In this paper we essentially determine all covers {a s (mod n s)} k s=1 of Z with k<10 , actually our algorithm is valid for any positive integer k . As an application we provide a somewhat ge...In this paper we essentially determine all covers {a s (mod n s)} k s=1 of Z with k<10 , actually our algorithm is valid for any positive integer k . As an application we provide a somewhat general theorem on (infinite) arithmetic progressions (e.g. 1330319+346729110 Z) consisting of odd integers no term of which can be expressed as the sum of a power of two and an odd prime, on the other hand we obtain an interesting result on integers of the form 2 n+cp where c is a constant and p is a prime.展开更多
This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment ...This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment is apt to result in notable service isomorphs. And moreover, as the environment cannot assure the stability of network communication and device services, the situation gets worse. Therefore, it becomes urgent to simplify user operations and let them take full and highly efficient advantage of the environments. Super-Service-Odented Architecture (SSOA) is an Serrice-Otiented Architecture (SOA)-based architecture for service management and organization in peryasive environments. With combining one kind of isomorphic services into a super service, SSOA provides better scalability and quick, convenient service invocations. Also, the complexity and instability of services, and network types are transparent, and system performance is highly promoted under the architecture.展开更多
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft...Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally.展开更多
The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise eco...The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise economic business more convenient and efficient. Here came the computer controlled environment audit new risks, of course, the computer technology applied to the audit work to improve the audit efficiency by a lot, but also increased the complex information technology environment audit risk. Starting from the concept of computer audit risk, this paper analyzes and discusses the new risks and causes of audit under the computer condition, and puts forward some constructive risk control measures.展开更多
Green accounting and their impact for reducing cost as a profession is the duty to improve the internal viewpoint of any economic unit and develop information that clarify its role within their environment and their c...Green accounting and their impact for reducing cost as a profession is the duty to improve the internal viewpoint of any economic unit and develop information that clarify its role within their environment and their contribution to providing appropriate information for decision-making which leads to the optimal exploitation of resources and the preservation of the environment and averting the threat. Thus, taking into account the environmental accounts especially environmental costs would enable the accounting profession to provide more relevant information and appropriate administrative decision makers, productivity, in particular where the problem lies in the lack of such information, resulting in the adoption of sound decisions which have contributed to the deterioration of the environment rather than addressed. In total, 180 questionnaires were distributed and 155 returned. Through analysis, the study came to the most important results that there were no statistically significant differences between the arithmetic average of the possibility of measuring the environment cost of disclosure, and the study also recommends the allocation of the budget to preserve and protect the environment and the budget of social cost, the development of accounting methods in order to provide environmental information to make sound decisions to exploit these resources.展开更多
Air DTH hammer has been successfully applied in minor-caliber solid mineral exploration,water-well drilling and other drilling areas. In order to expand the applications of the technology,the authors further studied t...Air DTH hammer has been successfully applied in minor-caliber solid mineral exploration,water-well drilling and other drilling areas. In order to expand the applications of the technology,the authors further studied the principle and analyzed the mechanism of reverse circulation drilling technique with air DTH hammer to get the perfect assembles of equipments by optimizing working parameters. No parameter seemed more important than the air volume because it could maintain the working performance stability. The minimum air volume is related to the parameters such as depth and pressure,which was calculated under the actual conditions. It was solved for the air injection flow tables of the air DTH Hammer working at the different pressures. According to the data tables,operators could adjust the air volume to meet the demand on this technique,which had a realistic guiding significance. So it could build up a set of systematic and complete hi-technique.展开更多
