Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them.This paper generates test cases for configuration testing with several common me...Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them.This paper generates test cases for configuration testing with several common methods,such as multiple single-factor experiments,uniform design,and orthogonal experiment design used in other fields.This paper analyzes their merits and improves the orthogonal experiment design method with pairwise testing,and decreases the testing risk caused by incomplete testing with a method of multiple-factors-covering.It presents a simple factor cover method which can cover all the factors and pairwise combinations to the greatest degree.Some comparisons of these methods are made on the aspects of test suite scale,coverage,and usability,etc..展开更多
When applying Software-Defined Networks(SDN) to WANs,the SDN flexibility enables the cross-domain control to achieve a better control scalability.However,the control consistence is required by all the cross-domain ser...When applying Software-Defined Networks(SDN) to WANs,the SDN flexibility enables the cross-domain control to achieve a better control scalability.However,the control consistence is required by all the cross-domain services,to ensure the data plane configured in consensus for different domains.Such consistence process is complicated by potential failure and errors of WANs.In this paper,we propose a consistence layer to actively and passively snapshot the cross-domain control states,to reduce the complexities of service realizations.We implement the layer and evaluate performance in the PlanetLab testbed for the WAN emulation.The testbed conditions are extremely enlarged comparing to the real network.The results show its scalability,reliability and responsiveness in dealing with the control dynamics.In the normalized results,the active and passive snapshots are executed with the mean times of 1.873 s and 105 ms in135 controllers,indicating its readiness to be used in the real network.展开更多
Hardware/software(HW/SW) partitioning is one of the key processes in an embedded system.It is used to determine which system components are assigned to hardware and which are processed by software.In contrast with p...Hardware/software(HW/SW) partitioning is one of the key processes in an embedded system.It is used to determine which system components are assigned to hardware and which are processed by software.In contrast with previous research that focuses on developing efficient heuristic,we focus on the pre-process of the task graph before the HW/SW partitioning in this paper,that is,enumerating all the sub-graphs that meet the requirements.Experimental results showed that the original graph can be reduced to 67% in the worst-case scenario and 58% in the best-case scenario.In conclusion,the reduced task graph saved hardware area while improving partitioning speed and accuracy.展开更多
This paper presents new theoretical aspects of software engineering which oriented on product lines for building applied systems and software product families from readymade reusable components in conditions of progra...This paper presents new theoretical aspects of software engineering which oriented on product lines for building applied systems and software product families from readymade reusable components in conditions of program factories. These aspects are the new disciplines such as the theory of component programming;models variability and interoperability of system;theory for building systems and product families from components. Principles and methods of implementing these theories were realized in the instrumental and technological complex by lines of component development: assembling program factories using lines, e-learning to new theories and technologies in textbook of “Software Engineering” by the universities students.展开更多
With the rapid development of 5G technology,the proportion of video traffic on the Internet is increasing,bringing pressure on the network infrastructure.Edge computing technology provides a feasible solution for opti...With the rapid development of 5G technology,the proportion of video traffic on the Internet is increasing,bringing pressure on the network infrastructure.Edge computing technology provides a feasible solution for optimizing video content distribution.However,the limited edge node cache capacity and dynamic user requests make edge caching more complex.Therefore,we propose a recommendation-driven edge Caching network architecture for the Full life cycle of video streaming(FlyCache)designed to improve users’Quality of Experience(QoE)and reduce backhaul traffic consumption.FlyCache implements intelligent caching management across three key stages:before-playback,during-playback,and after-playback.Specifically,we introduce a cache placement policy for the before-playback stage,a dynamic prefetching and cache admission policy for the during-playback stage,and a progressive cache eviction policy for the after-playback stage.To validate the effectiveness of FlyCache,we developed a user behavior-driven edge caching simulation framework incorporating recommendation mechanisms.Experiments conducted on the MovieLens and synthetic datasets demonstrate that FlyCache outperforms other caching strategies in terms of byte hit rate,backhaul traffic,and delayed startup rate.展开更多
