新加坡终身入息计划(CPF Lifelong Income Scheme)于2009年设立,是政府主导的唯一终身年金计划,力图为退休的新加坡公民和永久居民提供每月支付的生活费。该计划基于特殊的历史背景,为参保人提供了多种领取方式,特色鲜明。我国的社会发...新加坡终身入息计划(CPF Lifelong Income Scheme)于2009年设立,是政府主导的唯一终身年金计划,力图为退休的新加坡公民和永久居民提供每月支付的生活费。该计划基于特殊的历史背景,为参保人提供了多种领取方式,特色鲜明。我国的社会发展以及人口老龄化程度和新加坡有一些相似的地方,分析研究其终身入息计划,能够为我国社保制度的发展提供一些的启示。展开更多
This paper investigates the multi-beam selection algorithms for transmit correlation channels by using statistical channel state information (SCSI) and instantaneous channel state information. Unlike the conventiona...This paper investigates the multi-beam selection algorithms for transmit correlation channels by using statistical channel state information (SCSI) and instantaneous channel state information. Unlike the conventional codebook-based transmission scheme, the proposed multi-beam selection with the single channel quality indicator (CQI) feedback (MBS- SCF) algorithm determines the preferred beam vector by exploiting the SCSI and only feeds back CQI at each timeslot. The performance of the MBS-SCF algorithm is nearly the same as that of the conventional scheme. In order to further improve the average sum rate, a novel multi-beam selection with the dual CQIs feedback (MBS-DCF) algorithm is proposed, which determines dual preferred statistical eigen- directions and feeds back dual CQIs at each timeslot. The theoretical analysis and simulation results demonstrate that the MBS-DCF algorithm can increase the multiuser diversity and multiplexing gain and exhibits a higher average sum rate.展开更多
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash...The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.展开更多
Sign Writing, a writing system for sign language, is becoming a useful and convenient communication aid for people who are deaf. Principally, people who are deaf find it difficult to communicate with the hearing commu...Sign Writing, a writing system for sign language, is becoming a useful and convenient communication aid for people who are deaf. Principally, people who are deaf find it difficult to communicate with the hearing community and due to recent technological advancement they communicate amongst themselves and with the hearing community via text messaging on mobile phones. Existing messaging function is limited to writing based on the Roman alphabets or pictographic languages like Mandarin; writing in signs is deemed to be deficient in a mobile context. Hence, the aim of this paper is to examine the feasibility of writing and reading text messages in signs as an alternative communication mean besides Short Messaging Service (SMS). Initial experimental results have significantly exemplified that sign writing gains well acceptance and is preferred among the hearing-impaired community to communicate within or between the hearing communities.展开更多
In Multiple-Input Multiple-Out (MIMO) systems, the user selection algorithm plays an important role in the realization of multiplexing gain. In this paper, an improved Semi-orthogonal User Selection algorithm based ...In Multiple-Input Multiple-Out (MIMO) systems, the user selection algorithm plays an important role in the realization of multiplexing gain. In this paper, an improved Semi-orthogonal User Selection algorithm based on condition number is proposed. Besides, a new MIMO pre- coding scheme is designed. The proposed SUS- CN (SUS with condition number) algorithm outperforms the SUS algorithm for the selection of users with better matrix inversion property, thus a higher information rate for selected user pair is achieved. The designed MIMO precoding matrix brings benefits of the power equality at transmitted terminals, the limited dynamic range of the power over time, and a better power efficiency. The simulation results give the key insights into the im- pact of the different condition number value and users on the sum-rate capacity.展开更多
RS (remote sensing) applications to hydrological problem solving have successfully transitioned from being experimental to operational in the last couple of years, and information gathered through these technologies...RS (remote sensing) applications to hydrological problem solving have successfully transitioned from being experimental to operational in the last couple of years, and information gathered through these technologies can facilitate water resource procedures. Patterns from RS imagery can be translated into a deterministic distribution of input data over a wide area on a pixel-by-pixel basis. This paper presents the implementation of different methodologies of integrating satellite-derived information from RS, and GIS (geographic information system) visualization and simulation capabilities in improving hydrologic estimation processes.展开更多
