Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representin...Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representing 6 genera of family Tetrigidae.The collated sequences were aligned using Clustal X version 1.81 and then,the sequence variability and heredity distances based on Kimura 2-parameter model were calculated using Mega 2.1.In obtained sequences (736 bp),the average A+T content is 73.9%,ranging from 71.2% to 77.5%;the overall G+C content is 26.1%,ranging from 22.5% to 28.8%.Based on alignment of the combined sequences,185 parsimony-informative sites were revealed in 755 available base pairs.Phylogenetic trees were reconstructed using NJ,MP and ML methods with Cylindraustralia kochii as outgroup.The results indicated that the monophyletic nature of Tetrix is questioned and suggest that T.tubercarina may be given tribal rank.Our results also show that Coptltettix huanjiangensis and C.gongshanensis are the same species,i.e.Coptltettix gongshanensis Zheng,and C.huanjiangensis is the synonyms of C.gongshanensis.展开更多
Complete checklist records are essential to understand regional bird diversity.We update the checklist of the bird species of Jiangxi,China based on numerous reported documents.The updated checklist of the bird specie...Complete checklist records are essential to understand regional bird diversity.We update the checklist of the bird species of Jiangxi,China based on numerous reported documents.The updated checklist of the bird species of Jiangxi shows that there are 536 bird species in Jiangxi,which belong to 21 orders,74 families,246 genera.And 48.7% of them are Passeriformes species and 12.3% are Charadriiformes species.Fifty species are classified as threatened.Fourteen of these species are grade I nationally protected wild animals,and 72 species are grade II nationally protected wild animals.In addition,fauna analyses indicate that the Palearctic realm(47.7%) is dominant.As for distribution type,the Oriental type is dominant.Considering the fauna of resident birds,the Oriental realm is dominant.Additionally,the distribution of several species was revised in the checklist.展开更多
In order to describe pavement roughness more intuitively and effectively, a method of pavement roughness simulation, i.e., the stochastic sinusoidal wave, is introduced. The method is based on the primary idea that pa...In order to describe pavement roughness more intuitively and effectively, a method of pavement roughness simulation, i.e., the stochastic sinusoidal wave, is introduced. The method is based on the primary idea that pavement roughness is denoted as the sum of numerous sines or cosines with stochastic phases, and uses the discrete spectrum to approach the target stochastic process. It is a discrete numerical method used to simulate pavement roughness. According to a given pavement power spectral density (PSD) coefficient, under the condition that the character of displacement frequency based on the time domain model is in accordance with the given pavement surface spectrum, the pavement roughness is optimized to stochastic equivalent vibrations by computer simulation, and the curves that describe pavement roughness under each grade are obtained. The results show that the stochastic sinusoidal wave is suitable for simulation of measured pavement surface spectra based on the time domain model. The method of the stochastic sinusoidal wave is important to the research on vehicle ride comfort due to its rigorous mathematical derivation, extensive application range and intuitive simulation curve. Finally, a roughness index defined as the nominal roughness index (NRI) is introduced, and it has correlation with the PSD coefficient.展开更多
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o...To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.展开更多
This paper proposes a hierarchical word domain assignment algorithm to automatically build domain dictionaries from Machine-Readable Dictionary(MRD).The process for word domain assignment can be divided into three ste...This paper proposes a hierarchical word domain assignment algorithm to automatically build domain dictionaries from Machine-Readable Dictionary(MRD).The process for word domain assignment can be divided into three steps:1) Hierarchical structure constructing;2) Classifier training;3) Word domain assigning.Compared with the traditional methods,the hierarchical word domain assignment algorithm enhances the accuracy of word domain assignment while reducing human efforts on collecting corpus.Experiments on WordNet 2.0 show that 62.53% of the first domain labels are matched with the WordNet Domains 3.0 by using gloss-based word domain assignment,and the performance can be further improved by utilizing the hierarchical relationships among the domain sets.展开更多
Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic ...Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds.展开更多
DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the alg...DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the algorithm is inefficient when processing large scale data. The MR-CLOPE algorithm is proposed, which is an extension and improvement on CLOPE based on Map Reduce. Different from the previous parallel clustering method, a two-stage Map Reduce implementation framework is proposed. Each of the stage is implemented by one kind Map Reduce task. In the first stage, the DNS query logs are divided into multiple splits and the CLOPE algorithm is executed on each split. The second stage usually tends to iterate many times to merge the small clusters into bigger satisfactory ones. In these two stages, a novel partition process is designed to randomly spread out original sub clusters, which will be moved and merged in the map phrase of the second phase according to the defined merge criteria. In such way, the advantage of the original CLOPE algorithm is kept and its disadvantages are dealt with in the proposed framework to achieve more excellent clustering performance. The experiment results show that MR-CLOPE is not only faster but also has better clustering quality on DNS query logs compared with CLOPE.展开更多
Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Network...Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Networks(FFSNs)are usually used as proxies of phishing websites and malwares,and hide upstream servers that host actual content.In this paper,by analysing recursive DNS traffic,we develop a fast-flux domain detection method which combines both real-time detection and long-term monitoring.Experimental results demonstrate that our solution can achieve significantly higher detection accuracy values than previous flux-score based algorithms,and is light-weight in terms of resource consumption.We evaluate the performance of the proposed fast-flux detection and tracking solution during a 180-day period of deployment on our university’s DNS servers.Based on the tracking results,we successfully identify the changes in the distribution of FFSN and their roles in recent Internet attacks.展开更多
Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme bas...Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme based on Domain Name System (DNS) for PMIPv6 which can support global mobility by using DNS as a location manager. In addition, to support large numbers of mobile terminals and enhance network scalability a paging extension scheme is introduced to PMIPv6. To evaluate the proposed location management scheme, we establish an analytical model, formulate the location update cost and the paging cost, and analyze the influence of the different factors on the total signaling cost. The performance results show that our proposed scheme outperforms the basic PMIPv6 under various parameters in terms of reducing the signaling overhead and the proposed scheme reduces signaling overhead compared to the basic PMIPv6.展开更多
Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficien...Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.展开更多
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ...Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now.展开更多
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du...Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.展开更多
English gerund construction is a system composed of 3 variants, including "Gerund + Φ", "Gerund + of + NP", and "Gerund + NP". The noun and verb attributes of the 3 variants are recursiv...English gerund construction is a system composed of 3 variants, including "Gerund + Φ", "Gerund + of + NP", and "Gerund + NP". The noun and verb attributes of the 3 variants are recursive, and in theory their frequencies vary regularly in different styles. An abstract is placed before the beginning of an academic papers, which has the basic characteristics of conciseness and generalization, and has special requirements for the use of gerunds. The purpose of this study was to empirically explore the system of gerund construction in abstracts of natural science and social science papers, and to specifically explore the inherent characteristics of noun and verb properties of the 3 variants. For this purpose, two corpora were constructed, one is about abstracts of natural science papers, and the other is about abstracts of social science papers. Finally, the results of chi-square test showed that there was no significant difference in the frequencies of the 3 variants in the abstracts of natural science and social science papers, and the two corpora can be studied as a whole. In the combined corpus, there were significant differences in the frequencies of the 3 gerund variants. The frequencies of these 3 variants and their gerund properties showed a recursive change.展开更多
Nomenclatures for lunar features always accompany the progresses of human lunar exploration,which has an important dual meaning in culture and science. The naming of lunar features not only can commemorate the outstan...Nomenclatures for lunar features always accompany the progresses of human lunar exploration,which has an important dual meaning in culture and science. The naming of lunar features not only can commemorate the outstanding contributions of academics,masters in various fields, and popularize the traditional cultures of ethnic groups all over the world, but also have a critical function of providing accurate indicative information on features with special morphology, origin, nature and scientific value. However, nomenclature for features at the Chang'e-3 landing site, which has a more arbitrary form without many constrains posed by a uniformed system, is unlike the features for other morphological units.This paper originated from the actual needs for the description of scientific exploration activities, interpretation of scientific research and dissemination of scientific results. Some prominent morphological units with great scientific importance and identification purpose were chosen from the images taken by the terrain camera, panorama cameras and landing camera onboard the Chang'e lander and Yutu rover. A nomenclature system was established under the three enclosures, four quadrants and twenty-eight lunar lodges' system of the Chinese ancient sky division method. Finally, a standard feature names set waspublished after some necessary approval procedures by the International Astronomical Union.展开更多
Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' res...Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system.展开更多
With the development of rural tourism, the cooperation of villages has become very important.Identifying the status and importance of each village can contribute to better understanding of the integrated rural tourism...With the development of rural tourism, the cooperation of villages has become very important.Identifying the status and importance of each village can contribute to better understanding of the integrated rural tourism management and sustainable rural tourism development. The research focused on 46 villages of Yesanpo scenic spot in China(39°35'-40°north latitude, and 115°16'- 115°30' east longitude). Integrating the method of Geographical Information System(GIS) and social network analysis, the spatial centrality and interrelation of each village in Yesanpo tourism destination were evaluated. The results showed that Xinggezhuang is the spatial core village of the whole 46 villages in Yesanpo tourism areas; Xinggezhuang, Nanzhuang, Zhenchang, Daze, Liujiahe and Zishikou are sub-core villages of the six tourism spots. Magezhuang, Ximagezhuang, Eyu, Zishikou, Daze, Shangzhuang, Zhenchang and Xiazhuang should be support of the core villages, which provide subsidiary services and connects with other nodes. The results also indicated that the study of the village centrality will contribute to build an integrated hierarchy structure and to provide sufficient basis for further development of rural tourism destination.展开更多
To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DN...To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DNS redirection has brought a significant advantage to Akamai' s CDN.However,the reliance on DNS also poses a fundamental threat to Akamai' s content distribution model.In particular,systematic evaluation and quantification illustrates the impact of recent emerging public DNS resolving services on Akamai' s CDN,including the degradation of corresponding user perceived performance and the benefit damnification of collaborating internet services providers(ISPs) that host Akamai's edge servers.The measurement demonstrates that a considerable penetration of public DNS resolving services(e.g.,OpenDNS and GoogleDNS) effectively corrupts the Akamai' s serving model,namely the large-scale server distribution and quick DNS redirection.展开更多
文摘Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representing 6 genera of family Tetrigidae.The collated sequences were aligned using Clustal X version 1.81 and then,the sequence variability and heredity distances based on Kimura 2-parameter model were calculated using Mega 2.1.In obtained sequences (736 bp),the average A+T content is 73.9%,ranging from 71.2% to 77.5%;the overall G+C content is 26.1%,ranging from 22.5% to 28.8%.Based on alignment of the combined sequences,185 parsimony-informative sites were revealed in 755 available base pairs.Phylogenetic trees were reconstructed using NJ,MP and ML methods with Cylindraustralia kochii as outgroup.The results indicated that the monophyletic nature of Tetrix is questioned and suggest that T.tubercarina may be given tribal rank.Our results also show that Coptltettix huanjiangensis and C.gongshanensis are the same species,i.e.Coptltettix gongshanensis Zheng,and C.huanjiangensis is the synonyms of C.gongshanensis.
文摘Complete checklist records are essential to understand regional bird diversity.We update the checklist of the bird species of Jiangxi,China based on numerous reported documents.The updated checklist of the bird species of Jiangxi shows that there are 536 bird species in Jiangxi,which belong to 21 orders,74 families,246 genera.And 48.7% of them are Passeriformes species and 12.3% are Charadriiformes species.Fifty species are classified as threatened.Fourteen of these species are grade I nationally protected wild animals,and 72 species are grade II nationally protected wild animals.In addition,fauna analyses indicate that the Palearctic realm(47.7%) is dominant.As for distribution type,the Oriental type is dominant.Considering the fauna of resident birds,the Oriental realm is dominant.Additionally,the distribution of several species was revised in the checklist.
文摘In order to describe pavement roughness more intuitively and effectively, a method of pavement roughness simulation, i.e., the stochastic sinusoidal wave, is introduced. The method is based on the primary idea that pavement roughness is denoted as the sum of numerous sines or cosines with stochastic phases, and uses the discrete spectrum to approach the target stochastic process. It is a discrete numerical method used to simulate pavement roughness. According to a given pavement power spectral density (PSD) coefficient, under the condition that the character of displacement frequency based on the time domain model is in accordance with the given pavement surface spectrum, the pavement roughness is optimized to stochastic equivalent vibrations by computer simulation, and the curves that describe pavement roughness under each grade are obtained. The results show that the stochastic sinusoidal wave is suitable for simulation of measured pavement surface spectra based on the time domain model. The method of the stochastic sinusoidal wave is important to the research on vehicle ride comfort due to its rigorous mathematical derivation, extensive application range and intuitive simulation curve. Finally, a roughness index defined as the nominal roughness index (NRI) is introduced, and it has correlation with the PSD coefficient.
