438 research outputs found
Empirical ResearchonTeaching KnowledgeSharingin University Townand Its Influential Factors
The implement of knowledge sharing in University Town facilitates to aggregate education resource and improve overall strength of University Town. According to factors and performance of teaching knowledge sharing in University Town, the model and theoretical hypothesis of teaching knowledge sharing in University Town are proposed. Questionnaire and structural equation model are used to empirically study teaching knowledge sharing model in University Town. The results indicate that three factors including the characteristics of knowledge, the cluster of University Town and the system and mechanism for University Town have a significant correlation with teaching knowledge sharing in University Town, while teaching knowledge sharing in University Town has a significant correlation with Knowledge Innovation, comprehensive strength and education quality of University Town. By analysis results, effective strategies are designed for knowledge sharing mechanism in University Town
A New Security Model for Cross-Realm C2C-PAKE Protocol
Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. In 2006, Yin-Bao presented the first provably secure cross-realm C2C-PAKE, which security is proven rigorously within a formally defined security model and based on the hardness of some computationally intractable assumptions. However, soon after, Phan et al. pointed out that the Yin-Bao scheme was flawed. In this paper, we first analyze the necessary security attributes in the cross-realm C2C-PAKE scenario, and then a new security model for cross-realm C2C-PAKE is given. Analogous to the general construction of 3PAKE protocol for single server C2C-PAKE setting, we give a general construction of cross-realm C2C-PAKE protocol, which security is proved in the new security model
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Recently, Byun et al. proposed an efficient client-to-client password-authenticated key agreement protocol (EC2C-PAKA), which was provably secure in a formally defined security model. This letter shows that EC2C-PAKA protocol is vulnerable to password compromise impersonate attack and man-in-the-middle attack if the key between servers is compromised
Experiments and simulations of hollow cylinders falling through quiescent liquids
Acknowledgment This work was supported by the National Natural Science Foundation of China (grant numbers: 22078191, 21978165, 22081340412 and 92156020).Peer reviewe
Robust Fuzzy Control for Fractional-Order Uncertain Hydroturbine Regulating System with Random Disturbances
The robust fuzzy control for fractional-order hydroturbine regulating system is studied in this paper. First, the more practical fractional-order hydroturbine regulating system with uncertain parameters and random disturbances is presented. Then, on the basis of interval matrix theory and fractional-order stability theorem, a fuzzy control method is proposed for fractional-order hydroturbine regulating system, and the stability condition is expressed as a group of linear matrix inequalities. Furthermore, the proposed method has good robustness which can process external random disturbances and uncertain parameters. Finally, the validity and superiority are proved by the numerical simulations
Lattice Boltzmann Phase Field Simulations of Droplet Slicing
ACKNOWLEDGEMENT This research was sponsored by Shanghai Sailing Program (No. 20YF1416000) and SUES Distinguished Overseas Professor Program.Peer reviewedPostprin
Use of redundant exclusion PCR to identify a novel Bacillus thuringiensis Cry8 toxin gene from pooled genomic DNA
With the aim of optimizing the cloning of novel genes from a genomic pool containing many previously identified, homologous, genes we designed a redundant exclusion PCR technique. In RE-PCR a pair of generic amplification primers are combined with additional primers that are designed to specifically bind to redundant, unwanted genes that are a subset of those copied by the amplification primers. During RE-PCR the specific primer blocks amplification of the full length redundant gene. Using this method we managed to clone a number of cry8 or cry9 toxin genes from a pool of Bacillus thuringiensis genomic DNA while excluding amplicons for cry9Da, cry9Ea and cry9Eb. The method proved very efficient at increasing the number of rare genes in the resulting library. One such rare, and novel, cry8-like gene was expressed and the encoded toxin was shown to be toxic to Anomola corpulenta
Recommended from our members
A natural hybrid of a Bacillus thuringiensis Cry2A toxin implicates Domain I in specificity determination
A PCR-RFLP method was used to identify cry2A toxin genes in a collection of 300 strains of Bacillus thuringiensis. From 81 genes identified, the vast majority appeared to be cry2Aa or cry2Ab, however three showed a different pattern and were subsequently cloned and sequenced. The gene cloned from strain HD395 was named cry2Ba2. Since the proteins encoded by the genes cloned from LS5115-3 and DS415 shared >95% sequence identity with existing toxins their genes were named cry2Aa17 and cry2Ab29 respectively by the toxin nomenclature committee. Despite this overall similarity these two toxins resembled natural hybrids, with Cry2Ab29 resembling Cry2Ab for the majority of the protein but then showing identity to Cry2Aa for the last 66 amino acids. For Cry2Aa17, Domains II and III most closely resembled Cry2Aa (99% identity) whilst Domain I was identical to that of Cry2Ab. The toxicity of the recombinant toxins was tested against Aedes aegypti and Spodoptera exigua, and it was found that the toxicity profile of Cry2Aa17 more closely matched the profile of Cry2Ab than that of Cry2Aa, thus implicating Domain I in specificity determination. This association of Domain I with toxicity was confirmed when hybrids were made between Cry2Aa and Cry2Ab
Compound word frequency modifies the effect of character frequency in reading Chinese
In two eye-tracking studies, reading of two-character Chinese compound
words was examined. First and second character frequency were
orthogonally manipulated to examine the extent to which Chinese compound
words are processed via the component characters. In Experiment 1,
first and second character frequency were manipulated for frequent
compound words, whereas in Experiment 2 it was done for infrequent
compound words. Fixation time and skipping probability for the first and
second character were affected by its frequency in neither experiment,
nor in their pooled analysis. Yet, in Experiment 2 fixations on the
second character were longer when a high-frequency character was
presented as the first character compared with when a low-frequency
character was presented as the first character. This reversed character
frequency effect reflects a morphological family size effect and is
explained by the constraint hypothesis, according to which fixation time
on the second component of two-component compound words is shorter when
its identity is constrained by the first component. It is concluded
that frequent Chinese compound words are processed holistically, whereas
with infrequent compound words there is some room for the characters to
play a role in the identification process.</p
- …