A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared e...A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared error(MMSE) estimate of the source data to the destination. Since it performs like amplify-and-forward(AF) and decode-and-forward(DF) for the low and high signal-to-noise ratio(SNR) regions, respectively, the EF relay thus outperforms conventional AF and DF across all SNRs without the need for switching algorithms for different SNRs. Because computational complexity is however high for relays with a large number of antennas(large MIMO) and/or high order constellations, list EF for large MIMO relay networks is proposed. It computes a list sphere decoder based MMSE estimate and retains the advantages of the exact EF relay at a negligible performance loss. The proposed list EF could offer a flexible trade-off between the performance and computational complexity.展开更多
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challengin...Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user’s environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.展开更多
Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighbori...Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighboring caches. These nodes would cooperate in caching and share cached content if and only if they each benefit. The challenges are to determine what objects to cache at each node and to implement the system in the context of Information Centric Networking(ICN). This work includes both a solution for the NSCC problem and a design and implementation of an NSCC system in Named Data Networking(NDN), a large effort that exemplifies ICN. Our design applies NDN synchronization protocol to facilitate the information exchange among nodes, adopts group key encryption to control data access within the NSCC group, and offers an error checker to detect error events in the system. Our approach is validated by deploying the system we developed on Planet Lab.展开更多
Accounting concepts dictate that separately disclosed components should contain separate useful information. This paper examines the relations between income statement components and analysts' earnings forecasts and ...Accounting concepts dictate that separately disclosed components should contain separate useful information. This paper examines the relations between income statement components and analysts' earnings forecasts and forecast errors. Regressions explaining earnings forecasts using earnings components provide a better fit than regression using just aggregate income to explain forecasts. We interpret this as consistent with the hypothesis that analysts use incremental information in components not available in aggregate income. However, additional tests based on predictability of forecast errors indicate that analysts do not incorporate all information available in components into earnings forecasts. In addition, this inefficiency appears to increase at longer forecast horizons.展开更多
In a three-dimensional (3D) multiple- input multiple-output (MIMO) system, the base station can use both horizontal and vertical spaces, transmitting spatial beam to users more accurately. This system has caught t...In a three-dimensional (3D) multiple- input multiple-output (MIMO) system, the base station can use both horizontal and vertical spaces, transmitting spatial beam to users more accurately. This system has caught the attention of researchers in recent years. The existing research on the 3D MIMO technology is based on the assumption that the base station can acquire the ideal channel state information (CSI), which is not actually the case in real systems. Therefore, this paper introduces a limited feedback transmission scheme based on mobile station (MS) compensation in the 3D MIMO system. In this scheme, the vertical antenna gain of the 3D MIMO system compensation is assigned to the MS. Two CSI-RS ports are configured at the base station, omnidirectional CSI-RS port and partial CSI-RS port. The MS can calculate the horizontal CSI and the vertical beam gain according to omnidirectional CSI-RS port and partial CSI- RS port, respectively. Partial CSI-RS resources are used to calculate the channel after being weighted by the vertical beam vector, MS selects the optimal vertical precoding vector. Simulations show that compared with the reference strategy, the transmission scheme with limited feedback based on the MS compensation proposed in this article has more advantages. The average spectral efficiency of the system and the cell edge spectral efficiency can be greatly improved.展开更多
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio...The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information.展开更多
文摘新加坡终身入息计划(CPF Lifelong Income Scheme)于2009年设立,是政府主导的唯一终身年金计划,力图为退休的新加坡公民和永久居民提供每月支付的生活费。该计划基于特殊的历史背景,为参保人提供了多种领取方式,特色鲜明。我国的社会发展以及人口老龄化程度和新加坡有一些相似的地方,分析研究其终身入息计划,能够为我国社保制度的发展提供一些的启示。
基金The National Natural Science Foundation of China( No. 60925004, 60902009, 61001103)the National Science and Technology Major Project of China ( No. 2009ZX03003-005-02, 2009ZX03003-011-04,2011ZX03003-003-03) +1 种基金the Natural Science Foundation of Jiangsu Province of China ( No. BK2011019)the Natural Science Foundation of the Jiangsu Higher Education Institutions of China ( No. 10KJB510021)
文摘This paper investigates the multi-beam selection algorithms for transmit correlation channels by using statistical channel state information (SCSI) and instantaneous channel state information. Unlike the conventional codebook-based transmission scheme, the proposed multi-beam selection with the single channel quality indicator (CQI) feedback (MBS- SCF) algorithm determines the preferred beam vector by exploiting the SCSI and only feeds back CQI at each timeslot. The performance of the MBS-SCF algorithm is nearly the same as that of the conventional scheme. In order to further improve the average sum rate, a novel multi-beam selection with the dual CQIs feedback (MBS-DCF) algorithm is proposed, which determines dual preferred statistical eigen- directions and feeds back dual CQIs at each timeslot. The theoretical analysis and simulation results demonstrate that the MBS-DCF algorithm can increase the multiuser diversity and multiplexing gain and exhibits a higher average sum rate.
基金The National Natural Science Foundation of China(No.71071033)the Innovation Project of Jiangsu Postgraduate Education(No.CX10B_058Z)
文摘The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.
文摘Sign Writing, a writing system for sign language, is becoming a useful and convenient communication aid for people who are deaf. Principally, people who are deaf find it difficult to communicate with the hearing community and due to recent technological advancement they communicate amongst themselves and with the hearing community via text messaging on mobile phones. Existing messaging function is limited to writing based on the Roman alphabets or pictographic languages like Mandarin; writing in signs is deemed to be deficient in a mobile context. Hence, the aim of this paper is to examine the feasibility of writing and reading text messages in signs as an alternative communication mean besides Short Messaging Service (SMS). Initial experimental results have significantly exemplified that sign writing gains well acceptance and is preferred among the hearing-impaired community to communicate within or between the hearing communities.
基金This paper was supported by the National Natural Science Foundation of China under Grant No.61390513 and 61201225,and National Science and Technology Major Project of China under Grant No.2013ZX03003004,the Natural Science Foundation of Shanghai under Grant No.12ZR1450800,and sponsored by Shanghai Pujiang Program under Grant No.13PJD030.It was also supported by the Fundamental Research Funds for the Central Universities under Grant No.20140767,the Program for Young Excellent Talents in Tongji University under Grant No.2013KJ007,and 'Chen Guang' project supported by Shanghai Municipal Education Commission and Shanghai Education Development Foundation under Grant No.13CG18
文摘In Multiple-Input Multiple-Out (MIMO) systems, the user selection algorithm plays an important role in the realization of multiplexing gain. In this paper, an improved Semi-orthogonal User Selection algorithm based on condition number is proposed. Besides, a new MIMO pre- coding scheme is designed. The proposed SUS- CN (SUS with condition number) algorithm outperforms the SUS algorithm for the selection of users with better matrix inversion property, thus a higher information rate for selected user pair is achieved. The designed MIMO precoding matrix brings benefits of the power equality at transmitted terminals, the limited dynamic range of the power over time, and a better power efficiency. The simulation results give the key insights into the im- pact of the different condition number value and users on the sum-rate capacity.
文摘RS (remote sensing) applications to hydrological problem solving have successfully transitioned from being experimental to operational in the last couple of years, and information gathered through these technologies can facilitate water resource procedures. Patterns from RS imagery can be translated into a deterministic distribution of input data over a wide area on a pixel-by-pixel basis. This paper presents the implementation of different methodologies of integrating satellite-derived information from RS, and GIS (geographic information system) visualization and simulation capabilities in improving hydrologic estimation processes.
基金supported in part by the National Natural Science Foundation of China 61501461, 61471269, 71232006, and61533019the Early Career Development Award of SKLMCCS (Y3S9021F34)
文摘A sphere-based list forwarding scheme for multiple-input multiple-output(MIMO) relay networks is proposed and analyzed. Firstly, an estimate forwarding(EF) method is proposed, which forwards the minimum mean squared error(MMSE) estimate of the source data to the destination. Since it performs like amplify-and-forward(AF) and decode-and-forward(DF) for the low and high signal-to-noise ratio(SNR) regions, respectively, the EF relay thus outperforms conventional AF and DF across all SNRs without the need for switching algorithms for different SNRs. Because computational complexity is however high for relays with a large number of antennas(large MIMO) and/or high order constellations, list EF for large MIMO relay networks is proposed. It computes a list sphere decoder based MMSE estimate and retains the advantages of the exact EF relay at a negligible performance loss. The proposed list EF could offer a flexible trade-off between the performance and computational complexity.
基金Supported by the National Natural Science Foundation of China (No.60403027) .
文摘Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user’s environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.
基金sponsored by the National Grand Fundamental Research 973 program of China under Grant No.2009CB320505the National Nature Science Foundation of China under Grant No. 60973123+1 种基金the Technology Support Program (Industry) of Jiangsu under Grant No.BE2011173Prospective Research Project on Future Networks of Jiangsu Future Networks Innovation Institute under Grant No.BY2013095-5-03
文摘Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighboring caches. These nodes would cooperate in caching and share cached content if and only if they each benefit. The challenges are to determine what objects to cache at each node and to implement the system in the context of Information Centric Networking(ICN). This work includes both a solution for the NSCC problem and a design and implementation of an NSCC system in Named Data Networking(NDN), a large effort that exemplifies ICN. Our design applies NDN synchronization protocol to facilitate the information exchange among nodes, adopts group key encryption to control data access within the NSCC group, and offers an error checker to detect error events in the system. Our approach is validated by deploying the system we developed on Planet Lab.
文摘Accounting concepts dictate that separately disclosed components should contain separate useful information. This paper examines the relations between income statement components and analysts' earnings forecasts and forecast errors. Regressions explaining earnings forecasts using earnings components provide a better fit than regression using just aggregate income to explain forecasts. We interpret this as consistent with the hypothesis that analysts use incremental information in components not available in aggregate income. However, additional tests based on predictability of forecast errors indicate that analysts do not incorporate all information available in components into earnings forecasts. In addition, this inefficiency appears to increase at longer forecast horizons.
基金the National Natural Science Foundation of China Grants No.61302106,51274018,the National Science & Technology Pillar Program Grants No.2013BAK06B03 Natural Science Foundation of Hebei Province No.F2014502029 and the Fundamental Research Funds for the Central Universities Grants No.2014MS100
文摘In a three-dimensional (3D) multiple- input multiple-output (MIMO) system, the base station can use both horizontal and vertical spaces, transmitting spatial beam to users more accurately. This system has caught the attention of researchers in recent years. The existing research on the 3D MIMO technology is based on the assumption that the base station can acquire the ideal channel state information (CSI), which is not actually the case in real systems. Therefore, this paper introduces a limited feedback transmission scheme based on mobile station (MS) compensation in the 3D MIMO system. In this scheme, the vertical antenna gain of the 3D MIMO system compensation is assigned to the MS. Two CSI-RS ports are configured at the base station, omnidirectional CSI-RS port and partial CSI-RS port. The MS can calculate the horizontal CSI and the vertical beam gain according to omnidirectional CSI-RS port and partial CSI- RS port, respectively. Partial CSI-RS resources are used to calculate the channel after being weighted by the vertical beam vector, MS selects the optimal vertical precoding vector. Simulations show that compared with the reference strategy, the transmission scheme with limited feedback based on the MS compensation proposed in this article has more advantages. The average spectral efficiency of the system and the cell edge spectral efficiency can be greatly improved.
文摘The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information.