With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of secur...With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of security and established corresponding mechanisms. In this process,the EU has also formed and developed its National Security Strategy and issued four versions of security strategy reports in 2003, 2008, 2016, and 2022. The 2022 version of the EU security strategy(hereafter referred to as the New Security Strategy), for the first time, has identified Russia as a long-term and direct threat. Furthermore, it has paid increased attention to traditional security, especially the upgrading of military capabilities and has become more reliant on the United States and the North Atlantic Treaty Organization. In the future, the EU will accelerate the militarization process, exert all-out efforts to contain Russia, scrutinize neighborhood security, and increase its swing on China policy.展开更多
In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that secu...In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that security should be prioritized over other aspects;it gives more attention to the chaotic aspects of order change in its assessment of the international situation;it highlights the threats from the West;and it places increased emphasis on domestic capacity building as a means for safeguarding national security.From the content of the new Strategy as well as Russia’s policies in recent years,the strategy of Russia for the foreseeable future can be generally characterized as inward-looking.Domestically,its policies will become more conservative;diplomatically,it will take up a defensive position;and economically,it will increasingly emphasize security and selfreliance.In other words,several issues that were previously overlooked will be given attention.However,strategic introversion does not mean that Russia will invest all its energy in defense.Instead,Russia will build up strength for changes that lie ahead.With the expected strategic introversion,Russia will fnd difculty in making breakthroughs in terms of its relations with the West;the China-Russia relations will continue on the path of steady development;and Russia will place greater importance to the balance of power among major countries.展开更多
India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of ...India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of national security strategy that has distinct Indian characteristics. Generally, successive governments in India have followed the basic principles articulated in Kautilya’s Arthasastra and various security practices adopted during the British Raj. India’s national security strategies are based on an internal logic of geopolitical rivalry and changes in international scenarios, and they are strongly influenced by Hindu traditions and the “Sad-Dharma” purported by King Ashoka. The objective is to create an India-dominated security order in the South Asian subcontinent, which persistently builds its capacity and system as a “net security provider” in the Indian Ocean Rim. Moreover, India is vigorously expanding its network of influence in the Pacific region in an effort to become a world leading power that enjoys a high level of strategic autonomy.展开更多
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi...The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald展开更多
The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively dis...The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role.展开更多
Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether ...Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether will Chi-na seek external expansion when it becomes powerful? In 1992, there began to ap-pear a myth of so-called "China threat". In its November 28 issue of that year,展开更多
This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered- off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the s...This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered- off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.展开更多
The European Union(EU)and its core member states are active participants and stakeholders in the security affairs of the Gulf region.European maritime security is not only an important extension of European security i...The European Union(EU)and its core member states are active participants and stakeholders in the security affairs of the Gulf region.European maritime security is not only an important extension of European security in geospatial and functional areas,but also an indispensable part of Europe’s overall security strategy.However,the attention to the EU’s maritime security was distracted before 2010,while the concern for European maritime security and the Gulf region was limited to safe transit routes through the international straits and archipelagic waters of the Gulf region.With the tension in Gulf was increased by oil tanker attacks,the role of EU and its core member states as major stakeholders in Gulf maritime security affairs has been more and more important.展开更多
The United States is shaping a Central Asian Security Strategy Planning with priority on economics and trade. In area of economics and trade, it pushes on the U.S.-Central Asian trade and investment framework agreemen...The United States is shaping a Central Asian Security Strategy Planning with priority on economics and trade. In area of economics and trade, it pushes on the U.S.-Central Asian trade and investment framework agreement, focusing on developing trade in greater Central Asian region so as to encourage the regional countries to lower trade barriers and to advance reconfiguration of the regional countries and Afghanistan neighboring areas. In area of energy, it builds a greater Central Asian transportation network composed of highway, railway, natural gas-pipeline and electricity grid line to boom the regional trade and economy. In area of anti-terrorism, it strengthens security cooperation with the Central Asian countries. Meanwhile, it also pushes forward a multi-lateral security mechanism, increases economic aid, and promotes regional cooperation so as to achieve the regional lasting peace.展开更多
