A model of continuous-time insider trading in which a risk-neutral in-sider possesses two imperfect correlated signals of a risky asset is studied.By conditional expectation theory and filtering theory,we first establ...A model of continuous-time insider trading in which a risk-neutral in-sider possesses two imperfect correlated signals of a risky asset is studied.By conditional expectation theory and filtering theory,we first establish three lemmas:normal corre-lation,equivalent pricing and equivalent profit,which can guarantee to turn our model into a model with insider knowing full information.Then we investigate the impact of the two correlated signals on the market equilibrium consisting of optimal insider trading strategy and semi-strong pricing rule.It shows that in the equilibrium,(1)the market depth is constant over time;(2)if the two noisy signals are not linerly correlated,then all private information of the insider is incorporated into prices in the end while the whole information on the asset value can not incorporated into prices in the end;(3)if the two noisy signals are linear correlated such that the insider can infer the whole information of the asset value,then our model turns into a model with insider knowing full information;(4)if the two noisy signals are the same then the total ex ant profit of the insider is increasing with the noise decreasing,while down to O as the noise going up to infinity;(5)if the two noisy signals are not linear correlated then with one noisy signal fixed,the total ex ante profit of the insider is single-peaked with a unique minimum with respect to the other noisy signal value,and furthermore as the noisy value going to O it gets its maximum,the profit in the case that the real value is observed.展开更多
In view of the development problems of village banks,through introducing the concept of private relationship lending,the functions of soft information,the channels of village banks for collecting soft information,and ...In view of the development problems of village banks,through introducing the concept of private relationship lending,the functions of soft information,the channels of village banks for collecting soft information,and the private relationship lending of village banks under Chinese rural human environment of highlighting relationship while despising rationality are proved.According to the recognition standard of core competitive edge,it can be concluded that the core competitive edge of village banks is private relationship lending.In the first place,these kinds of small and medium-sized quarter banks have competitive advantages in launching private relationship lending;in the second place,the lending businesses of village banks based on soft information attracts small and medium clients;in the third place,the private relationship lending has realized the scale economy.Furthermore,the reasons why village banks can not display the core competitive edge have been analyzed:firstly,village banks have not found that private relationship lending is their core competitive edge;secondly,the internal motivation on establishing private relationship lending of village banks is insufficient;thirdly,village banks have not prepared well in developing private relationship lending;The relevant policies and countermeasures are put forward,including transforming idea and vigorously developing private relationship lending;intensifying training and improving the quality of personnel involved;strengthening supervision and avoiding the violation behaviors of personnel involved;emulating experiences and perfecting the private relationship lending mechanism of village banks.展开更多
The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the s...The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed.展开更多
This study shows that a decline in investment efficiency due to information asymmetry may not necessarily devalue a firm but may enhance its value instead.Firms base their investment decisions on both public and priva...This study shows that a decline in investment efficiency due to information asymmetry may not necessarily devalue a firm but may enhance its value instead.Firms base their investment decisions on both public and private information.However,effectively transmitting private information to investors in a competitive market is quite challenging,as it leads to stock prices inadequately reflecting a firm’s true value.Simultaneously,firms must invest to achieve their business objectives,which results in a deviation between a firm’s actual investment level and the market’s expected investment level,thereby reducing investment-q sensitivity.However,this deviation does not imply a waste of societal resources;instead,it improves a firm’s core competitiveness in the product market.We consider the future launch of new products as a proxy for firm private information.We find that(1)private information is negatively associated with investment-q sensitivity,and that the greater the sales of the new product,the lower the investment-q sensitivity;(2)the negative effect is more pronounced for firms with higher revenue volatility and ownership concentration than for those with lower revenue volatility and ownership concentration.This study helps us to further understand how to evaluate firm investment efficiency from the perspective of private information and provides empirical evidence of the costs of the new product launch process.展开更多
