首页 > 最新文献

Mathematical and Computer Modelling最新文献

英文 中文
Power consumption and processing models of servers in computation and storage based applications 基于计算和存储的应用中服务器的功耗和处理模型
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.11.021
Takuro Inoue , Ailixier Aikebaier , Tomoya Enokido , Makoto Takizawa

The electric power consumption of information systems has to be reduced in addition to increasing the performance and fault tolerance in order to realize green societies. Here, servers mainly consume electric power to perform processes requested by clients compared with clients. We consider computation (CP) and storage (ST) types of application processes on servers. In CP processes, CPU is mainly consumed as in scientific computation. In ST processes, files in storage drives are mainly manipulated. First, we present the storage and computation based power consumption (SCBPC) model of a server to perform ST and CP processes. In the SCBPC model, the power consumption rate of a server depends on the types of processes concurrently performed and is independent of the number of processes. Then, we discuss the storage and computation based processing (SCBP) model to perform CP and ST processes on a server. Here, the execution times of a CP process and an ST process depend on the number of CP processes and the number of CP and ST processes concurrently performed, respectively. By using the SCBPC and SCBP models, we discuss an energy-aware (EA) algorithm to select a server for a process so that not only the execution time but also the power consumption can be reduced. We evaluate the EA algorithm in terms of total power consumption of servers and total execution time of processes. We show not only the total power consumption but also the total execution time can be reduced in the EA algorithm.

为了实现绿色社会,必须在提高信息系统性能和容错能力的基础上降低信息系统的电力消耗。在这里,与客户端相比,服务器消耗的电力主要用于执行客户端请求的进程。我们考虑服务器上的计算(CP)和存储(ST)类型的应用程序进程。在CP进程中,CPU主要用于科学计算。在ST进程中,主要操作存储驱动器中的文件。首先,我们提出了基于存储和计算的服务器功耗(SCBPC)模型来执行ST和CP进程。在SCBPC模型中,服务器的功耗率取决于并发执行的进程类型,与进程数量无关。然后,我们讨论了基于存储和计算的处理(SCBP)模型在服务器上执行CP和ST处理。这里,CP进程和ST进程的执行时间分别取决于CP进程的数量以及同时执行的CP和ST进程的数量。通过使用SCBPC和SCBP模型,我们讨论了一种能量感知(EA)算法来为进程选择服务器,从而不仅可以减少执行时间,还可以降低功耗。我们根据服务器的总功耗和进程的总执行时间来评估EA算法。我们证明了EA算法不仅可以减少总功耗,而且可以减少总执行时间。
{"title":"Power consumption and processing models of servers in computation and storage based applications","authors":"Takuro Inoue ,&nbsp;Ailixier Aikebaier ,&nbsp;Tomoya Enokido ,&nbsp;Makoto Takizawa","doi":"10.1016/j.mcm.2012.11.021","DOIUrl":"10.1016/j.mcm.2012.11.021","url":null,"abstract":"<div><p>The electric power consumption of information systems has to be reduced in addition to increasing the performance and fault tolerance in order to realize green societies. Here, servers mainly consume electric power to perform processes requested by clients compared with clients. We consider computation (<em>CP</em>) and storage (<em>ST</em>) types of application processes on servers. In CP processes, CPU is mainly consumed as in scientific computation. In ST processes, files in storage drives are mainly manipulated. First, we present the storage and computation based power consumption (SCBPC) model of a server to perform ST and CP processes. In the SCBPC model, the power consumption rate of a server depends on the types of processes concurrently performed and is independent of the number of processes. Then, we discuss the storage and computation based processing (SCBP) model to perform CP and ST processes on a server. Here, the execution times of a CP process and an ST process depend on the number of CP processes and the number of CP and ST processes concurrently performed, respectively. By using the SCBPC and SCBP models, we discuss an energy-aware (EA) algorithm to select a server for a process so that not only the execution time but also the power consumption can be reduced. We evaluate the EA algorithm in terms of total power consumption of servers and total execution time of processes. We show not only the total power consumption but also the total execution time can be reduced in the EA algorithm.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1475-1488"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.11.021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88080241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A secure communication over wireless environments by using a data connection core 利用数据连接核心实现无线环境下的安全通信
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.11.022
Yi-Li Huang, Fang-Yie Leu, Ko-Chung Wei

