This paper sets out a new paradigm of faith based organisation(FBO)called Curating Spaces of Hope.The paper sets out the paradigm and the interdisciplinary literatures into which the paradigm is applied namely,the div...This paper sets out a new paradigm of faith based organisation(FBO)called Curating Spaces of Hope.The paper sets out the paradigm and the interdisciplinary literatures into which the paradigm is applied namely,the diversifying belief landscape in the UK,the postsecular,the redefinition of FBOs,and liminality as the new norm in policy.The paper then turns to ethnographic research to evidence the ability of the paradigm to map and coproduce shared values,before considering applications of Curating Spaces of Hope in post-pandemic contexts in the north west of England through case studies with ecumenical Christian,non-religious,and Turkish Muslim and interfaith contexts.展开更多
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert...A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.展开更多
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat...Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.展开更多
Information has always been an integral component of business strategy. However, with the rise of information technology (IT) and globalization of businesses, information has taken a far more important role in explain...Information has always been an integral component of business strategy. However, with the rise of information technology (IT) and globalization of businesses, information has taken a far more important role in explaining business performance. IT can be used to enhance research activities of the firm;and its product knowledge can be used to improve business productivity. In fact, scholars and researchers have indicated that knowledge can be a source of sustainable advantages for the firm. However, not much research has been done that explains what kind of knowledge is important for sustainable advantages. In this paper, we present three kinds of knowledge: core, complementary, and peripheral. We also develop an idea of shared space along three dimensions: physically shared space, technically shared space, and cognitively shared space. The main theme of this paper is to show the relevance and importance of these different kinds of knowledge along the shared spaces that create sustainable advantages for the firm.展开更多
The text aims to investigate the relevance of the concept of"public space" and the continuous variations which have changed its meaning. Going beyond the concept of public space, the author can understand the semant...The text aims to investigate the relevance of the concept of"public space" and the continuous variations which have changed its meaning. Going beyond the concept of public space, the author can understand the semantic boundaries of this definition: Today, relational spaces and shared spaces are the forms with which people can express the concept of public space. The gradual spread of new forms of communication has transformed the static view of public space in a more dynamic condition, the distinction between square, street, garden has lost its meaning leaving space to fragments and residues. Contemporary public spaces are defined, as the residual places that come from the abandonment of industries. The large mono-functional voids, which originate from industrial dismantlement, should be strategically reconsidered as new shared public spaces, where the integration between different functions leads to reactivate new forms of re-using of built space.展开更多
In this paper, the concepts of topological space and differential manifold are introduced, and it is proved that the surface determined by function F (x<sub>2</sub>, x<sub>2</sub>, …, x<sub...In this paper, the concepts of topological space and differential manifold are introduced, and it is proved that the surface determined by function F (x<sub>2</sub>, x<sub>2</sub>, …, x<sub>t</sub>) of class C<sup>r</sup> in Euelidean R<sup>t</sup> is a differential manifold. Using the intersection of the tangent plane and the hypernormal of the differential manifold to construct the shared master key of participants, an intuitive, secure and complete (t,n)-threshold secret sharing scheme is designed. The paper is proved to be safe, and the probability of successful attack of attackers is only 1/p<sup>t</sup><sup>-1</sup>. When the prime number p is sufficiently large, the probability is almost 0. The results show that this scheme has the characteristics of single-parameter representation of the master key in the geometric method, and is more practical and easy to implement than the Blakley threshold secret sharing scheme.展开更多
In 2013,President Xi Jinping first proposed the "Belt and Road Initiative";the First China Textile Industry Go Global Conference was held at the same year.In 2015,National Development and Reform Commission,Ministry ...In 2013,President Xi Jinping first proposed the "Belt and Road Initiative";the First China Textile Industry Go Global Conference was held at the same year.In 2015,National Development and Reform Commission,Ministry of Foreign Affairs and the Ministry of Commerce jointly issued the document of "The vision and action to promote the construction of Silk RoadEconomic Belt and 21st Century Maritime Silk Road"; the Second China Textile Industry Go Global Conference was held at the same year.展开更多
After the understanding of the concept and characteristics of waterfront architectural space, by taking library, archive, and science and technology museum in Fuqing City for example, the paper had pointed out design ...After the understanding of the concept and characteristics of waterfront architectural space, by taking library, archive, and science and technology museum in Fuqing City for example, the paper had pointed out design techniques and features of their natural geological space, planning structure space, traditional courtyard space and architectural indoor space. It had illustrated their structure of "one center and three axes" in detail. Environmental factor had been regarded in plane planning layout. Semi-enclosed space of "cultural square", sequential space of "open courtyard", and well-spaced space of "vertical ecological courtyard" had been created. Based on these spaces, courtyard and garden environments for reading, rest, leisure and communication had been constructed. It was hoped to inspire design idea of waterfront architectures, so as to create waterfront architectures with times spirit and national feature.展开更多
文摘This paper sets out a new paradigm of faith based organisation(FBO)called Curating Spaces of Hope.The paper sets out the paradigm and the interdisciplinary literatures into which the paradigm is applied namely,the diversifying belief landscape in the UK,the postsecular,the redefinition of FBOs,and liminality as the new norm in policy.The paper then turns to ethnographic research to evidence the ability of the paradigm to map and coproduce shared values,before considering applications of Curating Spaces of Hope in post-pandemic contexts in the north west of England through case studies with ecumenical Christian,non-religious,and Turkish Muslim and interfaith contexts.
