By adopting the method of controlling parameters this paper describes the construction of various kinds of cubic curve segment and curved surface fragment with rational and non rational parameters, and discusses the ...By adopting the method of controlling parameters this paper describes the construction of various kinds of cubic curve segment and curved surface fragment with rational and non rational parameters, and discusses the relationship between controlling parameters, weighted factors and types, kinds and characteristics of curve segments and curved surface fragments. A mathematical method is provided for CAGD with abundant connotations, broad covering region, convenience, flexibility and direct simplicity.展开更多
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an...In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations.展开更多
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th...Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.展开更多
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con...At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.展开更多
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies...Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.展开更多
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte...In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.展开更多
With the establishment of a modem corporate system, the separation of ownership and management appears in the company. The rational allocation of corporate control between different behavioral agents has attracted mor...With the establishment of a modem corporate system, the separation of ownership and management appears in the company. The rational allocation of corporate control between different behavioral agents has attracted more and more attention. This paper points out that scholars have studied the allocation of corporate control from the angles of the agency cost theory, property rights theory, corporate finance theory, and the theory of corporate governance, which has great value. However, the existing theories also have some flaws on the allocation of corporate control. First, people still have different understandings and views over the meaning of corporate control. Secondly, the existing research theoretically only observes and studies an arrangement of sheer level control, the allocation between final control and real control. This paper argues to build the two-tier allocation of corporate control: The first tier relation is between ultimate control rights and actual control rights, the second tier relation is between indirect control rights and direct control rights which are in actual control rights. This study can explain the resource allocation effects of corporate control, promote the development and improvement of the theory of the firm.展开更多
Aiming at the difficulty of setting the weight coefficient in the value function of model predictive torque control(MPTC)for permanent magnet synchronous motor(PMSM)driven by three-level inverter,a fine-division model...Aiming at the difficulty of setting the weight coefficient in the value function of model predictive torque control(MPTC)for permanent magnet synchronous motor(PMSM)driven by three-level inverter,a fine-division model predictive flux control(MPFC)method is proposed.First,establish a mathematical model between the motor torque and the stator flux linkage according to the mathematical equations of PMSM.Thus,the control of the motor torque and stator flux linkage in the MPTC is transformed into the control of a single stator flux linkage vector,omitting the cumbersome weight setting process in the traditional MPTC.The midpoint potential control strategy is proposed,which uses the characteristics of redundant small vectors to balance the midpoint potential.After that,a fine-division strategy is proposed,which effectively reduces the number of candidate vectors and the computational burden of the system.Finally,the proposed MPFC is compared with MPTC by simulation.The results show that the proposed fine-division MPFC effectively reduces the system calculation,and has the advantages of simple principle and better dynamic and steady-state control performance.The feasibility of the control strategy is verified.展开更多
The objective of this study was to technically and economically assess the effect of biopesticides on the serious plant parasitic nematode Radopholus similis on banana in Costa Rica. The following treatments were eval...The objective of this study was to technically and economically assess the effect of biopesticides on the serious plant parasitic nematode Radopholus similis on banana in Costa Rica. The following treatments were evaluated: a mixture of nematode trapping fungi-Arthrobotrys oligospora, A. botryospora, Dactylella brochophaga and Drechmeria coniospora; DiTera DF which consist of a "dead" fungus Myrothecium spp. and its fermentation substrate; Savitan produced from desert plant extracts; QL Agri which contain Quillaja saponaria extracts; Japanese-style compost called Bokashi; two application of a chemical nematicide; and an absolute control. Results of root sampling on a six month basis showed that the biopesticides had lower nematode population densities than the control with the nematode trapping-fungi having statistically significant differences over the other treatments. Chemical control was highly effective and produced the lowest nematode density. However, there were no significant differences between the chemical treatment and the trapping-fungi treatment. The functional root weight and bunch weight showed no significant differences between treatments. Conversely, economic analyses indicated that using nematode trapping-fungi, chemical nematieide, or the QL Agri treatments gave a detectable profit. The land expectation value (LEV) of the banana plantation was higher than the price of banana land which indicated that under normal conditions in the banana sector, production is economically sustainable / profitable. Other results confirm that profit in banana production is affected by the price of a banana box, production and discount rate. The optimal production cycle was obtained in year ten after farm establishment, which refers to the year with the highest profit following plantation renewal. Finally, economical results highlighted the importance of nematodes control, since profitability indexes were sensitive to the efficiency and cost of nematode management technology adopted by the banana company.展开更多
