Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the...Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.展开更多
A semi-reference image quality assessment metric based on similarity measurement for synthesized virtual viewpoint image (VVI) in free-viewpoint television system (FFV) is proposed in this paper. The key point of ...A semi-reference image quality assessment metric based on similarity measurement for synthesized virtual viewpoint image (VVI) in free-viewpoint television system (FFV) is proposed in this paper. The key point of the proposed metric is taking resemblant information between VVI and its neighbor view images for quality assessment to make our metric to be extended to multi-semi-reference image quality assessment easily. The proposed metric first extracts impact factors from image features, then combines an image synthesis technique and similarity functions, in which, disparity information are taken into account for registering the resemblant regions. Experiments are divided into three phases. Phase I is to verify the validation of the proposed metric by taking impaired images and original reference into account. The experimental results show the agreement between evaluation scores and bio-characteristic of human visual system. Phase II shows the accordance with Phase I by taking neighbor view as reference. The proposed metric can be taken as a full reference one to evaluate the image quality even though the original reference is absent. Phase III is then performed to evaluate the quality of WI. Evaluation scores in the experimental results are able to evaluate the quality of VVI.展开更多
As a type II or III transmembrane glycoprotein, human CD38 is ubiquitously expressed in all mammalian tissues. CD38 is a multi-functional enzyme and a member of the ADP-ribosyl cyclase family, and it catalyzes nicotin...As a type II or III transmembrane glycoprotein, human CD38 is ubiquitously expressed in all mammalian tissues. CD38 is a multi-functional enzyme and a member of the ADP-ribosyl cyclase family, and it catalyzes nicotinamide adenine dinucleotide (NAD^+) and nicotinamide adenine dinucleotide phosphate (NADP+) to two distinct Ca^2+ messengers as follows: cyclic ADP-ribose (cADPR) and nicotinic acid adenine dinucleotide phosphate (NAADP), respectively. Moreover, both cADPR and NAADP mediate mobilization of intracellular Ca^2+ targeting endoplasmic stores and the lysosomes, respectively. In this study, we combined ligand-based and structure-based virtual screening strategies to compare the inhibitor discovery efficacy based on natural substrates and the known inhibitors. The similarity queries towards SPECS database were carried out using ROCS and EON modules of OpenEye software. The hits were further docked to CD38 using AutoDock 4.05 program. In addition, ADME studies were also processed considering solubility in water and membrane permeability. Finally, we identified 17 compotmds-based on natural substrates and 10 compounds based on known inhibitor models. The results showed that the known inhibitor H2-based model was more efficient in virtual screening of CD38 non-covalent inhibitors.展开更多
Following the outbreak of the subprime financial crisis,international accounting standards came under heavy fire for being strongly pro-cyclical.Under those standards,financial reporting mixes financial statement data...Following the outbreak of the subprime financial crisis,international accounting standards came under heavy fire for being strongly pro-cyclical.Under those standards,financial reporting mixes financial statement data with financial analysis data,seriously weakening the public interest function of financial reporting.An analysis using Marx’s fictitious capital theory shows that fair value accounting and asset impairment accounting are both defective.In line with the principle of“accounting based on legal fact,”we use the methodology of“historical cost accounting plus fair value disclosure”to distinguish between legal fact and financial expectations in financial reporting.This is a viable means of appropriately resolving the contradiction between ensuring that enterprise financial reporting observes domestic law and ensuring that it accords with international trends.展开更多
Let V be a linear space over a field F with finite dimension,L(V) the semigroup,under composition,of all linear transformations from V into itself.Suppose that V = V1⊕V2⊕···⊕Vm is a direct sum decomp...Let V be a linear space over a field F with finite dimension,L(V) the semigroup,under composition,of all linear transformations from V into itself.Suppose that V = V1⊕V2⊕···⊕Vm is a direct sum decomposition of V,where V1,V2,...,Vm are subspaces of V with the same dimension.A linear transformation f ∈ L(V) is said to be sum-preserving,if for each i(1 ≤ i ≤ m),there exists some j(1 ≤ j ≤ m) such that f(Vi) ■Vj.It is easy to verify that all sum-preserving linear transformations form a subsemigroup of L(V) which is denoted by L⊕(V).In this paper,we first describe Green's relations on the semigroup L⊕(V).Then we consider the regularity of elements and give a condition for an element in L⊕(V) to be regular.Finally,Green's equivalences for regular elements are also characterized.展开更多
文摘Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.