基金Supported by the National Natural Science Foun-dation of China(60573129) the Opening Foundation of State Key La-boratory of Information Security and the Opening Foundation of KeyLaboratory of Computer Network and Information Security, Ministryof Education of PRC.
文摘A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.
文摘Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.
文摘Information has always been an integral component of business strategy. However, with the rise of information technology (IT) and globalization of businesses, information has taken a far more important role in explaining business performance. IT can be used to enhance research activities of the firm;and its product knowledge can be used to improve business productivity. In fact, scholars and researchers have indicated that knowledge can be a source of sustainable advantages for the firm. However, not much research has been done that explains what kind of knowledge is important for sustainable advantages. In this paper, we present three kinds of knowledge: core, complementary, and peripheral. We also develop an idea of shared space along three dimensions: physically shared space, technically shared space, and cognitively shared space. The main theme of this paper is to show the relevance and importance of these different kinds of knowledge along the shared spaces that create sustainable advantages for the firm.
文摘The text aims to investigate the relevance of the concept of"public space" and the continuous variations which have changed its meaning. Going beyond the concept of public space, the author can understand the semantic boundaries of this definition: Today, relational spaces and shared spaces are the forms with which people can express the concept of public space. The gradual spread of new forms of communication has transformed the static view of public space in a more dynamic condition, the distinction between square, street, garden has lost its meaning leaving space to fragments and residues. Contemporary public spaces are defined, as the residual places that come from the abandonment of industries. The large mono-functional voids, which originate from industrial dismantlement, should be strategically reconsidered as new shared public spaces, where the integration between different functions leads to reactivate new forms of re-using of built space.
文摘In this paper, the concepts of topological space and differential manifold are introduced, and it is proved that the surface determined by function F (x<sub>2</sub>, x<sub>2</sub>, …, x<sub>t</sub>) of class C<sup>r</sup> in Euelidean R<sup>t</sup> is a differential manifold. Using the intersection of the tangent plane and the hypernormal of the differential manifold to construct the shared master key of participants, an intuitive, secure and complete (t,n)-threshold secret sharing scheme is designed. The paper is proved to be safe, and the probability of successful attack of attackers is only 1/p<sup>t</sup><sup>-1</sup>. When the prime number p is sufficiently large, the probability is almost 0. The results show that this scheme has the characteristics of single-parameter representation of the master key in the geometric method, and is more practical and easy to implement than the Blakley threshold secret sharing scheme.
文摘In 2013,President Xi Jinping first proposed the "Belt and Road Initiative";the First China Textile Industry Go Global Conference was held at the same year.In 2015,National Development and Reform Commission,Ministry of Foreign Affairs and the Ministry of Commerce jointly issued the document of "The vision and action to promote the construction of Silk RoadEconomic Belt and 21st Century Maritime Silk Road"; the Second China Textile Industry Go Global Conference was held at the same year.
基金Supported by Scientific Research Development Fund of Fujian University of Technology(GY-Z09094)~~
文摘After the understanding of the concept and characteristics of waterfront architectural space, by taking library, archive, and science and technology museum in Fuqing City for example, the paper had pointed out design techniques and features of their natural geological space, planning structure space, traditional courtyard space and architectural indoor space. It had illustrated their structure of "one center and three axes" in detail. Environmental factor had been regarded in plane planning layout. Semi-enclosed space of "cultural square", sequential space of "open courtyard", and well-spaced space of "vertical ecological courtyard" had been created. Based on these spaces, courtyard and garden environments for reading, rest, leisure and communication had been constructed. It was hoped to inspire design idea of waterfront architectures, so as to create waterfront architectures with times spirit and national feature.