In this paper, we conduct research on the teaching evaluation system based on the feedback tracking technology under the cloud computing environment. Teaching evaluation is an important work of teaching management dep...In this paper, we conduct research on the teaching evaluation system based on the feedback tracking technology under the cloud computing environment. Teaching evaluation is an important work of teaching management department. According to the traditional mode of work, must first into classroom, through questionnaire survey, fill out a form scale, obtain first-hand teaching evaluation data, and then input the data into the computer, after check again the data statistics and analysis which is not efficient. To optimize the procedure, we use the cloud computing to assist finalizing the general evaluation steps which is innovative and meaningful.展开更多
This paper presents a hybrid symbolic-numeric algorithm to compute ranking functions for establishing the termination of loop programs with polynomial guards and polynomial assignments.The authors first transform the ...This paper presents a hybrid symbolic-numeric algorithm to compute ranking functions for establishing the termination of loop programs with polynomial guards and polynomial assignments.The authors first transform the problem into a parameterized polynomial optimization problem,and obtain a numerical ranking function using polynomial sum-of-squares relaxation via semidefinite programming(SDP).A rational vector recovery algorithm is deployed to recover a rational polynomial from the numerical ranking function,and some symbolic computation techniques are used to certify that this polynomial is an exact ranking function of the loop programs.At last,the authors demonstrate on some polynomial loop programs from the literature that our algorithm successfully yields nonlinear ranking functions with rational coefficients.展开更多
Cloud-based quantum computing is anticipated to be the most useful and reachable form for public users to experience with the power of quantum. As initial attempts, IBM Q has launched influential cloud services on a s...Cloud-based quantum computing is anticipated to be the most useful and reachable form for public users to experience with the power of quantum. As initial attempts, IBM Q has launched influential cloud services on a superconducting quantum processor in 2016, but no other platforms has followed up yet. Here,we report our new cloud quantum computing service – NMRCloud Q(http://nmrcloudq.com/zh-hans/),where nuclear magnetic resonance, one of the pioneer platforms with mature techniques in experimental quantum computing, plays as the role of implementing computing tasks. Our service provides a comprehensive software environment preconfigured with a list of quantum information processing packages,and aims to be freely accessible to either amateurs that look forward to keeping pace with this quantum era or professionals that are interested in carrying out real quantum computing experiments in person. In our current version, four qubits are already usable with in average 99.10% single-qubit gate fidelity and 97.15% two-qubit fidelity via randomized benchmaking tests. Improved control precisions as well as a new seven-qubit processor are also in preparation and will be available later.展开更多
文摘In this paper we essentially determine all covers {a s (mod n s)} k s=1 of Z with k<10 , actually our algorithm is valid for any positive integer k . As an application we provide a somewhat general theorem on (infinite) arithmetic progressions (e.g. 1330319+346729110 Z) consisting of odd integers no term of which can be expressed as the sum of a power of two and an odd prime, on the other hand we obtain an interesting result on integers of the form 2 n+cp where c is a constant and p is a prime.
文摘This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment is apt to result in notable service isomorphs. And moreover, as the environment cannot assure the stability of network communication and device services, the situation gets worse. Therefore, it becomes urgent to simplify user operations and let them take full and highly efficient advantage of the environments. Super-Service-Odented Architecture (SSOA) is an Serrice-Otiented Architecture (SOA)-based architecture for service management and organization in peryasive environments. With combining one kind of isomorphic services into a super service, SSOA provides better scalability and quick, convenient service invocations. Also, the complexity and instability of services, and network types are transparent, and system performance is highly promoted under the architecture.
基金Projects(61202004,61272084)supported by the National Natural Science Foundation of ChinaProjects(2011M500095,2012T50514)supported by the China Postdoctoral Science Foundation+2 种基金Projects(BK2011754,BK2009426)supported by the Natural Science Foundation of Jiangsu Province,ChinaProject(12KJB520007)supported by the Natural Science Fund of Higher Education of Jiangsu Province,ChinaProject(yx002001)supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions,China
文摘Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally.
文摘The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise economic business more convenient and efficient. Here came the computer controlled environment audit new risks, of course, the computer technology applied to the audit work to improve the audit efficiency by a lot, but also increased the complex information technology environment audit risk. Starting from the concept of computer audit risk, this paper analyzes and discusses the new risks and causes of audit under the computer condition, and puts forward some constructive risk control measures.
