In order to automatically find and conveniently rectify the structural conflicts appearing in a new ontology model version after a series of ontology evolution,we propose an ontology model verification approach,in whi...In order to automatically find and conveniently rectify the structural conflicts appearing in a new ontology model version after a series of ontology evolution,we propose an ontology model verification approach,in which the object constraint language (OCL) and an ontology definition meta-model (ODM) are used to complete the ontology verification.The ODM is composed of the ontology related elements and the definition rule related elements.The OCL is employed to describe the elements in the ontology definition meta-model:OCL extension for the ontology related elements,and OCL extension for the ontological design patterns.All of the above OCL rules will describe the constraint relationships between ontology elements.Associated with an example,the application of the ontology model verification approach based on OCL and ODM is introduced.Consequently,the conflicts happened in the ontology changing and evolution can be easily verified and rectified through this approach.展开更多
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggre...To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation.展开更多
An approach was proposed to specify the C4ISR capability of domain-specific modeling language.To confine the domain modeling within a standard architecture framework,formally a C4ISR capability meta-ontology was defin...An approach was proposed to specify the C4ISR capability of domain-specific modeling language.To confine the domain modeling within a standard architecture framework,formally a C4ISR capability meta-ontology was defined according to the meta-model of DoD Architecture Framework.The meta-ontology is used for extending UML Profile so that the domain experts can model the C4ISR domains using the C4ISR capability meta-concepts to define a domain-specific modeling language.The domain models can be then checked to guarantee the consistency and completeness through converting the UML models into the Description Logic ontology and making use of inference engine Pellet to verify the ontology.展开更多
Objective Natural language processing (NLP) was used to excavate and visualize the core content of syndrome element syndrome differentiation (SESD). Methods The first step was to build a text mining and analysis envir...Objective Natural language processing (NLP) was used to excavate and visualize the core content of syndrome element syndrome differentiation (SESD). Methods The first step was to build a text mining and analysis environment based on Python language, and built a corpus based on the core chapters of SESD. The second step was to digitalize the corpus. The main steps included word segmentation, information cleaning and merging, document-entry matrix, dictionary compilation and information conversion. The third step was to mine and display the internal information of SESD corpus by means of word cloud, keyword extraction and visualization. Results NLP played a positive role in computer recognition and comprehension of SESD. Different chapters had different keywords and weights. Deficiency syndrome elements were an important component of SESD, such as "Qi deficiency""Yang deficiency" and "Yin deficiency". The important syndrome elements of substantiality included "Blood stasis""Qi stagnation", etc. Core syndrome elements were closely related. Conclusions Syndrome differentiation and treatment was the core of SESD. Using NLP to excavate syndromes differentiation could help reveal the internal relationship between syndromes differentiation and provide basis for artificial intelligence to learn syndromes differentiation.展开更多
This study investigates gender income disparity in Portuguese firms using separate Tobit models for men and women. While job segregation seems to be one of the major sources of gender disparity, women do not appear to...This study investigates gender income disparity in Portuguese firms using separate Tobit models for men and women. While job segregation seems to be one of the major sources of gender disparity, women do not appear to be systematically underpaid in predominantly female occupations, regardless of the industry. The authors found that gender pay gap is larger in domestic firms, and it increases with employees' accumulated tenure and decreases with advanced education for women and on labor market entry. Despite showing some encouraging cracks, the glass ceiling still continues to prevent women from reaching top management positions. Finally, despite it appears wage disparity does exist, and it will probably continue to exist, the results point towards a window of opportunity for women.展开更多
