In this paper, we discuss some propertie s of lattice implication algebra and difine the transitivity of implication in a set, we show the transitivity of implication and the substitution Theorem hold i n filters. S...In this paper, we discuss some propertie s of lattice implication algebra and difine the transitivity of implication in a set, we show the transitivity of implication and the substitution Theorem hold i n filters. So every filter of lattice implication algebra satisfies the Syllogis m and substitution Theorem of propositional logic.展开更多
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ...The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.展开更多
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si...In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented.展开更多
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg...The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.展开更多
Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle ...Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle muhicast infrastructure, this approach results in a highly efficient key update mechanism in which the number of muhicast messages transmitted upon a membership update is proportional to the depth of the tree, which is logarithmic to the size of the secure muhicast group. But this is based on the hypothesis that the tree is maintained in a balanced manner. This paper proposes a scalable rekeying scheme---link-tree structure for implementing secure group communication. Theoretical calculation and experimentation show that this scheme has better performance than the tree structure and the star structure, and at the same time still keep the link-tree structure balanced.展开更多
In spite of receiving a significant amount of food aid, achieving food security has been a major problem in Ethiopia. The claim is evidenced from the 2010 Global Hunger Index where the country fared dismally, coming o...In spite of receiving a significant amount of food aid, achieving food security has been a major problem in Ethiopia. The claim is evidenced from the 2010 Global Hunger Index where the country fared dismally, coming only fourth from the bottom. There are several factors attributing to this problem of food insecurity in a country like Ethiopia which depends highly on agriculture and allied activities. Some of the factors can be linked to low food production and productivity thereby leading to pervasive poverty. In order to assess these factors, the study was conducted on some selected members of agro-pastoral communities of Somali and Oromia regions in Ethiopia. Using availability of food in the household for the last one month as a proxy for food security, the estimated results of a logistic regression model indicated that the most significant factors affecting household food security are educational level of the spouse and that of the household head, size of farm land, availability of household assets including livestock, peace and security. The paper suggests some leads to how these amenities and resources can be provided to household members as they endeavor to reduce food insecurity.展开更多
Involvement in road traffic crashes as vehicle occupants is a leading cause of death and serious injury among children. The objective of this study was to investigate crash severity factors and child safety restraint ...Involvement in road traffic crashes as vehicle occupants is a leading cause of death and serious injury among children. The objective of this study was to investigate crash severity factors and child safety restraint use characteristics in order to identify effective countermeasures to increase children's highway safety. Characteristics and percentages of restraint use among child passengers aged 4-13 years were examined using highway crash data from Kansas. The association between restraint use, injury severity and characteristics of children involved in crashes were investigated using OR (odds ratios) and a logistic regression model, which was used to identify risk factors. Results showed that children, who were unrestrained, were seated in the front seat, traveling with drunk drivers and on rural roads, and traveling during nighttime was more vulnerable to severe injury in the case of motor vehicle crashes. The most frequent contributing causes related to crashes involving children included driver's inattention while driving, failure to yield right-of-way, driving too fast, wet roads and animals in the road. Based on identified critical factors, general countermeasure ideas to improve children's traffic safety were suggested, including age-appropriate and size-appropriate seat belt restraints and having children seated in the rear seat. Parents and children must gain better education regarding these safety measures in order to increase child safety on the road.展开更多
Whether a collection of scientific data can be explained only by a unique theory or whether such data can be equally explained by multiple theories is one of the more contested issues in the history and philosophy of ...Whether a collection of scientific data can be explained only by a unique theory or whether such data can be equally explained by multiple theories is one of the more contested issues in the history and philosophy of science. This paper argues that the case for multiple explanations is strengthened by the widespread failure of models in mathematical logic to be unique, i.e., categorical. Science is taken to require replicable and explicit public knowledge; this necessitates an unambiguous language for its transmission. Mathematics has been chosen as the vehicle to transmit scientific knowledge, both because of its "unreasonable effectiveness" and because of its unambiguous nature, hence the vogue of axiomatic systems. But mathematical logic tells us that axiomatic systems need not refer to uniquely defined real structures. Hence what is accepted as science may be only one of several possibilities.展开更多