This paper presents a study of water vending in 3 informal settlements of Yola North in Adamawa State of Nigeria. These settlements represent the fast growing urban areas often dwelling in unplanned and unsecured tenu...This paper presents a study of water vending in 3 informal settlements of Yola North in Adamawa State of Nigeria. These settlements represent the fast growing urban areas often dwelling in unplanned and unsecured tenure. Access to safe water supply has great influence on the health, economic productivity and quality of life of the people. But meeting this need is one of the major challenges facing the urban communities of Nigeria today. A field survey was conducted in the area with 100 observations of households in each of the three informal settlements. These settlements are Sabongari -University village, Vinikilang and Wuro Jabbe. The survey solicited for response concerning household water source, water per capita use and household size. Findings revealed that about 92% of respondent in Sabongari-University village, 66% in Vinikilang and 87% in Wuro Jabbe depend on vended water from borehole, hand dug well as well as surface water sources which are delivered by hand pushed trucks. Owing to the absence of piped water networks in the study area, households are forced to rely on available water sources which are precursor to water borne diseases. It is advocated that the public agencies should evolve special programs for regularizing informal settlements, meaning the legalization of land tenure, layout corrections and service upgrading if service is to meet the poor informal dwellers.展开更多
The present contribution aims at helping the Mayors to implement a less expensive and effective system of management of household refuse to Yopougon. Indeed, the incapacity of service providers to be assured the colle...The present contribution aims at helping the Mayors to implement a less expensive and effective system of management of household refuse to Yopougon. Indeed, the incapacity of service providers to be assured the collection of the garbage and the failure of their systems of pre-collection favored the emergence of the informal private precollectors in the municipality of Yopougon. The regularity of the interventions of these new actors, the affordable cost of their services and the living environment daily freed the garbage incites the households to request them because they succeed better where service providers failed. Such an activity will have to be better organized because of supplier employment.展开更多
With the gradual completion of the split-share structure reform,private placement has gradually become the mainstream of refinancing. One of the points that the practical and theoretical circles are widely concerned a...With the gradual completion of the split-share structure reform,private placement has gradually become the mainstream of refinancing. One of the points that the practical and theoretical circles are widely concerned about is that the private placement price is often higher than the market price at the time of the private placement. High discounts are often accompanied by the transmission of benefits,and the increase in insider information will lead to the risk of a stock market crash? This paper intends to use the data of A-share listed companies from 2006 to 2015 to empirically study the relationship between the discount on private placements and the risk of stock market crash. At the same time,this paper examines whether the degree of information asymmetry plays a regulatory role in the relationship between the discount on private placements and the risk of stock market crash. This paper provides a certain reference for the regulatory authorities to improve the relevant laws and regulations in the private placement,and to provide a certain reference for the protection of the interests of small and medium-sized investors.展开更多
We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After e...We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After executing the queries,the content of the server's set remains secret.One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy-preserving way.We apply the Bloom filter and the Cuckoo filter in the membership test procedure.In order to achieve privacy properties,we present a novel protocol based on some homomorphic encryption schemes.In our protocol,we rearrange the data in the set into N-dimensional hypercubes.We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company.The evaluation shows that our method is feasible for real-world applications.We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions:2-dimensional,3-dimensional,and 4-dimensional hypercubes.We present formulas to estimate the cost of computation and communication in our protocol.展开更多
