Now the world has entered into an era of cross-cultural communication. Cultures influence and infiltrate one another. Willing or not, people must first encounter culture shock when they migrate from a familiar cultura...Now the world has entered into an era of cross-cultural communication. Cultures influence and infiltrate one another. Willing or not, people must first encounter culture shock when they migrate from a familiar cultural background to a strange one. This thesis analyzes what causes culture shock and puts forward some suggestions to deal with it. Those who are about to go into a new culture environment may have some mental preparation.展开更多
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process...A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.展开更多
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat...A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks.展开更多
Culture shock is unavoidable for foreign teachers in China. Using qualitative method, this paper reports a case study of culture shock--a foreign teacher's teaching experience in a Chinese university located in an ar...Culture shock is unavoidable for foreign teachers in China. Using qualitative method, this paper reports a case study of culture shock--a foreign teacher's teaching experience in a Chinese university located in an area with a unique local population. The city involved in this study is Meizhou, located in Guangdong Province, which is considered "the capital of Hakka". The study found that indirect communication is a big shock for foreign teachers who teach in this area. The paper explores the reasons from the perspectives of Hakka culture and points out that culture shock can be an important aspect of foreign teachers' professional development, cultural learning and personal growth. Finally, the study provides implications for language teaching and learning in a similar area, such as Meizhou.展开更多
Solid pseudopapillary neoplasm(SPN) is a rare indolent pancreatic neoplasm that occurs mostly in females. Although the malignancy potential is quite limited for SPN, these tumors can sometimes be aggressive and lead t...Solid pseudopapillary neoplasm(SPN) is a rare indolent pancreatic neoplasm that occurs mostly in females. Although the malignancy potential is quite limited for SPN, these tumors can sometimes be aggressive and lead to inferior prognosis for male patients. In this case report, we present a special case of a male patient with SPN who experienced an aggressive tumor expansion after two surgical resections. For further treatment, we decided to administer chemotherapy with apatinib and S-1, and subsequent CT/MRI tumor monitoring indicated satisfactory control of tumor expansion. The effectiveness of apatinib plus the S-1 regimen should be tested for more patients with SPN in the future.展开更多
Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is propo...Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is proposed, where a simple post-processing by compressing is employed. A new adaptive image encryption scheme with the substitution-diffusion architecture is designed using the new pseu- do-random bit generator. In the scheme, the session key for the pseudo-random bit generator is dependent on the content of the image which ensures that the scheme can effectively resist knownplaintext and chosen-plaintext attacks. Theoretical analysis and computer simulation indicate that the proposed algorithm is efficient and highly secure.展开更多
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are ...In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes.展开更多
APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an ...APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%.展开更多
The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of ...The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of these expectations as predictors of pro-social and anti-social behaviour has been analysed. The research is based on the assumption that every culture develops specific benchmarks in reference to which people judge various social phenomena. Creation of an individual conception of oneself and making a plan for one's life is based, to some extent, on social values which constitute the crucial element of every culture. The hypothesis to be verified in this study was the presence of a significant link between the occurrence of anti-social and pro-social behaviour and the adopted axiological assumptions concerning students and their behaviour. The subjects of the study were students and teachers from 18 schools representing three types of culture and three educational levels (primary, lower secondary, and upper secondary). The total number of 1,212 students were observed (Goldsmith's Observational Questionnaire), and 36 teachers were interviewed. The results indicate a link between the adopted school culture and teachers' functioning, and open perspectives of further research on the connection between the values in school curricula and the occurrence of behaviour violating social norms and bounds.展开更多
Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and...Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and of two of her male peers and the children's father altogether exploring their obsession towards her and, moreover, traces the evaluation and devaluation of women to the presentation of TV exploring its influence on his heroines, namely Mrs. Tucker and the babysitter serving as victims of the patriarchal society. Through a close engagement with the sexual objectification theory, this paper analyzes in detail men's aggressive oppressions upon women as well as women's compromise and rebellion towards the sexual violence, and investigates that the awakening of female independent consciousness is a key factor in effectively helping women achieve the gender equality between sexes.展开更多
