438 research outputs found

    Empirical ResearchonTeaching KnowledgeSharingin University Townand Its Influential Factors

    Get PDF
    The implement of knowledge sharing in University Town facilitates to aggregate education resource and improve overall strength of University Town. According to factors and performance of teaching knowledge sharing in University Town, the model and theoretical hypothesis of teaching knowledge sharing in University Town are proposed. Questionnaire and structural equation model are used to empirically study teaching knowledge sharing model in University Town. The results indicate that three factors including the characteristics of knowledge, the cluster of University Town and the system and mechanism for University Town have a significant correlation with teaching knowledge sharing in University Town, while teaching knowledge sharing in University Town has a significant correlation with Knowledge Innovation, comprehensive strength and education quality of University Town. By analysis results, effective strategies are designed for knowledge sharing mechanism in University Town

    A New Security Model for Cross-Realm C2C-PAKE Protocol

    Get PDF
    Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. In 2006, Yin-Bao presented the first provably secure cross-realm C2C-PAKE, which security is proven rigorously within a formally defined security model and based on the hardness of some computationally intractable assumptions. However, soon after, Phan et al. pointed out that the Yin-Bao scheme was flawed. In this paper, we first analyze the necessary security attributes in the cross-realm C2C-PAKE scenario, and then a new security model for cross-realm C2C-PAKE is given. Analogous to the general construction of 3PAKE protocol for single server C2C-PAKE setting, we give a general construction of cross-realm C2C-PAKE protocol, which security is proved in the new security model

    Cryptanalysis of a client-to-client password-authenticated key agreement protocol

    Get PDF
    Recently, Byun et al. proposed an efficient client-to-client password-authenticated key agreement protocol (EC2C-PAKA), which was provably secure in a formally defined security model. This letter shows that EC2C-PAKA protocol is vulnerable to password compromise impersonate attack and man-in-the-middle attack if the key between servers is compromised

    Experiments and simulations of hollow cylinders falling through quiescent liquids

    Get PDF
    Acknowledgment This work was supported by the National Natural Science Foundation of China (grant numbers: 22078191, 21978165, 22081340412 and 92156020).Peer reviewe

    Robust Fuzzy Control for Fractional-Order Uncertain Hydroturbine Regulating System with Random Disturbances

    Get PDF
    The robust fuzzy control for fractional-order hydroturbine regulating system is studied in this paper. First, the more practical fractional-order hydroturbine regulating system with uncertain parameters and random disturbances is presented. Then, on the basis of interval matrix theory and fractional-order stability theorem, a fuzzy control method is proposed for fractional-order hydroturbine regulating system, and the stability condition is expressed as a group of linear matrix inequalities. Furthermore, the proposed method has good robustness which can process external random disturbances and uncertain parameters. Finally, the validity and superiority are proved by the numerical simulations

    Lattice Boltzmann Phase Field Simulations of Droplet Slicing

    Get PDF
    ACKNOWLEDGEMENT This research was sponsored by Shanghai Sailing Program (No. 20YF1416000) and SUES Distinguished Overseas Professor Program.Peer reviewedPostprin

    Use of redundant exclusion PCR to identify a novel Bacillus thuringiensis Cry8 toxin gene from pooled genomic DNA

    Get PDF
    With the aim of optimizing the cloning of novel genes from a genomic pool containing many previously identified, homologous, genes we designed a redundant exclusion PCR technique. In RE-PCR a pair of generic amplification primers are combined with additional primers that are designed to specifically bind to redundant, unwanted genes that are a subset of those copied by the amplification primers. During RE-PCR the specific primer blocks amplification of the full length redundant gene. Using this method we managed to clone a number of cry8 or cry9 toxin genes from a pool of Bacillus thuringiensis genomic DNA while excluding amplicons for cry9Da, cry9Ea and cry9Eb. The method proved very efficient at increasing the number of rare genes in the resulting library. One such rare, and novel, cry8-like gene was expressed and the encoded toxin was shown to be toxic to Anomola corpulenta

    Compound word frequency modifies the effect of character frequency in reading Chinese

    Get PDF
    In two eye-tracking studies, reading of two-character Chinese compound words was examined. First and second character frequency were orthogonally manipulated to examine the extent to which Chinese compound words are processed via the component characters. In Experiment 1, first and second character frequency were manipulated for frequent compound words, whereas in Experiment 2 it was done for infrequent compound words. Fixation time and skipping probability for the first and second character were affected by its frequency in neither experiment, nor in their pooled analysis. Yet, in Experiment 2 fixations on the second character were longer when a high-frequency character was presented as the first character compared with when a low-frequency character was presented as the first character. This reversed character frequency effect reflects a morphological family size effect and is explained by the constraint hypothesis, according to which fixation time on the second component of two-component compound words is shorter when its identity is constrained by the first component. It is concluded that frequent Chinese compound words are processed holistically, whereas with infrequent compound words there is some room for the characters to play a role in the identification process.</p
    corecore