This article makes a comparative analysis of the similarities and differences on HRM in the small and medium state-owned, civilian-owned, foreign-invested enterprises in Guangdong province and puts forward some sugges...This article makes a comparative analysis of the similarities and differences on HRM in the small and medium state-owned, civilian-owned, foreign-invested enterprises in Guangdong province and puts forward some suggestions to enhance the competition preponderance of the SMEs.展开更多
The North Branch, separated by the Chongming Island, was once the main channel in the estuary of the Changjiang River. Reclamation and a decrease in runoffto the North Branch had led to the narrowing and shallowing of...The North Branch, separated by the Chongming Island, was once the main channel in the estuary of the Changjiang River. Reclamation and a decrease in runoffto the North Branch had led to the narrowing and shallowing of the channel. The Yuantuojiao Point is located at the intersecting point connecting the North Branch of the Changjiang River and the Jiangsu coastline. Erosion cliffs are developed between the typical silty-muddy tidal flat and the salt marsh occupied by Spartina alterniflorea, and this has changed rapidly over the past few years. The sediment grain size analysis results of the surficial and two core samples indi- cate that the Yuantuoiiao Point tidal fiat experienced continuous accretional processes. Based upon 137Cs analysis results of the YT and YY Cores sampled from the tidal flat at the Yuantuojiao Point, the average sed- imentation rate of the YT Core was 2.30 cm/a from 1963 to 2007, and 2.38 cm/a from 1954 to 2007 for the YY Core. The sedimentation rates of both core locations have declined since the 1960s corresponding to the seaward reclamation at the Yuantuojiao Point. The average sedimentation rates at the Yuantnojiao Point were similar to that of the silty-muddy tidal flat at the northern ]iangsu coast, but lower than that of the south of the Changjiang River Estuary. According to field morphological investigations from 2006 to 2008 on the salt marsh at the Yuantuojiao Point, cliffs retreated markedly by storm surges and disappeared gradu- ally because of the rapid sedimentation on the silty-muddy tidal flat. The maximum annual retreat reached 10 m. The recent sedimentation and morphological changes of the Yuantuojiao Point tidal flat not only displayed the retreat of the salt marsh and the disappearance of cliffs, but also was accompanied by rapid sedimentation of the silty-muddy tidal flat and the salt marsh, indicating the responses to the tidal currents, storm surges, Spartina alterniflorea trapping sediments and large-scale reclamation. The sediment grain size and their trends, southward coastal flow, and sandspits of the longshore bars suggest that the main sediment source at the Yuantuoijao Point, estuary of the North Branch was possibly from the Changjiang River before 1958, since then, it has been from the south of the submarine radial sand ridges of the southern Huanghai Sea (Yellow Sea).展开更多
In this article, authors study the growth of Laplace-Stieltjes transform with zero order convergent in the right half-plane, define the exponential order and the exponential low order, and find the relations between t...In this article, authors study the growth of Laplace-Stieltjes transform with zero order convergent in the right half-plane, define the exponential order and the exponential low order, and find the relations between them. Some results similar to Dirichlet series are obtained.展开更多
In the paper, generalized orders and generalized types of Dirichlet series in the right half-plane are given. Some interesting relationships on maximum modulus, the maximum term and the coefficients of entire function...In the paper, generalized orders and generalized types of Dirichlet series in the right half-plane are given. Some interesting relationships on maximum modulus, the maximum term and the coefficients of entire function defined by Dirichlet series of in the right half-plane are obtained.展开更多
Suffcient conditions for the existence of at least one solution of two-point boundary value problems for second order nonlinear differential equations [φ(x(t))] + kx(t) + g(t,x(t)) = p(t),t ∈(0,π) x(0) = x(π) = 0 ...Suffcient conditions for the existence of at least one solution of two-point boundary value problems for second order nonlinear differential equations [φ(x(t))] + kx(t) + g(t,x(t)) = p(t),t ∈(0,π) x(0) = x(π) = 0 are established,where [φ(x)] =(|x |p-2x) with p > 1.Our result is new even when [φ(x)] = x in above problem,i.e.p = 2.Examples are presented to illustrate the effciency of the theorem in this paper.展开更多
Using Ahlfors’ theory of covering surface and a type-function,we confirm the existence theorem of a Borel radius and a T-radius for the algebroidal function dealing with multiple values in the unit disc,which briefly...Using Ahlfors’ theory of covering surface and a type-function,we confirm the existence theorem of a Borel radius and a T-radius for the algebroidal function dealing with multiple values in the unit disc,which briefly extend some results for the algebroidal functions in the complex plane展开更多