To meet the demands for highly advanced components with ultra precise contour accuracy and optical surface quality arising in the fields of photonics and optics, automotive, medical applications and biotechnology, con...To meet the demands for highly advanced components with ultra precise contour accuracy and optical surface quality arising in the fields of photonics and optics, automotive, medical applications and biotechnology, consumer electronics and renewable energy, more advanced production machines and processes have to be developed. As the complexity of machine tools rises steadily, the automation of manufacture increases rapidly, processes become more integrated and cycle times have to be reduced significantly, challenges of engineering efficient machine tools with respect to these demands expand every day. Especially the manufacture of freeform geometries with non-continuous and asymmetric surfaces requires advanced diamond machining strategies involving highly dynamic axes movements with a high bandwidth and position accuracy. Ultra precision lathes additionally equipped with Slow Tool and Fast Tool systems can be regarded as state-of-the-art machines achieving the objectives of high quality optical components. The mechanical design of such ultra precision machine tools as well as the mechanical integration of additional highly dynamic axes are very well understood today. In contrast to that, neither advanced control strategies for ultra precision machining nor the control integration of additional Fast Tool systems have been sufficiently developed yet. Considering a complex machine setup as a mechatronic system, it becomes obvious that enhancements to further increase the achievable form accuracy and surface quality and at the same time decrease cycle times and error sensitivity can only be accomplished by innovative, integrated control systems. At the Fraunhofer Institute for Production Technology IPT a novel, fully integrated control approach has been developed to overcome the drawbacks of state-of-the-art machine controls for ultra precision processes. Current control systems are often realized as decentralized solutions consisting of various computational hardware components for setpoint generation, machine control, HMI (human machine interface), Slow Tool control and Fast Tool control. While implementing such a distributed control strategy, many disadvantages arise in terms of complex communication interfaces, discontinuous safety structures, synchronization of cycle times and the machining accuracy as a whole. The novel control approach has been developed as a fully integrated machine control including standard CNC (computer numerical control) and PLC (programmable logic controller) functionality, advanced setpoint generation methods, an extended HMI as well as an FPGA (field programmable gate array)-based controller for a voice coil driven Slow Tool and a piezo driven Fast Tool axis. As the new control system has been implemented as a fully integrated platform using digital communication via EtherCAT, a continuous safety strategy could be realized, the error sensitivity and EMC susceptibility could be significantly decreased and the overall process accuracy from setpoint generation over path interpolation to axes movements could be enhanced. The novel control at the same time offers additional possibilities of automation, process integration, online data acquisition and evaluation as well as error compensation methods.展开更多
Within cultural globalization there exist two distinct approaches, each with its built-in logic: the logic of a globalized culture promoted by one country and that of a globalized culture defined by many countries on...Within cultural globalization there exist two distinct approaches, each with its built-in logic: the logic of a globalized culture promoted by one country and that of a globalized culture defined by many countries on the basis of consultations and exchanges on an equal footing. As a result of the present unequal world economic and political order, the former has become the keynote of the process of cultural globalization. Establishing a flee and equal globalized culture requires the guidance of socialist ideology to change the unjust global economic and political order. Globalized culture is neither homogeneous nor heterogeneous; it is a diversified unified whole or a unity within diversity.展开更多
Breakthroughs in the global governance of terrorism depend mainly on the development on the part of the international community of thorough and effective mechanisms.At present,global governance targets terrorism via f...Breakthroughs in the global governance of terrorism depend mainly on the development on the part of the international community of thorough and effective mechanisms.At present,global governance targets terrorism via four regimes:hegemonic governance;governance by international organizations;hybrid governance;and coordinated governance by major powers.These strategies have made a contribution to counter-terrorism,but they do have shortcomings.We start with the judgment that governance entities should adhere to the logic of consequences,the logic of appropriateness,the logic of emotion and the logic of habitus,and on this basis make a preliminary assessment of the global governance of terrorism.Present terrorism governance regimes tend to be based on the thinking of the logic of consequences with only partial implementation of the logic of appropriateness and no use,so far,of counterterrorism measures based on the logic of emotion and the logic of habitus.To address both the symptoms and root causes of terrorism,international society should encourage governance strategies that implement counter-terrorism measures based on the four types of logic above and should promote coordination and cooperation based on this platform.In this course,China could promote a more significant role in global terrorism governance for such counter-terrorism platforms as the United Nations,including the Security Council,and the Shanghai Cooperation Organization.展开更多
文摘In this paper, we discuss some propertie s of lattice implication algebra and difine the transitivity of implication in a set, we show the transitivity of implication and the substitution Theorem hold i n filters. So every filter of lattice implication algebra satisfies the Syllogis m and substitution Theorem of propositional logic.
