Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ...Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.展开更多
In ultra-dense networks(UDNs), large-scale deployment of femto base stations is an important technique for improving the network throughput and quality of service(QoS). In this paper, a multidimensional resource alloc...In ultra-dense networks(UDNs), large-scale deployment of femto base stations is an important technique for improving the network throughput and quality of service(QoS). In this paper, a multidimensional resource allocation algorithm based on noncooperation game theory is proposed to manage the resource allocation in UDNs, including transmission point association, user channels, and power. The algorithm derives a multidimensional resource optimization model and converts into a noncooperation game model according to the analysis of transmission point association user channel and power allocation. The algorithm includes two phases: transmission point association, and channel and power allocation. Then, feasible domain and discrete variables relaxation approaches are introduced to derive an approximate optimal multidimensional resource allocation solution with low complexity. Simulation results show that this method has some advantages in suppressing interference and improves the overall system throughput, while ensuring the QoS of femtocell users.展开更多
According to the proposed hypothesis, graphic characters trigger the subcortical visual route. The reaction discussed is very weak. Yet, its very existence has an unusual importance: characters and (occluded) venomous...According to the proposed hypothesis, graphic characters trigger the subcortical visual route. The reaction discussed is very weak. Yet, its very existence has an unusual importance: characters and (occluded) venomous snakeskin patterns reveal themselves as conflatable. Furthermore, following tractogra<span><span><span style="font-family:;" "="">- </span></span></span><span><span><span style="font-family:;" "="">phic research, a functional segregation of the subcortical pathway is to be <span>presupposed. Thus, there can’t be a later dissociation of two stimuli pre</span>viously associated. The outc</span></span></span><span><span><span style="font-family:;" "="">omes of lecture will gradually appear probabilistically <span>(much) more peaceful than encountering a venomous snake, though, and</span> thus a continuous lessening of the reaction is expectable. Here, on one hand, it is relevant that the subcortical visual pathway goes to the amygdala. The reactions we describe tap into goal-oriented processes, and they will do that un<span>fettered. On the other hand, in the case of characters, since the beginning,</span> fear has been converted into appetition to a great degree. This process should be fostered in the presence of light. In this way, luminosity might become a conditioned stimulus for attraction. In this case, a Pavlovian addiction for light <span>will foster, yet also—from the point of view of reward fee</span>ling—counterbalance the lessening of the stimulation elicited by characters. The addiction we refer to is one towards light accompanied by graphic signs. Yet, as opposed to the case of the luminous medium, the attention captured by the later ones taken for themselves is continuously reduced.</span></span></span>展开更多
A mathematical model of the human cardiovascu lar system in conjunction with an accurate lumped model for a stenosis can provide better insights into the pressure wave propagation at pathological conditions. In this s...A mathematical model of the human cardiovascu lar system in conjunction with an accurate lumped model for a stenosis can provide better insights into the pressure wave propagation at pathological conditions. In this study, a the oretical relation between pressure drop and flow rate based on Lorentz's reciprocal theorem is derived, which offers an identity to describe the relevance of the geometry and the convective momentum transport to the drag force. A voxel based simulator VFLOW VOF3D, where the vessel geome try is expressed by using volume of fluid (VOF) functions, is employed to find the flow distribution in an idealized steno sis vessel and the identity was validated numerically. It is revealed from the correlation flow in a stenosis vessel can that the pressure drop of NS be decomposed into a linear term caused by Stokes flow with the same boundary condi tions, and two nonlinear terms. Furthermore, the linear term for the pressure drop of Stokes flow can be summarized as a correlation by using a modified equation of lubrication the ory, which gives favorable results compared to the numerical ones. The contribution of the nonlinear terms to the pressure drop was analyzed numerically, and it is found that geomet ric shape and momentum transport are the primary factors for the enhancement of drag force. This work paves a way to simulate the blood flow and pressure propagation under dif ferent stenosis conditions by using 1D mathematical model.展开更多
