Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the hab...Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the habitat fragmentation and unduly commercial collections. Previous observation showed that this species has very low and even no fruit set, and the pollinators are not observed before this report. The present observation was conducted at the Shennongjia, Hubei Province during the spring of 2002. The results showed that Bombus (Diversobombus) trifasciatus Smith, B. imitator Pittion and one species of Apis visited the flowers of the orchid, but only B. tritasciatus could carry pollinaria on its body and was the legitimate pollinators of C amoena. During 113 h of observation, only nine visitations were recorded. The bumblebees mainly appeared during 12:00-15:00 during the day. Bumblebees stayed in a flower only a few seconds and never more than ten seconds. The flowers would persist in fresh for about three weeks when they were not pollinated, but 3 or 4 d after pollinated, the pollinated flowers underwent a series of color and morphological changes including stalk elongation and ovary swelling. Therefore, stalk elongation can be considered an index of fruits set. Artificial pollination indicated that C amoena is a highly self-compatible and outcrossing species, but dependent on pollinators for fruit set. Based on the field observations, we concluded that pollination system of C amoena is deceptive. The fruit set in nature is not very low (26.98% on average) compared to other deceptive orchids, which may be related to small population sizes. The number of pollinia removal is much higher than that of fruit set, indicating that there are some degrees of pollinia wasting in C amoena.展开更多
In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the ...In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the GNSS spoofing is proposed.First,a Hammerstein model is applied to model the spoofer/GNSS transmitter and the wireless channel.Then,a novel method based on the uncultivated wolf pack algorithm(UWPA) is proposed to estimate the model parameters.Taking the estimated model parameters as a feature vector,the identification of the spoofing is realized by comparing the Euclidean distance between the feature vectors.Simulations verify the effectiveness and the robustness of the proposed method.The results show that,compared with the other identification algorithms,such as least square(LS),the iterative method and the bat-inspired algorithm(BA),although the UWPA has a little more time-eomplexity than the LS and the BA algorithm,it has better estimation precision of the model parameters and higher identification rate of the GNSS spoofing,even for relative low signal-to-noise ratios.展开更多
Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati...Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.展开更多
Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data ...Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data were introduced, and similarity measure analysis was also illustrated and compared with conventional similarity measure. As a result, overlapped data comparison was possible to present similarity with conventional similarity measure. Non-overlapped data similarity analysis provided the clue to solve the similarity of high dimensional data. Considering high dimensional data analysis was designed with consideration of neighborhoods information. Conservative and strict solutions were proposed. Proposed similarity measure was applied to express financial fraud among multi dimensional datasets. In illustrative example, financial fraud similarity with respect to age, gender, qualification and job was presented. And with the proposed similarity measure, high dimensional personal data were calculated to evaluate how similar to the financial fraud. Calculation results show that the actual fraud has rather high similarity measure compared to the average, from minimal 0.0609 to maximal 0.1667.展开更多
This paper presents a method using range deception jamming to evaluate the safety performance of the autonomous vehicle with millimetre wave(MMW)radar.The working principle of this method is described.Combined with a ...This paper presents a method using range deception jamming to evaluate the safety performance of the autonomous vehicle with millimetre wave(MMW)radar.The working principle of this method is described.Combined with a waveform edition software,an experimental platform is developed to generate a deceptive signal that contains false distance information.According to related theories and its principle,the configuration parameters of the experimental setup are calculated and configured.The MMW radar of evaluated vehicle should identify an objective when it receives the deceptive signal from the experimental setup.Even if no obstacle,the evaluated vehicle can immediately brake in order that its braking distance is measured.The experimental results show that the proposed method can meet the requirements of the safety performance evaluation for the autonomous vehicle with MMW radar,and it also overcomes some deficiencies of previous methods.展开更多
Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will ca...Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment.展开更多
Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanc...Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed.展开更多
Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active dece...Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security.展开更多
Foucault famously questioned the humor, and possibly the deceit, at the heart of Deleuze's philosophy by asserting its sincerity and seriousness. In this paper I address how humor and sincerity, and thereby truth and...Foucault famously questioned the humor, and possibly the deceit, at the heart of Deleuze's philosophy by asserting its sincerity and seriousness. In this paper I address how humor and sincerity, and thereby truth and falsity, are philosophical concepts at the core of Deleuze's thought. Using Deleuze's work Difference and Repetition as the focal object of my interrogation, I seek to show how truth and falsity are structured by difference and repetition. Deleuze's philosophy of pure difference does not merely try to critique traditional notions of truth, but attempts to define a new model of truth and falsity that bears both differences and repetitions from the previous models in the history of philosophy.展开更多
文摘Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the habitat fragmentation and unduly commercial collections. Previous observation showed that this species has very low and even no fruit set, and the pollinators are not observed before this report. The present observation was conducted at the Shennongjia, Hubei Province during the spring of 2002. The results showed that Bombus (Diversobombus) trifasciatus Smith, B. imitator Pittion and one species of Apis visited the flowers of the orchid, but only B. tritasciatus could carry pollinaria on its body and was the legitimate pollinators of C amoena. During 113 h of observation, only nine visitations were recorded. The bumblebees mainly appeared during 12:00-15:00 during the day. Bumblebees stayed in a flower only a few seconds and never more than ten seconds. The flowers would persist in fresh for about three weeks when they were not pollinated, but 3 or 4 d after pollinated, the pollinated flowers underwent a series of color and morphological changes including stalk elongation and ovary swelling. Therefore, stalk elongation can be considered an index of fruits set. Artificial pollination indicated that C amoena is a highly self-compatible and outcrossing species, but dependent on pollinators for fruit set. Based on the field observations, we concluded that pollination system of C amoena is deceptive. The fruit set in nature is not very low (26.98% on average) compared to other deceptive orchids, which may be related to small population sizes. The number of pollinia removal is much higher than that of fruit set, indicating that there are some degrees of pollinia wasting in C amoena.