基金Supported by the National Natural Science Foundation of China (No. 60672073,60872094)the Program for New Century Excellent Talents in University (NCET-06-0537)the Natural Science Foundation of Ningbo (No. 2007A610037).
文摘A semi-reference image quality assessment metric based on similarity measurement for synthesized virtual viewpoint image (VVI) in free-viewpoint television system (FFV) is proposed in this paper. The key point of the proposed metric is taking resemblant information between VVI and its neighbor view images for quality assessment to make our metric to be extended to multi-semi-reference image quality assessment easily. The proposed metric first extracts impact factors from image features, then combines an image synthesis technique and similarity functions, in which, disparity information are taken into account for registering the resemblant regions. Experiments are divided into three phases. Phase I is to verify the validation of the proposed metric by taking impaired images and original reference into account. The experimental results show the agreement between evaluation scores and bio-characteristic of human visual system. Phase II shows the accordance with Phase I by taking neighbor view as reference. The proposed metric can be taken as a full reference one to evaluate the image quality even though the original reference is absent. Phase III is then performed to evaluate the quality of WI. Evaluation scores in the experimental results are able to evaluate the quality of VVI.
基金National Natural Science Foundation of China(Grant No.21272017 and 81172917)
文摘As a type II or III transmembrane glycoprotein, human CD38 is ubiquitously expressed in all mammalian tissues. CD38 is a multi-functional enzyme and a member of the ADP-ribosyl cyclase family, and it catalyzes nicotinamide adenine dinucleotide (NAD^+) and nicotinamide adenine dinucleotide phosphate (NADP+) to two distinct Ca^2+ messengers as follows: cyclic ADP-ribose (cADPR) and nicotinic acid adenine dinucleotide phosphate (NAADP), respectively. Moreover, both cADPR and NAADP mediate mobilization of intracellular Ca^2+ targeting endoplasmic stores and the lysosomes, respectively. In this study, we combined ligand-based and structure-based virtual screening strategies to compare the inhibitor discovery efficacy based on natural substrates and the known inhibitors. The similarity queries towards SPECS database were carried out using ROCS and EON modules of OpenEye software. The hits were further docked to CD38 using AutoDock 4.05 program. In addition, ADME studies were also processed considering solubility in water and membrane permeability. Finally, we identified 17 compotmds-based on natural substrates and 10 compounds based on known inhibitor models. The results showed that the known inhibitor H2-based model was more efficient in virtual screening of CD38 non-covalent inhibitors.
基金the result of the Major Project of the National Social Science Fund of China(16ZDA029)the Key Project of the National Social Science Fund of China(13AFX019)+2 种基金supported by the Humanities and Social Science Fund of Ministry of Education(13YJC790223)the Research Fund “Branding Research Project” of Renmin University of China,i.e.the Basic Research Funds for the Central Universities(16XNI006)
文摘Following the outbreak of the subprime financial crisis,international accounting standards came under heavy fire for being strongly pro-cyclical.Under those standards,financial reporting mixes financial statement data with financial analysis data,seriously weakening the public interest function of financial reporting.An analysis using Marx’s fictitious capital theory shows that fair value accounting and asset impairment accounting are both defective.In line with the principle of“accounting based on legal fact,”we use the methodology of“historical cost accounting plus fair value disclosure”to distinguish between legal fact and financial expectations in financial reporting.This is a viable means of appropriately resolving the contradiction between ensuring that enterprise financial reporting observes domestic law and ensuring that it accords with international trends.
文摘Let V be a linear space over a field F with finite dimension,L(V) the semigroup,under composition,of all linear transformations from V into itself.Suppose that V = V1⊕V2⊕···⊕Vm is a direct sum decomposition of V,where V1,V2,...,Vm are subspaces of V with the same dimension.A linear transformation f ∈ L(V) is said to be sum-preserving,if for each i(1 ≤ i ≤ m),there exists some j(1 ≤ j ≤ m) such that f(Vi) ■Vj.It is easy to verify that all sum-preserving linear transformations form a subsemigroup of L(V) which is denoted by L⊕(V).In this paper,we first describe Green's relations on the semigroup L⊕(V).Then we consider the regularity of elements and give a condition for an element in L⊕(V) to be regular.Finally,Green's equivalences for regular elements are also characterized.