文摘Green accounting and their impact for reducing cost as a profession is the duty to improve the internal viewpoint of any economic unit and develop information that clarify its role within their environment and their contribution to providing appropriate information for decision-making which leads to the optimal exploitation of resources and the preservation of the environment and averting the threat. Thus, taking into account the environmental accounts especially environmental costs would enable the accounting profession to provide more relevant information and appropriate administrative decision makers, productivity, in particular where the problem lies in the lack of such information, resulting in the adoption of sound decisions which have contributed to the deterioration of the environment rather than addressed. In total, 180 questionnaires were distributed and 155 returned. Through analysis, the study came to the most important results that there were no statistically significant differences between the arithmetic average of the possibility of measuring the environment cost of disclosure, and the study also recommends the allocation of the budget to preserve and protect the environment and the budget of social cost, the development of accounting methods in order to provide environmental information to make sound decisions to exploit these resources.
基金supported by the project of the feasibility study on air reverse circulation drilling system,research foundation for out standingteachers,Jilin University(No.2006220100003435)
文摘Air DTH hammer has been successfully applied in minor-caliber solid mineral exploration,water-well drilling and other drilling areas. In order to expand the applications of the technology,the authors further studied the principle and analyzed the mechanism of reverse circulation drilling technique with air DTH hammer to get the perfect assembles of equipments by optimizing working parameters. No parameter seemed more important than the air volume because it could maintain the working performance stability. The minimum air volume is related to the parameters such as depth and pressure,which was calculated under the actual conditions. It was solved for the air injection flow tables of the air DTH Hammer working at the different pressures. According to the data tables,operators could adjust the air volume to meet the demand on this technique,which had a realistic guiding significance. So it could build up a set of systematic and complete hi-technique.
文摘In this paper, we conduct research on the teaching evaluation system based on the feedback tracking technology under the cloud computing environment. Teaching evaluation is an important work of teaching management department. According to the traditional mode of work, must first into classroom, through questionnaire survey, fill out a form scale, obtain first-hand teaching evaluation data, and then input the data into the computer, after check again the data statistics and analysis which is not efficient. To optimize the procedure, we use the cloud computing to assist finalizing the general evaluation steps which is innovative and meaningful.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.10901055,61021004,91118007by NKBRPC 2011CB302802,2011CB70690by the Fundamental Research Funds for the Central Universities under Grant No.78210043
文摘This paper presents a hybrid symbolic-numeric algorithm to compute ranking functions for establishing the termination of loop programs with polynomial guards and polynomial assignments.The authors first transform the problem into a parameterized polynomial optimization problem,and obtain a numerical ranking function using polynomial sum-of-squares relaxation via semidefinite programming(SDP).A rational vector recovery algorithm is deployed to recover a rational polynomial from the numerical ranking function,and some symbolic computation techniques are used to certify that this polynomial is an exact ranking function of the loop programs.At last,the authors demonstrate on some polynomial loop programs from the literature that our algorithm successfully yields nonlinear ranking functions with rational coefficients.
基金the National Natural Science Foundation of China(11175094)National Basic Research Program of China(2015CB921002)+7 种基金supported by the National Natural Science Foundation of China(61771278)supported by the National Basic Research Program of China(2014CB921403,2016YFA0301201,2014CB848700 and 2013CB921800)National Natural Science Foundation of China(11421063,11534002,11375167 and 11605005)the National Science Fund for Distinguished Young Scholars(11425523)NSAF(U1530401)Natural Sciences and Engineering Research Council of Canada(NSERC)Canadian Institute for Advanced Research(CIFAR)Chinese Ministry of Education(20173080024)
文摘Cloud-based quantum computing is anticipated to be the most useful and reachable form for public users to experience with the power of quantum. As initial attempts, IBM Q has launched influential cloud services on a superconducting quantum processor in 2016, but no other platforms has followed up yet. Here,we report our new cloud quantum computing service – NMRCloud Q(http://nmrcloudq.com/zh-hans/),where nuclear magnetic resonance, one of the pioneer platforms with mature techniques in experimental quantum computing, plays as the role of implementing computing tasks. Our service provides a comprehensive software environment preconfigured with a list of quantum information processing packages,and aims to be freely accessible to either amateurs that look forward to keeping pace with this quantum era or professionals that are interested in carrying out real quantum computing experiments in person. In our current version, four qubits are already usable with in average 99.10% single-qubit gate fidelity and 97.15% two-qubit fidelity via randomized benchmaking tests. Improved control precisions as well as a new seven-qubit processor are also in preparation and will be available later.