Recently, wireless networks, such as Wi-Fi and 3G, have been widely equipped and popularly used in the world. People holding smart devices can conveniently access the Internet services through modern wireless networks. However, when people are enjoying using wireless systems, network security has been a crucial challenge because wireless messages, encrypted or unencrypted, may be maliciously intercepted by hackers. After analyzing and/or decrypting the messages, hackers can illegally capture or steal important information, such as credit card numbers or usernames/passwords, carried in the messages. Currently, SSL and IPsec are utilized to protect the delivery of these types of information. However, each of the two security protocols has its own drawbacks both in their key exchange and message encryption/decryption processes. To solve these drawbacks, in this paper, we propose a secure communication system, named the Wireless Security System with Data Connection Core (WiSDC for short), which consists of two security schemes, including a symmetric key exchange process and a two-dimensional stream cipher mechanism. The former employs random numbers and the connection keys contained in the Data Connection Core (the DCC for short) to generate internal keys, through which the security level of the key exchange process can be enhanced. Here, the DCC is a set of random numbers created when the underlying user registers himself/herself with the wireless system being considered, and the random numbers are only known to the user and AAA server of the wireless system. The latter invokes two operators, including exclusive-or and binary adder +2 operators, and two Pseudo Random Number Sequences (PRNSs) to encrypt plaintext so as to well protect the ciphertext. The WiSDC also adopts a pseudo random number generator, which feeds back keys in current stage as a part of the inputs of the next stage, to generate more complicated keys for data encryption. Experimental results show that the WiSDC can effectively protect transmitted messages for wireless environments. The analytical results indicate that the WiSDC has higher security level and execution efficiency than those of the SSL and IPsec.

近年来,Wi-Fi和3G等无线网络在世界范围内得到了广泛的装备和普及。手持智能设备的人们可以通过现代无线网络方便地访问互联网服务。然而,当人们享受使用无线系统时,网络安全一直是一个至关重要的挑战,因为无线信息,加密或未加密,都可能被黑客恶意拦截。在分析和/或解密信息后,黑客可以非法获取或窃取信息中携带的重要信息,如信用卡号码或用户名/密码。目前,SSL和IPsec被用来保护这类信息的传递。然而,这两种安全协议在密钥交换和消息加密/解密过程中都有自己的缺点。为了解决这些问题,本文提出了一种安全的通信系统,称为具有数据连接核心的无线安全系统(简称WiSDC),该系统由对称密钥交换过程和二维流密码机制两种安全方案组成。前者使用随机数和数据连接核心(Data connection Core,简称DCC)中包含的连接密钥生成内部密钥,从而提高密钥交换过程的安全级别。这里,DCC是底层用户向所考虑的无线系统注册时创建的一组随机数,并且这些随机数仅为该无线系统的用户和AAA服务器所知道。后者调用两个操作符(异或⊕和二进制加法器+2操作符)和两个伪随机数序列(PRNSs)对明文进行加密,从而很好地保护密文。WiSDC还采用伪随机数生成器,将当前阶段的密钥作为下一阶段输入的一部分进行反馈,生成更复杂的密钥用于数据加密。实验结果表明,WiSDC可以有效地保护无线环境下传输的消息。分析结果表明,与SSL和IPsec相比,WiSDC具有更高的安全级别和执行效率。
{"title":"A secure communication over wireless environments by using a data connection core","authors":"Yi-Li Huang,&nbsp;Fang-Yie Leu,&nbsp;Ko-Chung Wei","doi":"10.1016/j.mcm.2012.11.022","DOIUrl":"10.1016/j.mcm.2012.11.022","url":null,"abstract":"<div><p>Recently, wireless networks, such as Wi-Fi and 3G, have been widely equipped and popularly used in the world. People holding smart devices can conveniently access the Internet services through modern wireless networks. However, when people are enjoying using wireless systems, network security has been a crucial challenge because wireless messages, encrypted or unencrypted, may be maliciously intercepted by hackers. After analyzing and/or decrypting the messages, hackers can illegally capture or steal important information, such as credit card numbers or usernames/passwords, carried in the messages. Currently, SSL and IPsec are utilized to protect the delivery of these types of information. However, each of the two security protocols has its own drawbacks both in their key exchange and message encryption/decryption processes. To solve these drawbacks, in this paper, we propose a secure communication system, named the <u>Wi</u>reless <u>S</u>ecurity System with <u>D</u>ata <u>C</u>onnection Core (WiSDC for short), which consists of two security schemes, including a symmetric key exchange process and a two-dimensional stream cipher mechanism. The former employs random numbers and the connection keys contained in the <u>D</u>ata <u>C</u>onnection <u>C</u>ore (the DCC for short) to generate internal keys, through which the security level of the key exchange process can be enhanced. Here, the DCC is a set of random numbers created when the underlying user registers himself/herself with the wireless system being considered, and the random numbers are only known to the user and AAA server of the wireless system. The latter invokes two operators, including exclusive-or<span><math><mo>⊕</mo></math></span> and binary adder <span><math><msub><mrow><mo>+</mo></mrow><mrow><mn>2</mn></mrow></msub></math></span> operators, and two Pseudo Random Number Sequences (PRNSs) to encrypt plaintext so as to well protect the ciphertext. The WiSDC also adopts a pseudo random number generator, which feeds back keys in current stage as a part of the inputs of the next stage, to generate more complicated keys for data encryption. Experimental results show that the WiSDC can effectively protect transmitted messages for wireless environments. The analytical results indicate that the WiSDC has higher security level and execution efficiency than those of the SSL and IPsec.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1459-1474"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.11.022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125657518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Resource allocation models’ construction for the reduction of undesirable outputs based on DEA methods 基于DEA方法的减少不良产出的资源配置模型构建
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.10.026
Hong Li , Wei Yang , Zhixiang Zhou , Chengming Huang