The typical features of the coordinate and the curvature as well as the recorded time information were analyzed in the hand-written signatures.In the hand-written signature process 10 biometric features were summarize...The typical features of the coordinate and the curvature as well as the recorded time information were analyzed in the hand-written signatures.In the hand-written signature process 10 biometric features were summarized:the amount of zero speed in direction x and direction y,the amount of zero acceleration in direction x and direction y,the total time of the hand-written signatures,the total distance of the pen traveling in the hand-written process,the frequency for lifting the pen,the time for lifting the pen,the amount of the pressure higher or lower than the threshold values.The formulae of biometric features extraction were summarized.The Gauss function was used to draw the typical information from the above-mentioned biometric features,with which to establish the hidden Markov mode and to train it.The frame of double authentication was proposed by combing the signature with the digital signature.Web service technology was applied in the system to ensure the security of data transmission.The training practice indicates that the hand-written signature verification can satisfy the needs from the office automation systems.展开更多
The main purpose of this article is to study the existence theories of global meromorphic solutions for some second-order linear differential equations with meromorphic coefficients, which perfect the solution theory ...The main purpose of this article is to study the existence theories of global meromorphic solutions for some second-order linear differential equations with meromorphic coefficients, which perfect the solution theory of such equations.展开更多
The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algo...The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algorithm between broker nodes in the routing process of the contentbased publish/subscribe system. It analyzes the security of the secure channel encrypted with data communication by DES algorithm and chaos code algorithm, and finds out the secure channel can be easily attacked by known plain text. Therefore, the paper proposes the improved algorithm of message encryption and authentication, combining encryption and the generation of the message authentication code together to finish scanning at one time, which enhances both the secure degree and running efficiency. This secure channel system has a certain reference value to the pub/sub system requiring highly communication security.展开更多
Reviewing the background of dividend policy adopted by public corporations in China, this paper investigates the relationship between dividend policy of public corporation and the state supervisory policy upon the pro...Reviewing the background of dividend policy adopted by public corporations in China, this paper investigates the relationship between dividend policy of public corporation and the state supervisory policy upon the promulgation and implementation of Regulatory Measures on New Issues of Public Corporations in 2001. We collect all listed companies with dividend distribution from 1992 to 2002 as sample data. The results of analyses indicate that corporate dividend is affected evidently by the state supervisory policy and different majority shareholders have distinct reaction to governance. The majority shareholders are obviously motivated to maximize their benefits and evade the supervision from the state. At last we propose that supervisory policy of corporations should adopt unambiguous guideline.展开更多
Empirical mode decomposition (EMD) is an adaptive and approximately orthogonal filtering process that reflects human’s visual mechanism of differentiating textures. In this paper, we present a modified 2D EMD algorit...Empirical mode decomposition (EMD) is an adaptive and approximately orthogonal filtering process that reflects human’s visual mechanism of differentiating textures. In this paper, we present a modified 2D EMD algorithm using the FastRBF and an appropriate number of iterations in the shifting process (SP), then apply it to texture classification. Rotation-invariant texture feature vectors are extracted using auto-registration and circular regions of magnitude spectra of 2D fast Fourier transform (FFT). In the experiments, we employ a Bayesion classifier to classify a set of 15 distinct natural textures selected from the Brodatz album. The experimental results, based on different testing datasets for images with different orientations, show the effectiveness of the proposed classification scheme.展开更多
An effective assemble-oriented framework for grid Web service based on open grid service architecture was proposed,in which Web service semantics network constructed by software reuse was designed to enhance the locat...An effective assemble-oriented framework for grid Web service based on open grid service architecture was proposed,in which Web service semantics network constructed by software reuse was designed to enhance the locating of assemble-oriented service resources.The successful Web services assembled structure was exploited to design semantics network,the logical and the physical structure of the resource was separated in Web service,and the logical resource derived from type ID of Web service was combined with semantic structure.The organizing protocol,data structures and the mechanism of implementation in the model were presented.Experiment results show that the success ratio of Web service request comes to 100% while providing completely assembly semantics set.This model provides guarantee of the reliability of assemble Web service and establishes the foundation of Web service automatic interaction,customizing application service and dynamic service configuration.展开更多
In this paper, by introducing the norm ||x|| (x ∈ Rn), a multiple Hardy- Hilbert's integral inequality with the best constant factor and it's equivalent form are given.
