GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Wiley ; 2022
    In:  Asia Pacific Viewpoint Vol. 63, No. 2 ( 2022-08), p. 236-249
    In: Asia Pacific Viewpoint, Wiley, Vol. 63, No. 2 ( 2022-08), p. 236-249
    Abstract: This article applies the pluralistic concept of environmental justice to the issue of park accessibility between people across different socioeconomic strata in the metropolitan region of Shanghai. Data were obtained from China's 2000 and 2010 population census, Shanghai Landscaping and City Appearance Administrative Bureau, semi‐structured interviews and secondary sources. The article finds significant environmental injustice between foreign citizens and Chinese citizens (including people from Hong Kong, Macau and Taiwan and mainland people with and without Shanghai hukou ) and between blue collar, white collar and wealthy white collar people from distributive, recognition, participatory and procedural justice perspectives. The article then discusses why such injustice is the result of urban China's unique authoritarian mode of governance, power structure, neoliberal practice and globalisation development. The findings offer insights into the development of the concept of environmental justice in the Chinese context and the country's objective to build an impartial society.
    Type of Medium: Online Resource
    ISSN: 1360-7456 , 1467-8373
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2022
    detail.hit.zdb_id: 2006516-4
    SSG: 14
    SSG: 6,32
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Wiley ; 2020
    In:  Population, Space and Place Vol. 26, No. 1 ( 2020-01)
    In: Population, Space and Place, Wiley, Vol. 26, No. 1 ( 2020-01)
    Abstract: With a remarkably increasing number of transnational migrants settling down in China, their residential spatial distributions in Chinese cities have drawn significant academic attention. This paper investigates recent residential spatial patterns of transnational migrants in Shanghai and the underlying driving forces behind such choices. Based on China's sixth population census and our 30 focus group interviews in 30 neighbourhood committees, this paper finds that comparing with it in the semi‐colonial period, Mao's era and the early stages of China's economic reform, transnational migrants' residential spatial patterns in recent times in Shanghai are dispersed in every corner rather than concentrated in specific areas such as the old settlement sites and foreign expert buildings. The paper explains that such residential spatial fragmentation is largely driven by the combined forces of a neoliberal approach in the unique urban political economy in China, globalisation development, individual socioeconomic and demographic concerns and cultural factors.
    Type of Medium: Online Resource
    ISSN: 1544-8444 , 1544-8452
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2020
    detail.hit.zdb_id: 2133981-8
    SSG: 14
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    In: Pediatric Anesthesia, Wiley, Vol. 24, No. 5 ( 2014-05), p. 505-509
    Abstract: The objective of this study was to determine ED 50 and ED 95 of remifentanil for intubation combined with propofol in nonparalyzed C hinese children. Methods Forty‐seven A merican Society of Anesthesiologists Class I children aged 4–11 years weighing 14–33.5 kg underwent general anesthesia with 2.5 mg·kg −1 of intravenous propofol followed by remifentanil in W enzhou, C hina. The initial dose of remifentanil was 2.5 μg·kg −1 injected over 60 s. Intubation was attempted 30 s after the completion of remifentanil injection. Level of difficulty to intubate was graded on a scoring system. If the initial intubation condition was deemed satisfactory, subsequent remifentanil doses were decreased by 0.25 μg·kg −1 . If the intubating condition was deemed unsatisfactory, subsequent remifentanil doses were increased by 0.25 μg·kg −1 . Mean arterial pressure, heart rate, and pulse oximetry were documented before and after induction, immediately after intubation, and 1 min after intubation. Results The ED 50 of remifentanil used to render a satisfactory intubating condition used in combination with 2.5 mg·kg −1 of propofol in nonparalyzed C hinese children was 2.30 μg·kg −1 (95% confidence interval: 2.28–2.31 μg·kg −1 ), and the ED 95 is 2.75 μg·kg −1 (95% confidence interval: 2.59–3.35 μg·kg −1 ). These doses were lower than previously reported. Conclusion When used in combination with 2.5 mg·kg −1 of intravenous propofol, ED 50 and ED 95 of remifentanil for adequate intubation in nonparalyzed children were lower than previously reported, at 2.30 and 2.75 μg·kg −1 , respectively.