Against the backdrop of the accelerating changes unseen in a century and the intensifying major-country competition,the European Union(EU) has significantly modified its economic security concepts,as illustrated by th...Against the backdrop of the accelerating changes unseen in a century and the intensifying major-country competition,the European Union(EU) has significantly modified its economic security concepts,as illustrated by the release of its first-ever strategy on economic security in 2023,which will continue to be advanced in 2024.This article discusses the possible pathways for the EU to implement its economic security strategy in the context of “de-risking” by taking stock of the evolution of EU economic security concepts and its relevant policy documents and foreign economic policies and practices in recent years.Finally,this article will analyze some of the negative impacts of the latest EU policy on the global economy and trade,as well as on European economic prospects.展开更多
Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideolog...Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideology guiding its national security strategy has gradually transitioned from Kemalism to Erdo?anism.At the present stage,Türkiye's national security strategy is prominently characterized by its geographical and cultural duality,the expansivity deep-rooted in its history and religion,and an enterprising response to its geopolitical realities.Such a strategy will comprehensively shape Türkiye's practice of preserving national security and guide the future of its security policies,prompting the country to seek a balance between its differentiated perceptions of identity and generalized national interests.展开更多
The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstu...The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstuff Security: integrating new biological techniques with traditional methods, full utilization of soil with its protection, policies leading with market regulation, steady high yield with promoting additional value through further processing, general foodstuff production with substitute food seeking, domestic self-supply with international trade complementarities as well as short-term exploiting with long-term development on the basis of the increase of general foodstuff production capability.展开更多
General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,whi...General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,which are synergistic and inseparable.Compared with other major global powers,China is embarking on a path of national security that incorporates distinctive Chinese characteristics.Unlike the United States,which seeks international expansion and hegemony while pursuing national security,China is dedicated to maintaining global security and building a community with a shared future for humanity.Unlike Russia,which prioritizes national security over everything else,China places greater emphasis on balancing development and security.Unlike Europe and Japan,which entrust their national security to other countries,China has always adhered to the principle of independence and self-reliance.An essential feature of the path of national security with Chinese characteristics is that it upholds the unity of the people’s security,political security,and the supremacy of national interests.Moreover,China will remain committed to peaceful development while defending its interests.China will continue to balance development and security imperatives,maintaining an independent foreign policy while building a community with a shared future for humanity.To make solid strides on the path of national security with Chinese characteristics,the fundamental task will be pursuing a holistic approach to national security and implementing the Ten Upholds.展开更多
As a southwestern border province of China,Yunnan is featured by the geographical advantage of proximity to the Indo-China Peninsula which is known as World Rice Warehouse,and its capital and technology are ahead of t...As a southwestern border province of China,Yunnan is featured by the geographical advantage of proximity to the Indo-China Peninsula which is known as World Rice Warehouse,and its capital and technology are ahead of the neighboring countries of China.Therefore,to enhance its support capability in consolidating and improving the national food security strategy,Yunnan should further develop its comparative advantages by building the regional food industry chain and supply chain depending on the province's grain system of production,processing,storage and transportation,as well as its agricultural economic and trade cooperation platforms and channels with the neighboring countries of China.In this study,comparative analysis and related methods were used to systematically analyze the scale of grain production in Yunnan,the proportion of its grain production to the national total amount,the transition of its grain variety structure and the characteristics of its food security system,as well as the grain export trade of the 6 countries in the Indo-China Peninsula from 2010 to 2019.Then,the problems in grain production in Yunnan were clarified,such as the decrease of grain ration production capacity,the decline of comparative benefits of grain production and the insufficient support for agricultural"going global"strategy.Finally,a series of countermeasures were put forward,including further implementing the strategy of"reserving grain in land and technology"to increase Yunnan's production capacity of grain,focusing on agricultural products storage and transportation system to improve the ability to obtain grain from abroad,expanding the border processing and logistics industry,optimizing the policy of agricultural products'import and export,and etc.展开更多
The last two years have attracted the world's attention to Russia. The annexation of Crimea, the hybrid war in Eastern Ukraine, and finally the unexpected interference in Syria--all these actions bring us back to the...The last two years have attracted the world's attention to Russia. The annexation of Crimea, the hybrid war in Eastern Ukraine, and finally the unexpected interference in Syria--all these actions bring us back to the question of understanding the Russian motivation properly. Generally, it includes the whole interpretation of Russian strategic culture which is based on the research and analysis of the different factors: from literature and history to religion and political nature of the Russian state. Significant attempts to understand Moscow's strategic culture were made by the American experts during the Cold War; therefore the article analyzes the main pillars of Russian strategic culture, its continuity and change in comparison to Soviet times as well as the main reactions of Moscow for what it considers to be a threat.展开更多
