According to Kripke, traditional approaches to presupposition and anaphora do not work in some compound sentences because traditionally, they have been thought to assign presuppositions to each clause in isolation. I ...According to Kripke, traditional approaches to presupposition and anaphora do not work in some compound sentences because traditionally, they have been thought to assign presuppositions to each clause in isolation. I agree with this criticism, but also think that context is required in order to determine the presupposition included in a complex sentence. To show the context role in fixing the utterance truth-conditions in those cases, this paper introduces the Kripkean anaphoric account on presuppositions (section 2), and then criticizes this approach because it is very restrictive (section 3). The paper concludes that to solve those difficulties, one should appeal to a two-dimensional framework, including a new parameter that focuses on the sentence according to the concrete features of the context: the speaker's point of view (section 4).展开更多
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies...Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.展开更多
There are numerous information technology solutions including hardware and software. A company that provides the solution should have knowledge of the customer needs in the purpose of sailing strategy or upgrade polic...There are numerous information technology solutions including hardware and software. A company that provides the solution should have knowledge of the customer needs in the purpose of sailing strategy or upgrade policy. The needs are also directly connected to the user satisfaction. However, the users have respective points of view in the needs as well as they may not identify the requirements to improve the solution. SERVQUAL can be an appropriate method to define and measure the customer satisfaction for the information technology solutions. As a case study of the customer satisfaction, the modified SERVQUAL items and scoring method are applied to a cyber-infrastructure system named CyberL ab in Korea. The measurement results of user satisfaction for CyberL ab are provided to confirm that our proposed method performs as we intended. From the results, we can score the satisfaction level of users and identify their needs in the various aspects. The total user satisfaction level for CyberL ab is scored by 88.3.展开更多
In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple seco...In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple secondary users.With the cooperation of Primary Base Station(PBS)and Secondary Base Station(SBS),a signal processing procedure is designed to guarantee the priority of the primary transmission.As a reward for offering help to the PBS,the SBS is granted communication opportunity.The transmission difference of various spatial channels is exploited in Secondary User(SU)scheduling.With the proposed scheme,interferencefree concurrent transmission of both PBS and SBS is implemented.Spatial channel resources can be effectively utilised compared with a traditional Interference Alignment(IA)based strategy.Simulation results show that the achievable data for primary transmission is enhanced by cooperative signal processing at the SBS.With respect to the SBS,its data rate grows with an increasing number of SUs by exploiting the multiuser diversity gain.展开更多
Cardiac amyloidoses (CA), a disease caused by the pre- cipitation of amyloid proteins in myocardial extracellular matrix, is difficult to diagnose due to its lack of specific clinical manifestations, and can be easi...Cardiac amyloidoses (CA), a disease caused by the pre- cipitation of amyloid proteins in myocardial extracellular matrix, is difficult to diagnose due to its lack of specific clinical manifestations, and can be easily misdiagnosed.[1] However, due to the recent improved awareness and wide use of biopsy, most patients are now correctly diagnosed prior to death. This report concerns a 59-year-old male who presented with symptoms of double eyelid swelling and chest tightness without obvious causes.展开更多
This study examined the effect of farmer business, technical training and input provision through a government intervention programme on productivity and crop incomes among Farmer Based Organizations (FBO) in Ghana....This study examined the effect of farmer business, technical training and input provision through a government intervention programme on productivity and crop incomes among Farmer Based Organizations (FBO) in Ghana. Farm level data were collected from 2,900 farmers over 11,000 farm plots. The difference-in-difference estimator is employed to test the impact of this intervention on crop yields and incomes. Farmers were randomly put into two distinct groups: the treatment (early training) and control (late training). After the collection of baseline data, the treatment group received crop husbandry training and a starter pack which included inputs and cash both worth about US$230. The control group received the intervention after a year. The main findings of this study are that the intervention does not have any significant impact on crop yields and crop incomes. However the authors do find some evidences that as a result of the intervention, the value of chemicals used by farmers decreased by about GH^25 The study concludes by noting that although some changes do occur over the period, and it is not possible to attribute these changes to the MiDA training programme for all the indicators of interest except chemical costs.展开更多
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network...The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.展开更多
Software Defined Networking(SDN) provides a flexible and convenient way to support fine-grained traffic-engineering(TE). Besides, SDN also provides better Quality of Experience(QoE) for customers. However, the policy ...Software Defined Networking(SDN) provides a flexible and convenient way to support fine-grained traffic-engineering(TE). Besides, SDN also provides better Quality of Experience(QoE) for customers. However, the policy of the evolution from legacy networks to the SDNs overemphasizes the controllability of the network or TE while ignoring the customers' benefit. Standing in the customers' position, we propose an optimization scheme, named as Optimal Migration Schedule based on Customers' Benefit(OMSB), to produce an optimized migration schedule and maximize the benefit of customers. Not only the quality and quantity of paths availed by migration, but also the number of flows from the customers that can use these multi-paths are taken into consideration for the scheduling. We compare the OMSB with other six migration schemes in terms of the benefit of customers. Our results suggest that the sequence of the migration plays a vital role for customers, especially in the early stages of the network migration to the SDN.展开更多
文摘According to Kripke, traditional approaches to presupposition and anaphora do not work in some compound sentences because traditionally, they have been thought to assign presuppositions to each clause in isolation. I agree with this criticism, but also think that context is required in order to determine the presupposition included in a complex sentence. To show the context role in fixing the utterance truth-conditions in those cases, this paper introduces the Kripkean anaphoric account on presuppositions (section 2), and then criticizes this approach because it is very restrictive (section 3). The paper concludes that to solve those difficulties, one should appeal to a two-dimensional framework, including a new parameter that focuses on the sentence according to the concrete features of the context: the speaker's point of view (section 4).