During the fast developing process of the Chinese economy, China consumes lots of energy and environmental pollution caused by energy consumption currently urgently needs solving. So, paying more attention to energy saving and emission reduction is very important. Therefore, to reasonably allocate resources and reduce emissions in China’s different regions has practical significance. So this paper firstly considers the model construction method for resource allocation considering undesirable outputs between different decision making units based on the DEA framework under the CRS and VRS assumption. We have proposed some resource allocation models as a multiple objective linear problem which considers the input reduction, desirable output reduction and undesirable output reduction. Then, to demonstrate the practical application of the resource allocation model, numerical examples are used to illustrate the approach. In addition, we explore the resource allocation problem of China’s regions in 2006–2010. The empirical results show that the resource allocation models dealing with undesirable outputs have effective configuration results, that is, the reduction proportion for desirable output is smaller than the reduction proportion for undesirable output. From the resource allocation results in China’s regions, we find that the eastern area has more emission reduction than the central and western areas corresponding to the same energy consumption reduction, and the energy and environmental policy should focus more on the central and western areas. All of these conclusions will give some policy recommendations on saving energy and reducing pollution emissions.

在中国经济快速发展的过程中,中国消耗了大量的能源,能源消耗造成的环境污染是目前急需解决的问题。因此,更加重视节能减排是非常重要的。因此,在中国不同地区合理配置资源,减少排放具有现实意义。因此,本文首先考虑了在CRS和VRS假设下,基于DEA框架的不同决策单元间考虑不良产出的资源分配模型构建方法。提出了考虑投入减少、期望产出减少和不期望产出减少的多目标线性问题的资源分配模型。然后,为了说明资源分配模型的实际应用,用数值算例说明了该方法。此外,本文还探讨了2006-2010年中国区域资源配置问题。实证结果表明,考虑不期望产出的资源配置模型具有有效的配置结果,即期望产出的减少比例小于不期望产出的减少比例。从中国各地区的资源配置结果来看,在相同的能耗降幅下,东部地区的减排幅度大于中西部地区,能源环境政策应更多地向中西部地区倾斜。这些结论将为节能减排提供一定的政策建议。
{"title":"Resource allocation models’ construction for the reduction of undesirable outputs based on DEA methods","authors":"Hong Li ,&nbsp;Wei Yang ,&nbsp;Zhixiang Zhou ,&nbsp;Chengming Huang","doi":"10.1016/j.mcm.2012.10.026","DOIUrl":"10.1016/j.mcm.2012.10.026","url":null,"abstract":"<div><p>During the fast developing process of the Chinese economy, China consumes lots of energy and environmental pollution caused by energy consumption currently urgently needs solving. So, paying more attention to energy saving and emission reduction is very important. Therefore, to reasonably allocate resources and reduce emissions in China’s different regions has practical significance. So this paper firstly considers the model construction method for resource allocation considering undesirable outputs between different decision making units based on the DEA framework under the CRS and VRS assumption. We have proposed some resource allocation models as a multiple objective linear problem which considers the input reduction, desirable output reduction and undesirable output reduction. Then, to demonstrate the practical application of the resource allocation model, numerical examples are used to illustrate the approach. In addition, we explore the resource allocation problem of China’s regions in 2006–2010. The empirical results show that the resource allocation models dealing with undesirable outputs have effective configuration results, that is, the reduction proportion for desirable output is smaller than the reduction proportion for undesirable output. From the resource allocation results in China’s regions, we find that the eastern area has more emission reduction than the central and western areas corresponding to the same energy consumption reduction, and the energy and environmental policy should focus more on the central and western areas. All of these conclusions will give some policy recommendations on saving energy and reducing pollution emissions.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 913-926"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.10.026","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77544079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A cognitive RBAC model with handover functions in small heterogeneous networks 小型异构网络中具有切换功能的认知RBAC模型
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2013.02.001
Hsing-Chung Chen , Marsha Anjanette Violetta

