According to characteristics of information communication and sevices in omnimedia era, this paper studied the plan of constructing remote plant end animal hospital, which provided remote diagnosis service by expert t...According to characteristics of information communication and sevices in omnimedia era, this paper studied the plan of constructing remote plant end animal hospital, which provided remote diagnosis service by expert team of doctors based on the co-building and sharing medical case resource bases through the reasonable management model on cloud services platform, and discussed the model for service and commerce of remote plant and animal hospital.展开更多
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key...A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation.展开更多
Ground level ozone pollution has become a significant air pollution problem in Beijing. Because of the complex way in which ozone is formed, it is difficult for policy makers to identify optimal control options on a c...Ground level ozone pollution has become a significant air pollution problem in Beijing. Because of the complex way in which ozone is formed, it is difficult for policy makers to identify optimal control options on a cost-effective basis. This paper identi-fies and assesses a range of options for addressing this problem. We apply the Ambient Least Cost Model and compare the eco-nomic costs of control options, then recommend the most effective sequence to realize pollution control at the lowest cost. The study finds that installing of Stage II gasoline vapor recovery system at Beijing's 1446 gasoline stations would be the most cost-effective option. Overall, options to reduce ozone pollution by cutting ve-hicular emissions are much more cost-effective than options to "clean up" coal-fired power plants.展开更多
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are ...In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes.展开更多
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ...This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.展开更多
The purpose of this article is to present an additional overloading assessment scheme to the current protection scheme, which can be applied in the low voltage distribution network to prevent overloading of network as...The purpose of this article is to present an additional overloading assessment scheme to the current protection scheme, which can be applied in the low voltage distribution network to prevent overloading of network assets. As higher penetration of distributed generators is envisioned among distribution networks, the network operators will have an challenging task in the future to maintain the reliability and quality of supply. The distribution networks are going to be challenged simultaneously by increasing penetration of distributed generators and by increasing loading (inter alia heat pumps, air conditioners or electric vehicles), which will change the operational perspective of the future distribution networks. Presented simulation results show that the increasing penetration of those appliances can jeopardize the functionality of current protection scheme in distribution networks. Therefore, an additional scheme for assessment of network overloading applicable at low voltage distribution networks is proposed and the application of this scheme, supported by smart metering infrastructure, is demonstrated in a case study. The proposed overloading assessment scheme should help the network operators to increase the flexibility of distribution networks, their hosting capacity, safety and reliability.展开更多
Resistive random access memory(RRAM) with crossbar structure is receiving widespread attentions due to its simple structure,high density,and feasibility of three-dimensional(3D) stack.It is an extremely promising solu...Resistive random access memory(RRAM) with crossbar structure is receiving widespread attentions due to its simple structure,high density,and feasibility of three-dimensional(3D) stack.It is an extremely promising solution for high density storage.However,a major issue of crosstalk restricts its development and application.In this paper,we will first introduce the integration methods of RRAM device and the existing crosstalk phenomenon in passive crossbar array,and then focus on the 1D1R(one diode and one resistor) structure and self-rectifying 1R(one resistor) structure which can restrain crosstalk and avoid misreading for the passive crossbar array.The test methods of crossbar array are also presented to evaluate the performances of passive crossbar array to achieve its commercial application in comparison with the active array consisting of one transistor and one RRAM cell(1T1R) structure.Finally,the future research direction of rectifying-based RRAM passive crossbar array is discussed.展开更多
In this paper, we consider the minimax strategy to unambiguously discriminate two pure nonorthogonal quantum states without knowing a priori probability. By exploiting the positive-operator valued measure, we derive t...In this paper, we consider the minimax strategy to unambiguously discriminate two pure nonorthogonal quantum states without knowing a priori probability. By exploiting the positive-operator valued measure, we derive the upper bound of the minimax measurement of the optimal unambiguous state discrimination. Based on the linear optical devices, we propose an experimentally feasible scheme to implement a minimax measure of a general pair of two nonorthogonal quantum states.展开更多
文摘According to characteristics of information communication and sevices in omnimedia era, this paper studied the plan of constructing remote plant end animal hospital, which provided remote diagnosis service by expert team of doctors based on the co-building and sharing medical case resource bases through the reasonable management model on cloud services platform, and discussed the model for service and commerce of remote plant and animal hospital.