In this paper we give an elementary and unified proof of the Hajek-Renyi inequality, and get a general version of this inequality which not only covers the all known results but also derives some new results.
Reactions of Cd(OAC)2·2H2O with m-thioacetatebenzoic acid(H2L) and 1,10-phenanthroline(phen) give rise to a metal-organic framework,[CdL(phen)]n(1).X-ray single-crystal diffraction reveals that 1 crysta...Reactions of Cd(OAC)2·2H2O with m-thioacetatebenzoic acid(H2L) and 1,10-phenanthroline(phen) give rise to a metal-organic framework,[CdL(phen)]n(1).X-ray single-crystal diffraction reveals that 1 crystallizes in the monoclinic system,space group C2/c,with a= 25.7099(5),b=10.3872(2),c=19.1820(4),β=131.114(1)°,V=3859.4(1)3,Mr=502.80,Z= 8,F(000)=2000,μ=1.271 mm-1,Dc=1.731 g·cm-3,the final R=0.0226 and wR=0.0559 for 3817 observed reflections(Ⅰ〉 2σ(Ⅰ)).1 displays a 1D double-strand chain structure with crab-like dinuclear subunits,and extends into a 3D network by π-π interactions and C-H···O hydrogen bonds.Photoluminescence studies reveal that it displays intense structure-related fluorescent emission bands(λex=342 nm) at 370.5 and 389 nm in the solid state at room temperature.展开更多
Two new supramolecular complexes [MnL(H2O) 4](1) and [ZnL(H2O) 5]·0.25H2O(2) (H2L = 5-carboxy-1-carboxymethyl-2-oxidopyridinium) have been synthesized and structurally characterized by elemental analysi...Two new supramolecular complexes [MnL(H2O) 4](1) and [ZnL(H2O) 5]·0.25H2O(2) (H2L = 5-carboxy-1-carboxymethyl-2-oxidopyridinium) have been synthesized and structurally characterized by elemental analysis,IR and X-ray single-crystal structure determination. Complex 1 crystallizes in the monoclinic system,space group P21/n with a = 5.1537(2) ,b = 21.2008(9) ,c = 10.9727(4)A,β = 99.182(2) °,V = 1183.54(8)A^3,C8H13MnNO9,Mr = 322.13,Dc = 1.808,Z = 4,F(000) = 660,μ = 1.160,R = 0.0372 and wR = 0.0750 for 2217 observed reflections(I 〉 2σ(I)) . Complex 2 crystallizes in the triclinic system,space group P1^- with a = 7.730(2) ,b = 8.030(2) ,c = 11.400(2) A^3,α = 104.27(3) ,β = 92.93(3) ,γ = 102.67(3) °,V = 664.9(2) 3,C8H15.5ZnNO10.25,Mr = 355.08,Dc = 1.774,Z = 2,F(000) = 365,μ = 1.899,R = 0.0243 and wR = 0.0695 for 2759 observed reflections(I 〉 2σ(I)) . Their thermal properties have been studied.展开更多
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ...In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.展开更多
This paper takes Principal-agent Theory as the basic analysis flame to analyze the modern corporate principal and agent in a state of the two sides in asymmetric information on the basis of self-interest maximization,...This paper takes Principal-agent Theory as the basic analysis flame to analyze the modern corporate principal and agent in a state of the two sides in asymmetric information on the basis of self-interest maximization, and the game strategy which revolves the information disclosure and hideaway to launch, and therefore can get the game way which causes the auditing institution. The equilibrium in game of the information disclosure causes the auditing institution, the expense and cost which the audit profession consumes is the company governs reduces the information not asymmetrical diligently center essential agency costs.展开更多
Language is influenced by many factors, among which social class and network are the two main aspects. Many scholars have argued about which one plays the role more importantly, but no conclusion was reached. This pap...Language is influenced by many factors, among which social class and network are the two main aspects. Many scholars have argued about which one plays the role more importantly, but no conclusion was reached. This paper, based on Rachel's language in Friends 3, is to analyze whether her language will change when she moves to another social class, but staying in the same network, therefore to study the major social factor influencing language.展开更多