In communication networks, a cognitive network (CN) is a new type of data network which is used to solve some of the problems that face current networks. Cognitive radio (CR) is part of a cognitive network and a smart wireless communication system. CR is conscious of its surrounding environment, learns from the environment and adapts its internal states by making corresponding real-time changes in certain operating parameters. In this paper, we propose a Cognitive RBAC scheme which can be applied to Small Heterogeneous Networks (SHNs) with handover function. We propose the Cognitive RBAC model applying with handover function in SHNs by extending from the well-known RBAC model. The required definitions for the model are proposed in this paper. They can increase the ability of the conventional RBAC model to meet new challenges. In our scheme, we assume that Cognitive Server (CS) provides and manages the permissions of services, and also supports a variety of CRs and CNs. For more efficiently managing CR and CN and meeting the SHNs, we let a mobile user actively perceive current network situations to get permissions and access corresponding services under the negotiation made among CSs to get better QoS if handover occurs either by Inter-CS Handover or Intra-CS Handover. In this paper, the cognitive RBAC functions and their definitions are proposed and defined for new applications in a SHN environment.

在通信网络中,认知网络(CN)是一种新型的数据网络,用于解决当前网络面临的一些问题。认知无线电(CR)是认知网络和智能无线通信系统的一部分。CR意识到其周围的环境,从环境中学习,并通过对某些运行参数进行相应的实时变化来适应其内部状态。本文提出了一种适用于具有切换功能的小型异构网络的认知RBAC方案。在已有的认知RBAC模型的基础上,提出了在shn中应用切换功能的认知RBAC模型。本文提出了该模型所需的定义。它们可以提高传统RBAC模型应对新挑战的能力。在我们的方案中,我们假设认知服务器(Cognitive Server, CS)提供和管理服务的权限,并支持各种cr和cn。为了更有效地管理CR和CN并满足shn,我们让移动用户主动感知当前网络情况,在cs间切换或cs内切换时,通过cs间的协商获得相应的权限和访问相应的服务,从而获得更好的QoS。本文针对SHN环境下的新应用,提出并定义了认知RBAC函数及其定义。
{"title":"A cognitive RBAC model with handover functions in small heterogeneous networks","authors":"Hsing-Chung Chen ,&nbsp;Marsha Anjanette Violetta","doi":"10.1016/j.mcm.2013.02.001","DOIUrl":"10.1016/j.mcm.2013.02.001","url":null,"abstract":"<div><p>In communication networks, a cognitive network (CN) is a new type of data network which is used to solve some of the problems that face current networks. Cognitive radio (CR) is part of a cognitive network and a smart wireless communication system. CR is conscious of its surrounding environment, learns from the environment and adapts its internal states by making corresponding real-time changes in certain operating parameters. In this paper, we propose a Cognitive RBAC scheme which can be applied to Small Heterogeneous Networks (SHNs) with handover function. We propose the Cognitive RBAC model applying with handover function in SHNs by extending from the well-known RBAC model. The required definitions for the model are proposed in this paper. They can increase the ability of the conventional RBAC model to meet new challenges. In our scheme, we assume that Cognitive Server (CS) provides and manages the permissions of services, and also supports a variety of CRs and CNs. For more efficiently managing CR and CN and meeting the SHNs, we let a mobile user actively perceive current network situations to get permissions and access corresponding services under the negotiation made among CSs to get better QoS if handover occurs either by Inter-CS Handover or Intra-CS Handover. In this paper, the cognitive RBAC functions and their definitions are proposed and defined for new applications in a SHN environment.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1267-1288"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2013.02.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77674287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing 一种以人为中心感知中具有灵活身份撤销的隐私保护认证方案
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2013.02.007
Dan Cao, Baokang Zhao, Jinshu Su, Baosheng Wang, Xiaofeng Wang

People-Centric Sensing (PCS) is a new sensing paradigm, in which people’s context information is described by attributes. However, due to the nature of “people centric” and dynamicity, the prevalence of PCS faces two main challenges, including authentication with privacy preservation and complex identity revocation.