基金supported by the NSFC(61173141,U1536206,61232016, U1405254,61373133,61502242,61572258)BK20150925+3 种基金Fund of Jiangsu Engineering Center of Network Monitoring(KJR1402)Fund of MOE Internet Innovation Platform(KJRP1403)CICAEETthe PAPD fund
文摘Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.
基金supported by the National Research Foundation in Korea (NRF) through contract N-12-NM-IR19
文摘There are numerous information technology solutions including hardware and software. A company that provides the solution should have knowledge of the customer needs in the purpose of sailing strategy or upgrade policy. The needs are also directly connected to the user satisfaction. However, the users have respective points of view in the needs as well as they may not identify the requirements to improve the solution. SERVQUAL can be an appropriate method to define and measure the customer satisfaction for the information technology solutions. As a case study of the customer satisfaction, the modified SERVQUAL items and scoring method are applied to a cyber-infrastructure system named CyberL ab in Korea. The measurement results of user satisfaction for CyberL ab are provided to confirm that our proposed method performs as we intended. From the results, we can score the satisfaction level of users and identify their needs in the various aspects. The total user satisfaction level for CyberL ab is scored by 88.3.
基金supported by the National Natural Science Foundation of China under Grants No. 61102057,No. 61231008the National Key Basic Research Program of China (973 Program) under Grant No. 2009CB320404+4 种基金the National Science and Technology Major Project under Grant No. 2012ZX-03003005-005the 111 Project under Grant No.B08038the Program for Changjiang Scholars and Innovative Research Team in University under Grant No. IRT0852the ISN Project under Grant No. ISN1103005the Fundamental Research Funds for the Central Universities under Grant No. K5051301014
文摘In this paper,an Interference Alignment and Cancellation(IAC)based transmission and scheduling scheme is proposed for an infrastructured Cognitive Radio(CR)Multiple-Input Multiple-Output(MIMO)system with multiple secondary users.With the cooperation of Primary Base Station(PBS)and Secondary Base Station(SBS),a signal processing procedure is designed to guarantee the priority of the primary transmission.As a reward for offering help to the PBS,the SBS is granted communication opportunity.The transmission difference of various spatial channels is exploited in Secondary User(SU)scheduling.With the proposed scheme,interferencefree concurrent transmission of both PBS and SBS is implemented.Spatial channel resources can be effectively utilised compared with a traditional Interference Alignment(IA)based strategy.Simulation results show that the achievable data for primary transmission is enhanced by cooperative signal processing at the SBS.With respect to the SBS,its data rate grows with an increasing number of SUs by exploiting the multiuser diversity gain.
文摘Cardiac amyloidoses (CA), a disease caused by the pre- cipitation of amyloid proteins in myocardial extracellular matrix, is difficult to diagnose due to its lack of specific clinical manifestations, and can be easily misdiagnosed.[1] However, due to the recent improved awareness and wide use of biopsy, most patients are now correctly diagnosed prior to death. This report concerns a 59-year-old male who presented with symptoms of double eyelid swelling and chest tightness without obvious causes.
文摘This study examined the effect of farmer business, technical training and input provision through a government intervention programme on productivity and crop incomes among Farmer Based Organizations (FBO) in Ghana. Farm level data were collected from 2,900 farmers over 11,000 farm plots. The difference-in-difference estimator is employed to test the impact of this intervention on crop yields and incomes. Farmers were randomly put into two distinct groups: the treatment (early training) and control (late training). After the collection of baseline data, the treatment group received crop husbandry training and a starter pack which included inputs and cash both worth about US$230. The control group received the intervention after a year. The main findings of this study are that the intervention does not have any significant impact on crop yields and crop incomes. However the authors do find some evidences that as a result of the intervention, the value of chemicals used by farmers decreased by about GH^25 The study concludes by noting that although some changes do occur over the period, and it is not possible to attribute these changes to the MiDA training programme for all the indicators of interest except chemical costs.
基金ACKNOWLEDGMENT This work was supported by the National Basic Research Program of China (973 Project) (NO.2007CB311100), the National Science Foundation for Young Scholars of China (Grant No.61001091), Beijing Nature Science Foundation(No. 4122012), "next-generation broadband wireless mobile communication network" National Science and Technology major Special issue funding(No. 2012ZX03002003), Funding Program for Academic Human Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of China and the key technology research and validation issue for the emergency treatment telemedicine public service platform which integrates the military and civilian and bases on the broadband wireless networks(No.2013ZX03006001-005), the issue belongs to Major national science and technology projects.
文摘The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.
基金supported by Joint Funds of National Natural Science Foundation of China and Xinjiang under code U1603261the Research Fund of Ministry of Education-China Mobile under Grant No. MCM20160304the Fundamental Research Funds for the Central Universities
文摘Software Defined Networking(SDN) provides a flexible and convenient way to support fine-grained traffic-engineering(TE). Besides, SDN also provides better Quality of Experience(QoE) for customers. However, the policy of the evolution from legacy networks to the SDNs overemphasizes the controllability of the network or TE while ignoring the customers' benefit. Standing in the customers' position, we propose an optimization scheme, named as Optimal Migration Schedule based on Customers' Benefit(OMSB), to produce an optimized migration schedule and maximize the benefit of customers. Not only the quality and quantity of paths availed by migration, but also the number of flows from the customers that can use these multi-paths are taken into consideration for the scheduling. We compare the OMSB with other six migration schemes in terms of the benefit of customers. Our results suggest that the sequence of the migration plays a vital role for customers, especially in the early stages of the network migration to the SDN.