Wireless charging has played a crucial role in electric vehicle charging market presently.As electric vehicles will be important nodes access to the smart grid in the future,the security flow of energy and information...Wireless charging has played a crucial role in electric vehicle charging market presently.As electric vehicles will be important nodes access to the smart grid in the future,the security flow of energy and information between wireless charging infrastructure and the smart grid will directly affect the security of the smart grid.A novel secure wireless transfer method for energy and information transfer simultaneously has been represented in this paper by designing a reasonable dual-band coil for simultaneous transmission of energy and information,using improved chaotic modulation and a three times handshake protocol for encrypting energy and information between wireless charging infrastructure and the smart grid.Both the simulation and experiments show that the security of energy transmission can be effectively improved by this structure,in the premise of ensuring the power and efficiency of wireless energy transmission.展开更多
This paper analyzes the aritrage free security markets and the general equilibrium existence problem for a stochastic economy with incomplete financial markets. Information structure is given by an event tree. This pa...This paper analyzes the aritrage free security markets and the general equilibrium existence problem for a stochastic economy with incomplete financial markets. Information structure is given by an event tree. This paper restricts attention to purely financial securities. It is assume that trading takes place in the sequence of spot markets and futures markets for securities payable in units of account. Unlimited short selling in securities is allowed. Financial markets may be incomplete: some consumption streams may be impossible to obtain by any trading strategy. Securities may be individually precluded from trade at arbitrary states and dates. The security price process is arbitrage free the dividend process if and only if there exists a stochstic state price (present value) process: the present value of the security prices at every vertex is the present value of their dividend and capital values over the set of immediate successors; the current value of each security at every vertex is the present value of its future dividend stream over all succeeding vertices. The existence of such an equilibrium is proved under the following condition: continuous, weakly convex, strictly monotone and complete preferences, strictly positive endowments and dividends processes.展开更多
The distributed simulation system interoperation can be divided into six levels.Interactive data encryption can be completed in each level,lead to six encryption strategies:data field encryption,data package encryptio...The distributed simulation system interoperation can be divided into six levels.Interactive data encryption can be completed in each level,lead to six encryption strategies:data field encryption,data package encryption,program module encryption,simulation application encryption,simulation node encryption,and simulation system encryption.There are four basic Encryption/decryption realization modes:serial modes with software or hardware realization,parallel modes based on embedded processor or FPGA/ASIC system.Large and Complex distributed simulation system may employ one or several encryption strategies and realization modes.展开更多
This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be appl...This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be applied to prove the existence of solutions for quasi-convexmultiobjective generalized game. On the other hand,a new concept of security strategy isintroduced and its existence is proved.At last,some relations between these solutions areestablished.展开更多
文摘With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of security and established corresponding mechanisms. In this process,the EU has also formed and developed its National Security Strategy and issued four versions of security strategy reports in 2003, 2008, 2016, and 2022. The 2022 version of the EU security strategy(hereafter referred to as the New Security Strategy), for the first time, has identified Russia as a long-term and direct threat. Furthermore, it has paid increased attention to traditional security, especially the upgrading of military capabilities and has become more reliant on the United States and the North Atlantic Treaty Organization. In the future, the EU will accelerate the militarization process, exert all-out efforts to contain Russia, scrutinize neighborhood security, and increase its swing on China policy.
文摘In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that security should be prioritized over other aspects;it gives more attention to the chaotic aspects of order change in its assessment of the international situation;it highlights the threats from the West;and it places increased emphasis on domestic capacity building as a means for safeguarding national security.From the content of the new Strategy as well as Russia’s policies in recent years,the strategy of Russia for the foreseeable future can be generally characterized as inward-looking.Domestically,its policies will become more conservative;diplomatically,it will take up a defensive position;and economically,it will increasingly emphasize security and selfreliance.In other words,several issues that were previously overlooked will be given attention.However,strategic introversion does not mean that Russia will invest all its energy in defense.Instead,Russia will build up strength for changes that lie ahead.With the expected strategic introversion,Russia will fnd difculty in making breakthroughs in terms of its relations with the West;the China-Russia relations will continue on the path of steady development;and Russia will place greater importance to the balance of power among major countries.