基金the National Natural Science Foundation of China (No.60573036).
文摘The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.
基金Project(2007AA01Z241-2) supported by the National High-tech Research and Development Program of ChinaProject(2006XM002) supported by Beijing Jiaotong University Science Foundation,ChinaProject(0910KYZY55) supported by the Fundamental Research Funds for the Central University in China
文摘In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented.
文摘The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.
基金Sponsored by the National Natural Science Foundation of China (Grant No.60203012) and Shanghai Rising-Star Program in Science and Technology (Grant No.02QD14027).
文摘Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle muhicast infrastructure, this approach results in a highly efficient key update mechanism in which the number of muhicast messages transmitted upon a membership update is proportional to the depth of the tree, which is logarithmic to the size of the secure muhicast group. But this is based on the hypothesis that the tree is maintained in a balanced manner. This paper proposes a scalable rekeying scheme---link-tree structure for implementing secure group communication. Theoretical calculation and experimentation show that this scheme has better performance than the tree structure and the star structure, and at the same time still keep the link-tree structure balanced.
文摘In spite of receiving a significant amount of food aid, achieving food security has been a major problem in Ethiopia. The claim is evidenced from the 2010 Global Hunger Index where the country fared dismally, coming only fourth from the bottom. There are several factors attributing to this problem of food insecurity in a country like Ethiopia which depends highly on agriculture and allied activities. Some of the factors can be linked to low food production and productivity thereby leading to pervasive poverty. In order to assess these factors, the study was conducted on some selected members of agro-pastoral communities of Somali and Oromia regions in Ethiopia. Using availability of food in the household for the last one month as a proxy for food security, the estimated results of a logistic regression model indicated that the most significant factors affecting household food security are educational level of the spouse and that of the household head, size of farm land, availability of household assets including livestock, peace and security. The paper suggests some leads to how these amenities and resources can be provided to household members as they endeavor to reduce food insecurity.
文摘Involvement in road traffic crashes as vehicle occupants is a leading cause of death and serious injury among children. The objective of this study was to investigate crash severity factors and child safety restraint use characteristics in order to identify effective countermeasures to increase children's highway safety. Characteristics and percentages of restraint use among child passengers aged 4-13 years were examined using highway crash data from Kansas. The association between restraint use, injury severity and characteristics of children involved in crashes were investigated using OR (odds ratios) and a logistic regression model, which was used to identify risk factors. Results showed that children, who were unrestrained, were seated in the front seat, traveling with drunk drivers and on rural roads, and traveling during nighttime was more vulnerable to severe injury in the case of motor vehicle crashes. The most frequent contributing causes related to crashes involving children included driver's inattention while driving, failure to yield right-of-way, driving too fast, wet roads and animals in the road. Based on identified critical factors, general countermeasure ideas to improve children's traffic safety were suggested, including age-appropriate and size-appropriate seat belt restraints and having children seated in the rear seat. Parents and children must gain better education regarding these safety measures in order to increase child safety on the road.
文摘Whether a collection of scientific data can be explained only by a unique theory or whether such data can be equally explained by multiple theories is one of the more contested issues in the history and philosophy of science. This paper argues that the case for multiple explanations is strengthened by the widespread failure of models in mathematical logic to be unique, i.e., categorical. Science is taken to require replicable and explicit public knowledge; this necessitates an unambiguous language for its transmission. Mathematics has been chosen as the vehicle to transmit scientific knowledge, both because of its "unreasonable effectiveness" and because of its unambiguous nature, hence the vogue of axiomatic systems. But mathematical logic tells us that axiomatic systems need not refer to uniquely defined real structures. Hence what is accepted as science may be only one of several possibilities.