In this paper, we propose the ABS-KR, an attribute-based signature scheme supporting key revocation. ABS-KR inherits the advantage of most attribute-based signature schemes, that is, a signature only shows that whether the user owns attributes satisfying the verification policy, no more information about his identifier or attributes, implementing authentication with privacy preservation. Furthermore, we introduce a mediator responsible for the key revocation to reduce the workload of the attribute authority managing users’ attributes and generating secret key for them. The core idea of performing flexible revocation is to divide a user’s secret key into two shares, and give one part to the mediator, making the user asking the mediator for help to generate a valid signature. Before answering the user, the mediator performs a revocation check for the user’s identifier and claimed attributes. If and only if the signer owns unrevoked attributes satisfying the policy, he can generate a valid signature. In addition, the mediator realizes instantaneous key revocation through revocation check during signing a message. Moreover, our ABS-KR supports monotone policies in the form of attribute trees under the computational Diffie–Hellman assumption.

以人为中心的感知是一种新的感知范式,它将人的语境信息用属性来描述。然而,由于“以人为本”的特性和动态性,pc的普及面临着两个主要挑战,即具有隐私保护的身份验证和复杂的身份撤销。本文提出了一种支持密钥撤销的基于属性的签名方案ABS-KR。ABS-KR继承了大多数基于属性的签名方案的优点,即签名只显示用户是否拥有满足验证策略的属性,而不显示其标识符或属性的更多信息,实现了保护隐私的身份验证。此外,我们引入了一个负责密钥撤销的中介,以减少管理用户属性并为其生成密钥的属性机构的工作量。执行灵活撤销的核心思想是将用户的秘密密钥分成两个共享,并将一部分交给中介,使用户请求中介帮助生成有效签名。在回答用户之前,中介对用户的标识符和声明的属性执行撤销检查。当且仅当签名者拥有满足策略的未撤销属性时,他才能生成有效的签名。此外,中介还可以在消息签名期间通过撤销检查实现密钥的即时撤销。此外,我们的ABS-KR在计算性的Diffie-Hellman假设下以属性树的形式支持单调策略。
{"title":"A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing","authors":"Dan Cao,&nbsp;Baokang Zhao,&nbsp;Jinshu Su,&nbsp;Baosheng Wang,&nbsp;Xiaofeng Wang","doi":"10.1016/j.mcm.2013.02.007","DOIUrl":"10.1016/j.mcm.2013.02.007","url":null,"abstract":"<div><p>People-Centric Sensing (PCS) is a new sensing paradigm, in which people’s context information is described by attributes. However, due to the nature of “people centric” and dynamicity, the prevalence of PCS faces two main challenges, including authentication with privacy preservation and complex identity revocation.</p><p>In this paper, we propose the ABS-KR, an attribute-based signature scheme supporting key revocation. ABS-KR inherits the advantage of most attribute-based signature schemes, that is, a signature only shows that whether the user owns attributes satisfying the verification policy, no more information about his identifier or attributes, implementing authentication with privacy preservation. Furthermore, we introduce a mediator responsible for the key revocation to reduce the workload of the attribute authority managing users’ attributes and generating secret key for them. The core idea of performing flexible revocation is to divide a user’s secret key into two shares, and give one part to the mediator, making the user asking the mediator for help to generate a valid signature. Before answering the user, the mediator performs a revocation check for the user’s identifier and claimed attributes. If and only if the signer owns unrevoked attributes satisfying the policy, he can generate a valid signature. In addition, the mediator realizes instantaneous key revocation through revocation check during signing a message. Moreover, our ABS-KR supports monotone policies in the form of attribute trees under the computational Diffie–Hellman assumption.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1175-1188"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2013.02.007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74815163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring the environmental efficiency of the Chinese industrial sector: A directional distance function approach 衡量中国工业部门的环境效率:一个方向距离函数方法
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.10.024
Peng Yuan, Shi Cheng , Jia Sun , Wenbo Liang

This paper presents a directional distance function approach to measure two technical efficiencies with respect to the two technologies characterized by strong and weak disposability of pollutants. The environmental efficiency index, defined as the ratio of the two technical efficiencies, reflects the opportunity cost to transform the strong disposability of pollutants into a weak one. The proposed approach is applied to measure the environmental efficiency index of the Chinese industrial sector, with the input and output data of the sector in 284 cities at the prefecture level and above in China from 2003 to 2009, including the emissions of wastewater, sulfur dioxide, and soot. Several factors of environmental efficiency are also investigated by using a panel Tobit model.