基金The National Natural Science Foundation of China(No.61271214,61471152)the Postdoctoral Science Foundation of Jiangsu Province(No.1402023C)the Natural Science Foundation of Zhejiang Province(No.LZ14F010003)
文摘In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the GNSS spoofing is proposed.First,a Hammerstein model is applied to model the spoofer/GNSS transmitter and the wireless channel.Then,a novel method based on the uncultivated wolf pack algorithm(UWPA) is proposed to estimate the model parameters.Taking the estimated model parameters as a feature vector,the identification of the spoofing is realized by comparing the Euclidean distance between the feature vectors.Simulations verify the effectiveness and the robustness of the proposed method.The results show that,compared with the other identification algorithms,such as least square(LS),the iterative method and the bat-inspired algorithm(BA),although the UWPA has a little more time-eomplexity than the LS and the BA algorithm,it has better estimation precision of the model parameters and higher identification rate of the GNSS spoofing,even for relative low signal-to-noise ratios.
基金The National Natural Science Foundation of China(No.60873101)the Natural Science Foundation of Jiangsu Province(No.BK2008209)the Research Foundation of Nanjing University of Information Science and Technology(No.20080298)
文摘Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.
基金Project(RDF 11-02-03)supported by the Research Development Fund of XJTLU,China
文摘Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data were introduced, and similarity measure analysis was also illustrated and compared with conventional similarity measure. As a result, overlapped data comparison was possible to present similarity with conventional similarity measure. Non-overlapped data similarity analysis provided the clue to solve the similarity of high dimensional data. Considering high dimensional data analysis was designed with consideration of neighborhoods information. Conservative and strict solutions were proposed. Proposed similarity measure was applied to express financial fraud among multi dimensional datasets. In illustrative example, financial fraud similarity with respect to age, gender, qualification and job was presented. And with the proposed similarity measure, high dimensional personal data were calculated to evaluate how similar to the financial fraud. Calculation results show that the actual fraud has rather high similarity measure compared to the average, from minimal 0.0609 to maximal 0.1667.
基金National Natural Science Foundation of China(No.61471289)Natural Science Foundation of Shaanxi Province of China(No.2015JM5189)。
文摘This paper presents a method using range deception jamming to evaluate the safety performance of the autonomous vehicle with millimetre wave(MMW)radar.The working principle of this method is described.Combined with a waveform edition software,an experimental platform is developed to generate a deceptive signal that contains false distance information.According to related theories and its principle,the configuration parameters of the experimental setup are calculated and configured.The MMW radar of evaluated vehicle should identify an objective when it receives the deceptive signal from the experimental setup.Even if no obstacle,the evaluated vehicle can immediately brake in order that its braking distance is measured.The experimental results show that the proposed method can meet the requirements of the safety performance evaluation for the autonomous vehicle with MMW radar,and it also overcomes some deficiencies of previous methods.
基金Supported by the National Basic Research Program (973) of China under Grant No.2010CB923200Chinese Universities Scientific Fund BUPT2009RC0709
文摘Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment.
基金Supported by the National Nature Science Foundation of China( No. 60773003,60970120).
文摘Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed.
基金Supported by the National Natural Science Foundation of China (No.60572131)Innovation Fund of Technol-ogy Based Firms (No.08C26213200495)+2 种基金Key tech-nologies R&D Program of Jiang su Province (No.BE 2007058)College Natural Science Foundation of Ji-angsu Province (No.08KJB520005)the Scientific Research Foundation of NUPT (No.NY206050)
文摘Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security.
文摘Foucault famously questioned the humor, and possibly the deceit, at the heart of Deleuze's philosophy by asserting its sincerity and seriousness. In this paper I address how humor and sincerity, and thereby truth and falsity, are philosophical concepts at the core of Deleuze's thought. Using Deleuze's work Difference and Repetition as the focal object of my interrogation, I seek to show how truth and falsity are structured by difference and repetition. Deleuze's philosophy of pure difference does not merely try to critique traditional notions of truth, but attempts to define a new model of truth and falsity that bears both differences and repetitions from the previous models in the history of philosophy.