174 resultados para Minjiang Kou


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the existing watermarking protocols, a trusted third party (TTP) is introduced to guarantee that a protocol is fair to both the seller and buyer in a digital content transaction. However, the TTP decreases the security and affects the protocol implementation. To address this issue, in this article a secure buyer–seller watermarking protocol without the assistance of a TTP is proposed in which there are only two participants, a seller and a buyer. Based on the idea of sharing a secret, a watermark embedded in digital content to trace piracy is composed of two pieces of secret information, one produced by the seller and one by the buyer. Since neither knows the exact watermark, the buyer cannot remove the watermark from watermarked digital content, and at the same time the seller cannot fabricate piracy to frame an innocent buyer. In other words, the proposed protocol can trace piracy and protect the customer’s rights. In addition, because no third party is introduced into the proposed protocol, the problem of a seller (or a buyer) colluding with a third party to cheat the buyer (or the seller), namely, the conspiracy problem, can be avoided.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un trusted third party (UTTP) was proposed. Based on the idea of all-o>nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol pro vided mechanisms to trace piracy and protect customer's right, fn addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Certificateless public key encryption can be classified into two types, namely, CLE and CLE † , both of which were introduced by Al-Riyami and Paterson in Asiacrypt 2003. Most works about certificateless public key encryption belong to CLE, where the partial secret key is uniquely determined by an entity’s identity. In CLE † , an entity’s partial secret key is not only determined by the identity information but also by his/her (partial) public key. Such techniques can enhance the resilience of certificateless public key encryption against a cheating KGC. In this paper, we first formalize the security definitions of CLE † . After that, we demonstrate the gap between the security model of CLE † and CLE, by showing the insecurity of a CLE † scheme proposed by Lai and Kou in PKC 2007. We give an attack that can successfully break the indistinguishability of their CLE † scheme, although their scheme can be proved secure in the security model of CLE. Therefore, it does not suffice to consider the security of CLE † in the security model of CLE. Finally, we show how to secure Lai-Kou’s scheme by providing a new scheme with the security proof in the model of CLE †

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter of the "Flavor in the era of LHC" workshop report discusses flavor-related issues in the production and decays of heavy states at the LHC at high momentum transfer Q, both from the experimental and the theoretical perspective. We review top quark physics, and discuss the flavor aspects of several extensions of the standard model, such as supersymmetry, little Higgs models or models with extra dimensions. This includes discovery aspects, as well as the measurement of several properties of these heavy states. We also present publicly available computational tools related to this topic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increase in new electronic devices had generated a considerable increase in obtaining spatial data information; hence these data are becoming more and more widely used. As well as for conventional data, spatial data need to be analyzed so interesting information can be retrieved from them. Therefore, data clustering techniques can be used to extract clusters of a set of spatial data. However, current approaches do not consider the implicit semantics that exist between a region and an object’s attributes. This paper presents an approach that enhances spatial data mining process, so they can use the semantic that exists within a region. A framework was developed, OntoSDM, which enables spatial data mining algorithms to communicate with ontologies in order to enhance the algorithm’s result. The experiments demonstrated a semantically improved result, generating more interesting clusters, therefore reducing manual analysis work of an expert.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several types of alumina were synthesized from sodium aluminate (NaAlO2) by precipitation with sulfuric acid (H2SO4) and subsequently calcination at 500 degrees C to obtain gamma-Al2O3. The precursor aluminate was derived from aluminum scrap. The various gamma-Al2O3 synthesized were characterized by Fourier-transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), adsorption-desorption of N-2 (S-BET) and scanning electron microscopy (SEM). XRD revealed that distinct phases of Al2O3 were formed during thermal treatment. Moreover, it was observed that conditions of synthesis (pH, aging time and temperature) strongly affect the physicochemical properties of the alumina. A high-surface-area alumina (371 m(2) g(-1)) was synthesized under mild conditions, from inexpensive raw materials. These aluminas were tested for the adsorption of Cd(II), Zn(II) and Pb(II) from aqueous solution at toxic metal concentrations, and isotherms were determined. (C) 2012 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present the Kinship Verification in the Wild Competition: the first kinship verification competition which is held in conjunction with the International Joint Conference on Biometrics 2014, Clearwater, Florida, USA. The key goal of this competition is to compare the performance of different methods on a new-collected dataset with the same evaluation protocol and develop the first standardized benchmark for kinship verification in the wild.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Questa tesi è incentrata sull'analisi della formula di Dupire, che permette di ottenere un'espressione della volatilità locale, nei modelli di Lévy esponenziali. Vengono studiati i modelli di mercato Merton, Kou e Variance Gamma dimostrando che quando si è off the money la volatilità locale tende ad infinito per il tempo di maturità delle opzioni che tende a zero. In particolare viene proposta una procedura di regolarizzazione tale per cui il processo di volatilità locale di Dupire ricrea i corretti prezzi delle opzioni anche quando si ha la presenza di salti. Infine tale risultato viene provato numericamente risolvendo il problema di Cauchy per i prezzi delle opzioni.