A dual random model of a portfolio of variable amount whole life annuity is set with the mth moment of the present value of benefits, and the respective expressions of the moments under the assumption that the force o...A dual random model of a portfolio of variable amount whole life annuity is set with the mth moment of the present value of benefits, and the respective expressions of the moments under the assumption that the force of interest accumulation function is Wiener process or Ornstein-Uhlenbeck process. Furthermore, the limiting distribution of average cost of this portfolio is discussed with the expression of the limiting distribution under the assumption that the force of interest accumulation is an independent increment process.展开更多
The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography ...The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed.展开更多
This research aims to analyse the contents of Fundo Clamor, located at the Documentation and Scientific Information Centre--CEDIC, from the Pontifical Catholic University of S~_o Paulo--SP, between the years of 1970 a...This research aims to analyse the contents of Fundo Clamor, located at the Documentation and Scientific Information Centre--CEDIC, from the Pontifical Catholic University of S~_o Paulo--SP, between the years of 1970 and 1992, as well as its contribution to the process of rescuing historical memory of child and teenager abduction, imprisonment, and torture in the course of military dictatorships in Brazil, Argentina, Uruguay, and Paraguay. The methodology used in this descriptive and qualitative research intends to take two directions: a bibliographical and a descriptive analytic documental research. Through the consultation and analysis of documents from Fundo Clamor (correspondence, denunciations, bulletins, and leaflets from Abuelas de la Plaza de Mayo, reports, writs of habeas corpus, pieces of reportage, and files from clandestine detention centres and on enforced disappearances), a compilation will be made with information regarding the disappearance of children and the imprisonment and/or abduction of pregnant militants in an attempt to describe the situation of apprehension and incarceration, the historical context, and the repression forces involved in the operation of arrest, kidnapping and/or torture of militants, children, and teenagers. Besides this heritage, a documental research will be made at Terror Archives, the Centre for Documentation and Archives for the Defence of Human Rights (CDyA) of Paraguay Supreme Justice Court, which contains a register of Alfredo Stroessner's thirty-five-year-long military dictatorship in Paraguay. The main argument in this research states that the archives from the Committee for the Defence of Refugees Human Rights from the Southern Cone, available at Fundo Clamor, contribute significantly to the rescue of historical memory from the dictatorial period and to the achievement of complete citizenship in these countries, considering that Brazil was the protagonist of the National Security Doctrine implantation process in South America.展开更多
Acquired hemophilia A (AHA) is a rare, hemorrhagic autoimmune disease, whose pathogenesis involves reduced coagulation factor Ⅷ (FⅧ) activity related to the appearance of inhibitors against FⅧ. Common etiologic...Acquired hemophilia A (AHA) is a rare, hemorrhagic autoimmune disease, whose pathogenesis involves reduced coagulation factor Ⅷ (FⅧ) activity related to the appearance of inhibitors against FⅧ. Common etiological factors include autoimmune diseases, ma-lignancy, and pregnancy. We report two cases of AHA in solid cancer. The first case is a 63-year-old man who developed peritoneal and intestinal bleeding after gastrectomy for gastric cancer. He was diagnosed with AHA, and was treated with prednisone, followed by cyclophosphamide. In the second case, a 68-year-old man developed a subcutaneous hemorrhage. He was diagnosed with AHA in hepatocellular carcinoma on CT imaging, and treated with rituximab alone. Hemostasis was achieved for both patients without bypassing agents as the amount of inhibitors was reduced and eradicated. However, both patients died within 1 yeardue to cancer progression. Successful treatment for AHA in solid cancer can be diffcult because treatment of the underlying malignancy is also required.展开更多
Bulgarian cultural heritage is the most important part of the national wealth and a major factor in the accreditation of the Bulgarian cultural identity. Preservation of cultural and historical heritage valuables of o...Bulgarian cultural heritage is the most important part of the national wealth and a major factor in the accreditation of the Bulgarian cultural identity. Preservation of cultural and historical heritage valuables of one nation determines its development and presents an integrated project for their use in accordance with the contemporary needs of the society. Sustainable management and adaptation of Bulgarian cultural and historical heritage buildings are a guarantee for preservation of their value, including social, economical, political, scientific, aesthetic, philosophical, spiritual, architectural, structural, archeological and sentimental aspects of this value. Regarding to this, structural preservation presents a priority of the sustainable management of Bulgarian cultural and historical heritage buildings. For that type of buildings, the traditional methods for structural strengthening are not applicable and the development of individual rehabilitation programs is required. They must always reflect the specific conditions and building's importance. The existing technical regulations in Bulgaria are presented and general recommendations for their applications and future development are done. Regarding to the Bulgarian current law and governing regulations, the implementation plan for the conservation and management is presented in this paper. Based on the analysis of the principles of the sustainable management and especially of the structural preservation, some general conclusions are made.展开更多
This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string ...This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.展开更多
文摘A dual random model of a portfolio of variable amount whole life annuity is set with the mth moment of the present value of benefits, and the respective expressions of the moments under the assumption that the force of interest accumulation function is Wiener process or Ornstein-Uhlenbeck process. Furthermore, the limiting distribution of average cost of this portfolio is discussed with the expression of the limiting distribution under the assumption that the force of interest accumulation is an independent increment process.