Sound propagation in a wedge-shaped waveguide with perfectly reflecting boundaries is one of the few range- dependent problems with an analytical solution, and hence provides an ideal benchmark for a full two-way solu...Sound propagation in a wedge-shaped waveguide with perfectly reflecting boundaries is one of the few range- dependent problems with an analytical solution, and hence provides an ideal benchmark for a full two-way solution to the wave equation. An analytical solution for the sound propagation in an ideal wedge with a pressure-release bottom was presented by Buckingham and Tolstoy [Buckingham and Tolstoy 1990 J. Acoust. Soc. Am. 87 1511]. The ideal wedge problem with a rigid bottom is also of great importance in underwater acoustics. We present an analytical solution to the ideal wedge problem with a perfectly reflecting bottom, either rigid or pressure-release, which may be used to provide a means for investigating the sound field in depth-varying channels, and to establish the accuracy of numerical propagation models. Closed-form expressions for coupling matrices are also provided for the ideal waveguides characterized by a ho- mogeneous water column bounded by perfectly reflecting boundaries. A comparison between the analytical solution and the numerical solution recently proposed by Luo et al. [Luo W Y, Yang C M and Zhang R H 2012 Chin. Phys. Lett. 29 014302] is also presented, through which the accuracy of this numerical model is illustrated.展开更多
The writers of the"red literary classics"replace the Confucian tradition of the blood relation with the modern"class struggle theory",so the class attribute becomes the one and only standard for va...The writers of the"red literary classics"replace the Confucian tradition of the blood relation with the modern"class struggle theory",so the class attribute becomes the one and only standard for value evaluation,under which the modern "class revolution"is quite different from the traditional blood revenge,taking on the expansion of the revenge object,the simplification of the revenge method,ennobling of the revenge motivation and the legalization of the revenge means and so on.展开更多
Algebraic solutions of the D-dimensional Schrodinger equation with Killingbeck potential are investigated using the Lie algebraic approach within the framework of quasi-exact solvability. The spectrum and wavefunction...Algebraic solutions of the D-dimensional Schrodinger equation with Killingbeck potential are investigated using the Lie algebraic approach within the framework of quasi-exact solvability. The spectrum and wavefunctions of the system are reported and the allowed values of the potential parameters are obtained through the sl(2) algebraization.展开更多
<img src="Edit_bdc7d851-e537-40df-990c-d678defa9648.png" alt="" />(M = Au, Ag, Cu;<span lang="EN-US" style="font-size:9pt;font-family:"color:black;"><i>n&...<img src="Edit_bdc7d851-e537-40df-990c-d678defa9648.png" alt="" />(M = Au, Ag, Cu;<span lang="EN-US" style="font-size:9pt;font-family:"color:black;"><i>n</i></span>= 1, 2, 3) clusters were used as a cluster model to study the activation of oxygen molecules on single-atom catalysts. Structures of <img src="Edit_bb84deb7-e24a-4777-a2f6-a1621ddd2afc.png" alt="" /> clusters were studied by density functional calculations with global optimization. For each <span style="font-family:"color:black;white-space:normal;"><i>n</i></span>, the most stable structures are quite similar for different metal types, and the oxygen molecule prefers to be adsorbed onto M atoms. It is found that the activation degree of oxygen is higher on clusters with non-noble metal Cu than that of Ag or Au containing clusters, by comparing the changes of O-O bond length and vibrational frequency, natural charge population analysis, Fuzzy bond order analysis, and energy barriers of O<sub>2</sub> dissociation. CO oxidation was used as a probe reaction to study the reactivity of Cu-containing clusters, and it is found that the reactivity decreases with the increase of the size of silicon-oxygen clusters. Our results give a new aspect to understand the reaction mechanism of non-precious metal single-atom catalyst for oxygen activation with high efficiency.展开更多
Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the...Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the whole range of the losses using a standard loss distribution. We tackle this modeling problem by proposing a three-component spliced regression model that can simultaneously model zeros, moderate and large losses and consider heterogeneous effects in mixture components. To apply our proposed model to Privacy Right Clearinghouse (PRC) data breach chronology, we segment geographical groups using unsupervised cluster analysis, and utilize a covariate-dependent probability to model zero losses, finite mixture distributions for moderate body and an extreme value distribution for large losses capturing the heavy-tailed nature of the loss data. Parameters and coefficients are estimated using the Expectation-Maximization (EM) algorithm. Combining with our frequency model (generalized linear mixed model) for data breaches, aggregate loss distributions are investigated and applications on cyber insurance pricing and risk management are discussed.展开更多
基金supported in part by the Natioual Natural Science Foundation of China(Grant No.60933003)the High Technical Research and Development Program of China(Grant No.2006AA01Z101)+1 种基金Shaanxi ISTC(Grant No.2008KW-02)IBM Joint Project
文摘Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.