The convergence of large language models(LLMs)and virtual reality(VR)technologies has led to significant breakthroughs across multiple domains,particularly in healthcare and medicine.Owing to its immersive and interac...The convergence of large language models(LLMs)and virtual reality(VR)technologies has led to significant breakthroughs across multiple domains,particularly in healthcare and medicine.Owing to its immersive and interactive capabilities,VR technology has demonstrated exceptional utility in surgical simulation,rehabilitation,physical therapy,mental health,and psychological treatment.By creating highly realistic and precisely controlled environments,VR not only enhances the efficiency of medical training but also enables personalized therapeutic approaches for patients.The convergence of LLMs and VR extends the potential of both technologies.LLM-empowered VR can transform medical education through interactive learning platforms and address complex healthcare challenges using comprehensive solutions.This convergence enhances the quality of training,decision-making,and patient engagement,paving the way for innovative healthcare delivery.This study aims to comprehensively review the current applications,research advancements,and challenges associated with these two technologies in healthcare and medicine.The rapid evolution of these technologies is driving the healthcare industry toward greater intelligence and precision,establishing them as critical forces in the transformation of modern medicine.展开更多
Satellite communication systems provide a cost-effective solution for global internet of things(IoT)applications due to its large coverage and easy deployment.This paper mainly focuses on Satellite networks system,in ...Satellite communication systems provide a cost-effective solution for global internet of things(IoT)applications due to its large coverage and easy deployment.This paper mainly focuses on Satellite networks system,in which low earth orbit(LEO)satellites network collect sensing data from the user terminals(UTs)and then forward the data to ground station through geostationary earth orbit(GEO)satellites network.Considering the limited uplink transmission resources,this paper optimizes the uplink transmission scheduling scheme over LEO satellites.A novel transmission scheduling algorithm,which combined Algorithms of Simulated Annealing and Monte Carlo(SA-MC),is proposed to achieve the dynamic optimal scheduling scheme.Simulation results show the effectiveness of the proposed SA-MC algorithm in terms of cost value reduction and fast convergence.展开更多
OBJECTIVE:To explore the correlation between diagnostic information of tongue and gastroscopy results of patients with chronic gastritis.METHODS:Frequent pattern growth(FP-Growth),SPSS Modeler was used to analyze the ...OBJECTIVE:To explore the correlation between diagnostic information of tongue and gastroscopy results of patients with chronic gastritis.METHODS:Frequent pattern growth(FP-Growth),SPSS Modeler was used to analyze the correlation rules between the image information of tongue parameters and the characteristics of the stomach and duodenum seen under gastroscopy.RESULTS:Ranking in order of confidence:cyanotic tongue,slippery fur,yellow fur and spotted tongue were sequently associated with both gastric antrum mucosal hyperemia or edema and gastric antrum mucosal erythema/macula.L,one value of tongue coating color,which counted among(30,60),tooth-marked tongue and b,one value of tongue coating color,which counted in the range of(5,20)were sequently associated with gastric antrum mucosal erythema/macula.A,one value of tongue body color,which counted in the range of(0,20),was related to both gastric antrum mucosal hyperemia or edema and gastric antrum mucosal erythema/macula.a,one value of tongue coating color,which counted in the range of(15,35),was associated with gastric antrum mucosal erythema/macula.There are a total of 9 strong correlation rules.CONCLUSIONS:Cyanotic tongue,slippery fur,yellow fur,the CIE Lab value of tongue coating,a,the value of tongue body color,spotted tongue,and tooth-marked tongue are all related to the gastric antrum mucosal hyperemia or edema and gastric antrum mucosal erythema/macula.The conditions of gastric mucosa could be predicted by the examination of the above related image information of tongue.展开更多
The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific sec...The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.展开更多