Orthogonal matching pursuit (OMP) algorithm is an efficient method for the recovery of a sparse signal in compressed sensing, due to its ease implementation and low complexity. In this paper, the robustness of the O...Orthogonal matching pursuit (OMP) algorithm is an efficient method for the recovery of a sparse signal in compressed sensing, due to its ease implementation and low complexity. In this paper, the robustness of the OMP algorithm under the restricted isometry property (RIP) is presented. It is shown that 5K+V/KOK,1 〈 1 is sufficient for the OMP algorithm to recover exactly the support of arbitrary /(-sparse signal if its nonzero components are large enough for both 12 bounded and lz~ bounded noises.展开更多
文摘This article makes a comparative analysis of the similarities and differences on HRM in the small and medium state-owned, civilian-owned, foreign-invested enterprises in Guangdong province and puts forward some suggestions to enhance the competition preponderance of the SMEs.
基金The National Natural Science Foundation of China under contract Nos 41071006 and 40676052the Jiangsu Natural Science Foundation under contract No. BK2010050the Research Fund for the Doctoral Program of Higher Education of China under contract No.20100091110011
文摘The North Branch, separated by the Chongming Island, was once the main channel in the estuary of the Changjiang River. Reclamation and a decrease in runoffto the North Branch had led to the narrowing and shallowing of the channel. The Yuantuojiao Point is located at the intersecting point connecting the North Branch of the Changjiang River and the Jiangsu coastline. Erosion cliffs are developed between the typical silty-muddy tidal flat and the salt marsh occupied by Spartina alterniflorea, and this has changed rapidly over the past few years. The sediment grain size analysis results of the surficial and two core samples indi- cate that the Yuantuoiiao Point tidal fiat experienced continuous accretional processes. Based upon 137Cs analysis results of the YT and YY Cores sampled from the tidal flat at the Yuantuojiao Point, the average sed- imentation rate of the YT Core was 2.30 cm/a from 1963 to 2007, and 2.38 cm/a from 1954 to 2007 for the YY Core. The sedimentation rates of both core locations have declined since the 1960s corresponding to the seaward reclamation at the Yuantuojiao Point. The average sedimentation rates at the Yuantnojiao Point were similar to that of the silty-muddy tidal flat at the northern ]iangsu coast, but lower than that of the south of the Changjiang River Estuary. According to field morphological investigations from 2006 to 2008 on the salt marsh at the Yuantuojiao Point, cliffs retreated markedly by storm surges and disappeared gradu- ally because of the rapid sedimentation on the silty-muddy tidal flat. The maximum annual retreat reached 10 m. The recent sedimentation and morphological changes of the Yuantuojiao Point tidal flat not only displayed the retreat of the salt marsh and the disappearance of cliffs, but also was accompanied by rapid sedimentation of the silty-muddy tidal flat and the salt marsh, indicating the responses to the tidal currents, storm surges, Spartina alterniflorea trapping sediments and large-scale reclamation. The sediment grain size and their trends, southward coastal flow, and sandspits of the longshore bars suggest that the main sediment source at the Yuantuoijao Point, estuary of the North Branch was possibly from the Changjiang River before 1958, since then, it has been from the south of the submarine radial sand ridges of the southern Huanghai Sea (Yellow Sea).
文摘In this article, authors study the growth of Laplace-Stieltjes transform with zero order convergent in the right half-plane, define the exponential order and the exponential low order, and find the relations between them. Some results similar to Dirichlet series are obtained.
基金supported by the National Natural Science Foundation of China(1110109611201083)+1 种基金Guangdong Natural Science Foundation(S2012010010376)the Startup Foundation for Doctors of Guangdong University of Technology(083063)
文摘In the paper, generalized orders and generalized types of Dirichlet series in the right half-plane are given. Some interesting relationships on maximum modulus, the maximum term and the coefficients of entire function defined by Dirichlet series of in the right half-plane are obtained.