文摘A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation.
基金supported by the Economyand Environment Program for Southeast Asia (EEPSEA)Beijing Science and Technology Commission (GrantNo.D09040903670905)+1 种基金Study on the Regional Air PollutionControl Strategy and PolicyShanghai Tongji Gao Tingyao Environmental Science and Technology Development Foundation
文摘Ground level ozone pollution has become a significant air pollution problem in Beijing. Because of the complex way in which ozone is formed, it is difficult for policy makers to identify optimal control options on a cost-effective basis. This paper identi-fies and assesses a range of options for addressing this problem. We apply the Ambient Least Cost Model and compare the eco-nomic costs of control options, then recommend the most effective sequence to realize pollution control at the lowest cost. The study finds that installing of Stage II gasoline vapor recovery system at Beijing's 1446 gasoline stations would be the most cost-effective option. Overall, options to reduce ozone pollution by cutting ve-hicular emissions are much more cost-effective than options to "clean up" coal-fired power plants.
文摘In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt an encrypted fie to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is caught by the forensics investigator and ordered to hand over the key for decryption. We then present a construction of secure disguisable symmetric encryption schemes.
基金supported by National Natural Science Foundation of China(No.U 1405254, 61472092)China Postdoctoral Science Foundation(No.2015M581101)National Science and Technology SupportingFoundation of China(No.2014BAH41B00)
文摘This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.
文摘The purpose of this article is to present an additional overloading assessment scheme to the current protection scheme, which can be applied in the low voltage distribution network to prevent overloading of network assets. As higher penetration of distributed generators is envisioned among distribution networks, the network operators will have an challenging task in the future to maintain the reliability and quality of supply. The distribution networks are going to be challenged simultaneously by increasing penetration of distributed generators and by increasing loading (inter alia heat pumps, air conditioners or electric vehicles), which will change the operational perspective of the future distribution networks. Presented simulation results show that the increasing penetration of those appliances can jeopardize the functionality of current protection scheme in distribution networks. Therefore, an additional scheme for assessment of network overloading applicable at low voltage distribution networks is proposed and the application of this scheme, supported by smart metering infrastructure, is demonstrated in a case study. The proposed overloading assessment scheme should help the network operators to increase the flexibility of distribution networks, their hosting capacity, safety and reliability.
基金supported by the National Basic Research Program of China ("973" Project) (Grant Nos. 2011CB309602, 2010CB934200, 2008CB925002)the National Natural Science Foundation of China (Grant Nos. 60825403, 50972160)+1 种基金the Hi-Tech Research and Development Program of China ("863" Project) (Grant No. 2009AA03Z306)the National Key Project (Grant No. 2009ZX02023-005-4)
文摘Resistive random access memory(RRAM) with crossbar structure is receiving widespread attentions due to its simple structure,high density,and feasibility of three-dimensional(3D) stack.It is an extremely promising solution for high density storage.However,a major issue of crosstalk restricts its development and application.In this paper,we will first introduce the integration methods of RRAM device and the existing crosstalk phenomenon in passive crossbar array,and then focus on the 1D1R(one diode and one resistor) structure and self-rectifying 1R(one resistor) structure which can restrain crosstalk and avoid misreading for the passive crossbar array.The test methods of crossbar array are also presented to evaluate the performances of passive crossbar array to achieve its commercial application in comparison with the active array consisting of one transistor and one RRAM cell(1T1R) structure.Finally,the future research direction of rectifying-based RRAM passive crossbar array is discussed.
基金Supported by the National Science Foundation of China under Grant Nos.11074002,61073048,and11104057the Natural Science Foundation of the Education Department of Anhui Province of China under Grant Nos.KJ2010ZD08,KJ2012A245the Doctor Research Start-Up Program of Huainan Normal University
文摘In this paper, we consider the minimax strategy to unambiguously discriminate two pure nonorthogonal quantum states without knowing a priori probability. By exploiting the positive-operator valued measure, we derive the upper bound of the minimax measurement of the optimal unambiguous state discrimination. Based on the linear optical devices, we propose an experimentally feasible scheme to implement a minimax measure of a general pair of two nonorthogonal quantum states.