The idea of this work arises from the analysis of the researches developed in the literature on topic of ownership and control that are mostly based on threshold of ownership stake to determine control equal for all c...The idea of this work arises from the analysis of the researches developed in the literature on topic of ownership and control that are mostly based on threshold of ownership stake to determine control equal for all companies and, in most cases, not supported by theoretical arguments and empirical evidences. In fact, the aim of this paper is to build a new method of determining the threshold of ownership stake that allows the shareholder to exercise control. In particular, this survey uses all Italian listed companies as reference, and the minutes of the Ordinary and Extraordinary General Meetings of shareholders, in 2009-2012, as database. The topic can be enriched with further and future researches aiming to adapt this new method in a cross-country investigation and so to identify the different threshold for the countries, on the basis of the different national laws regarding the ownership stakes that affect the control.展开更多
This paper analyzes the price difference between superior voting (SV) and inferior voting (IV) shares for three dual-class firms: Farmer Mac as a big price discount case, Fox as a price similarity case, and Heico...This paper analyzes the price difference between superior voting (SV) and inferior voting (IV) shares for three dual-class firms: Farmer Mac as a big price discount case, Fox as a price similarity case, and Heico as a big price premium case. We show that the price difference is mainly affected by the control benefit, while voting power and liquidity are also relevant factors. We suggest that the control benefit can be revealed by examining share accumulation and firm performance.展开更多
The aim of this paper is to consider the problem of politicians' control of state-owned enterprises in a transforming economy. The control of a company can be treated as a choice of a strategy pursued by this company...The aim of this paper is to consider the problem of politicians' control of state-owned enterprises in a transforming economy. The control of a company can be treated as a choice of a strategy pursued by this company. In order to present politicians' influence on a company's strategy, we consider the case of a firm controlled by the State Treasury (i.e., by politicians) and a company outside politicians' control, both functioning in a favorable and an unfavorable state of the economy. We propose the option-to-switch valuation model as a method of measuring politicians' private benefits of control. We illustrate the considerations using data concerning Poland's printing industry.展开更多
The article combines the background of Chinese system, theoretically derivates the relationship between corporate governance and their financial value, selects a sample of loss listed companies from 2003 to 2009, and ...The article combines the background of Chinese system, theoretically derivates the relationship between corporate governance and their financial value, selects a sample of loss listed companies from 2003 to 2009, and studies how the level of corporate governance affects the value of listed company losses. Research results show that, among corporate governance factors, the largest shareholder and the market for corporate control have obvious positive effects on the financial value of loss listed companies; the proportion of state-owned shares, the type of audit opinion, and corporate govemance factors have obvious negative effects on the financial value of loss listed companies; and managerial ownership, the proportion of independent directors, and the size of the board have no obvious driving effect on the financial value of loss listed companies.展开更多
Corporate governance takes an important role in affecting the quality of accounting information. Since the ownership structure determines the method and the level of the corporate governance and the right of control, ...Corporate governance takes an important role in affecting the quality of accounting information. Since the ownership structure determines the method and the level of the corporate governance and the right of control, supervision, and the benefit, it can decide the quality of information and affect the earning quality. This paper examines if the ownership concentration affects the earning quality in family-owned companies in China. Using the data of 298 publicly-traded corporations in China, this paper finds that the controlling shareholders are associated with low earning quality and that the separation of control rights and cash flow rights is negatively associated with the earning quality of family ownership.展开更多
This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided in...This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently.展开更多
This paper analyses the system of artistic and ideological conditioning that architects were subject to during the Portuguese fascism, the so-called "New State", the longest western European dictatorship of the prev...This paper analyses the system of artistic and ideological conditioning that architects were subject to during the Portuguese fascism, the so-called "New State", the longest western European dictatorship of the previous century, that lasted from 1933 to 1974, under the uninterrupted leadership of Ant6nio de Oliveira Salazar until 1968. After a concise exposition of the importance of a major public work campaign to the regime affirmation as well as the aesthetic discourse promoted in its architecture, the standard course of a building project evaluation will be described. Crossing varied legislation and taking into consideration the results of a thorough examination to more than one hundred processes of architectural plans approval, the interaction of the various decision-making bodies will illustrate the existence of an efficient apparatus which progressively depurate designs. Prevention and repression of artistic deviation will be demonstrated. Furthermore, the development and importance of self-censorship will be highlighted. Secondly, a characterization of the atmosphere of ideological surveillance and dissident's oppression will be provided. Architects' participation in opposition's initiatives and strategies will be portrayed. As a conclusion, New State practice of a negotiation and inclusion (both artistic and ideological) tactic in the architectural field will be underlined.展开更多
文摘By adopting the method of controlling parameters this paper describes the construction of various kinds of cubic curve segment and curved surface fragment with rational and non rational parameters, and discusses the relationship between controlling parameters, weighted factors and types, kinds and characteristics of curve segments and curved surface fragments. A mathematical method is provided for CAGD with abundant connotations, broad covering region, convenience, flexibility and direct simplicity.