As one type of the highly sought after housing facilities in Indonesia, Kosts have formed unique heterogeneous living environment while also been a part of fast growing urban settlement developments in Indonesia's ca...As one type of the highly sought after housing facilities in Indonesia, Kosts have formed unique heterogeneous living environment while also been a part of fast growing urban settlement developments in Indonesia's capital, Jakarta. This paper investigates the nature and operation of Kost private rental housing developed with various conditions and arrangements, as well as its position among other dwelling types, based on on-site investigations, literature reviews and statistical analyses. It is necessary to understand the development of Kost as it shows potentials to overcome the lack of affordable and adequate housing in the country. An accurate checking process during the application of building permit may early identify Kosts. Undefined standard of operation and arrangement may hinder improvement opportunities to its quality of services. Efforts to educate the community and easy access to related regulations are necessary for improvement and compliance awareness. Moreover, increased collaborative design and public education may improve the knowledge of self-builders on building design, planning and construction. Associations of self-organized housing and platforms offering affordable design services that meet the guidelines and standards are promising ootions.展开更多
In Bangladesh, more than a dozen of private TV channels are operating and about 10 new channels are waiting with green signal for transmission. Bangladesh Television (BTV), the only government owned and administered...In Bangladesh, more than a dozen of private TV channels are operating and about 10 new channels are waiting with green signal for transmission. Bangladesh Television (BTV), the only government owned and administered, and known as structurally a biased institution serves the audience the public service information most. At the same time it serves purposes of incumbent government. Public information (PI) broadcast means broadcasting towards public welfare which may bring about change in the betterment of life and work of people. Its main focus would be on information, education, and motivation values rather than entertainment. In case of information, dissemination, and documentation, all private TV channels in Bangladesh serve more entertainment and less public service information, whereas, BTV's focus is evident on more PI. The owners and operators of private channels think first of their business profit as well as pressure from government and political parties. During formulating planning and strategies or building program content, they become cautious as they fear that the government become angry and shut down the channel.展开更多
The Best Value Approach(BVA)is a new project delivery method that has been developed at Arizona State University.It has been documented to increase performance and value on projects by the identification and utilizati...The Best Value Approach(BVA)is a new project delivery method that has been developed at Arizona State University.It has been documented to increase performance and value on projects by the identification and utilization of expertise instead of management,direction,and control(MDC).It utilizes perfomance information that is simple,observable,and countable.It allows the expert vendor to know what the client proj-ect requires,why they can achieve success and what they will do before they do it.The tracking of the project cost and time deviation requires an initial plan and method to tack it.Preliminary results of the BVA have shown a 90%decrease in effort by client organizations,98%customed satisfaction and has led to 1%vendor cost and time deviation rate.It ap-plies to construction,services/TT projects,and any long-term service.In 2014,a large private organization having dificulty delivering information technology(T)and construction/facility services identified the BVA as a potential solution.This paper will summarize a major IT Enterprise Resource Planming case study that the large private organization used the BVA on and identify the full results.展开更多
In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the ...In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the objective.This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom(DOF),which could have 64 combinations.The TP can decide which combination to use based on the shared key information provided from a quantum key distribution(QKD)protocol.By doing so,the security of the protocol can be improved further.Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier.The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks.In addition,the new QPC protocol also can compare secret inputs securely and efficiently.展开更多
