474 research outputs found
Empirical ResearchonTeaching KnowledgeSharingin University Townand Its Influential Factors
The implement of knowledge sharing in University Town facilitates to aggregate education resource and improve overall strength of University Town. According to factors and performance of teaching knowledge sharing in University Town, the model and theoretical hypothesis of teaching knowledge sharing in University Town are proposed. Questionnaire and structural equation model are used to empirically study teaching knowledge sharing model in University Town. The results indicate that three factors including the characteristics of knowledge, the cluster of University Town and the system and mechanism for University Town have a significant correlation with teaching knowledge sharing in University Town, while teaching knowledge sharing in University Town has a significant correlation with Knowledge Innovation, comprehensive strength and education quality of University Town. By analysis results, effective strategies are designed for knowledge sharing mechanism in University Town
A New Security Model for Cross-Realm C2C-PAKE Protocol
Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. In 2006, Yin-Bao presented the first provably secure cross-realm C2C-PAKE, which security is proven rigorously within a formally defined security model and based on the hardness of some computationally intractable assumptions. However, soon after, Phan et al. pointed out that the Yin-Bao scheme was flawed. In this paper, we first analyze the necessary security attributes in the cross-realm C2C-PAKE scenario, and then a new security model for cross-realm C2C-PAKE is given. Analogous to the general construction of 3PAKE protocol for single server C2C-PAKE setting, we give a general construction of cross-realm C2C-PAKE protocol, which security is proved in the new security model
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Recently, Byun et al. proposed an efficient client-to-client password-authenticated key agreement protocol (EC2C-PAKA), which was provably secure in a formally defined security model. This letter shows that EC2C-PAKA protocol is vulnerable to password compromise impersonate attack and man-in-the-middle attack if the key between servers is compromised
Experiments and simulations of hollow cylinders falling through quiescent liquids
Acknowledgment This work was supported by the National Natural Science Foundation of China (grant numbers: 22078191, 21978165, 22081340412 and 92156020).Peer reviewe
Robust Fuzzy Control for Fractional-Order Uncertain Hydroturbine Regulating System with Random Disturbances
The robust fuzzy control for fractional-order hydroturbine regulating system is studied in this paper. First, the more practical fractional-order hydroturbine regulating system with uncertain parameters and random disturbances is presented. Then, on the basis of interval matrix theory and fractional-order stability theorem, a fuzzy control method is proposed for fractional-order hydroturbine regulating system, and the stability condition is expressed as a group of linear matrix inequalities. Furthermore, the proposed method has good robustness which can process external random disturbances and uncertain parameters. Finally, the validity and superiority are proved by the numerical simulations
A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
SIP is playing a key role in the IP based services and has been chosen as the protocol for multimedia application in 3G mobile networks by the Third-Generation Partnership Project. The authentication mechanism proposed in SIP specification is HTTP digest based authentication, which allows malicious parties to impersonate other parties or to charge calls to other parties, furthermore, other security problems, such as off-line password guessing attacks and server spoofing, are also needed to be solved. This paper proposes a new authenticated key exchange protocol NAKE, which can solve the existed problems in the original proposal. The NAKE protocol is provably secure in CK security model, thus it inherits the corresponding security attributes in CK security model
Lattice Boltzmann Phase Field Simulations of Droplet Slicing
ACKNOWLEDGEMENT This research was sponsored by Shanghai Sailing Program (No. 20YF1416000) and SUES Distinguished Overseas Professor Program.Peer reviewedPostprin
Use of redundant exclusion PCR to identify a novel Bacillus thuringiensis Cry8 toxin gene from pooled genomic DNA
With the aim of optimizing the cloning of novel genes from a genomic pool containing many previously identified, homologous, genes we designed a redundant exclusion PCR technique. In RE-PCR a pair of generic amplification primers are combined with additional primers that are designed to specifically bind to redundant, unwanted genes that are a subset of those copied by the amplification primers. During RE-PCR the specific primer blocks amplification of the full length redundant gene. Using this method we managed to clone a number of cry8 or cry9 toxin genes from a pool of Bacillus thuringiensis genomic DNA while excluding amplicons for cry9Da, cry9Ea and cry9Eb. The method proved very efficient at increasing the number of rare genes in the resulting library. One such rare, and novel, cry8-like gene was expressed and the encoded toxin was shown to be toxic to Anomola corpulenta
Recommended from our members
A natural hybrid of a Bacillus thuringiensis Cry2A toxin implicates Domain I in specificity determination
A PCR-RFLP method was used to identify cry2A toxin genes in a collection of 300 strains of Bacillus thuringiensis. From 81 genes identified, the vast majority appeared to be cry2Aa or cry2Ab, however three showed a different pattern and were subsequently cloned and sequenced. The gene cloned from strain HD395 was named cry2Ba2. Since the proteins encoded by the genes cloned from LS5115-3 and DS415 shared >95% sequence identity with existing toxins their genes were named cry2Aa17 and cry2Ab29 respectively by the toxin nomenclature committee. Despite this overall similarity these two toxins resembled natural hybrids, with Cry2Ab29 resembling Cry2Ab for the majority of the protein but then showing identity to Cry2Aa for the last 66 amino acids. For Cry2Aa17, Domains II and III most closely resembled Cry2Aa (99% identity) whilst Domain I was identical to that of Cry2Ab. The toxicity of the recombinant toxins was tested against Aedes aegypti and Spodoptera exigua, and it was found that the toxicity profile of Cry2Aa17 more closely matched the profile of Cry2Ab than that of Cry2Aa, thus implicating Domain I in specificity determination. This association of Domain I with toxicity was confirmed when hybrids were made between Cry2Aa and Cry2Ab
- …