Carbon sinks constitute an important element within the complex phenomenon of global climate change,and forest ecosystems are important global carbon sinks.The Natural Forest Protection Program(NFPP) is an ecologica...Carbon sinks constitute an important element within the complex phenomenon of global climate change,and forest ecosystems are important global carbon sinks.The Natural Forest Protection Program(NFPP) is an ecological program in China that was established after catastrophic flooding in the country in 1998.The goals of the NFPP are to curb the deterioration of the ecological environment,strengthen the protection and restoration of habitat to increase biodiversity,and rehabilitate natural forests to support sustainable development in forest regions.This study looked at changes in carbon sequestration in a forested area of northeast China after the inception of the NFPP.The program divides China's natural forests into three classes—commercial and two types of noneconomic forests—that are subject to management regimes prescribing varying levels of timber harvest,afforestation,and reforestation.During the 18-year period from 1998 to 2015,the total amount of carbon sequestration increased at an average annual rate of 0.04 MT C.This trend reflects a transformation of forest management practices after implementation of the NFPP that resulted in prohibited and/or restricted logging and tighter regulation of allowable harvest levels for specific areas.In documenting this trend,guidelines for more effective implementation of forestry programs such as the NFPP in other countries in the future are also suggested.展开更多
Smart lighting system based on PLC (Power Line Communication) is lack of extensibility due to low data rate and non-standard communication protocol. 6LoWPAN is an IP-based communication standard for WSN (Wireless Sens...Smart lighting system based on PLC (Power Line Communication) is lack of extensibility due to low data rate and non-standard communication protocol. 6LoWPAN is an IP-based communication standard for WSN (Wireless Sensor Network) proposed by IETF. We upgraded the SEMS smart lighting system from PLC to 6LoWPAN, PLC nodes were replaced by 6LoWPAN nodes and centralized controllers were replaced by border routers. 6LoWPAN system testing was carried out on the street after the implementation. The results show that smart lighting system based on 6LoWPAN is better than PLC in transmission rate, signal coverage range, compatibility and extensibility.展开更多
In this paper, the authors discuss the global existence and blow-up of the solution to an evolution p-Laplace system with nonlinear sources and nonlinear boundary condition. The authors first establish the local exist...In this paper, the authors discuss the global existence and blow-up of the solution to an evolution p-Laplace system with nonlinear sources and nonlinear boundary condition. The authors first establish the local existence of solutions, then give a necessary and sufficient condition on the global existence of the positive solution.展开更多
As a new class of forward error correcting encoding algorithm,Luby Transform codes are suitable for the erasure channel environment based on the packet communication.The encoding,decoding algorithms and the implementa...As a new class of forward error correcting encoding algorithm,Luby Transform codes are suitable for the erasure channel environment based on the packet communication.The encoding,decoding algorithms and the implementation of LT codes are summarized in the paper.Meanwhile simulations of the ideal soliton distribution and robust soliton distribution are conducted to evaluate the performance of LT codes in terms of successful decoding probability,mean degree and decoding time over the erasure channel.The parameter optimization rules of LT codes are deeply discussed and proposed in the paper.The research results are of great practical importance for improving the real time performance in the erasure correction applications.展开更多
FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this pap...FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this paper, we analyze the FIDO UAF(Universal Authentication Framework) Protocol, one of the two sets of specifications in the standard. We first present protocols' cryptographic abstractions for the registration and authentication protocols of the FIDO UAF. According to the abstractions, we discuss on selected security goals presented in the standard to study UAF security properties. We also propose three attacks, which the first two are based on an assumption that an attacker can corrupt the software installed on the user device, and the third is based on two users sharing a FIDO roaming authenticator. The results of the attacks are to impersonate the legitimate user to pass the online authentication.展开更多
We present a model for self-adjustment of social conventions to small perturbations, and investigate how perturbations can influence the convergence of social convention in different situations. The experimental resul...We present a model for self-adjustment of social conventions to small perturbations, and investigate how perturbations can influence the convergence of social convention in different situations. The experimental results show that the sensitivity of social conventions is determined by not only the perturbations themselves but also the agent adjustment functions for the perturbations; and social conventions are more sensitive to the outlier agent number than to the strategy fluctuation magnitudes and localities of perturbations.展开更多
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di...Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising.展开更多
In this paper,we study the normal criterion of meromorphic functions concerning shared analytic function.We get some theorems concerning shared analytic function,which improves some earlier related results.