    Type of Medium: Online Resource
    ISSN: 1155-5645 , 1460-9592
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2014
    detail.hit.zdb_id: 2008564-3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Wiley ; 2023
    In:  International Journal of Communication Systems Vol. 36, No. 1 ( 2023-01-10)
    In: International Journal of Communication Systems, Wiley, Vol. 36, No. 1 ( 2023-01-10)
    Abstract: In mobile edge computing, service migration can not only reduce the access latency but also reduce the network costs for users. However, due to bandwidth bottleneck, migration costs should also be considered during service migration. In this way, the trade‐off between benefits of service migration and total service costs is very important for the cloud service providers. In this paper, we propose an efficient dynamic service migration algorithm named SMDQN, which is based on reinforcement learning. We consider each mobile application service can be hosted on one or more edge nodes and each edge node has limited resources. SMDQN takes total delay and migration costs into consideration. And to reduce the size of Markov decision process space, we devise the deep reinforcement learning algorithm to make a fast decision. We implement the algorithm and test the performance and stability of it. The simulation result shows that it can minimize the service costs and adapt well to different mobile access patterns.
    Type of Medium: Online Resource
    ISSN: 1074-5351 , 1099-1131
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2023
    detail.hit.zdb_id: 2024893-3
    SSG: 24,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Wiley ; 2017
    In:  Concurrency and Computation: Practice and Experience Vol. 29, No. 24 ( 2017-12-25)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 29, No. 24 ( 2017-12-25)
    Abstract: Cloud has become a very popular infrastructure for many smart city applications. A growing number of smart city applications from all over the world are deployed on the clouds. However, node failure events from the cloud data center have negative impact on the performance of smart city applications. Survivable virtual machine placement has been proposed by the researchers to enhance the service reliability. Because of the ignorance of switch failure, current survivable virtual machine placement approaches cannot achieve the best effect. In this paper, we study to enhance the service reliability by designing a novel network failure–aware redundant virtual machine placement approach in a cloud data center. Firstly, we formulate the network failure–aware redundant virtual machine placement problem as an integer nonlinear programming problem and prove that the problem is NP‐hard. Secondly, we propose a heuristic algorithm to solve the problem. Finally, extensive simulation results show the effectiveness of our algorithm.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2017
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Software: Practice and Experience Vol. 51, No. 10 ( 2021-10), p. 1985-1986
    In: Software: Practice and Experience, Wiley, Vol. 51, No. 10 ( 2021-10), p. 1985-1986
    Type of Medium: Online Resource
    ISSN: 0038-0644 , 1097-024X
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 120252-2
    detail.hit.zdb_id: 1500326-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Wiley ; 2016
    In:  Security and Communication Networks Vol. 9, No. 15 ( 2016-10), p. 2581-2591
    In: Security and Communication Networks, Wiley, Vol. 9, No. 15 ( 2016-10), p. 2581-2591
    Abstract: Radio Frequency Identification (RFID) technology provides a seamless link between physical world and the information system in cyber space. However, the emerging Internet of Things and cloud systems are full of security holes, which introduce new challenging security problems in both tag identification and data privacy. In this paper, we present efficient methods for identity authentication and data encryption to enhance RFID privacy. The proposed techniques aim to ensure no adversary interacting with the tags and the reader, to infer any information on a tag's identity from the communication. The main idea, a symmetric cryptography technique, termed as Advanced Encryption Standard, was applied to implement both mutual authentication and data encryption between the front and back ends of RFID systems. The Advanced Encryption Standard cryptographic algorithm was adopted because of its low hardware complexity and high security strength. In addition, the proposed key management protocol is proved resistant to several known RFID attacks such as Man‐in‐the‐Middle, Denial‐of‐Service, replay, clone attack, and backward/forward traceability. The computational time complexity of the proposed scheme through the entire identity authentication and data encryption phases is 3 T encrypt  + 1 T nonce  + 4 T xor , which is superior to most existing approaches. The proposed scheme was also proved to be able to provide higher data encryption performance than other symmetric cryptographic algorithms with regard to the same level of security strength. Copyright © 2016 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1939-0114 , 1939-0122
