474 research outputs found

    Empirical ResearchonTeaching KnowledgeSharingin University Townand Its Influential Factors

    Get PDF
    The implement of knowledge sharing in University Town facilitates to aggregate education resource and improve overall strength of University Town. According to factors and performance of teaching knowledge sharing in University Town, the model and theoretical hypothesis of teaching knowledge sharing in University Town are proposed. Questionnaire and structural equation model are used to empirically study teaching knowledge sharing model in University Town. The results indicate that three factors including the characteristics of knowledge, the cluster of University Town and the system and mechanism for University Town have a significant correlation with teaching knowledge sharing in University Town, while teaching knowledge sharing in University Town has a significant correlation with Knowledge Innovation, comprehensive strength and education quality of University Town. By analysis results, effective strategies are designed for knowledge sharing mechanism in University Town

    A New Security Model for Cross-Realm C2C-PAKE Protocol

    Get PDF
    Cross realm client-to-client password authenticated key exchange (C2C-PAKE) schemes are designed to enable two clients in different realms to agree on a common session key using different passwords. In 2006, Yin-Bao presented the first provably secure cross-realm C2C-PAKE, which security is proven rigorously within a formally defined security model and based on the hardness of some computationally intractable assumptions. However, soon after, Phan et al. pointed out that the Yin-Bao scheme was flawed. In this paper, we first analyze the necessary security attributes in the cross-realm C2C-PAKE scenario, and then a new security model for cross-realm C2C-PAKE is given. Analogous to the general construction of 3PAKE protocol for single server C2C-PAKE setting, we give a general construction of cross-realm C2C-PAKE protocol, which security is proved in the new security model

    Cryptanalysis of a client-to-client password-authenticated key agreement protocol

    Get PDF
    Recently, Byun et al. proposed an efficient client-to-client password-authenticated key agreement protocol (EC2C-PAKA), which was provably secure in a formally defined security model. This letter shows that EC2C-PAKA protocol is vulnerable to password compromise impersonate attack and man-in-the-middle attack if the key between servers is compromised

    Experiments and simulations of hollow cylinders falling through quiescent liquids

    Get PDF
    Acknowledgment This work was supported by the National Natural Science Foundation of China (grant numbers: 22078191, 21978165, 22081340412 and 92156020).Peer reviewe

    Robust Fuzzy Control for Fractional-Order Uncertain Hydroturbine Regulating System with Random Disturbances

    Get PDF
    The robust fuzzy control for fractional-order hydroturbine regulating system is studied in this paper. First, the more practical fractional-order hydroturbine regulating system with uncertain parameters and random disturbances is presented. Then, on the basis of interval matrix theory and fractional-order stability theorem, a fuzzy control method is proposed for fractional-order hydroturbine regulating system, and the stability condition is expressed as a group of linear matrix inequalities. Furthermore, the proposed method has good robustness which can process external random disturbances and uncertain parameters. Finally, the validity and superiority are proved by the numerical simulations

    A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC

    Get PDF
    SIP is playing a key role in the IP based services and has been chosen as the protocol for multimedia application in 3G mobile networks by the Third-Generation Partnership Project. The authentication mechanism proposed in SIP specification is HTTP digest based authentication, which allows malicious parties to impersonate other parties or to charge calls to other parties, furthermore, other security problems, such as off-line password guessing attacks and server spoofing, are also needed to be solved. This paper proposes a new authenticated key exchange protocol NAKE, which can solve the existed problems in the original proposal. The NAKE protocol is provably secure in CK security model, thus it inherits the corresponding security attributes in CK security model

    Lattice Boltzmann Phase Field Simulations of Droplet Slicing

    Get PDF
    ACKNOWLEDGEMENT This research was sponsored by Shanghai Sailing Program (No. 20YF1416000) and SUES Distinguished Overseas Professor Program.Peer reviewedPostprin

    Use of redundant exclusion PCR to identify a novel Bacillus thuringiensis Cry8 toxin gene from pooled genomic DNA

    Get PDF
    With the aim of optimizing the cloning of novel genes from a genomic pool containing many previously identified, homologous, genes we designed a redundant exclusion PCR technique. In RE-PCR a pair of generic amplification primers are combined with additional primers that are designed to specifically bind to redundant, unwanted genes that are a subset of those copied by the amplification primers. During RE-PCR the specific primer blocks amplification of the full length redundant gene. Using this method we managed to clone a number of cry8 or cry9 toxin genes from a pool of Bacillus thuringiensis genomic DNA while excluding amplicons for cry9Da, cry9Ea and cry9Eb. The method proved very efficient at increasing the number of rare genes in the resulting library. One such rare, and novel, cry8-like gene was expressed and the encoded toxin was shown to be toxic to Anomola corpulenta
    corecore