The effect of the Tibetan Plateau(TP)on the Intertropical Convergence Zone(ITCZ)was investigated using a coupled Earth system model.The location of the ITCZ(in this work represented by the center of the tropical preci...The effect of the Tibetan Plateau(TP)on the Intertropical Convergence Zone(ITCZ)was investigated using a coupled Earth system model.The location of the ITCZ(in this work represented by the center of the tropical precipitation maximum)over the tropical Atlantic was found to be sensitive to the existence of the TP.Removing the TP led to a remarkable sea surface temperature(SST)cooling(warming)in the Northern(Southern)Hemisphere,which manifested clearly in the Atlantic rather than the Pacific.The locations of maximum precipitation and SST moved southwards clearly in the tropical Atlantic,forcing a southward shift of the atmospheric convection center,and thus the ITCZ.The shift in the ITCZ was also supported by the latitudinal change in the ascending branch of the tropical Hadley Cell,which moved southwards by about 2°in the boreal summer in response to the TP’s removal.From the viewpoint of the energy balance between the two hemispheres,the cooling(warming)in the Northern(Southern)Hemisphere requires an enhanced northward atmospheric heat transport across the equator,which can be realized by the southward displacement of the ITCZ.This study suggests that the presence of the TP may have played an important role in the climatology of the ITCZ,particularly its location over the tropical Atlantic.展开更多
The study aimed at investigating the neural mechanism of business moral decision-making. 15 participants were presented with a set of 96 dilemmas in business situation. Participants were required to decide between opt...The study aimed at investigating the neural mechanism of business moral decision-making. 15 participants were presented with a set of 96 dilemmas in business situation. Participants were required to decide between option 1 (more utilitarian decision for self benefit) and 2 (ethical decision for fairness or institution). ERPs were recorded to a slide displaying the letter 1 and 2 when subjects were deciding between options. The selection rate was calculated after the experiment as the behavior data. The business moral dilemmas prompted more ethical option. A larger P260 component was elicited in the left frontal lobe area when participants were deciding to act ethically. On the other hand, decisions on utilitarian aroused weaker emotional experience, as supported by the shorter LPC and smaller P260 amplitude.展开更多
基金The Natronal Natural Science Foundation of China(No.60373066)Opening Foundation of State Key Laboratory of Software Engineering in Wuhan UniversityOpening Foundation ofJiangsu Key Laboratory of Computer Information ProcessingTechnology in Soochow University.
文摘Software configuration testing is used to test a piece of software with all kinds of hardware to ensure that it can run properly on them.This paper generates test cases for configuration testing with several common methods,such as multiple single-factor experiments,uniform design,and orthogonal experiment design used in other fields.This paper analyzes their merits and improves the orthogonal experiment design method with pairwise testing,and decreases the testing risk caused by incomplete testing with a method of multiple-factors-covering.It presents a simple factor cover method which can cover all the factors and pairwise combinations to the greatest degree.Some comparisons of these methods are made on the aspects of test suite scale,coverage,and usability,etc..
基金supported by the National Basic Research Program of China (2012CB315903)the Program for Key Science and Technology Innovation Team of Zhejiang Province(2011R50010,2013TD20)+3 种基金the National High Technology Research Program of China(2015AA016103)the National Natural Science Foundation of China(61379118)the Research Fund of ZTE CorporationJiaxing Science and Technology Project (No.2014AY21021)
文摘When applying Software-Defined Networks(SDN) to WANs,the SDN flexibility enables the cross-domain control to achieve a better control scalability.However,the control consistence is required by all the cross-domain services,to ensure the data plane configured in consensus for different domains.Such consistence process is complicated by potential failure and errors of WANs.In this paper,we propose a consistence layer to actively and passively snapshot the cross-domain control states,to reduce the complexities of service realizations.We implement the layer and evaluate performance in the PlanetLab testbed for the WAN emulation.The testbed conditions are extremely enlarged comparing to the real network.The results show its scalability,reliability and responsiveness in dealing with the control dynamics.In the normalized results,the active and passive snapshots are executed with the mean times of 1.873 s and 105 ms in135 controllers,indicating its readiness to be used in the real network.
基金Supported by the National Natural Science Foundation of China (60970016,61173032)
文摘Hardware/software(HW/SW) partitioning is one of the key processes in an embedded system.It is used to determine which system components are assigned to hardware and which are processed by software.In contrast with previous research that focuses on developing efficient heuristic,we focus on the pre-process of the task graph before the HW/SW partitioning in this paper,that is,enumerating all the sub-graphs that meet the requirements.Experimental results showed that the original graph can be reduced to 67% in the worst-case scenario and 58% in the best-case scenario.In conclusion,the reduced task graph saved hardware area while improving partitioning speed and accuracy.