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2016
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Wiley ; 2012
    In:  Security and Communication Networks Vol. 5, No. 10 ( 2012-10), p. 1112-1120
    In: Security and Communication Networks, Wiley, Vol. 5, No. 10 ( 2012-10), p. 1112-1120
    Abstract: Trusted quality of Web service (QoWS) issue is critical for e‐commerce applications. However, many existing studies have little work in situations that have insufficient or no historical information regarding QoWS data. In this study, we propose a trusted QoWS metric approach, that is, Bayesian Approach with Maximum Entropy Principle. The key of our proposed approach is to extract QoWS prior distribution of Web service by using Maximum Entropy Principle and then to infer QoWS posterior distribution of Web service by using Bayesian Approach. On the basis of the obtained QoWS posterior distribution, trusted QoWS can be measured. We conduct extensive simulations to evaluate our proposed approach. The simulation results demonstrate that our proposed approach can obtain trusted QoWS effectively. Copyright © 2012 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1939-0114 , 1939-0122
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2012
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Wiley ; 2020
    In:  Software: Practice and Experience Vol. 50, No. 5 ( 2020-05), p. 489-502
    In: Software: Practice and Experience, Wiley, Vol. 50, No. 5 ( 2020-05), p. 489-502
    Abstract: Mobile edge computing is emerging as a novel ubiquitous computing platform to overcome the limit resources of mobile devices and bandwidth bottleneck of the core network in mobile cloud computing. In mobile edge computing, it is a significant issue for cost reduction and QoS improvement to place edge clouds at the edge network as a small data center to serve users. In this paper, we study the edge cloud placement problem, which is to place the edge clouds at the candidate locations and allocate the mobile users to the edge clouds. Specifically, we formulate it as a multiobjective optimization problem with objective to balance the workload between edge clouds and minimize the service communication delay of mobile users. To this end, we propose an approximate approach that adopted the K‐means and mixed‐integer quadratic programming. Furthermore, we conduct experiments based on Shanghai Telecom's base station data set and compare our approach with other representative approaches. The results show that our approach performs better to some extent in terms of workload balance and communication delay and validate the proposed approach.
    Type of Medium: Online Resource
    ISSN: 0038-0644 , 1097-024X
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2020
    detail.hit.zdb_id: 120252-2
    detail.hit.zdb_id: 1500326-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Wiley ; 2012
    In:  Security and Communication Networks Vol. 5, No. 10 ( 2012-10), p. 1131-1140
    In: Security and Communication Networks, Wiley, Vol. 5, No. 10 ( 2012-10), p. 1131-1140
    Abstract: SYN flooding attacks are a common type of distributed denial‐of‐service attacks. Up to now, many defense schemes have been proposed against SYN flooding attacks. Traditional defense schemes rely on passively sniffing an attacking signature and are inaccurate in the early stages of an attack. These schemes are effective only at the later stages when attacking signatures are obvious. In this paper, we propose a detection approach that makes use of SYN traffic prediction to determine whether SYN flooding attacks happen at the early stage. We firstly adopt grey prediction model to predict SYN traffic, and then, we employ cumulative sum algorithm to detect SYN flooding attack traffic among forecasted SYN traffic. Trace‐driven simulation results demonstrate that our proposed detection approach can detect SYN flooding attacks effectively. Copyright © 2012 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1939-0114 , 1939-0122
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2012
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...