本文提出了一种定向距离函数方法来衡量两种技术效率,这两种技术的特点是污染物的强可处置性和弱可处置性。环境效率指数定义为两种技术效率之比,反映了将污染物的强可处置性转化为弱可处置性的机会成本。利用2003 - 2009年中国284个地级及以上城市工业部门的投入产出数据,包括废水、二氧化硫和烟尘排放,将该方法应用于中国工业部门环境效率指数的测度。采用面板Tobit模型对影响环境效率的几个因素进行了研究。
{"title":"Measuring the environmental efficiency of the Chinese industrial sector: A directional distance function approach","authors":"Peng Yuan,&nbsp;Shi Cheng ,&nbsp;Jia Sun ,&nbsp;Wenbo Liang","doi":"10.1016/j.mcm.2012.10.024","DOIUrl":"10.1016/j.mcm.2012.10.024","url":null,"abstract":"<div><p>This paper presents a directional distance function approach to measure two technical efficiencies with respect to the two technologies characterized by strong and weak disposability of pollutants. The environmental efficiency index, defined as the ratio of the two technical efficiencies, reflects the opportunity cost to transform the strong disposability of pollutants into a weak one. The proposed approach is applied to measure the environmental efficiency index of the Chinese industrial sector, with the input and output data of the sector in 284 cities at the prefecture level and above in China from 2003 to 2009, including the emissions of wastewater, sulfur dioxide, and soot. Several factors of environmental efficiency are also investigated by using a panel Tobit model.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 936-947"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.10.024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87777756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
D-PMIPv6: A distributed mobility management scheme supported by data and control plane separation D-PMIPv6:一种支持数据平面和控制平面分离的分布式移动管理方案
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.11.031
Li Yi, Huachun Zhou, Daochao Huang, Hongke Zhang

Over the past few years, modern mobile subscriber devices such as Smartphones, tablets and PDAs have become more and more popular which use network resources in a more aggressive way and last for longer durations involving dramatically increasing traffic volumes. But traditional mobility management schemes have hardly taken this issue into account. Distributed mobility management is considered as a new trend for developing a mobility management scheme to address such an issue. This paper proposes D-PMIPv6, which is to achieve a distributed mobility management scheme supported by data and control plane separation based on PMIPv6. In the architecture of D-PMIPv6, the traditional functional entity Local mobility anchor (LMA) is split into two parts: Control plane LMA and Data plane LMA. We conclude with the three goals of distributed mobility management. With its elaborate design, D-PMIPv6 is proved to achieve these goals. Numerical results show that a single Control plane LMA can hold quite a number of MNs and the handover performance of D-PMIPv6 is acceptable compared to PMIPv6. Meanwhile, D-PMIPv6 can improve the performance in terms of the packet delivery cost compared to other mobility management schemes.

在过去的几年中,智能手机、平板电脑和pda等现代移动用户设备变得越来越流行,这些设备以更积极的方式使用网络资源,持续时间更长,导致流量急剧增加。但是传统的交通管理方案几乎没有考虑到这个问题。分布式移动管理被认为是解决这一问题的移动管理方案发展的新趋势。D-PMIPv6是一种基于PMIPv6实现数据平面与控制平面分离的分布式移动性管理方案。在D-PMIPv6体系结构中,将传统的功能实体本地移动锚(Local mobility anchor, LMA)分为控制平面LMA和数据平面LMA两部分。我们总结了分布式移动性管理的三个目标。通过其精心设计,D-PMIPv6被证明可以实现这些目标。数值结果表明,单个控制平面LMA可以容纳相当数量的MNs,与PMIPv6相比,D-PMIPv6的切换性能是可以接受的。同时,与其他移动管理方案相比,D-PMIPv6在数据包传输成本方面具有更高的性能。
{"title":"D-PMIPv6: A distributed mobility management scheme supported by data and control plane separation","authors":"Li Yi,&nbsp;Huachun Zhou,&nbsp;Daochao Huang,&nbsp;Hongke Zhang","doi":"10.1016/j.mcm.2012.11.031","DOIUrl":"10.1016/j.mcm.2012.11.031","url":null,"abstract":"<div><p>Over the past few years, modern mobile subscriber devices such as Smartphones, tablets and PDAs have become more and more popular which use network resources in a more aggressive way and last for longer durations involving dramatically increasing traffic volumes. But traditional mobility management schemes have hardly taken this issue into account. Distributed mobility management is considered as a new trend for developing a mobility management scheme to address such an issue. This paper proposes D-PMIPv6, which is to achieve a distributed mobility management scheme supported by data and control plane separation based on PMIPv6. In the architecture of D-PMIPv6, the traditional functional entity Local mobility anchor (LMA) is split into two parts: Control plane LMA and Data plane LMA. We conclude with the three goals of distributed mobility management. With its elaborate design, D-PMIPv6 is proved to achieve these goals. Numerical results show that a single Control plane LMA can hold quite a number of MNs and the handover performance of D-PMIPv6 is acceptable compared to PMIPv6. Meanwhile, D-PMIPv6 can improve the performance in terms of the packet delivery cost compared to other mobility management schemes.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1415-1426"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.11.031","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85145027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
The convergence test of transformation performance of resource cities in China considering undesirable output 考虑不良产出的中国资源型城市转型绩效的收敛检验
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2012.10.020
Feng Dong , Ruyin Long , Hong Chen , Xiaohui Li , Xiaoyan Liu