We prioritize interventions in the roof structure in order to prevent subsequent deterioration of the monument. This presentation refers to interventions in two Spanish National Monuments: the Collegiate Church of Ro...We prioritize interventions in the roof structure in order to prevent subsequent deterioration of the monument. This presentation refers to interventions in two Spanish National Monuments: the Collegiate Church of Roa de Duero and San Esteban's church of Los Balbases. The Collegiate Church was built during the 16th century. It is considered the jewel of the villa. It is a "hallenkirche" model with three big naves of the same height covered by beautiful starry vaults. The intervention consisted of restoring the wooden roof structure, preserving the original 16th centary structure, by replacing the damaged elements. It was restored according to archaeological criteria. San Esteban's church is a 13 century Gothic style church with a Latin cross plan. It has three naves with a transept of great slenderness. It preserves Romanesque remains. Opposite to the previous intervention we decided to rebuild the roof because the former roof was totally distorted due to bad executed works during the past Century. In this way we regain the original shape of the church. These interventions aim to improve constructive and structural conditions as well as retrieve the image of both monuments. We have studied the visual impact of interventions through virtual recreations. The intervention criteria are very different, restoration versus structttral reconstruction.展开更多
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q b...Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and(n, m, q)are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is(2dm^2+ mn + m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry's encryption scheme, by which m^2 bits of plaintext are encrypted into m^2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks.展开更多
文摘Now the world has entered into an era of cross-cultural communication. Cultures influence and infiltrate one another. Willing or not, people must first encounter culture shock when they migrate from a familiar cultural background to a strange one. This thesis analyzes what causes culture shock and puts forward some suggestions to deal with it. Those who are about to go into a new culture environment may have some mental preparation.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China under Grants No. 61073187 and No. 61161006 the Hunan Provincial Natural Science Foundation of China under Grant No. 10JJ6093 and the Hunan Provincial Science and Technology Program under Ccant No. 2010GK2003.
文摘A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.
文摘A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks.
文摘Culture shock is unavoidable for foreign teachers in China. Using qualitative method, this paper reports a case study of culture shock--a foreign teacher's teaching experience in a Chinese university located in an area with a unique local population. The city involved in this study is Meizhou, located in Guangdong Province, which is considered "the capital of Hakka". The study found that indirect communication is a big shock for foreign teachers who teach in this area. The paper explores the reasons from the perspectives of Hakka culture and points out that culture shock can be an important aspect of foreign teachers' professional development, cultural learning and personal growth. Finally, the study provides implications for language teaching and learning in a similar area, such as Meizhou.
文摘Solid pseudopapillary neoplasm(SPN) is a rare indolent pancreatic neoplasm that occurs mostly in females. Although the malignancy potential is quite limited for SPN, these tumors can sometimes be aggressive and lead to inferior prognosis for male patients. In this case report, we present a special case of a male patient with SPN who experienced an aggressive tumor expansion after two surgical resections. For further treatment, we decided to administer chemotherapy with apatinib and S-1, and subsequent CT/MRI tumor monitoring indicated satisfactory control of tumor expansion. The effectiveness of apatinib plus the S-1 regimen should be tested for more patients with SPN in the future.
基金Supported by the Naitonal Natural Science Foundation of China(No.61070246)
文摘Most of the existing image encryption schemes with the substitutlon-chltuslon structure are not secure and efficient. In this letter, a chaos-based pseudo-random bit generator with good statistical properties is proposed, where a simple post-processing by compressing is employed. A new adaptive image encryption scheme with the substitution-diffusion architecture is designed using the new pseu- do-random bit generator. In the scheme, the session key for the pseudo-random bit generator is dependent on the content of the image which ensures that the scheme can effectively resist knownplaintext and chosen-plaintext attacks. Theoretical analysis and computer simulation indicate that the proposed algorithm is efficient and highly secure.
文摘In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes.