The purpose of this study is to improve environmental sustainability by identifying the most sustainable/least fragile of the three major wildlife conservation access models—open, government, and private—under varyi...The purpose of this study is to improve environmental sustainability by identifying the most sustainable/least fragile of the three major wildlife conservation access models—open, government, and private—under varying environmental and socioeconomic conditions. The private access model is the most sustainable of the three major conservation models because it provides the best information and incentives to balance the needs of humans and wildlife, maintain general wildlife habitat, and adapt quickly to changing environmental and/or socioeconomic conditions. Government-controlled access, however, can be employed as a model of last resort if the private access model shows signs of failing to protect specific species from local extirpation or extinction, which it is most likely to do for migratory species, species with close commercial substitutes, and species with no direct commercial value. Government regulators may also be needed to enforce property rights arrangements like catch shares and to monitor resources that remain open access in case socioeconomic or environmental conditions change sufficiently to trigger the tragedy of the commons. Most treatments of wildlife regulation default to various iterations of the government access model and fail even to consider the costs and benefits of private and open access models. The analysis here instead shows the conditions in which each conservation access model is most appropriate: open when a resource is in high supply and low demand, private most of the time, and government when the others fail to slow resource depopulation/depletion.展开更多
This paper addresses a multi-agent scheduling problem with uniform parallel machines owned by a resource agent and competing jobs with dynamic arrival times that belong to different consumer agents.All agents are self...This paper addresses a multi-agent scheduling problem with uniform parallel machines owned by a resource agent and competing jobs with dynamic arrival times that belong to different consumer agents.All agents are self-interested and rational with the aim of maximizing their own objectives,resulting in intense resource competition among consumer agents and strategic behaviors of unwillingness to disclose private information.Within the context,a centralized scheduling approach is unfeasible,and a decentralized approach is considered to deal with the targeted problem.This study aims to generate a stable and collaborative solution with high social welfare while simultaneously accommodating consumer agents’preferences under incomplete information.For this purpose,a dynamic iterative auction-based approach based on a decentralized decision-making procedure is developed.In the proposed approach,a dynamic auction procedure is established for dynamic jobs participating in a realtime auction,and a straightforward and easy-to-implement bidding strategy without price is presented to reduce the complexity of bid determination.In addition,an adaptive Hungarian algorithm is applied to solve the winner determination problem efficiently.A theoretical analysis is conducted to prove that the proposed approach is individually rational and that the myopic bidding strategy is a weakly dominant strategy for consumer agents submitting bids.Extensive computational experiments demonstrate that the developed approach achieves high-quality solutions and exhibits considerable stability on largescale problems with numerous consumer agents and jobs.A further multi-agent scheduling problem considering multiple resource agents will be studied in future work.展开更多
高效的在线字符串模式匹配算法对云数据库检索至关重要,然而搜索内容的泄露会威胁用户隐私。现有的字符串模式匹配算法没有考虑用户搜索内容的保护,可搜索加密方案虽然可以保护用户的搜索内容,但存在索引构建代价大、检索效率低等问题...高效的在线字符串模式匹配算法对云数据库检索至关重要,然而搜索内容的泄露会威胁用户隐私。现有的字符串模式匹配算法没有考虑用户搜索内容的保护,可搜索加密方案虽然可以保护用户的搜索内容,但存在索引构建代价大、检索效率低等问题。因此,提出了两种保护用户搜索内容的模式匹配算法:基于分布式点函数的模式匹配(pattern matching based on distributed point function,PMDPF)算法和基于分布式点函数的跳跃式模式匹配(jumping pattern matching based on distributed point function,JPMDPF)算法。PMDPF算法利用指纹函数以及分布式点函数构造模式串真值表,并分发给两台独立的服务器,把搜索中字符对比操作转换为查表操作,从而保护搜索内容。为了提升搜索效率,提出了JPMDPF算法。通过字符跳转,JPMDPF算法以泄露更多信息为代价,其搜索效率比PMDPF算法平均提高了约m倍,其中m为搜索内容长度,同时显著降低了因指纹函数碰撞而导致的误判的概率。实验结果表明,PMDPF算法的搜索效率比基于指纹函数的经典算法提高约5%,并优于现有的可搜索加密方案,PMDPF算法的搜索耗时在搜索内容长度为4时是JPMDPF算法的4.2倍。展开更多
文摘A model of continuous-time insider trading in which a risk-neutral in-sider possesses two imperfect correlated signals of a risky asset is studied.By conditional expectation theory and filtering theory,we first establish three lemmas:normal corre-lation,equivalent pricing and equivalent profit,which can guarantee to turn our model into a model with insider knowing full information.Then we investigate the impact of the two correlated signals on the market equilibrium consisting of optimal insider trading strategy and semi-strong pricing rule.It shows that in the equilibrium,(1)the market depth is constant over time;(2)if the two noisy signals are not linerly correlated,then all private information of the insider is incorporated into prices in the end while the whole information on the asset value can not incorporated into prices in the end;(3)if the two noisy signals are linear correlated such that the insider can infer the whole information of the asset value,then our model turns into a model with insider knowing full information;(4)if the two noisy signals are the same then the total ex ant profit of the insider is increasing with the noise decreasing,while down to O as the noise going up to infinity;(5)if the two noisy signals are not linear correlated then with one noisy signal fixed,the total ex ante profit of the insider is single-peaked with a unique minimum with respect to the other noisy signal value,and furthermore as the noisy value going to O it gets its maximum,the profit in the case that the real value is observed.