Background The objective of this study was to identify prognostic indicators in patients with inflammatory cardiomyopathy (iCM) on endomyocardial biopsy (EMB). Methods and results Between 2007 and 2011 all consecu...Background The objective of this study was to identify prognostic indicators in patients with inflammatory cardiomyopathy (iCM) on endomyocardial biopsy (EMB). Methods and results Between 2007 and 2011 all consecutive patients with diagnosed with iCM at EMB were retrospectively analyzed. The combined primary endpoint (EP) (1E°P) was cardiac death, aborted sudden cardiac death/appropriate implantable cardioverter defibrillator (ICD) shock, progressive heart failure requiring left venWicular assist device (LVAD) implantation and heart transplantation. 503 patients (mean age 58 ° 12 years, 73% male) were available for analysis. Genomes of cardiotrophic viruses were detected in 396 patients (79%) and immuno-histochemical signs of inflammation were present in 223 individuals (44%). After 3.6 ° 2.4 years of follow-up, cardiac mortality was 3.0% (n = 14) and a total of 8.6% (n = 40) reached the primary endpoint. Independent predictors for the 1 °EP were: age 〉 50 years, presence and duration (〈 28 days) of symptomatic heart failure. A risk stratification approach based on the results of the multivariate analysis demonstrated that absence of signs and/or symptoms of congestive heart failure in younger (〈 50 years) patients with longer (〉 28 days) duration of disease appear to have an excellent prognosis with 100% survival and no events during follow-up The presence of all above mentioned independent risk factors results in an 1°EP occurrence of 35.9%. Conclusions Symptoms of heart fail- ure, short duration of disease, and older age are indicators of poor outcome in patients with iCM.展开更多
Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue a...Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model.展开更多
This research venture investigates the trends and motives behind the English learning as a second language. The author has used the Chinese binoculars to probe into the phenomenon of English learning and teaching. Eng...This research venture investigates the trends and motives behind the English learning as a second language. The author has used the Chinese binoculars to probe into the phenomenon of English learning and teaching. English language has become an international tool of communication and business. Professional and students at China's Mainland have been learning English since long but this trend has been increased in the recent years due to the wave of globalization and also owing to the enormous emerging economy of China. Internationalization of education and the quest of knowing the culture and civilizations have spurred the need for English learning. The authors have performed a questionnaire based research with the sample of 130 university students learning Chinese at different English learning institutes at Xi'an, Shanxi, China. The analysis of the findings in this research highlights the reasons behind the growing trends of English learning and also describes the teaching methodology for effective language teaching in the Chinese perspective.展开更多
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key...To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes .展开更多
基金Sponsored by the National Basic Research Program of China (the Natural Key Basis Research and Development Plan (Grant No.973:2003CB316905))the National Natural Science Foundation of China(Grant No.60374071)
文摘In order to automatically find and conveniently rectify the structural conflicts appearing in a new ontology model version after a series of ontology evolution,we propose an ontology model verification approach,in which the object constraint language (OCL) and an ontology definition meta-model (ODM) are used to complete the ontology verification.The ODM is composed of the ontology related elements and the definition rule related elements.The OCL is employed to describe the elements in the ontology definition meta-model:OCL extension for the ontology related elements,and OCL extension for the ontological design patterns.All of the above OCL rules will describe the constraint relationships between ontology elements.Associated with an example,the application of the ontology model verification approach based on OCL and ODM is introduced.Consequently,the conflicts happened in the ontology changing and evolution can be easily verified and rectified through this approach.
基金supported by the National Grand Fundamental Research 973 Program of China under Grant No.2011CB302903 the National Natural Science Foundation of China under Grants No.61073188,No.61073115+1 种基金 the Key University Science Research Project of Jiangsu Province under Grant No.11KJA520002 the Priority Academic Program Development of Jiangsu Higher Education Institutions under Grant No.yx002001
文摘To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation.
基金Project(2007AA01Z126) supported by the National High Technology Research and Development Program of ChinaProject(51306010202) supported by the National Defense Advance Research Program of China
文摘An approach was proposed to specify the C4ISR capability of domain-specific modeling language.To confine the domain modeling within a standard architecture framework,formally a C4ISR capability meta-ontology was defined according to the meta-model of DoD Architecture Framework.The meta-ontology is used for extending UML Profile so that the domain experts can model the C4ISR domains using the C4ISR capability meta-concepts to define a domain-specific modeling language.The domain models can be then checked to guarantee the consistency and completeness through converting the UML models into the Description Logic ontology and making use of inference engine Pellet to verify the ontology.