基金supported by National Natural Science Foundation of China under Grant No.60873231Natural Science Foundation of Jiangsu Province under Grant No.BK2009426+1 种基金Major State Basic Research Development Program of China under Grant No.2011CB302903Key University Science Research Project of Jiangsu Province under Grant No.11KJA520002
文摘In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations.
基金Project(61003140) supported by the National Natural Science Foundation of ChinaProject(013/2010/A) supported by Macao Science and Technology Development FundProject(10YJC630236) supported by Social Science Foundation for the Youth Scholars of Ministry of Education of China
文摘Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient.
基金Acknowledgements This work was supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900) and National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008).
文摘At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.
基金supported by the NSFC(61173141,U1536206,61232016, U1405254,61373133,61502242,61572258)BK20150925+3 种基金Fund of Jiangsu Engineering Center of Network Monitoring(KJR1402)Fund of MOE Internet Innovation Platform(KJRP1403)CICAEETthe PAPD fund
文摘Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.
基金supported by the National Science Foundation of China (No.61373040,No.61173137)The Ph.D.Pro-grams Foundation of Ministry of Education of China(20120141110073)Key Project of Natural Science Foundation of Hubei Province (No.2010CDA004)
文摘In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.
文摘With the establishment of a modem corporate system, the separation of ownership and management appears in the company. The rational allocation of corporate control between different behavioral agents has attracted more and more attention. This paper points out that scholars have studied the allocation of corporate control from the angles of the agency cost theory, property rights theory, corporate finance theory, and the theory of corporate governance, which has great value. However, the existing theories also have some flaws on the allocation of corporate control. First, people still have different understandings and views over the meaning of corporate control. Secondly, the existing research theoretically only observes and studies an arrangement of sheer level control, the allocation between final control and real control. This paper argues to build the two-tier allocation of corporate control: The first tier relation is between ultimate control rights and actual control rights, the second tier relation is between indirect control rights and direct control rights which are in actual control rights. This study can explain the resource allocation effects of corporate control, promote the development and improvement of the theory of the firm.
基金National Natural Science Foundation of China(No.51867012)。
文摘Aiming at the difficulty of setting the weight coefficient in the value function of model predictive torque control(MPTC)for permanent magnet synchronous motor(PMSM)driven by three-level inverter,a fine-division model predictive flux control(MPFC)method is proposed.First,establish a mathematical model between the motor torque and the stator flux linkage according to the mathematical equations of PMSM.Thus,the control of the motor torque and stator flux linkage in the MPTC is transformed into the control of a single stator flux linkage vector,omitting the cumbersome weight setting process in the traditional MPTC.The midpoint potential control strategy is proposed,which uses the characteristics of redundant small vectors to balance the midpoint potential.After that,a fine-division strategy is proposed,which effectively reduces the number of candidate vectors and the computational burden of the system.Finally,the proposed MPFC is compared with MPTC by simulation.The results show that the proposed fine-division MPFC effectively reduces the system calculation,and has the advantages of simple principle and better dynamic and steady-state control performance.The feasibility of the control strategy is verified.
文摘The objective of this study was to technically and economically assess the effect of biopesticides on the serious plant parasitic nematode Radopholus similis on banana in Costa Rica. The following treatments were evaluated: a mixture of nematode trapping fungi-Arthrobotrys oligospora, A. botryospora, Dactylella brochophaga and Drechmeria coniospora; DiTera DF which consist of a "dead" fungus Myrothecium spp. and its fermentation substrate; Savitan produced from desert plant extracts; QL Agri which contain Quillaja saponaria extracts; Japanese-style compost called Bokashi; two application of a chemical nematicide; and an absolute control. Results of root sampling on a six month basis showed that the biopesticides had lower nematode population densities than the control with the nematode trapping-fungi having statistically significant differences over the other treatments. Chemical control was highly effective and produced the lowest nematode density. However, there were no significant differences between the chemical treatment and the trapping-fungi treatment. The functional root weight and bunch weight showed no significant differences between treatments. Conversely, economic analyses indicated that using nematode trapping-fungi, chemical nematieide, or the QL Agri treatments gave a detectable profit. The land expectation value (LEV) of the banana plantation was higher than the price of banana land which indicated that under normal conditions in the banana sector, production is economically sustainable / profitable. Other results confirm that profit in banana production is affected by the price of a banana box, production and discount rate. The optimal production cycle was obtained in year ten after farm establishment, which refers to the year with the highest profit following plantation renewal. Finally, economical results highlighted the importance of nematodes control, since profitability indexes were sensitive to the efficiency and cost of nematode management technology adopted by the banana company.
