The numerical characteristics of fuzzy numbers include the optimistic value, pessimistic value, expected value, and the variance. We mainly provide the calculation formulae of several numerical characteristics of fuzz...The numerical characteristics of fuzzy numbers include the optimistic value, pessimistic value, expected value, and the variance. We mainly provide the calculation formulae of several numerical characteristics of fuzzy numbers based on credibility measure. Especially, the variance of symmetric fuzzy numbers is formulated, and a super bound for the variance of fuzzy numbers is presented. Meanwhile, some conclusions relative to credibility measure, optimistic and pessimistic values are also given.展开更多
The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certifi...The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certificate agent, the cloud user generates a trust base and extends it to its VMs. For each service running on the VM, a hash value is generated from all the necessary modules, and these hash values are organized and maintained with a specially designed hash tree whose root is extended from the user's trust base. Before the VM loads a service, the hash tree is verified from the coordinated hash value to check the trustworthiness of the service.展开更多
By developing an analytical model, this paper examines the role of the "external appraiser" as a tool to face the informational asymmetry issue related to fair value measurements. A comparison between such a signali...By developing an analytical model, this paper examines the role of the "external appraiser" as a tool to face the informational asymmetry issue related to fair value measurements. A comparison between such a signaling mechanism and a "full fair value disclosure" is firstly carried out, highlighting variables affecting the efficiency and the effectiveness of both information strategies. Then, recovering the traditional distinction between "protective disclosure" (hard information) and "informative disclosure" (soft information), this paper demonstrates how the former could significantly increase the positive effects associated to an employment of an independent valuer, reaching some conclusions useful to the standard setting process.展开更多
Since the spreading of harmful rumors can deeply endanger a society, it is valuable to investigate strategies that can efficiently prevent hazardous rumor propagation. To conduct this investigation, the authors modify...Since the spreading of harmful rumors can deeply endanger a society, it is valuable to investigate strategies that can efficiently prevent hazardous rumor propagation. To conduct this investigation, the authors modify the SIR model to describe rumor propagation on networks, and apply two major immunization strategies, namely, the random immunization and the targeted immunization to the rumor model on a small-world network. The authors find that when the average degree of the network is small, both two strategies are effective and when the average degree is large, neither strategy is efficient in preventing rumor propagation. In the latter case, the authors propose a new strategy by decreasing the credibility of the rumor and applying either the random or the targeted immunization at the same time. Numerical simulations indicate that this strategy is effective in preventing rumor spreading on the small-world network with large average degree.展开更多
An OOK-NRZ visible light communication (VLC) system is designed by using a single white LED and a 550 nm visible photodetector. The emitting model of the single LED is established, and the general expression of the de...An OOK-NRZ visible light communication (VLC) system is designed by using a single white LED and a 550 nm visible photodetector. The emitting model of the single LED is established, and the general expression of the detector's output signals under OOK modulation is deduced. With the selected LED, detector and other related parameters, the designed communication system is optimized and its performance is analyzed. The optimized communication distance between the LED and the detector is 0.54 m at the communication bit rate of 1 Mbit/s. With the best communication distance, when the signal-to-noise ratio (SNR) is larger than 6.5 dB, the bit error rate (BER) can drop to 10-4. The analytical model and theory presented in this paper can be of certain practical meanings in the design of similar communication systems.展开更多
文摘The numerical characteristics of fuzzy numbers include the optimistic value, pessimistic value, expected value, and the variance. We mainly provide the calculation formulae of several numerical characteristics of fuzzy numbers based on credibility measure. Especially, the variance of symmetric fuzzy numbers is formulated, and a super bound for the variance of fuzzy numbers is presented. Meanwhile, some conclusions relative to credibility measure, optimistic and pessimistic values are also given.
基金supported by the National Natural Science Foundation of China(No.6127249261572521)+1 种基金Natural Science Foundation of Shaanxi Provence(No.2013JM8012)Fundamental Research Project of CAPF(No.WJY201520)
文摘The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certificate agent, the cloud user generates a trust base and extends it to its VMs. For each service running on the VM, a hash value is generated from all the necessary modules, and these hash values are organized and maintained with a specially designed hash tree whose root is extended from the user's trust base. Before the VM loads a service, the hash tree is verified from the coordinated hash value to check the trustworthiness of the service.
文摘By developing an analytical model, this paper examines the role of the "external appraiser" as a tool to face the informational asymmetry issue related to fair value measurements. A comparison between such a signaling mechanism and a "full fair value disclosure" is firstly carried out, highlighting variables affecting the efficiency and the effectiveness of both information strategies. Then, recovering the traditional distinction between "protective disclosure" (hard information) and "informative disclosure" (soft information), this paper demonstrates how the former could significantly increase the positive effects associated to an employment of an independent valuer, reaching some conclusions useful to the standard setting process.
基金supported by the Natural Science Foundation of China under Grant No.61070069Zhejiang Provincial Natural Science Foundation of China under Grant No.Y1100290
文摘Since the spreading of harmful rumors can deeply endanger a society, it is valuable to investigate strategies that can efficiently prevent hazardous rumor propagation. To conduct this investigation, the authors modify the SIR model to describe rumor propagation on networks, and apply two major immunization strategies, namely, the random immunization and the targeted immunization to the rumor model on a small-world network. The authors find that when the average degree of the network is small, both two strategies are effective and when the average degree is large, neither strategy is efficient in preventing rumor propagation. In the latter case, the authors propose a new strategy by decreasing the credibility of the rumor and applying either the random or the targeted immunization at the same time. Numerical simulations indicate that this strategy is effective in preventing rumor spreading on the small-world network with large average degree.
基金supported by the Innovation Fund For Technology Based Firms of Changchun, China (No.10ZC04)
文摘An OOK-NRZ visible light communication (VLC) system is designed by using a single white LED and a 550 nm visible photodetector. The emitting model of the single LED is established, and the general expression of the detector's output signals under OOK modulation is deduced. With the selected LED, detector and other related parameters, the designed communication system is optimized and its performance is analyzed. The optimized communication distance between the LED and the detector is 0.54 m at the communication bit rate of 1 Mbit/s. With the best communication distance, when the signal-to-noise ratio (SNR) is larger than 6.5 dB, the bit error rate (BER) can drop to 10-4. The analytical model and theory presented in this paper can be of certain practical meanings in the design of similar communication systems.