1,492 research outputs found

    Toward Efficient Urban Form in China

    Get PDF
    Land efficiency in urban China is examined, using Tianjin as a case study, from the perspective of agricultural land conservation; reduction in energy use, conventional pollution, and greenhouse gas emissions; and human time savings. Issues addressed include increased scatter on the periphery, over-consumption of industrial land, over fiscal dependence on land sales, and loss of valuable agricultural and environmental services land. Policy implications discussed include the need for greater variation in urban densities (leveraging already high densities in urban China – one-third the global median), less broad-brush agricultural land conservation policies, higher floor area ratios near rapid transit stations, etc.China, land conversion, land efficiency, land use policy, urban density

    Robust passivity of coupled Cohen-Grossberg neural networks with reaction-diffusion terms

    Get PDF
    In this paper, we deal with the robust passivity problem for coupled reaction-diffusion Cohen-Grossberg neural networks (CRDCGNNs) with spatial diffusion coupling and state coupling. First, we present the network model for CRDCGNNs with state coupling and establish some robust passivity conditions for this kind of CRDCGNNs. Then, the investigation on robust passivity for CRDCGNNs with spatial diffusion coupling is carried out similarly. At last, the feasibility of the obtained theoretical results is demonstrated by one example with simulation results

    Efficient and Provably-secure Certificateless Strong Designated Verifier Signature Scheme without Pairings

    Get PDF
    Strong designated verifier signature (generally abbreviated to SDVS) allows signers to obtain absolute control over who can verify the signature, while only the designated verifier other than anyone else can verify the validity of a SDVS without being able to transfer the conviction. Certificateless PKC has unique advantages comparing with certificate-based cryptosystems and identity-based PKC, without suffering from key escrow. Motivated by these attractive features, we propose a novel efficient CL-SDVS scheme without bilinear pairings or map-to-point hash operations. The proposed scheme achieves all the required security properties including EUF-CMA, non-transferability, strongness and non-delegatability. We also estimate the computational and communication efficiency. The comparison shows that our scheme outperforms all the previous CL-(S)DVS schemes. Furthermore, the crucial security properties of the CL-SDVS scheme are formally proved based on the intractability of SCDH and ECDL assumptions in random oracle model
    • 

    corecore