文摘India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of national security strategy that has distinct Indian characteristics. Generally, successive governments in India have followed the basic principles articulated in Kautilya’s Arthasastra and various security practices adopted during the British Raj. India’s national security strategies are based on an internal logic of geopolitical rivalry and changes in international scenarios, and they are strongly influenced by Hindu traditions and the “Sad-Dharma” purported by King Ashoka. The objective is to create an India-dominated security order in the South Asian subcontinent, which persistently builds its capacity and system as a “net security provider” in the Indian Ocean Rim. Moreover, India is vigorously expanding its network of influence in the Pacific region in an effort to become a world leading power that enjoys a high level of strategic autonomy.
文摘The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald
文摘The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role.
文摘Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether will Chi-na seek external expansion when it becomes powerful? In 1992, there began to ap-pear a myth of so-called "China threat". In its November 28 issue of that year,
基金Project supported by the National Natural Science Foundation of China (No.60776027)
文摘This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered- off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.
文摘The European Union(EU)and its core member states are active participants and stakeholders in the security affairs of the Gulf region.European maritime security is not only an important extension of European security in geospatial and functional areas,but also an indispensable part of Europe’s overall security strategy.However,the attention to the EU’s maritime security was distracted before 2010,while the concern for European maritime security and the Gulf region was limited to safe transit routes through the international straits and archipelagic waters of the Gulf region.With the tension in Gulf was increased by oil tanker attacks,the role of EU and its core member states as major stakeholders in Gulf maritime security affairs has been more and more important.
文摘The United States is shaping a Central Asian Security Strategy Planning with priority on economics and trade. In area of economics and trade, it pushes on the U.S.-Central Asian trade and investment framework agreement, focusing on developing trade in greater Central Asian region so as to encourage the regional countries to lower trade barriers and to advance reconfiguration of the regional countries and Afghanistan neighboring areas. In area of energy, it builds a greater Central Asian transportation network composed of highway, railway, natural gas-pipeline and electricity grid line to boom the regional trade and economy. In area of anti-terrorism, it strengthens security cooperation with the Central Asian countries. Meanwhile, it also pushes forward a multi-lateral security mechanism, increases economic aid, and promotes regional cooperation so as to achieve the regional lasting peace.
文摘Against the backdrop of the accelerating changes unseen in a century and the intensifying major-country competition,the European Union(EU) has significantly modified its economic security concepts,as illustrated by the release of its first-ever strategy on economic security in 2023,which will continue to be advanced in 2024.This article discusses the possible pathways for the EU to implement its economic security strategy in the context of “de-risking” by taking stock of the evolution of EU economic security concepts and its relevant policy documents and foreign economic policies and practices in recent years.Finally,this article will analyze some of the negative impacts of the latest EU policy on the global economy and trade,as well as on European economic prospects.
文摘Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideology guiding its national security strategy has gradually transitioned from Kemalism to Erdo?anism.At the present stage,Türkiye's national security strategy is prominently characterized by its geographical and cultural duality,the expansivity deep-rooted in its history and religion,and an enterprising response to its geopolitical realities.Such a strategy will comprehensively shape Türkiye's practice of preserving national security and guide the future of its security policies,prompting the country to seek a balance between its differentiated perceptions of identity and generalized national interests.
文摘The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstuff Security: integrating new biological techniques with traditional methods, full utilization of soil with its protection, policies leading with market regulation, steady high yield with promoting additional value through further processing, general foodstuff production with substitute food seeking, domestic self-supply with international trade complementarities as well as short-term exploiting with long-term development on the basis of the increase of general foodstuff production capability.
文摘General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,which are synergistic and inseparable.Compared with other major global powers,China is embarking on a path of national security that incorporates distinctive Chinese characteristics.Unlike the United States,which seeks international expansion and hegemony while pursuing national security,China is dedicated to maintaining global security and building a community with a shared future for humanity.Unlike Russia,which prioritizes national security over everything else,China places greater emphasis on balancing development and security.Unlike Europe and Japan,which entrust their national security to other countries,China has always adhered to the principle of independence and self-reliance.An essential feature of the path of national security with Chinese characteristics is that it upholds the unity of the people’s security,political security,and the supremacy of national interests.Moreover,China will remain committed to peaceful development while defending its interests.China will continue to balance development and security imperatives,maintaining an independent foreign policy while building a community with a shared future for humanity.To make solid strides on the path of national security with Chinese characteristics,the fundamental task will be pursuing a holistic approach to national security and implementing the Ten Upholds.
