To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm...To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process.展开更多
A five-fingered underactuated prosthetic hand controlled by surface EMG (electromyographic) signals is presented in this paper. The prosthetic hand was designed with simplicity, lightweight and dexterity on the requir...A five-fingered underactuated prosthetic hand controlled by surface EMG (electromyographic) signals is presented in this paper. The prosthetic hand was designed with simplicity, lightweight and dexterity on the requirement of anthropomorphic hands. Underactuated self-adaptive theory was adopted to decrease the number of motors and weight. The control part of the prosthetic hand was based on a surface EMG motion pattern classifier which combines LM-based (Levenberg-Marquardt) neural network with the parametric AR (autoregressive) model. This motion pattern classifier can successfully identify the flexions of the thumb, the index finger and the middle finger by measuring the surface EMG signals through two electrodes mounted on the flexor digitorum profundus and flexor pollicis longus. Furthermore, via continuously controlling a single finger's motion, the five-fingered underactuated prosthetic hand can achieve more prehensile postures such as power grasp, centralized grip, fingertip grasp, cylindrical grasp, etc. The experimental results show that the classifier has a great potential application to the control of bionic man-machine systems because of its fast learning speed, high recognition capability and strong robustness.展开更多
By developing an analytical model, this paper examines the role of the "external appraiser" as a tool to face the informational asymmetry issue related to fair value measurements. A comparison between such a signali...By developing an analytical model, this paper examines the role of the "external appraiser" as a tool to face the informational asymmetry issue related to fair value measurements. A comparison between such a signaling mechanism and a "full fair value disclosure" is firstly carried out, highlighting variables affecting the efficiency and the effectiveness of both information strategies. Then, recovering the traditional distinction between "protective disclosure" (hard information) and "informative disclosure" (soft information), this paper demonstrates how the former could significantly increase the positive effects associated to an employment of an independent valuer, reaching some conclusions useful to the standard setting process.展开更多
Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are si...Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are simply solved. Because of the needs for the development, software starts to mutually integrate with complex power network, making the scale of software increase greatly. Such a growing trend of software promotes soft-ware development to go beyond a general understanding and control and thus a complex system is formed. It is necessary to strengthen the research of complex network theory, and this is a new way to help people study the complexity of software systems. In this paper, the development course of complex dynamic network is introduced simply and the use of complex power network in the software engineering is summarized. Hopefully, this paper can help the crossover study of complex power network and software engineering in the future.展开更多
The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the s...The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed.展开更多
The problems of current highly redundant flight control system are analyzed in this paper. Our study gives methods of utilizing other information to reduce physical components on the condition of meeting the reliabili...The problems of current highly redundant flight control system are analyzed in this paper. Our study gives methods of utilizing other information to reduce physical components on the condition of meeting the reliability requirements for flight control system. The strategies presented in this paper mainly include information redundancy, multi-thread, time redundancy, geometry space redundancy, etc.. Analysis and simulation show these non-hardware based methods can reduce the requirement of system hardware level and thus reduce the system complexity, weight, space, costs and R&D (research and development) time.展开更多
The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information...The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction; control information transmission layer implementation using TCPflP protocol to control information including control of resources and control commands etc.. This paper adopts centralized network control system model, the structure of the network system realize unified observation, control, coordination, and control of high efficiency. The use of key technologies, such as Socket and COM to realize the goal of computer hardware resource control, software resource management and other functions.展开更多
文摘To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process.
基金the National Natural Science Foundation of China (Grant No. 50435040)Development Programfor Outstanding Young Teachers in Har-bin Institute of Technology(Grant No. HITQNJS.2007.011)
文摘A five-fingered underactuated prosthetic hand controlled by surface EMG (electromyographic) signals is presented in this paper. The prosthetic hand was designed with simplicity, lightweight and dexterity on the requirement of anthropomorphic hands. Underactuated self-adaptive theory was adopted to decrease the number of motors and weight. The control part of the prosthetic hand was based on a surface EMG motion pattern classifier which combines LM-based (Levenberg-Marquardt) neural network with the parametric AR (autoregressive) model. This motion pattern classifier can successfully identify the flexions of the thumb, the index finger and the middle finger by measuring the surface EMG signals through two electrodes mounted on the flexor digitorum profundus and flexor pollicis longus. Furthermore, via continuously controlling a single finger's motion, the five-fingered underactuated prosthetic hand can achieve more prehensile postures such as power grasp, centralized grip, fingertip grasp, cylindrical grasp, etc. The experimental results show that the classifier has a great potential application to the control of bionic man-machine systems because of its fast learning speed, high recognition capability and strong robustness.
文摘By developing an analytical model, this paper examines the role of the "external appraiser" as a tool to face the informational asymmetry issue related to fair value measurements. A comparison between such a signaling mechanism and a "full fair value disclosure" is firstly carried out, highlighting variables affecting the efficiency and the effectiveness of both information strategies. Then, recovering the traditional distinction between "protective disclosure" (hard information) and "informative disclosure" (soft information), this paper demonstrates how the former could significantly increase the positive effects associated to an employment of an independent valuer, reaching some conclusions useful to the standard setting process.
文摘Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are simply solved. Because of the needs for the development, software starts to mutually integrate with complex power network, making the scale of software increase greatly. Such a growing trend of software promotes soft-ware development to go beyond a general understanding and control and thus a complex system is formed. It is necessary to strengthen the research of complex network theory, and this is a new way to help people study the complexity of software systems. In this paper, the development course of complex dynamic network is introduced simply and the use of complex power network in the software engineering is summarized. Hopefully, this paper can help the crossover study of complex power network and software engineering in the future.
文摘The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed.
文摘The problems of current highly redundant flight control system are analyzed in this paper. Our study gives methods of utilizing other information to reduce physical components on the condition of meeting the reliability requirements for flight control system. The strategies presented in this paper mainly include information redundancy, multi-thread, time redundancy, geometry space redundancy, etc.. Analysis and simulation show these non-hardware based methods can reduce the requirement of system hardware level and thus reduce the system complexity, weight, space, costs and R&D (research and development) time.
文摘The paper analyze and design and implement a remote control system based on network. A computer network remote control system mainly includes server, client and the control information. Server registration information realize the user command; client provides network hardware, software and other system resources, the system response message and then feedback service instruction; control information transmission layer implementation using TCPflP protocol to control information including control of resources and control commands etc.. This paper adopts centralized network control system model, the structure of the network system realize unified observation, control, coordination, and control of high efficiency. The use of key technologies, such as Socket and COM to realize the goal of computer hardware resource control, software resource management and other functions.