文摘This paper presents new theoretical aspects of software engineering which oriented on product lines for building applied systems and software product families from readymade reusable components in conditions of program factories. These aspects are the new disciplines such as the theory of component programming;models variability and interoperability of system;theory for building systems and product families from components. Principles and methods of implementing these theories were realized in the instrumental and technological complex by lines of component development: assembling program factories using lines, e-learning to new theories and technologies in textbook of “Software Engineering” by the universities students.
基金This work is supported by the National Natural Science Foundation of China (No. 60073020), the University Natural Science Foundation of Jiangsu Province of China (No. 05KJB520119) and the Natural Science Foundation Project of Chongqing (No. CSTC2006BB2259).
基金supported by the National Natural Science Foundation of China(NSFC)[Grant No.62072469].
文摘With the rapid development of 5G technology,the proportion of video traffic on the Internet is increasing,bringing pressure on the network infrastructure.Edge computing technology provides a feasible solution for optimizing video content distribution.However,the limited edge node cache capacity and dynamic user requests make edge caching more complex.Therefore,we propose a recommendation-driven edge Caching network architecture for the Full life cycle of video streaming(FlyCache)designed to improve users’Quality of Experience(QoE)and reduce backhaul traffic consumption.FlyCache implements intelligent caching management across three key stages:before-playback,during-playback,and after-playback.Specifically,we introduce a cache placement policy for the before-playback stage,a dynamic prefetching and cache admission policy for the during-playback stage,and a progressive cache eviction policy for the after-playback stage.To validate the effectiveness of FlyCache,we developed a user behavior-driven edge caching simulation framework incorporating recommendation mechanisms.Experiments conducted on the MovieLens and synthetic datasets demonstrate that FlyCache outperforms other caching strategies in terms of byte hit rate,backhaul traffic,and delayed startup rate.
基金Supported by Noncommunicable Chronic Diseases-National Science and Technology Major Project(2024ZD0523200)National Natural Science Foundation of China(62301330,62101346).
文摘The convergence of large language models(LLMs)and virtual reality(VR)technologies has led to significant breakthroughs across multiple domains,particularly in healthcare and medicine.Owing to its immersive and interactive capabilities,VR technology has demonstrated exceptional utility in surgical simulation,rehabilitation,physical therapy,mental health,and psychological treatment.By creating highly realistic and precisely controlled environments,VR not only enhances the efficiency of medical training but also enables personalized therapeutic approaches for patients.The convergence of LLMs and VR extends the potential of both technologies.LLM-empowered VR can transform medical education through interactive learning platforms and address complex healthcare challenges using comprehensive solutions.This convergence enhances the quality of training,decision-making,and patient engagement,paving the way for innovative healthcare delivery.This study aims to comprehensively review the current applications,research advancements,and challenges associated with these two technologies in healthcare and medicine.The rapid evolution of these technologies is driving the healthcare industry toward greater intelligence and precision,establishing them as critical forces in the transformation of modern medicine.
文摘Satellite communication systems provide a cost-effective solution for global internet of things(IoT)applications due to its large coverage and easy deployment.This paper mainly focuses on Satellite networks system,in which low earth orbit(LEO)satellites network collect sensing data from the user terminals(UTs)and then forward the data to ground station through geostationary earth orbit(GEO)satellites network.Considering the limited uplink transmission resources,this paper optimizes the uplink transmission scheduling scheme over LEO satellites.A novel transmission scheduling algorithm,which combined Algorithms of Simulated Annealing and Monte Carlo(SA-MC),is proposed to achieve the dynamic optimal scheduling scheme.Simulation results show the effectiveness of the proposed SA-MC algorithm in terms of cost value reduction and fast convergence.