The main challenge for sustainable development of resource cities is to work out a feasible strategy for transformation processes. This paper introduces a new approach for analysis of transformation performance. Using the environmental production technology and a Malmquist resource performance index (MRPI), we conduct σ, absolute β and conditional β convergence tests for the transformation performance of 21 resource cities in China. The results show that MRPI does not follow the same trend as economic strength of three Chinese regions. In addition, the transformation performance results exhibit a convergence trend for the 21 resource cities.

资源型城市可持续发展面临的主要挑战是制定可行的转型战略。本文介绍了一种分析改造效果的新方法。利用环境生产技术和Malmquist资源绩效指数(MRPI),对中国21个资源型城市的转型绩效进行σ、绝对β和条件β收敛检验。结果表明,MRPI与中国三个地区的经济实力变化趋势不一致。此外,21个资源型城市的转型绩效结果呈现趋同趋势。
{"title":"The convergence test of transformation performance of resource cities in China considering undesirable output","authors":"Feng Dong ,&nbsp;Ruyin Long ,&nbsp;Hong Chen ,&nbsp;Xiaohui Li ,&nbsp;Xiaoyan Liu","doi":"10.1016/j.mcm.2012.10.020","DOIUrl":"10.1016/j.mcm.2012.10.020","url":null,"abstract":"<div><p>The main challenge for sustainable development of resource cities is to work out a feasible strategy for transformation processes. This paper introduces a new approach for analysis of transformation performance. Using the environmental production technology and a Malmquist resource performance index (MRPI), we conduct <span><math><mi>σ</mi></math></span>, absolute <span><math><mi>β</mi></math></span> and conditional <span><math><mi>β</mi></math></span> convergence tests for the transformation performance of 21 resource cities in China. The results show that MRPI does not follow the same trend as economic strength of three Chinese regions. In addition, the transformation performance results exhibit a convergence trend for the 21 resource cities.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 948-955"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2012.10.020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85146048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Anonymously accessing JXTA community services through split message forwarding 通过拆分消息转发匿名访问JXTA社区服务
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2013.01.005
Joan Arnedo-Moreno, Noemí Pérez-Gilabert, Marc Domingo-Prieto

As peer-to-peer (P2P) systems have gained popularity and evolved to encompass different scenarios beyond simple file-sharing, such as ubiquitous and cognitive computing, awareness on the need for inclusion of security mechanisms into its design, has also raised. JXTA is an open P2P protocols specification that, for these reasons, has slowly incorporated security improvements such as message privacy and resource authentication, up to its latest version to this date, 2.7. However, under some contexts, even more advanced security requirements should be met. Anonymity, for which privacy is necessary but not a sufficient requirement, is a good example. Unfortunately, even though several approaches to message anonymization exist within the context of P2P networks, there is no perfect solution. In this work, we study the feasibility of anonymous access to JXTA community services using a split message-based approach. On that regard, we adapt a recently proposed anonymous protocol to JXTA’s idiosyncrasies and assess its actual performance under typical JXTA network configurations.