基金Supported by National Social Science Foundation(10BJY057)2010 Program of the Eleventh-Five Plan of the Development of Philosophy and Social Science in Guangzhou(10Y49)
文摘In view of the development problems of village banks,through introducing the concept of private relationship lending,the functions of soft information,the channels of village banks for collecting soft information,and the private relationship lending of village banks under Chinese rural human environment of highlighting relationship while despising rationality are proved.According to the recognition standard of core competitive edge,it can be concluded that the core competitive edge of village banks is private relationship lending.In the first place,these kinds of small and medium-sized quarter banks have competitive advantages in launching private relationship lending;in the second place,the lending businesses of village banks based on soft information attracts small and medium clients;in the third place,the private relationship lending has realized the scale economy.Furthermore,the reasons why village banks can not display the core competitive edge have been analyzed:firstly,village banks have not found that private relationship lending is their core competitive edge;secondly,the internal motivation on establishing private relationship lending of village banks is insufficient;thirdly,village banks have not prepared well in developing private relationship lending;The relevant policies and countermeasures are put forward,including transforming idea and vigorously developing private relationship lending;intensifying training and improving the quality of personnel involved;strengthening supervision and avoiding the violation behaviors of personnel involved;emulating experiences and perfecting the private relationship lending mechanism of village banks.
文摘The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed.
基金the National Science Foundation of China for its support(No.71632006)and(No.72072107).
文摘This study shows that a decline in investment efficiency due to information asymmetry may not necessarily devalue a firm but may enhance its value instead.Firms base their investment decisions on both public and private information.However,effectively transmitting private information to investors in a competitive market is quite challenging,as it leads to stock prices inadequately reflecting a firm’s true value.Simultaneously,firms must invest to achieve their business objectives,which results in a deviation between a firm’s actual investment level and the market’s expected investment level,thereby reducing investment-q sensitivity.However,this deviation does not imply a waste of societal resources;instead,it improves a firm’s core competitiveness in the product market.We consider the future launch of new products as a proxy for firm private information.We find that(1)private information is negatively associated with investment-q sensitivity,and that the greater the sales of the new product,the lower the investment-q sensitivity;(2)the negative effect is more pronounced for firms with higher revenue volatility and ownership concentration than for those with lower revenue volatility and ownership concentration.This study helps us to further understand how to evaluate firm investment efficiency from the perspective of private information and provides empirical evidence of the costs of the new product launch process.
文摘This paper presents a study of water vending in 3 informal settlements of Yola North in Adamawa State of Nigeria. These settlements represent the fast growing urban areas often dwelling in unplanned and unsecured tenure. Access to safe water supply has great influence on the health, economic productivity and quality of life of the people. But meeting this need is one of the major challenges facing the urban communities of Nigeria today. A field survey was conducted in the area with 100 observations of households in each of the three informal settlements. These settlements are Sabongari -University village, Vinikilang and Wuro Jabbe. The survey solicited for response concerning household water source, water per capita use and household size. Findings revealed that about 92% of respondent in Sabongari-University village, 66% in Vinikilang and 87% in Wuro Jabbe depend on vended water from borehole, hand dug well as well as surface water sources which are delivered by hand pushed trucks. Owing to the absence of piped water networks in the study area, households are forced to rely on available water sources which are precursor to water borne diseases. It is advocated that the public agencies should evolve special programs for regularizing informal settlements, meaning the legalization of land tenure, layout corrections and service upgrading if service is to meet the poor informal dwellers.
文摘The present contribution aims at helping the Mayors to implement a less expensive and effective system of management of household refuse to Yopougon. Indeed, the incapacity of service providers to be assured the collection of the garbage and the failure of their systems of pre-collection favored the emergence of the informal private precollectors in the municipality of Yopougon. The regularity of the interventions of these new actors, the affordable cost of their services and the living environment daily freed the garbage incites the households to request them because they succeed better where service providers failed. Such an activity will have to be better organized because of supplier employment.
文摘With the gradual completion of the split-share structure reform,private placement has gradually become the mainstream of refinancing. One of the points that the practical and theoretical circles are widely concerned about is that the private placement price is often higher than the market price at the time of the private placement. High discounts are often accompanied by the transmission of benefits,and the increase in insider information will lead to the risk of a stock market crash? This paper intends to use the data of A-share listed companies from 2006 to 2015 to empirically study the relationship between the discount on private placements and the risk of stock market crash. At the same time,this paper examines whether the degree of information asymmetry plays a regulatory role in the relationship between the discount on private placements and the risk of stock market crash. This paper provides a certain reference for the regulatory authorities to improve the relevant laws and regulations in the private placement,and to provide a certain reference for the protection of the interests of small and medium-sized investors.
基金This work was supported in part by Tekes project"Cloudassisted Security Services"grant number 3887/31/2016 and by the Academy of Finland project"Cloud Security Services"(283135).
文摘We introduce a practical method to perform private membership tests.In this method,clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server.After executing the queries,the content of the server's set remains secret.One use case for a private membership test is to check whether a file contains any malware by checking its signature against a database of malware samples in a privacy-preserving way.We apply the Bloom filter and the Cuckoo filter in the membership test procedure.In order to achieve privacy properties,we present a novel protocol based on some homomorphic encryption schemes.In our protocol,we rearrange the data in the set into N-dimensional hypercubes.We have implemented our method in a realistic scenario where a client of an anti-malware company wants to privately check whether a hash value of a given file is in the malware database of the company.The evaluation shows that our method is feasible for real-world applications.We also have tested the performance of our protocol for databases of different sizes and data structures with different dimensions:2-dimensional,3-dimensional,and 4-dimensional hypercubes.We present formulas to estimate the cost of computation and communication in our protocol.
文摘As one type of the highly sought after housing facilities in Indonesia, Kosts have formed unique heterogeneous living environment while also been a part of fast growing urban settlement developments in Indonesia's capital, Jakarta. This paper investigates the nature and operation of Kost private rental housing developed with various conditions and arrangements, as well as its position among other dwelling types, based on on-site investigations, literature reviews and statistical analyses. It is necessary to understand the development of Kost as it shows potentials to overcome the lack of affordable and adequate housing in the country. An accurate checking process during the application of building permit may early identify Kosts. Undefined standard of operation and arrangement may hinder improvement opportunities to its quality of services. Efforts to educate the community and easy access to related regulations are necessary for improvement and compliance awareness. Moreover, increased collaborative design and public education may improve the knowledge of self-builders on building design, planning and construction. Associations of self-organized housing and platforms offering affordable design services that meet the guidelines and standards are promising ootions.
文摘In Bangladesh, more than a dozen of private TV channels are operating and about 10 new channels are waiting with green signal for transmission. Bangladesh Television (BTV), the only government owned and administered, and known as structurally a biased institution serves the audience the public service information most. At the same time it serves purposes of incumbent government. Public information (PI) broadcast means broadcasting towards public welfare which may bring about change in the betterment of life and work of people. Its main focus would be on information, education, and motivation values rather than entertainment. In case of information, dissemination, and documentation, all private TV channels in Bangladesh serve more entertainment and less public service information, whereas, BTV's focus is evident on more PI. The owners and operators of private channels think first of their business profit as well as pressure from government and political parties. During formulating planning and strategies or building program content, they become cautious as they fear that the government become angry and shut down the channel.
文摘The Best Value Approach(BVA)is a new project delivery method that has been developed at Arizona State University.It has been documented to increase performance and value on projects by the identification and utilization of expertise instead of management,direction,and control(MDC).It utilizes perfomance information that is simple,observable,and countable.It allows the expert vendor to know what the client proj-ect requires,why they can achieve success and what they will do before they do it.The tracking of the project cost and time deviation requires an initial plan and method to tack it.Preliminary results of the BVA have shown a 90%decrease in effort by client organizations,98%customed satisfaction and has led to 1%vendor cost and time deviation rate.It ap-plies to construction,services/TT projects,and any long-term service.In 2014,a large private organization having dificulty delivering information technology(T)and construction/facility services identified the BVA as a potential solution.This paper will summarize a major IT Enterprise Resource Planming case study that the large private organization used the BVA on and identify the full results.