基金The National Natural Science Foundation of China(No.60473028)the Natural Science Foundation of Zhengzhou University of Light Industry(No.2006XXJ18)the Doctor Foundation of Zhengzhou University of Light Industry(No.20080014)
文摘To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.
基金supported by the BIT Technology Innovation Program "cloud computing-oriented intelligent processing theory and method of massive language information"underGrant No.3070012231102the BIT Fundamental Research Projects under Grant No.3070012210917
文摘This paper proposes a hierarchical word domain assignment algorithm to automatically build domain dictionaries from Machine-Readable Dictionary(MRD).The process for word domain assignment can be divided into three steps:1) Hierarchical structure constructing;2) Classifier training;3) Word domain assigning.Compared with the traditional methods,the hierarchical word domain assignment algorithm enhances the accuracy of word domain assignment while reducing human efforts on collecting corpus.Experiments on WordNet 2.0 show that 62.53% of the first domain labels are matched with the WordNet Domains 3.0 by using gloss-based word domain assignment,and the performance can be further improved by utilizing the hierarchical relationships among the domain sets.
文摘Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds.
基金Project(61103046) supported in part by the National Natural Science Foundation of ChinaProject(B201312) supported by DHU Distinguished Young Professor Program,China+1 种基金Project(LY14F020007) supported by Zhejiang Provincial Natural Science Funds of ChinaProject(2014A610072) supported by the Natural Science Foundation of Ningbo City,China
文摘DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the algorithm is inefficient when processing large scale data. The MR-CLOPE algorithm is proposed, which is an extension and improvement on CLOPE based on Map Reduce. Different from the previous parallel clustering method, a two-stage Map Reduce implementation framework is proposed. Each of the stage is implemented by one kind Map Reduce task. In the first stage, the DNS query logs are divided into multiple splits and the CLOPE algorithm is executed on each split. The second stage usually tends to iterate many times to merge the small clusters into bigger satisfactory ones. In these two stages, a novel partition process is designed to randomly spread out original sub clusters, which will be moved and merged in the map phrase of the second phase according to the defined merge criteria. In such way, the advantage of the original CLOPE algorithm is kept and its disadvantages are dealt with in the proposed framework to achieve more excellent clustering performance. The experiment results show that MR-CLOPE is not only faster but also has better clustering quality on DNS query logs compared with CLOPE.
基金supported by the National Basic Research Program of China(973 Program)under Grant No.2013CB329603Huawei Innovation Research Program+1 种基金the Opening Project of Key Laboratory of Information Network Security of Ministry of Public Security under Grant No.C11608the National Natural Science Foundation of China under Grant No.61271220
文摘Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Networks(FFSNs)are usually used as proxies of phishing websites and malwares,and hide upstream servers that host actual content.In this paper,by analysing recursive DNS traffic,we develop a fast-flux domain detection method which combines both real-time detection and long-term monitoring.Experimental results demonstrate that our solution can achieve significantly higher detection accuracy values than previous flux-score based algorithms,and is light-weight in terms of resource consumption.We evaluate the performance of the proposed fast-flux detection and tracking solution during a 180-day period of deployment on our university’s DNS servers.Based on the tracking results,we successfully identify the changes in the distribution of FFSN and their roles in recent Internet attacks.
基金supported in part by the National Basic Research Program of China ("973 program") under contract No. 2007CB307101 and No. 2007CB307106in part by the Program of Introducing Talents of Discipline to Universities ("111 Project") under contract No. B08002+1 种基金in part by the Cultivation Fund of the Key Scientifi c and Technical Innovation Project, Ministry of Education of China under contract No. 706005in part by the Ph.D. Student Scientifi c Research Innovation Fund of Beijing Jiaotong University (No.141057522)
文摘Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme based on Domain Name System (DNS) for PMIPv6 which can support global mobility by using DNS as a location manager. In addition, to support large numbers of mobile terminals and enhance network scalability a paging extension scheme is introduced to PMIPv6. To evaluate the proposed location management scheme, we establish an analytical model, formulate the location update cost and the paging cost, and analyze the influence of the different factors on the total signaling cost. The performance results show that our proposed scheme outperforms the basic PMIPv6 under various parameters in terms of reducing the signaling overhead and the proposed scheme reduces signaling overhead compared to the basic PMIPv6.
文摘Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.
基金Supported by the National Natural Science Foundation of China (No. 60970111, 61133014, 60903189, 60903020).
文摘Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now.