随着点对点(P2P)系统的普及和发展,它已经涵盖了简单的文件共享之外的不同场景,例如无处不在的和认知计算,人们对在其设计中包含安全机制的必要性的认识也有所提高。JXTA是一个开放的P2P协议规范,由于这些原因,它慢慢地整合了诸如消息隐私和资源身份验证等安全性改进,直到目前的最新版本2.7。然而,在某些上下文中,甚至应该满足更高级的安全性需求。匿名是一个很好的例子,隐私是必要的,但不是充分的要求。不幸的是,即使在P2P网络环境中存在几种消息匿名化方法,也没有完美的解决方案。在这项工作中,我们研究了使用基于拆分消息的方法匿名访问JXTA社区服务的可行性。在这方面,我们根据JXTA的特性调整了最近提出的匿名协议,并在典型的JXTA网络配置下评估了其实际性能。
{"title":"Anonymously accessing JXTA community services through split message forwarding","authors":"Joan Arnedo-Moreno,&nbsp;Noemí Pérez-Gilabert,&nbsp;Marc Domingo-Prieto","doi":"10.1016/j.mcm.2013.01.005","DOIUrl":"10.1016/j.mcm.2013.01.005","url":null,"abstract":"<div><p>As peer-to-peer (P2P) systems have gained popularity and evolved to encompass different scenarios beyond simple file-sharing, such as ubiquitous and cognitive computing, awareness on the need for inclusion of security mechanisms into its design, has also raised. JXTA is an open P2P protocols specification that, for these reasons, has slowly incorporated security improvements such as message privacy and resource authentication, up to its latest version to this date, 2.7. However, under some contexts, even more advanced security requirements should be met. Anonymity, for which privacy is necessary but not a sufficient requirement, is a good example. Unfortunately, even though several approaches to message anonymization exist within the context of P2P networks, there is no perfect solution. In this work, we study the feasibility of anonymous access to JXTA community services using a split message-based approach. On that regard, we adapt a recently proposed anonymous protocol to JXTA’s idiosyncrasies and assess its actual performance under typical JXTA network configurations.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1313-1327"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2013.01.005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91124653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Utilizing artificial neural networks and genetic algorithms to build an algo-trading model for intra-day foreign exchange speculation 利用人工神经网络和遗传算法建立日内外汇投机的算法交易模型
Pub Date : 2013-09-01 DOI: 10.1016/j.mcm.2013.02.002
Cain Evans , Konstantinos Pappas , Fatos Xhafa

The Foreign Exchange Market is the biggest and one of the most liquid markets in the world. This market has always been one of the most challenging markets as far as short term prediction is concerned. Due to the chaotic, noisy, and non-stationary nature of the data, the majority of the research has been focused on daily, weekly, or even monthly prediction. The literature review revealed that there is a gap for intra-day market prediction. Identifying this gap, this paper introduces a prediction and decision making model based on Artificial Neural Networks (ANN) and Genetic Algorithms. The dataset utilized for this research comprises of 70 weeks of past currency rates of the 3 most traded currency pairs: GBP∖USD, EUR∖GBP, and EUR∖USD. The initial statistical tests confirmed with a significance of more than 95% that the daily FOREX currency rates time series are not randomly distributed. Another important result is that the proposed model achieved 72.5% prediction accuracy. Furthermore, implementing the optimal trading strategy, this model produced 23.3% Annualized Net Return.

外汇市场是世界上最大和最具流动性的市场之一。就短期预测而言,这个市场一直是最具挑战性的市场之一。由于数据的混沌、噪声和非平稳性,大多数研究都集中在每日、每周甚至每月的预测上。文献综述发现,日内市场预测存在空白。针对这一不足,本文提出了一种基于人工神经网络和遗传算法的预测和决策模型。本研究使用的数据集包括过去70周交易最多的3种货币对的货币汇率:GBP + USD, EUR + GBP和EUR + USD。初步统计检验证实,每日外汇汇率时间序列不是随机分布的,显著性超过95%。另一个重要的结果是,该模型的预测精度达到了72.5%。此外,在实施最优交易策略后,该模型的年化净收益率为23.3%。
{"title":"Utilizing artificial neural networks and genetic algorithms to build an algo-trading model for intra-day foreign exchange speculation","authors":"Cain Evans ,&nbsp;Konstantinos Pappas ,&nbsp;Fatos Xhafa","doi":"10.1016/j.mcm.2013.02.002","DOIUrl":"10.1016/j.mcm.2013.02.002","url":null,"abstract":"<div><p>The Foreign Exchange Market is the biggest and one of the most liquid markets in the world. This market has always been one of the most challenging markets as far as short term prediction is concerned. Due to the chaotic, noisy, and non-stationary nature of the data, the majority of the research has been focused on daily, weekly, or even monthly prediction. The literature review revealed that there is a gap for intra-day market prediction. Identifying this gap, this paper introduces a prediction and decision making model based on Artificial Neural Networks (ANN) and Genetic Algorithms. The dataset utilized for this research comprises of 70 weeks of past currency rates of the 3 most traded currency pairs: GBP∖USD, EUR∖GBP, and EUR∖USD. The initial statistical tests confirmed with a significance of more than 95% that the daily FOREX currency rates time series are not randomly distributed. Another important result is that the proposed model achieved 72.5% prediction accuracy. Furthermore, implementing the optimal trading strategy, this model produced 23.3% Annualized Net Return.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1249-1266"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2013.02.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90269581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
期刊
Mathematical and Computer Modelling
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1