基金Supported by the Natural Science Foundation of Hunan Province(06JJ50008) Supported by the Natural Science Foundation of Guangdong Province(7004569)
文摘Suffcient conditions for the existence of at least one solution of two-point boundary value problems for second order nonlinear differential equations [φ(x(t))] + kx(t) + g(t,x(t)) = p(t),t ∈(0,π) x(0) = x(π) = 0 are established,where [φ(x)] =(|x |p-2x) with p > 1.Our result is new even when [φ(x)] = x in above problem,i.e.p = 2.Examples are presented to illustrate the effciency of the theorem in this paper.
基金supported by the National Natural Science Foundation of China (11101096)
文摘Using Ahlfors’ theory of covering surface and a type-function,we confirm the existence theorem of a Borel radius and a T-radius for the algebroidal function dealing with multiple values in the unit disc,which briefly extend some results for the algebroidal functions in the complex plane
基金Project(03JJY3102) supported by the Natural Science Foundation of Hunan Province, China
文摘The typical features of the coordinate and the curvature as well as the recorded time information were analyzed in the hand-written signatures.In the hand-written signature process 10 biometric features were summarized:the amount of zero speed in direction x and direction y,the amount of zero acceleration in direction x and direction y,the total time of the hand-written signatures,the total distance of the pen traveling in the hand-written process,the frequency for lifting the pen,the time for lifting the pen,the amount of the pressure higher or lower than the threshold values.The formulae of biometric features extraction were summarized.The Gauss function was used to draw the typical information from the above-mentioned biometric features,with which to establish the hidden Markov mode and to train it.The frame of double authentication was proposed by combing the signature with the digital signature.Web service technology was applied in the system to ensure the security of data transmission.The training practice indicates that the hand-written signature verification can satisfy the needs from the office automation systems.
基金Supported by the National Natural Science Foundation of China(11101096 )Guangdong Natural Science Foundation (S2012010010376, S201204006711)
文摘The main purpose of this article is to study the existence theories of global meromorphic solutions for some second-order linear differential equations with meromorphic coefficients, which perfect the solution theory of such equations.
基金Supported by the National Natural Science Foun-dation of China (60273014)
文摘The paper mainly discusses the integrity of the forwarded subscription message guaranteed by secure channel which encrypted in data communication by using data encryption standard (DES) algorithm and chaos code algorithm between broker nodes in the routing process of the contentbased publish/subscribe system. It analyzes the security of the secure channel encrypted with data communication by DES algorithm and chaos code algorithm, and finds out the secure channel can be easily attacked by known plain text. Therefore, the paper proposes the improved algorithm of message encryption and authentication, combining encryption and the generation of the message authentication code together to finish scanning at one time, which enhances both the secure degree and running efficiency. This secure channel system has a certain reference value to the pub/sub system requiring highly communication security.
文摘Reviewing the background of dividend policy adopted by public corporations in China, this paper investigates the relationship between dividend policy of public corporation and the state supervisory policy upon the promulgation and implementation of Regulatory Measures on New Issues of Public Corporations in 2001. We collect all listed companies with dividend distribution from 1992 to 2002 as sample data. The results of analyses indicate that corporate dividend is affected evidently by the state supervisory policy and different majority shareholders have distinct reaction to governance. The majority shareholders are obviously motivated to maximize their benefits and evade the supervision from the state. At last we propose that supervisory policy of corporations should adopt unambiguous guideline.
基金Project supported by the National Basic Research Program (973) of China (Nos. 2004CB318000 and 2002CB312104), the National Natural Science Foundation of China (Nos. 60133020 and 60325208) and the Natural Science Foundation of Beijing (No. 1062006), China
文摘Empirical mode decomposition (EMD) is an adaptive and approximately orthogonal filtering process that reflects human’s visual mechanism of differentiating textures. In this paper, we present a modified 2D EMD algorithm using the FastRBF and an appropriate number of iterations in the shifting process (SP), then apply it to texture classification. Rotation-invariant texture feature vectors are extracted using auto-registration and circular regions of magnitude spectra of 2D fast Fourier transform (FFT). In the experiments, we employ a Bayesion classifier to classify a set of 15 distinct natural textures selected from the Brodatz album. The experimental results, based on different testing datasets for images with different orientations, show the effectiveness of the proposed classification scheme.
基金Project (60573127) supported by the National Natural Science Foundation of ChinaProject (06023960) supported by the Natural Science Foundation of Guangdong Province, ChinaProject (06JJ30032) supported by the Natural Science Foundation of Hunan Province, China
文摘An effective assemble-oriented framework for grid Web service based on open grid service architecture was proposed,in which Web service semantics network constructed by software reuse was designed to enhance the locating of assemble-oriented service resources.The successful Web services assembled structure was exploited to design semantics network,the logical and the physical structure of the resource was separated in Web service,and the logical resource derived from type ID of Web service was combined with semantic structure.The organizing protocol,data structures and the mechanism of implementation in the model were presented.Experiment results show that the success ratio of Web service request comes to 100% while providing completely assembly semantics set.This model provides guarantee of the reliability of assemble Web service and establishes the foundation of Web service automatic interaction,customizing application service and dynamic service configuration.
文摘In this paper, by introducing the norm ||x|| (x ∈ Rn), a multiple Hardy- Hilbert's integral inequality with the best constant factor and it's equivalent form are given.
基金Supported by the National Natural Science Foundation of China(10671149)
文摘In this paper we give an elementary and unified proof of the Hajek-Renyi inequality, and get a general version of this inequality which not only covers the all known results but also derives some new results.
文摘Reactions of Cd(OAC)2·2H2O with m-thioacetatebenzoic acid(H2L) and 1,10-phenanthroline(phen) give rise to a metal-organic framework,[CdL(phen)]n(1).X-ray single-crystal diffraction reveals that 1 crystallizes in the monoclinic system,space group C2/c,with a= 25.7099(5),b=10.3872(2),c=19.1820(4),β=131.114(1)°,V=3859.4(1)3,Mr=502.80,Z= 8,F(000)=2000,μ=1.271 mm-1,Dc=1.731 g·cm-3,the final R=0.0226 and wR=0.0559 for 3817 observed reflections(Ⅰ〉 2σ(Ⅰ)).1 displays a 1D double-strand chain structure with crab-like dinuclear subunits,and extends into a 3D network by π-π interactions and C-H···O hydrogen bonds.Photoluminescence studies reveal that it displays intense structure-related fluorescent emission bands(λex=342 nm) at 370.5 and 389 nm in the solid state at room temperature.
文摘In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.
文摘This paper takes Principal-agent Theory as the basic analysis flame to analyze the modern corporate principal and agent in a state of the two sides in asymmetric information on the basis of self-interest maximization, and the game strategy which revolves the information disclosure and hideaway to launch, and therefore can get the game way which causes the auditing institution. The equilibrium in game of the information disclosure causes the auditing institution, the expense and cost which the audit profession consumes is the company governs reduces the information not asymmetrical diligently center essential agency costs.
文摘Language is influenced by many factors, among which social class and network are the two main aspects. Many scholars have argued about which one plays the role more importantly, but no conclusion was reached. This paper, based on Rachel's language in Friends 3, is to analyze whether her language will change when she moves to another social class, but staying in the same network, therefore to study the major social factor influencing language.
基金supported by National Natural Science Foundation of China(Grant Nos.11271060,U0935004,U1135003,11071031,11290143 and 11101096)the Scientific Research Foundation for the Returned Overseas Chinese Scholars,State Education Ministry,National Engineering Research Center of Digital Lifethe Guangdong Natural Science Foundation(Grant No.S2012010010376)
文摘Orthogonal matching pursuit (OMP) algorithm is an efficient method for the recovery of a sparse signal in compressed sensing, due to its ease implementation and low complexity. In this paper, the robustness of the OMP algorithm under the restricted isometry property (RIP) is presented. It is shown that 5K+V/KOK,1 〈 1 is sufficient for the OMP algorithm to recover exactly the support of arbitrary /(-sparse signal if its nonzero components are large enough for both 12 bounded and lz~ bounded noises.