文摘The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed.
文摘This research aims to analyse the contents of Fundo Clamor, located at the Documentation and Scientific Information Centre--CEDIC, from the Pontifical Catholic University of S~_o Paulo--SP, between the years of 1970 and 1992, as well as its contribution to the process of rescuing historical memory of child and teenager abduction, imprisonment, and torture in the course of military dictatorships in Brazil, Argentina, Uruguay, and Paraguay. The methodology used in this descriptive and qualitative research intends to take two directions: a bibliographical and a descriptive analytic documental research. Through the consultation and analysis of documents from Fundo Clamor (correspondence, denunciations, bulletins, and leaflets from Abuelas de la Plaza de Mayo, reports, writs of habeas corpus, pieces of reportage, and files from clandestine detention centres and on enforced disappearances), a compilation will be made with information regarding the disappearance of children and the imprisonment and/or abduction of pregnant militants in an attempt to describe the situation of apprehension and incarceration, the historical context, and the repression forces involved in the operation of arrest, kidnapping and/or torture of militants, children, and teenagers. Besides this heritage, a documental research will be made at Terror Archives, the Centre for Documentation and Archives for the Defence of Human Rights (CDyA) of Paraguay Supreme Justice Court, which contains a register of Alfredo Stroessner's thirty-five-year-long military dictatorship in Paraguay. The main argument in this research states that the archives from the Committee for the Defence of Refugees Human Rights from the Southern Cone, available at Fundo Clamor, contribute significantly to the rescue of historical memory from the dictatorial period and to the achievement of complete citizenship in these countries, considering that Brazil was the protagonist of the National Security Doctrine implantation process in South America.
文摘Acquired hemophilia A (AHA) is a rare, hemorrhagic autoimmune disease, whose pathogenesis involves reduced coagulation factor Ⅷ (FⅧ) activity related to the appearance of inhibitors against FⅧ. Common etiological factors include autoimmune diseases, ma-lignancy, and pregnancy. We report two cases of AHA in solid cancer. The first case is a 63-year-old man who developed peritoneal and intestinal bleeding after gastrectomy for gastric cancer. He was diagnosed with AHA, and was treated with prednisone, followed by cyclophosphamide. In the second case, a 68-year-old man developed a subcutaneous hemorrhage. He was diagnosed with AHA in hepatocellular carcinoma on CT imaging, and treated with rituximab alone. Hemostasis was achieved for both patients without bypassing agents as the amount of inhibitors was reduced and eradicated. However, both patients died within 1 yeardue to cancer progression. Successful treatment for AHA in solid cancer can be diffcult because treatment of the underlying malignancy is also required.
文摘Bulgarian cultural heritage is the most important part of the national wealth and a major factor in the accreditation of the Bulgarian cultural identity. Preservation of cultural and historical heritage valuables of one nation determines its development and presents an integrated project for their use in accordance with the contemporary needs of the society. Sustainable management and adaptation of Bulgarian cultural and historical heritage buildings are a guarantee for preservation of their value, including social, economical, political, scientific, aesthetic, philosophical, spiritual, architectural, structural, archeological and sentimental aspects of this value. Regarding to this, structural preservation presents a priority of the sustainable management of Bulgarian cultural and historical heritage buildings. For that type of buildings, the traditional methods for structural strengthening are not applicable and the development of individual rehabilitation programs is required. They must always reflect the specific conditions and building's importance. The existing technical regulations in Bulgaria are presented and general recommendations for their applications and future development are done. Regarding to the Bulgarian current law and governing regulations, the implementation plan for the conservation and management is presented in this paper. Based on the analysis of the principles of the sustainable management and especially of the structural preservation, some general conclusions are made.
基金supported by the Science and Technology Support Project of Sichuan Province of China(Grant No.2013GZX0137)the Fund for Young Persons Project of Sichuan Province of China(Grant No.12ZB017)+2 种基金the National Natural Science Foundation of China(Grant No.61100205)the Project of the Fundamental Research Funds for the Central Universities of China(Grant No.2013RC0307)the Cryptography Basic Development of the National"Twelfth Five-Year Plan" of China on Cryptographic Theory(Grant No.MMJJ201301004)
文摘This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.