基金Key Special Project of the National Key Research and Development Program of Ministry of Science and Technology(No.2017YFB1002300):Topic One:Multimodal Heterogeneous Efficient Acquisition of Traditional Chinese Medicine Big Data and Resource Library Construction(No.2017YFB1002301)and Topic Three:Multi-Scale Cognition Methods and Treatment Analysis Model of Traditional Chinese Medicine Based on Deep Learning(No.2017YFB1002303)from Big Data-Driven Traditional Chinese Medicine Intelligent Auxiliary Diagnostic Service SystemGraduation Design of“Cultivation Program”for Cross-cultivation of High-level Talents in Beijing Colleges and Universities in 2010(Scientific Research):the Research on the Clinical Diagnosis and Prediction System of Gastric Precancerous Lesions Based on Artificial Intelligence+2 种基金National Natural Science Foundation of China(No.30701071)the Sixth Batch of Academic Experience Inheritance of Traditional Chinese Medicine Experts(2017)“3+3”Project of Beijing Traditional Chinese Medicine Inheritance(No.2012-SZ-C-41)。
文摘OBJECTIVE:To explore the correlation between diagnostic information of tongue and gastroscopy results of patients with chronic gastritis.METHODS:Frequent pattern growth(FP-Growth),SPSS Modeler was used to analyze the correlation rules between the image information of tongue parameters and the characteristics of the stomach and duodenum seen under gastroscopy.RESULTS:Ranking in order of confidence:cyanotic tongue,slippery fur,yellow fur and spotted tongue were sequently associated with both gastric antrum mucosal hyperemia or edema and gastric antrum mucosal erythema/macula.L,one value of tongue coating color,which counted among(30,60),tooth-marked tongue and b,one value of tongue coating color,which counted in the range of(5,20)were sequently associated with gastric antrum mucosal erythema/macula.A,one value of tongue body color,which counted in the range of(0,20),was related to both gastric antrum mucosal hyperemia or edema and gastric antrum mucosal erythema/macula.a,one value of tongue coating color,which counted in the range of(15,35),was associated with gastric antrum mucosal erythema/macula.There are a total of 9 strong correlation rules.CONCLUSIONS:Cyanotic tongue,slippery fur,yellow fur,the CIE Lab value of tongue coating,a,the value of tongue body color,spotted tongue,and tooth-marked tongue are all related to the gastric antrum mucosal hyperemia or edema and gastric antrum mucosal erythema/macula.The conditions of gastric mucosa could be predicted by the examination of the above related image information of tongue.
基金This paper was supported by the National Natural Science Foundation of China under Grants No.91118006, No. 61202414 the Knowledge Innovation Project of Chinese Academy of Science under Grant No. ISCAS2009-DR14.
文摘The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.
基金supported by San Chazi Forestry Bureau,and the key project of Chinese Academy of Sciences,Grant No.KFZD-SW-305-001
文摘Carbon sinks constitute an important element within the complex phenomenon of global climate change,and forest ecosystems are important global carbon sinks.The Natural Forest Protection Program(NFPP) is an ecological program in China that was established after catastrophic flooding in the country in 1998.The goals of the NFPP are to curb the deterioration of the ecological environment,strengthen the protection and restoration of habitat to increase biodiversity,and rehabilitate natural forests to support sustainable development in forest regions.This study looked at changes in carbon sequestration in a forested area of northeast China after the inception of the NFPP.The program divides China's natural forests into three classes—commercial and two types of noneconomic forests—that are subject to management regimes prescribing varying levels of timber harvest,afforestation,and reforestation.During the 18-year period from 1998 to 2015,the total amount of carbon sequestration increased at an average annual rate of 0.04 MT C.This trend reflects a transformation of forest management practices after implementation of the NFPP that resulted in prohibited and/or restricted logging and tighter regulation of allowable harvest levels for specific areas.In documenting this trend,guidelines for more effective implementation of forestry programs such as the NFPP in other countries in the future are also suggested.
文摘Smart lighting system based on PLC (Power Line Communication) is lack of extensibility due to low data rate and non-standard communication protocol. 6LoWPAN is an IP-based communication standard for WSN (Wireless Sensor Network) proposed by IETF. We upgraded the SEMS smart lighting system from PLC to 6LoWPAN, PLC nodes were replaced by 6LoWPAN nodes and centralized controllers were replaced by border routers. 6LoWPAN system testing was carried out on the street after the implementation. The results show that smart lighting system based on 6LoWPAN is better than PLC in transmission rate, signal coverage range, compatibility and extensibility.