基金supported by Natural Science Foundation of China (61372125)973 project (2013CB329104)+1 种基金Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (16KJA510005)the open research fund of National Mobile Communications Research Laboratory, Southeast University (2013D01, 2015D10)
文摘In ultra-dense networks(UDNs), large-scale deployment of femto base stations is an important technique for improving the network throughput and quality of service(QoS). In this paper, a multidimensional resource allocation algorithm based on noncooperation game theory is proposed to manage the resource allocation in UDNs, including transmission point association, user channels, and power. The algorithm derives a multidimensional resource optimization model and converts into a noncooperation game model according to the analysis of transmission point association user channel and power allocation. The algorithm includes two phases: transmission point association, and channel and power allocation. Then, feasible domain and discrete variables relaxation approaches are introduced to derive an approximate optimal multidimensional resource allocation solution with low complexity. Simulation results show that this method has some advantages in suppressing interference and improves the overall system throughput, while ensuring the QoS of femtocell users.
文摘According to the proposed hypothesis, graphic characters trigger the subcortical visual route. The reaction discussed is very weak. Yet, its very existence has an unusual importance: characters and (occluded) venomous snakeskin patterns reveal themselves as conflatable. Furthermore, following tractogra<span><span><span style="font-family:;" "="">- </span></span></span><span><span><span style="font-family:;" "="">phic research, a functional segregation of the subcortical pathway is to be <span>presupposed. Thus, there can’t be a later dissociation of two stimuli pre</span>viously associated. The outc</span></span></span><span><span><span style="font-family:;" "="">omes of lecture will gradually appear probabilistically <span>(much) more peaceful than encountering a venomous snake, though, and</span> thus a continuous lessening of the reaction is expectable. Here, on one hand, it is relevant that the subcortical visual pathway goes to the amygdala. The reactions we describe tap into goal-oriented processes, and they will do that un<span>fettered. On the other hand, in the case of characters, since the beginning,</span> fear has been converted into appetition to a great degree. This process should be fostered in the presence of light. In this way, luminosity might become a conditioned stimulus for attraction. In this case, a Pavlovian addiction for light <span>will foster, yet also—from the point of view of reward fee</span>ling—counterbalance the lessening of the stimulation elicited by characters. The addiction we refer to is one towards light accompanied by graphic signs. Yet, as opposed to the case of the luminous medium, the attention captured by the later ones taken for themselves is continuously reduced.</span></span></span>
文摘A mathematical model of the human cardiovascu lar system in conjunction with an accurate lumped model for a stenosis can provide better insights into the pressure wave propagation at pathological conditions. In this study, a the oretical relation between pressure drop and flow rate based on Lorentz's reciprocal theorem is derived, which offers an identity to describe the relevance of the geometry and the convective momentum transport to the drag force. A voxel based simulator VFLOW VOF3D, where the vessel geome try is expressed by using volume of fluid (VOF) functions, is employed to find the flow distribution in an idealized steno sis vessel and the identity was validated numerically. It is revealed from the correlation flow in a stenosis vessel can that the pressure drop of NS be decomposed into a linear term caused by Stokes flow with the same boundary condi tions, and two nonlinear terms. Furthermore, the linear term for the pressure drop of Stokes flow can be summarized as a correlation by using a modified equation of lubrication the ory, which gives favorable results compared to the numerical ones. The contribution of the nonlinear terms to the pressure drop was analyzed numerically, and it is found that geomet ric shape and momentum transport are the primary factors for the enhancement of drag force. This work paves a way to simulate the blood flow and pressure propagation under dif ferent stenosis conditions by using 1D mathematical model.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11125420 and 10734100)the Knowledge Innovation Program of the Chinese Academy of Sciences