文摘To meet the demands for highly advanced components with ultra precise contour accuracy and optical surface quality arising in the fields of photonics and optics, automotive, medical applications and biotechnology, consumer electronics and renewable energy, more advanced production machines and processes have to be developed. As the complexity of machine tools rises steadily, the automation of manufacture increases rapidly, processes become more integrated and cycle times have to be reduced significantly, challenges of engineering efficient machine tools with respect to these demands expand every day. Especially the manufacture of freeform geometries with non-continuous and asymmetric surfaces requires advanced diamond machining strategies involving highly dynamic axes movements with a high bandwidth and position accuracy. Ultra precision lathes additionally equipped with Slow Tool and Fast Tool systems can be regarded as state-of-the-art machines achieving the objectives of high quality optical components. The mechanical design of such ultra precision machine tools as well as the mechanical integration of additional highly dynamic axes are very well understood today. In contrast to that, neither advanced control strategies for ultra precision machining nor the control integration of additional Fast Tool systems have been sufficiently developed yet. Considering a complex machine setup as a mechatronic system, it becomes obvious that enhancements to further increase the achievable form accuracy and surface quality and at the same time decrease cycle times and error sensitivity can only be accomplished by innovative, integrated control systems. At the Fraunhofer Institute for Production Technology IPT a novel, fully integrated control approach has been developed to overcome the drawbacks of state-of-the-art machine controls for ultra precision processes. Current control systems are often realized as decentralized solutions consisting of various computational hardware components for setpoint generation, machine control, HMI (human machine interface), Slow Tool control and Fast Tool control. While implementing such a distributed control strategy, many disadvantages arise in terms of complex communication interfaces, discontinuous safety structures, synchronization of cycle times and the machining accuracy as a whole. The novel control approach has been developed as a fully integrated machine control including standard CNC (computer numerical control) and PLC (programmable logic controller) functionality, advanced setpoint generation methods, an extended HMI as well as an FPGA (field programmable gate array)-based controller for a voice coil driven Slow Tool and a piezo driven Fast Tool axis. As the new control system has been implemented as a fully integrated platform using digital communication via EtherCAT, a continuous safety strategy could be realized, the error sensitivity and EMC susceptibility could be significantly decreased and the overall process accuracy from setpoint generation over path interpolation to axes movements could be enhanced. The novel control at the same time offers additional possibilities of automation, process integration, online data acquisition and evaluation as well as error compensation methods.
文摘Within cultural globalization there exist two distinct approaches, each with its built-in logic: the logic of a globalized culture promoted by one country and that of a globalized culture defined by many countries on the basis of consultations and exchanges on an equal footing. As a result of the present unequal world economic and political order, the former has become the keynote of the process of cultural globalization. Establishing a flee and equal globalized culture requires the guidance of socialist ideology to change the unjust global economic and political order. Globalized culture is neither homogeneous nor heterogeneous; it is a diversified unified whole or a unity within diversity.
基金a phased outcome of the key National Social Science Fund project,"Study of the AntiTerrorism Situation,Mechanisms and Countermeasures Related to Xinjiang"(No.:15AZD018)chaired by Professor Yang Shu of the Central Asian Institute of Lanzhou University,and of the key research base team-building project "Study of Belt and Road Security Issues"(No.17LZUJBWTD002)the Central University Basic Research Operating Expenditure of Lanzhou University
文摘Breakthroughs in the global governance of terrorism depend mainly on the development on the part of the international community of thorough and effective mechanisms.At present,global governance targets terrorism via four regimes:hegemonic governance;governance by international organizations;hybrid governance;and coordinated governance by major powers.These strategies have made a contribution to counter-terrorism,but they do have shortcomings.We start with the judgment that governance entities should adhere to the logic of consequences,the logic of appropriateness,the logic of emotion and the logic of habitus,and on this basis make a preliminary assessment of the global governance of terrorism.Present terrorism governance regimes tend to be based on the thinking of the logic of consequences with only partial implementation of the logic of appropriateness and no use,so far,of counterterrorism measures based on the logic of emotion and the logic of habitus.To address both the symptoms and root causes of terrorism,international society should encourage governance strategies that implement counter-terrorism measures based on the four types of logic above and should promote coordination and cooperation based on this platform.In this course,China could promote a more significant role in global terrorism governance for such counter-terrorism platforms as the United Nations,including the Security Council,and the Shanghai Cooperation Organization.