基金supported by a grant from the National High Technology Researchand and Development Program of China (863 Program) (2009AA044501)by NSFC (10776035+2 种基金10771085)by Key Lab of Symbolic Computation and Knowledge Engineering of Ministry of Educationby the 985 program of Jilin University
文摘In this paper, the authors discuss the global existence and blow-up of the solution to an evolution p-Laplace system with nonlinear sources and nonlinear boundary condition. The authors first establish the local existence of solutions, then give a necessary and sufficient condition on the global existence of the positive solution.
基金supported by Zhongguancun Haidian Science Park Postdoctoral Special Fund
文摘As a new class of forward error correcting encoding algorithm,Luby Transform codes are suitable for the erasure channel environment based on the packet communication.The encoding,decoding algorithms and the implementation of LT codes are summarized in the paper.Meanwhile simulations of the ideal soliton distribution and robust soliton distribution are conducted to evaluate the performance of LT codes in terms of successful decoding probability,mean degree and decoding time over the erasure channel.The parameter optimization rules of LT codes are deeply discussed and proposed in the paper.The research results are of great practical importance for improving the real time performance in the erasure correction applications.
文摘FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this paper, we analyze the FIDO UAF(Universal Authentication Framework) Protocol, one of the two sets of specifications in the standard. We first present protocols' cryptographic abstractions for the registration and authentication protocols of the FIDO UAF. According to the abstractions, we discuss on selected security goals presented in the standard to study UAF security properties. We also propose three attacks, which the first two are based on an assumption that an attacker can corrupt the software installed on the user device, and the third is based on two users sharing a FIDO roaming authenticator. The results of the attacks are to impersonate the legitimate user to pass the online authentication.
基金Supported by the National Natural Science Foundation of China under Grant No 60803060, and the Excellent Young Teachers Program of Southeast University.
文摘We present a model for self-adjustment of social conventions to small perturbations, and investigate how perturbations can influence the convergence of social convention in different situations. The experimental results show that the sensitivity of social conventions is determined by not only the perturbations themselves but also the agent adjustment functions for the perturbations; and social conventions are more sensitive to the outlier agent number than to the strategy fluctuation magnitudes and localities of perturbations.
文摘Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising.
基金Supported by the National Natural Science Foundation of China(Grant No.11961068).
文摘In this paper,we study the normal criterion of meromorphic functions concerning shared analytic function.We get some theorems concerning shared analytic function,which improves some earlier related results.
基金supported by the National Natural Science Foundation of China[grant numbers 41725021,91337106,and 91737204].
文摘The effect of the Tibetan Plateau(TP)on the Intertropical Convergence Zone(ITCZ)was investigated using a coupled Earth system model.The location of the ITCZ(in this work represented by the center of the tropical precipitation maximum)over the tropical Atlantic was found to be sensitive to the existence of the TP.Removing the TP led to a remarkable sea surface temperature(SST)cooling(warming)in the Northern(Southern)Hemisphere,which manifested clearly in the Atlantic rather than the Pacific.The locations of maximum precipitation and SST moved southwards clearly in the tropical Atlantic,forcing a southward shift of the atmospheric convection center,and thus the ITCZ.The shift in the ITCZ was also supported by the latitudinal change in the ascending branch of the tropical Hadley Cell,which moved southwards by about 2°in the boreal summer in response to the TP’s removal.From the viewpoint of the energy balance between the two hemispheres,the cooling(warming)in the Northern(Southern)Hemisphere requires an enhanced northward atmospheric heat transport across the equator,which can be realized by the southward displacement of the ITCZ.This study suggests that the presence of the TP may have played an important role in the climatology of the ITCZ,particularly its location over the tropical Atlantic.
文摘The study aimed at investigating the neural mechanism of business moral decision-making. 15 participants were presented with a set of 96 dilemmas in business situation. Participants were required to decide between option 1 (more utilitarian decision for self benefit) and 2 (ethical decision for fairness or institution). ERPs were recorded to a slide displaying the letter 1 and 2 when subjects were deciding between options. The selection rate was calculated after the experiment as the behavior data. The business moral dilemmas prompted more ethical option. A larger P260 component was elicited in the left frontal lobe area when participants were deciding to act ethically. On the other hand, decisions on utilitarian aroused weaker emotional experience, as supported by the shorter LPC and smaller P260 amplitude.