文摘Sound propagation in a wedge-shaped waveguide with perfectly reflecting boundaries is one of the few range- dependent problems with an analytical solution, and hence provides an ideal benchmark for a full two-way solution to the wave equation. An analytical solution for the sound propagation in an ideal wedge with a pressure-release bottom was presented by Buckingham and Tolstoy [Buckingham and Tolstoy 1990 J. Acoust. Soc. Am. 87 1511]. The ideal wedge problem with a rigid bottom is also of great importance in underwater acoustics. We present an analytical solution to the ideal wedge problem with a perfectly reflecting bottom, either rigid or pressure-release, which may be used to provide a means for investigating the sound field in depth-varying channels, and to establish the accuracy of numerical propagation models. Closed-form expressions for coupling matrices are also provided for the ideal waveguides characterized by a ho- mogeneous water column bounded by perfectly reflecting boundaries. A comparison between the analytical solution and the numerical solution recently proposed by Luo et al. [Luo W Y, Yang C M and Zhang R H 2012 Chin. Phys. Lett. 29 014302] is also presented, through which the accuracy of this numerical model is illustrated.
基金the staged achievement of the 54th fund project of China Postdoctoral Science Foundation--On the "Revolution/Revenge" Narration of the "Red Literary Classics" (2013M541491)
文摘The writers of the"red literary classics"replace the Confucian tradition of the blood relation with the modern"class struggle theory",so the class attribute becomes the one and only standard for value evaluation,under which the modern "class revolution"is quite different from the traditional blood revenge,taking on the expansion of the revenge object,the simplification of the revenge method,ennobling of the revenge motivation and the legalization of the revenge means and so on.
文摘Algebraic solutions of the D-dimensional Schrodinger equation with Killingbeck potential are investigated using the Lie algebraic approach within the framework of quasi-exact solvability. The spectrum and wavefunctions of the system are reported and the allowed values of the potential parameters are obtained through the sl(2) algebraization.
文摘<img src="Edit_bdc7d851-e537-40df-990c-d678defa9648.png" alt="" />(M = Au, Ag, Cu;<span lang="EN-US" style="font-size:9pt;font-family:"color:black;"><i>n</i></span>= 1, 2, 3) clusters were used as a cluster model to study the activation of oxygen molecules on single-atom catalysts. Structures of <img src="Edit_bb84deb7-e24a-4777-a2f6-a1621ddd2afc.png" alt="" /> clusters were studied by density functional calculations with global optimization. For each <span style="font-family:"color:black;white-space:normal;"><i>n</i></span>, the most stable structures are quite similar for different metal types, and the oxygen molecule prefers to be adsorbed onto M atoms. It is found that the activation degree of oxygen is higher on clusters with non-noble metal Cu than that of Ag or Au containing clusters, by comparing the changes of O-O bond length and vibrational frequency, natural charge population analysis, Fuzzy bond order analysis, and energy barriers of O<sub>2</sub> dissociation. CO oxidation was used as a probe reaction to study the reactivity of Cu-containing clusters, and it is found that the reactivity decreases with the increase of the size of silicon-oxygen clusters. Our results give a new aspect to understand the reaction mechanism of non-precious metal single-atom catalyst for oxygen activation with high efficiency.
文摘Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the whole range of the losses using a standard loss distribution. We tackle this modeling problem by proposing a three-component spliced regression model that can simultaneously model zeros, moderate and large losses and consider heterogeneous effects in mixture components. To apply our proposed model to Privacy Right Clearinghouse (PRC) data breach chronology, we segment geographical groups using unsupervised cluster analysis, and utilize a covariate-dependent probability to model zero losses, finite mixture distributions for moderate body and an extreme value distribution for large losses capturing the heavy-tailed nature of the loss data. Parameters and coefficients are estimated using the Expectation-Maximization (EM) algorithm. Combining with our frequency model (generalized linear mixed model) for data breaches, aggregate loss distributions are investigated and applications on cyber insurance pricing and risk management are discussed.