文摘The idea of this work arises from the analysis of the researches developed in the literature on topic of ownership and control that are mostly based on threshold of ownership stake to determine control equal for all companies and, in most cases, not supported by theoretical arguments and empirical evidences. In fact, the aim of this paper is to build a new method of determining the threshold of ownership stake that allows the shareholder to exercise control. In particular, this survey uses all Italian listed companies as reference, and the minutes of the Ordinary and Extraordinary General Meetings of shareholders, in 2009-2012, as database. The topic can be enriched with further and future researches aiming to adapt this new method in a cross-country investigation and so to identify the different threshold for the countries, on the basis of the different national laws regarding the ownership stakes that affect the control.
文摘This paper analyzes the price difference between superior voting (SV) and inferior voting (IV) shares for three dual-class firms: Farmer Mac as a big price discount case, Fox as a price similarity case, and Heico as a big price premium case. We show that the price difference is mainly affected by the control benefit, while voting power and liquidity are also relevant factors. We suggest that the control benefit can be revealed by examining share accumulation and firm performance.
文摘The aim of this paper is to consider the problem of politicians' control of state-owned enterprises in a transforming economy. The control of a company can be treated as a choice of a strategy pursued by this company. In order to present politicians' influence on a company's strategy, we consider the case of a firm controlled by the State Treasury (i.e., by politicians) and a company outside politicians' control, both functioning in a favorable and an unfavorable state of the economy. We propose the option-to-switch valuation model as a method of measuring politicians' private benefits of control. We illustrate the considerations using data concerning Poland's printing industry.
文摘The article combines the background of Chinese system, theoretically derivates the relationship between corporate governance and their financial value, selects a sample of loss listed companies from 2003 to 2009, and studies how the level of corporate governance affects the value of listed company losses. Research results show that, among corporate governance factors, the largest shareholder and the market for corporate control have obvious positive effects on the financial value of loss listed companies; the proportion of state-owned shares, the type of audit opinion, and corporate govemance factors have obvious negative effects on the financial value of loss listed companies; and managerial ownership, the proportion of independent directors, and the size of the board have no obvious driving effect on the financial value of loss listed companies.
文摘Corporate governance takes an important role in affecting the quality of accounting information. Since the ownership structure determines the method and the level of the corporate governance and the right of control, supervision, and the benefit, it can decide the quality of information and affect the earning quality. This paper examines if the ownership concentration affects the earning quality in family-owned companies in China. Using the data of 298 publicly-traded corporations in China, this paper finds that the controlling shareholders are associated with low earning quality and that the separation of control rights and cash flow rights is negatively associated with the earning quality of family ownership.
基金Supported by the Science Foundation of Shanghai Mu-nicipal Commission of Science and Technology under contract 045115012.
文摘This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel,broadcast channel and several data chan-nels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol,the results show that the pro-posed mechanism improves the average throughput and limits the transmission delay efficiently.
文摘This paper analyses the system of artistic and ideological conditioning that architects were subject to during the Portuguese fascism, the so-called "New State", the longest western European dictatorship of the previous century, that lasted from 1933 to 1974, under the uninterrupted leadership of Ant6nio de Oliveira Salazar until 1968. After a concise exposition of the importance of a major public work campaign to the regime affirmation as well as the aesthetic discourse promoted in its architecture, the standard course of a building project evaluation will be described. Crossing varied legislation and taking into consideration the results of a thorough examination to more than one hundred processes of architectural plans approval, the interaction of the various decision-making bodies will illustrate the existence of an efficient apparatus which progressively depurate designs. Prevention and repression of artistic deviation will be demonstrated. Furthermore, the development and importance of self-censorship will be highlighted. Secondly, a characterization of the atmosphere of ideological surveillance and dissident's oppression will be provided. Architects' participation in opposition's initiatives and strategies will be portrayed. As a conclusion, New State practice of a negotiation and inclusion (both artistic and ideological) tactic in the architectural field will be underlined.