基金This work was supported by China Nature Science Fund .Serial No.60073059and60273078
文摘Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.
基金supported by the Humanities and Social Sciences Research Planning Fund of Ministry of Education for Western and Frontier Areas(14XJA740001)。
文摘English gerund construction is a system composed of 3 variants, including "Gerund + Φ", "Gerund + of + NP", and "Gerund + NP". The noun and verb attributes of the 3 variants are recursive, and in theory their frequencies vary regularly in different styles. An abstract is placed before the beginning of an academic papers, which has the basic characteristics of conciseness and generalization, and has special requirements for the use of gerunds. The purpose of this study was to empirically explore the system of gerund construction in abstracts of natural science and social science papers, and to specifically explore the inherent characteristics of noun and verb properties of the 3 variants. For this purpose, two corpora were constructed, one is about abstracts of natural science papers, and the other is about abstracts of social science papers. Finally, the results of chi-square test showed that there was no significant difference in the frequencies of the 3 variants in the abstracts of natural science and social science papers, and the two corpora can be studied as a whole. In the combined corpus, there were significant differences in the frequencies of the 3 gerund variants. The frequencies of these 3 variants and their gerund properties showed a recursive change.
基金provided by National Major Projects-GRAS Construction of China Lunar Exploration Project
文摘Nomenclatures for lunar features always accompany the progresses of human lunar exploration,which has an important dual meaning in culture and science. The naming of lunar features not only can commemorate the outstanding contributions of academics,masters in various fields, and popularize the traditional cultures of ethnic groups all over the world, but also have a critical function of providing accurate indicative information on features with special morphology, origin, nature and scientific value. However, nomenclature for features at the Chang'e-3 landing site, which has a more arbitrary form without many constrains posed by a uniformed system, is unlike the features for other morphological units.This paper originated from the actual needs for the description of scientific exploration activities, interpretation of scientific research and dissemination of scientific results. Some prominent morphological units with great scientific importance and identification purpose were chosen from the images taken by the terrain camera, panorama cameras and landing camera onboard the Chang'e lander and Yutu rover. A nomenclature system was established under the three enclosures, four quadrants and twenty-eight lunar lodges' system of the Chinese ancient sky division method. Finally, a standard feature names set waspublished after some necessary approval procedures by the International Astronomical Union.
文摘Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system.
基金supported by the Humanities and Social Science Research Foundation Project of Tianjin Higher Colleges and Universities (No.20142112)
文摘With the development of rural tourism, the cooperation of villages has become very important.Identifying the status and importance of each village can contribute to better understanding of the integrated rural tourism management and sustainable rural tourism development. The research focused on 46 villages of Yesanpo scenic spot in China(39°35'-40°north latitude, and 115°16'- 115°30' east longitude). Integrating the method of Geographical Information System(GIS) and social network analysis, the spatial centrality and interrelation of each village in Yesanpo tourism destination were evaluated. The results showed that Xinggezhuang is the spatial core village of the whole 46 villages in Yesanpo tourism areas; Xinggezhuang, Nanzhuang, Zhenchang, Daze, Liujiahe and Zishikou are sub-core villages of the six tourism spots. Magezhuang, Ximagezhuang, Eyu, Zishikou, Daze, Shangzhuang, Zhenchang and Xiazhuang should be support of the core villages, which provide subsidiary services and connects with other nodes. The results also indicated that the study of the village centrality will contribute to build an integrated hierarchy structure and to provide sufficient basis for further development of rural tourism destination.
基金Supported by the National Basic Research Program of China(No.2013CB329103)the National Natural Science Foundation of China(No.61133016,61300191)+1 种基金the National High Technology Joint Research Program of China(No.2011AA010706)the Program of SichuanProvince Applied and Basic Research(No.2013JY0116)
文摘To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DNS redirection has brought a significant advantage to Akamai' s CDN.However,the reliance on DNS also poses a fundamental threat to Akamai' s content distribution model.In particular,systematic evaluation and quantification illustrates the impact of recent emerging public DNS resolving services on Akamai' s CDN,including the degradation of corresponding user perceived performance and the benefit damnification of collaborating internet services providers(ISPs) that host Akamai's edge servers.The measurement demonstrates that a considerable penetration of public DNS resolving services(e.g.,OpenDNS and GoogleDNS) effectively corrupts the Akamai' s serving model,namely the large-scale server distribution and quick DNS redirection.