基金Supported by the Construction of Think Tank for Yunnan Agricultural Development and Policy Research on Science and Technology Management(202102AE090036-15)the Research Project of Yunnan Provincial Committee of Jiusan Society(YN93/2020018)the Talent Project for Yunling Scholars(YNWR-YLXZ-2019-013)。
文摘As a southwestern border province of China,Yunnan is featured by the geographical advantage of proximity to the Indo-China Peninsula which is known as World Rice Warehouse,and its capital and technology are ahead of the neighboring countries of China.Therefore,to enhance its support capability in consolidating and improving the national food security strategy,Yunnan should further develop its comparative advantages by building the regional food industry chain and supply chain depending on the province's grain system of production,processing,storage and transportation,as well as its agricultural economic and trade cooperation platforms and channels with the neighboring countries of China.In this study,comparative analysis and related methods were used to systematically analyze the scale of grain production in Yunnan,the proportion of its grain production to the national total amount,the transition of its grain variety structure and the characteristics of its food security system,as well as the grain export trade of the 6 countries in the Indo-China Peninsula from 2010 to 2019.Then,the problems in grain production in Yunnan were clarified,such as the decrease of grain ration production capacity,the decline of comparative benefits of grain production and the insufficient support for agricultural"going global"strategy.Finally,a series of countermeasures were put forward,including further implementing the strategy of"reserving grain in land and technology"to increase Yunnan's production capacity of grain,focusing on agricultural products storage and transportation system to improve the ability to obtain grain from abroad,expanding the border processing and logistics industry,optimizing the policy of agricultural products'import and export,and etc.
文摘The last two years have attracted the world's attention to Russia. The annexation of Crimea, the hybrid war in Eastern Ukraine, and finally the unexpected interference in Syria--all these actions bring us back to the question of understanding the Russian motivation properly. Generally, it includes the whole interpretation of Russian strategic culture which is based on the research and analysis of the different factors: from literature and history to religion and political nature of the Russian state. Significant attempts to understand Moscow's strategic culture were made by the American experts during the Cold War; therefore the article analyzes the main pillars of Russian strategic culture, its continuity and change in comparison to Soviet times as well as the main reactions of Moscow for what it considers to be a threat.
基金This work is supported by International Science&Technology Cooperation Program of China under contract No.2016YFE0102200.
文摘Wireless charging has played a crucial role in electric vehicle charging market presently.As electric vehicles will be important nodes access to the smart grid in the future,the security flow of energy and information between wireless charging infrastructure and the smart grid will directly affect the security of the smart grid.A novel secure wireless transfer method for energy and information transfer simultaneously has been represented in this paper by designing a reasonable dual-band coil for simultaneous transmission of energy and information,using improved chaotic modulation and a three times handshake protocol for encrypting energy and information between wireless charging infrastructure and the smart grid.Both the simulation and experiments show that the security of energy transmission can be effectively improved by this structure,in the premise of ensuring the power and efficiency of wireless energy transmission.
文摘This paper analyzes the aritrage free security markets and the general equilibrium existence problem for a stochastic economy with incomplete financial markets. Information structure is given by an event tree. This paper restricts attention to purely financial securities. It is assume that trading takes place in the sequence of spot markets and futures markets for securities payable in units of account. Unlimited short selling in securities is allowed. Financial markets may be incomplete: some consumption streams may be impossible to obtain by any trading strategy. Securities may be individually precluded from trade at arbitrary states and dates. The security price process is arbitrage free the dividend process if and only if there exists a stochstic state price (present value) process: the present value of the security prices at every vertex is the present value of their dividend and capital values over the set of immediate successors; the current value of each security at every vertex is the present value of its future dividend stream over all succeeding vertices. The existence of such an equilibrium is proved under the following condition: continuous, weakly convex, strictly monotone and complete preferences, strictly positive endowments and dividends processes.
文摘The distributed simulation system interoperation can be divided into six levels.Interactive data encryption can be completed in each level,lead to six encryption strategies:data field encryption,data package encryption,program module encryption,simulation application encryption,simulation node encryption,and simulation system encryption.There are four basic Encryption/decryption realization modes:serial modes with software or hardware realization,parallel modes based on embedded processor or FPGA/ASIC system.Large and Complex distributed simulation system may employ one or several encryption strategies and realization modes.
文摘This paper deals with the solution concepts,scalarization and existence of solutions formultiobjective generalized game. The scalarization method used in this paper can characterizecompletely the solutions and be applied to prove the existence of solutions for quasi-convexmultiobjective generalized game. On the other hand,a new concept of security strategy isintroduced and its existence is proved.At last,some relations between these solutions areestablished.