基金partially supported by the NSFC-General Technology Basic Research Joint Fund (U1536204)the National Key Technologies R&D Program (2014BAH41B00)+3 种基金the National Nature Science Foundation of China (61672394 61373168 61373169)the National High-tech R&D Program of China (863 Program) (2015AA016004)
文摘APT attacks are prolonged and have multiple stages, and they usually utilize zero-day or one-day exploits to be penetrating and stealthy. Among all kinds of security tech- niques, provenance tracing is regarded as an important approach to attack investigation, as it discloses the root cause, the attacking path, and the results of attacks. However, existing techniques either suffer from the limitation of only focusing on the log type, or are high- ly susceptible to attacks, which hinder their applications in investigating APT attacks. We present CAPT, a context-aware provenance tracing system that leverages the advantages of virtualization technologies to transparently collect system events and network events out of the target machine, and processes them in the specific host which introduces no space cost to the target. CAPT utilizes the contexts of collected events to bridge the gap between them, and provides a panoramic view to the attack investigation. Our evaluation results show that CAPT achieves the efi'ective prov- enance tracing to the attack cases, and it only produces 0.21 MB overhead in 8 hours. With our newly-developed technology, we keep the run-time overhead averages less than 4%.
文摘The aim of this article is to analyse aggressive behaviour of pupils during school breaks. The main emphasis has been put on the importance of teachers' expectations concerning behaviour violating norms. The role of these expectations as predictors of pro-social and anti-social behaviour has been analysed. The research is based on the assumption that every culture develops specific benchmarks in reference to which people judge various social phenomena. Creation of an individual conception of oneself and making a plan for one's life is based, to some extent, on social values which constitute the crucial element of every culture. The hypothesis to be verified in this study was the presence of a significant link between the occurrence of anti-social and pro-social behaviour and the adopted axiological assumptions concerning students and their behaviour. The subjects of the study were students and teachers from 18 schools representing three types of culture and three educational levels (primary, lower secondary, and upper secondary). The total number of 1,212 students were observed (Goldsmith's Observational Questionnaire), and 36 teachers were interviewed. The results indicate a link between the adopted school culture and teachers' functioning, and open perspectives of further research on the connection between the values in school curricula and the occurrence of behaviour violating social norms and bounds.
文摘Sexual violence, a prevalent problem in the spousal relationship, is closely related to the issue of female consciousness. In The Babysitter, Coover (1989) tells of a teenage girl babysitting two kids and a baby and of two of her male peers and the children's father altogether exploring their obsession towards her and, moreover, traces the evaluation and devaluation of women to the presentation of TV exploring its influence on his heroines, namely Mrs. Tucker and the babysitter serving as victims of the patriarchal society. Through a close engagement with the sexual objectification theory, this paper analyzes in detail men's aggressive oppressions upon women as well as women's compromise and rebellion towards the sexual violence, and investigates that the awakening of female independent consciousness is a key factor in effectively helping women achieve the gender equality between sexes.
文摘We prioritize interventions in the roof structure in order to prevent subsequent deterioration of the monument. This presentation refers to interventions in two Spanish National Monuments: the Collegiate Church of Roa de Duero and San Esteban's church of Los Balbases. The Collegiate Church was built during the 16th century. It is considered the jewel of the villa. It is a "hallenkirche" model with three big naves of the same height covered by beautiful starry vaults. The intervention consisted of restoring the wooden roof structure, preserving the original 16th centary structure, by replacing the damaged elements. It was restored according to archaeological criteria. San Esteban's church is a 13 century Gothic style church with a Latin cross plan. It has three naves with a transept of great slenderness. It preserves Romanesque remains. Opposite to the previous intervention we decided to rebuild the roof because the former roof was totally distorted due to bad executed works during the past Century. In this way we regain the original shape of the church. These interventions aim to improve constructive and structural conditions as well as retrieve the image of both monuments. We have studied the visual impact of interventions through virtual recreations. The intervention criteria are very different, restoration versus structttral reconstruction.
基金Project supported by the National Natural Science Foundation of China(Nos.61303198,61471409,61472470,and 61402112) the Natural Science Foundation of Shandong Province,China(No.ZR2013FQ031)
文摘Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and(n, m, q)are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is(2dm^2+ mn + m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry's encryption scheme, by which m^2 bits of plaintext are encrypted into m^2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks.