How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat...How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.展开更多
Determination of the optimal model parameters for biochemical systems is a time consuming iterative process. In this study, a novel hybrid differential evolution (DE) algorithm based on the differential evolution te...Determination of the optimal model parameters for biochemical systems is a time consuming iterative process. In this study, a novel hybrid differential evolution (DE) algorithm based on the differential evolution technique and a local search strategy is developed for solving kinetic parameter estimation problems. By combining the merits of DE with Gauss-Newton method, the proposed hybrid approach employs a DE algorithm for identifying promising regions of the solution space followed by use of Gauss-Newton method to determine the optimum in the identified regions. Some well-known benchmark estimation problems are utilized to test the efficiency and the robustness of the proposed algorithm compared to other methods in literature. The comparison indicates that the present hybrid algorithm outperforms other estimation techniques in terms of the global searching ability and the con- vergence speed. Additionally, the estimation of kinetic model parameters for a feed batch fermentor is carried out to test the applicability of the proposed algorithm. The result suggests that the method can be used to estimate suitable values of model oarameters for a comolex mathematical model.展开更多
In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular,...In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.展开更多
This paper is devoted to study the modified holographic dark energy model by taking its different aspects in the t/at Kaiuza-Klein universe. We construct the equation of state parameter which evolutes the universe fro...This paper is devoted to study the modified holographic dark energy model by taking its different aspects in the t/at Kaiuza-Klein universe. We construct the equation of state parameter which evolutes the universe from quintessence region towards the vacuum. It is found that the modified holographic model exhibits instability against small perturbations in the early epoch of the universe but becomes stable in the later times. We also develop its correspondence with some scalar field dark energy models. It is interesting to mention here that ail the results are consistent with the present observations.展开更多
Richardson et al. (Sci Bull, 2015. doi:10.1007/ sl1434-015-0806-z) suggest that the irreducibly simple climate model described in Monckton of Brenchley et al. (Sci Bull 60:122-135, 2015. doi:10.1007/s11434-014- ...Richardson et al. (Sci Bull, 2015. doi:10.1007/ sl1434-015-0806-z) suggest that the irreducibly simple climate model described in Monckton of Brenchley et al. (Sci Bull 60:122-135, 2015. doi:10.1007/s11434-014- 0699-2) was not validated against observations, relying instead on synthetic test data based on underestimated global warming, illogical parameter choice and near-in- stantaneous response at odds with ocean warming and other observations. However, the simple model, informed by its authors' choice of parameters, usually hindcasts observed temperature change more closely than the general-circu- lation models, and finds high climate sensitivity implausi- ble. With IPCC's choice of parameters, the model is further validated in that it duly replicates IPCC's sensitivity interval. Also, fast climate system response is consistent with near-zero or net-negative temperature feedback. Given the large uncertainties in the initial conditions and evolutionary processes determinative of climate sensitivity, subject to obvious caveats a simple sensitivity-focused model need not, and the present model does not, exhibit significantly less predictive skill than the general-circula- tion models.展开更多
文摘How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.
基金Supported by the National Natural Science Foundation of China (60804027, 61064003) and Fuzhou University Research Foundation (FZU-02335, 600338 and 600567).
文摘Determination of the optimal model parameters for biochemical systems is a time consuming iterative process. In this study, a novel hybrid differential evolution (DE) algorithm based on the differential evolution technique and a local search strategy is developed for solving kinetic parameter estimation problems. By combining the merits of DE with Gauss-Newton method, the proposed hybrid approach employs a DE algorithm for identifying promising regions of the solution space followed by use of Gauss-Newton method to determine the optimum in the identified regions. Some well-known benchmark estimation problems are utilized to test the efficiency and the robustness of the proposed algorithm compared to other methods in literature. The comparison indicates that the present hybrid algorithm outperforms other estimation techniques in terms of the global searching ability and the con- vergence speed. Additionally, the estimation of kinetic model parameters for a feed batch fermentor is carried out to test the applicability of the proposed algorithm. The result suggests that the method can be used to estimate suitable values of model oarameters for a comolex mathematical model.
基金supported by the Fundamental Research Funds for the Center University of China under Grant HIT. MKSTISP. 2016 13
文摘In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.
文摘This paper is devoted to study the modified holographic dark energy model by taking its different aspects in the t/at Kaiuza-Klein universe. We construct the equation of state parameter which evolutes the universe from quintessence region towards the vacuum. It is found that the modified holographic model exhibits instability against small perturbations in the early epoch of the universe but becomes stable in the later times. We also develop its correspondence with some scalar field dark energy models. It is interesting to mention here that ail the results are consistent with the present observations.
文摘Richardson et al. (Sci Bull, 2015. doi:10.1007/ sl1434-015-0806-z) suggest that the irreducibly simple climate model described in Monckton of Brenchley et al. (Sci Bull 60:122-135, 2015. doi:10.1007/s11434-014- 0699-2) was not validated against observations, relying instead on synthetic test data based on underestimated global warming, illogical parameter choice and near-in- stantaneous response at odds with ocean warming and other observations. However, the simple model, informed by its authors' choice of parameters, usually hindcasts observed temperature change more closely than the general-circu- lation models, and finds high climate sensitivity implausi- ble. With IPCC's choice of parameters, the model is further validated in that it duly replicates IPCC's sensitivity interval. Also, fast climate system response is consistent with near-zero or net-negative temperature feedback. Given the large uncertainties in the initial conditions and evolutionary processes determinative of climate sensitivity, subject to obvious caveats a simple sensitivity-focused model need not, and the present model does not, exhibit significantly less predictive skill than the general-circula- tion models.