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elicitability has recently been discussed as a desirable property for risk measures. Kou and Peng (2014) showed that an elicitable distortion risk measure is either a Value-at-Risk or the mean. We give a concise alternative proof of this result, and discuss the conflict between comonotonic additivity and elicitability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Experimental diffusion data were critically assessed to develop the atomic mobility for the bcc phase of the Ti–Al–Fe system by using the DICTRA software. Good agreements were obtained from comprehensive comparisons made between the calculated and the experimental diffusion coefficients. The developed atomic mobility was then validated by well predicting the interdiffusion behavior observed from the diffusion-couple experiments in available literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Streptozotocin (STZ), a glucose analogue known to induce diabetes in experimental animals, causes DNA strand breaks and subsequent activation of poly(ADPribose) polymerase (Parp). Because Parp uses NAD as a substrate, extensive DNA damage will result in reduction of cellular NAD level. In fact, STZ induces NAD depletion and cell death in isolated pancreatic islets in vitro. Activation of Parp therefore is thought to play an important role in STZ-induced diabetes. In the present study, we established Parp-deficient (Parp−/−) mice by disrupting Parp exon 1 by using the homologous recombination technique. These mice were used to examine the possible involvement of Parp in STZ-induced β-cell damage in vivo. The wild-type (Parp+/+) mice showed significant increases in blood glucose concentration from 129 mg/dl to 218, 370, 477, and 452 mg/dl on experimental days 1, 7, 21, and 60, respectively, after a single injection of 180 mg STZ/kg body weight. In contrast, the concentration of blood glucose in Parp−/− mice remained normal up to day 7, slightly increased on day 21, but returned to normal levels on day 60. STZ injection caused extensive necrosis in the islets of Parp+/+ mice on day 1, with subsequent progressive islet atrophy and loss of functional β cells from day 7. In contrast, the extent of islet β-cell death and dysfunction was markedly less in Parp−/− mice. Our findings clearly implicate Parp activation in islet β-cell damage and glucose intolerance induced by STZ in vivo.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reactive power is critical to the operation of the power networks on both safety aspects and economic aspects. Unreasonable distribution of the reactive power would severely affect the power quality of the power networks and increases the transmission loss. Currently, the most economical and practical approach to minimizing the real power loss remains using reactive power dispatch method. Reactive power dispatch problem is nonlinear and has both equality constraints and inequality constraints. In this thesis, PSO algorithm and MATPOWER 5.1 toolbox are applied to solve the reactive power dispatch problem. PSO is a global optimization technique that is equipped with excellent searching capability. The biggest advantage of PSO is that the efficiency of PSO is less sensitive to the complexity of the objective function. MATPOWER 5.1 is an open source MATLAB toolbox focusing on solving the power flow problems. The benefit of MATPOWER is that its code can be easily used and modified. The proposed method in this thesis minimizes the real power loss in a practical power system and determines the optimal placement of a new installed DG. IEEE 14 bus system is used to evaluate the performance. Test results show the effectiveness of the proposed method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This layer is a georeferenced raster image of the historic paper map entitled: Carte de l'entrée de la riviere de Canton : dressée sur les observations les plus récentes, par N.B., Ingr. ordre. de la Marine ; J.V. Schley direx. It was published by Pierre de Hondt in 1749. Scale [ca. 1:475,000]. Covers the Zhujiang Kou region, Guangdong Sheng, China. Map in French and Dutch.The image inside the map neatline is georeferenced to the surface of the earth and fit to the Asia North Lambert Conformal Conic coordinate system. All map collar and inset information is also available as part of the raster image, including any inset maps, profiles, statistical tables, directories, text, illustrations, index maps, legends, or other information associated with the principal map. This map shows features such as drainage, cities and other human settlements, selected buildings and fortification, shoreline features, and more. Relief shown pictorially.This layer is part of a selection of digitally scanned and georeferenced historic maps from the Harvard Map Collection. These maps typically portray both natural and manmade features. The selection represents a range of originators, ground condition dates, scales, and map purposes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This layer is a georeferenced raster image of the historic paper map entitled: Carte des isles qui sont a l'embouchure de la riviere de Canton : dressée sur les observations des navigateurs, par N.B., Ingr. ordre. de la Marine ; J.V. Schley, direx. It was published by Pierre de Hondt in 1749. Scale [ca. 1:500,000]. Covers the Zhujiang Kou region, Guangdong Sheng, China. Map in French and Dutch. The image inside the map neatline is georeferenced to the surface of the earth and fit to the Asia North Lambert Conformal Conic coordinate system. All map collar and inset information is also available as part of the raster image, including any inset maps, profiles, statistical tables, directories, text, illustrations, index maps, legends, or other information associated with the principal map. This map shows features such as drainage, cities and other human settlements, selected buildings and fortification, shoreline features, and more. Relief shown pictorially.This layer is part of a selection of digitally scanned and georeferenced historic maps from the Harvard Map Collection. These maps typically portray both natural and manmade features. The selection represents a range of originators, ground condition dates, scales, and map purposes.