文摘In this paper,we propose a new protocol designed for quantum private comparison(QPC).This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party(TP)to achieve the objective.This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom(DOF),which could have 64 combinations.The TP can decide which combination to use based on the shared key information provided from a quantum key distribution(QKD)protocol.By doing so,the security of the protocol can be improved further.Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier.The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks.In addition,the new QPC protocol also can compare secret inputs securely and efficiently.
文摘The purpose of this study is to improve environmental sustainability by identifying the most sustainable/least fragile of the three major wildlife conservation access models—open, government, and private—under varying environmental and socioeconomic conditions. The private access model is the most sustainable of the three major conservation models because it provides the best information and incentives to balance the needs of humans and wildlife, maintain general wildlife habitat, and adapt quickly to changing environmental and/or socioeconomic conditions. Government-controlled access, however, can be employed as a model of last resort if the private access model shows signs of failing to protect specific species from local extirpation or extinction, which it is most likely to do for migratory species, species with close commercial substitutes, and species with no direct commercial value. Government regulators may also be needed to enforce property rights arrangements like catch shares and to monitor resources that remain open access in case socioeconomic or environmental conditions change sufficiently to trigger the tragedy of the commons. Most treatments of wildlife regulation default to various iterations of the government access model and fail even to consider the costs and benefits of private and open access models. The analysis here instead shows the conditions in which each conservation access model is most appropriate: open when a resource is in high supply and low demand, private most of the time, and government when the others fail to slow resource depopulation/depletion.
基金supported by the National Natural Science Foundation of China(51975482)the China Scholarship Council.
文摘This paper addresses a multi-agent scheduling problem with uniform parallel machines owned by a resource agent and competing jobs with dynamic arrival times that belong to different consumer agents.All agents are self-interested and rational with the aim of maximizing their own objectives,resulting in intense resource competition among consumer agents and strategic behaviors of unwillingness to disclose private information.Within the context,a centralized scheduling approach is unfeasible,and a decentralized approach is considered to deal with the targeted problem.This study aims to generate a stable and collaborative solution with high social welfare while simultaneously accommodating consumer agents’preferences under incomplete information.For this purpose,a dynamic iterative auction-based approach based on a decentralized decision-making procedure is developed.In the proposed approach,a dynamic auction procedure is established for dynamic jobs participating in a realtime auction,and a straightforward and easy-to-implement bidding strategy without price is presented to reduce the complexity of bid determination.In addition,an adaptive Hungarian algorithm is applied to solve the winner determination problem efficiently.A theoretical analysis is conducted to prove that the proposed approach is individually rational and that the myopic bidding strategy is a weakly dominant strategy for consumer agents submitting bids.Extensive computational experiments demonstrate that the developed approach achieves high-quality solutions and exhibits considerable stability on largescale problems with numerous consumer agents and jobs.A further multi-agent scheduling problem considering multiple resource agents will be studied in future work.
文摘高效的在线字符串模式匹配算法对云数据库检索至关重要,然而搜索内容的泄露会威胁用户隐私。现有的字符串模式匹配算法没有考虑用户搜索内容的保护,可搜索加密方案虽然可以保护用户的搜索内容,但存在索引构建代价大、检索效率低等问题。因此,提出了两种保护用户搜索内容的模式匹配算法:基于分布式点函数的模式匹配(pattern matching based on distributed point function,PMDPF)算法和基于分布式点函数的跳跃式模式匹配(jumping pattern matching based on distributed point function,JPMDPF)算法。PMDPF算法利用指纹函数以及分布式点函数构造模式串真值表,并分发给两台独立的服务器,把搜索中字符对比操作转换为查表操作,从而保护搜索内容。为了提升搜索效率,提出了JPMDPF算法。通过字符跳转,JPMDPF算法以泄露更多信息为代价,其搜索效率比PMDPF算法平均提高了约m倍,其中m为搜索内容长度,同时显著降低了因指纹函数碰撞而导致的误判的概率。实验结果表明,PMDPF算法的搜索效率比基于指纹函数的经典算法提高约5%,并优于现有的可搜索加密方案,PMDPF算法的搜索耗时在搜索内容长度为4时是JPMDPF算法的4.2倍。