基金the funding support from the National Natural Science Foundation of China (No. 81874429)Digital and Applied Research Platform for Diagnosis of Traditional Chinese Medicine (No. 49021003005)+1 种基金2018 Hunan Provincial Postgraduate Research Innovation Project (No. CX2018B465)Excellent Youth Project of Hunan Education Department in 2018 (No. 18B241)
文摘Objective Natural language processing (NLP) was used to excavate and visualize the core content of syndrome element syndrome differentiation (SESD). Methods The first step was to build a text mining and analysis environment based on Python language, and built a corpus based on the core chapters of SESD. The second step was to digitalize the corpus. The main steps included word segmentation, information cleaning and merging, document-entry matrix, dictionary compilation and information conversion. The third step was to mine and display the internal information of SESD corpus by means of word cloud, keyword extraction and visualization. Results NLP played a positive role in computer recognition and comprehension of SESD. Different chapters had different keywords and weights. Deficiency syndrome elements were an important component of SESD, such as "Qi deficiency""Yang deficiency" and "Yin deficiency". The important syndrome elements of substantiality included "Blood stasis""Qi stagnation", etc. Core syndrome elements were closely related. Conclusions Syndrome differentiation and treatment was the core of SESD. Using NLP to excavate syndromes differentiation could help reveal the internal relationship between syndromes differentiation and provide basis for artificial intelligence to learn syndromes differentiation.
文摘This study investigates gender income disparity in Portuguese firms using separate Tobit models for men and women. While job segregation seems to be one of the major sources of gender disparity, women do not appear to be systematically underpaid in predominantly female occupations, regardless of the industry. The authors found that gender pay gap is larger in domestic firms, and it increases with employees' accumulated tenure and decreases with advanced education for women and on labor market entry. Despite showing some encouraging cracks, the glass ceiling still continues to prevent women from reaching top management positions. Finally, despite it appears wage disparity does exist, and it will probably continue to exist, the results point towards a window of opportunity for women.
文摘Background The objective of this study was to identify prognostic indicators in patients with inflammatory cardiomyopathy (iCM) on endomyocardial biopsy (EMB). Methods and results Between 2007 and 2011 all consecutive patients with diagnosed with iCM at EMB were retrospectively analyzed. The combined primary endpoint (EP) (1E°P) was cardiac death, aborted sudden cardiac death/appropriate implantable cardioverter defibrillator (ICD) shock, progressive heart failure requiring left venWicular assist device (LVAD) implantation and heart transplantation. 503 patients (mean age 58 ° 12 years, 73% male) were available for analysis. Genomes of cardiotrophic viruses were detected in 396 patients (79%) and immuno-histochemical signs of inflammation were present in 223 individuals (44%). After 3.6 ° 2.4 years of follow-up, cardiac mortality was 3.0% (n = 14) and a total of 8.6% (n = 40) reached the primary endpoint. Independent predictors for the 1 °EP were: age 〉 50 years, presence and duration (〈 28 days) of symptomatic heart failure. A risk stratification approach based on the results of the multivariate analysis demonstrated that absence of signs and/or symptoms of congestive heart failure in younger (〈 50 years) patients with longer (〉 28 days) duration of disease appear to have an excellent prognosis with 100% survival and no events during follow-up The presence of all above mentioned independent risk factors results in an 1°EP occurrence of 35.9%. Conclusions Symptoms of heart fail- ure, short duration of disease, and older age are indicators of poor outcome in patients with iCM.
文摘Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model.
文摘This research venture investigates the trends and motives behind the English learning as a second language. The author has used the Chinese binoculars to probe into the phenomenon of English learning and teaching. English language has become an international tool of communication and business. Professional and students at China's Mainland have been learning English since long but this trend has been increased in the recent years due to the wave of globalization and also owing to the enormous emerging economy of China. Internationalization of education and the quest of knowing the culture and civilizations have spurred the need for English learning. The authors have performed a questionnaire based research with the sample of 130 university students learning Chinese at different English learning institutes at Xi'an, Shanxi, China. The analysis of the findings in this research highlights the reasons behind the growing trends of English learning and also describes the teaching methodology for effective language teaching in the Chinese perspective.
基金This research was supported partially by the National Natural Science Foundation of China under Grants No. 61103247, No. 6110209 the Natural Science Foundation of Fujian Province under Grant No. 2011J05147+1 种基金 the Research Foundation of Education Bureau of Fujian Province under Grant No. JBll017 the Foundation for Excellent Young Teachers of Fujian Normal University under Grant No. fjsdjk2012049.
文摘To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes .