Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire surve...Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat.展开更多
In this article, we study the problems of Borel's directions of meromorphic func- tions concerning shared values and prove that if two meromorphie functions of infinite order share three distinct values, their Borel...In this article, we study the problems of Borel's directions of meromorphic func- tions concerning shared values and prove that if two meromorphie functions of infinite order share three distinct values, their Borel's directions are same.展开更多
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA)....With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency.展开更多
The Supplemental Nutrition Assistance Program (SNAP), the National School Lunch Program (NSLP), the School Breakfast Program (SBP), and the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC)...The Supplemental Nutrition Assistance Program (SNAP), the National School Lunch Program (NSLP), the School Breakfast Program (SBP), and the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) share a common goal of helping people with limited financial means obtain better diets than they could otherwise afford, but the programs differ in terms of the groups that they target and the types of assistance they provide. While the programs appear to increase food consumption among households generally and among their intended beneficiaries, we know much less about whether they help other people. This investigation uses 2002-2003 data from the second Child Development Supplement of the Panel Study of Income Dynamics to examine the relationship between households’ participation in the SNAP, SBP, NLSP, and WIC and individual 10 - 17 year-old children’s consumption of particular food items. Our analyses indicate that WIC participation by others in the household is associated with a 22 percent increase in breakfast consumption of milk and a 16 percent increase in breakfast consumption of cereal for the children in our sample, while WIC is associated with a 13 percent decrease in toast consumption. Participation in school meals is also associated with increased consumption of some foods, particularly juice, fruit, and sweet snacks. Household SNAP participation is estimated to have positive associations with some foods but negative associations with others.展开更多
In this paper, we put forward a collaborative mode based on A/S mode to solve existing problems in the process of developing electromechanical instrument collaborative sharing system (EICSS). The mode architecture, wo...In this paper, we put forward a collaborative mode based on A/S mode to solve existing problems in the process of developing electromechanical instrument collaborative sharing system (EICSS). The mode architecture, working pattern and development flow of this system were described. The prototype system developed was applied to Lambda 900 Spectrometer in Chongqing University to realize electromechanical instrument networked sharing, and demonstrated desirable expansibility and felxibility to satisfy diverse demands of customers.展开更多
In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary ...In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary users doesn't affect their transmission. Aimed at the selfishness problem of primary users, a seller's market trading mechanism is introduced which can not only stimulate primary users to tolerate larger interference power but also give the primary users an appropriate compensation at the same time, and which has very important practical significance. Based on the mechanism, the achievable maximal gross profit of secondary users and their optimal power allocation scheme in the Rayleigh fading environment are derived, and the interference price of primary users and the average revenue of secondary users' impact on them are also studied. Numerical calculation results are conducted to verify our theoretical results.展开更多
The aim of this study was to investigate the effect of dividend distributions and earnings per share by moderating bank size as measured by its total assets on the stock market value of banks operating in Jordan durin...The aim of this study was to investigate the effect of dividend distributions and earnings per share by moderating bank size as measured by its total assets on the stock market value of banks operating in Jordan during the period between 2011 and 2016.The hypotheses of the study were tested based on multiple and hierarchical regression method.The most important result of the study is that the earnings per share is the strongest variable that helps in predicting the stock market value of the bank shares,in addition to the significant effect of bank size as measured by its total assets.展开更多
We study a spectrum sharing problem where multiple systems coexist and interfere with each other. First, an analysis is proposed for distributed spectrum sharing based on Prisoners' Dilemma (PD) in Cognitive Radio...We study a spectrum sharing problem where multiple systems coexist and interfere with each other. First, an analysis is proposed for distributed spectrum sharing based on Prisoners' Dilemma (PD) in Cognitive Radios (CRs). In one-shot game, selfish and rational CRs greedily full spread their own spectrum space in order to maximize their own rates, which leads to Nash Equilibrium (N.E.). But with long term interaction, i.e., Iterated Prisoner's Dilemma (IPD), CRs can come to cooperate and acquire the social optimal point by using different evolutionary strategies such as Tit For Tat (TFT), Generous TFT (GTFT), etc. Also we compare the performances of the different evolutionary strategies in noise-free and noisy environments for two-player games. Finally, N-player IPD (N-IPD) is simulated to verify our conclusions that TFT is a good strategy for spectrum sharing in CRs.展开更多
ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on April 12, 2010 that Infonetics, a leading market research firm, has recently released a 2G/3G Mobile Infrast...ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on April 12, 2010 that Infonetics, a leading market research firm, has recently released a 2G/3G Mobile Infrastructure and Subscribers Report on the global wireless communication equipment market in 2009. According to the report, major changes have occurred in the shares of the global wireless communication market.展开更多
This study examines the association between firm value and ownership structure, when board and controlling stockholders' voting rights deviate from obligations. The measurement of the corporate governance variables i...This study examines the association between firm value and ownership structure, when board and controlling stockholders' voting rights deviate from obligations. The measurement of the corporate governance variables is different from prior research. The author further investigates whether monitoring mechanisms can alleviate the agency problem due to percentage of outside directors. The empirical results show that the higher board voting rights-obligations is deviated, which means the weaker relation with the firm value. The author also finds the monitoring from outside directors can reduce the agency problems from board's deviation and thus can improve firm value. But the results of the controlling stockholders' deviation are mixed or insignificant. This research has implications for Taiwan's regulators who are striving to improve the information, transparency, and corporate governance of board and controlling shareholders' voting rights-obligations deviation.展开更多
A community with a shared future for mankind refers to equal, all-win, safe and inclusive human collective organizations between countries. Xi Jinping's thought on building a community with a shared future for man...A community with a shared future for mankind refers to equal, all-win, safe and inclusive human collective organizations between countries. Xi Jinping's thought on building a community with a shared future for mankind is deeply rooted in the excellent traditional Chinese culture, and is the "Chinese diagnosis" made, and "Chinese plans" proposed, for world problems. It provides the realistic possibility to advocate for and construct a community with a shared future for mankind for development, peace and security of the world and global governance. We should adhere to the principles of step-bystep implementation, equality and mutual assistance, respect for differences, eco-friendly development and inclusiveness, to achieve a community with a shared future for mankind.展开更多
Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image...Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image can be reconstructed by collecting sufficient shadow images.In recent years,many SIS schemes are proposed,among which Shamir’s polynomial-based SIS scheme and visual secret sharing(VSS)also called visual cryptography scheme(VCS)are the primary branches.However,as the basic research issues,the security analysis and security level classification of SIS are rarely discussed.In this paper,based on the study of image feature and typical SIS schemes,four security levels are classified as well as the security of typical SIS schemes are analyzed.Furthermore,experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics.展开更多
Accurately measuring labor's share of income is of great importance for China 'S national policies, particularly its labor compensation policies during the 12th Five Year Plan period. This paper first analyses the m...Accurately measuring labor's share of income is of great importance for China 'S national policies, particularly its labor compensation policies during the 12th Five Year Plan period. This paper first analyses the measurement problems of labor's share of income from the perspectives of definition and data and their influences on the accuracy of the measurement results. Then it sums up and appraises several adjustment methods for existing measurement problems. Finally, the author estimates the operating surplus of private, unincorporated enterprises (OSPUE) in China using data from Urban household survey (UHS), Rural household survey (RHS) and population survey, and further makes a correction to labor's share of income in China from 1993 to 2008 with data from flow of funds accounts. Finally, the author conducted trend analysis and international comparisons using the results obtained from the first part of the paper.展开更多
Shamir proposed a classic polynomial-based secret sharing(SS)scheme,which is also widely applied in secret image sharing(SIS).However,the following researchers paid more attention to the development of properties,such...Shamir proposed a classic polynomial-based secret sharing(SS)scheme,which is also widely applied in secret image sharing(SIS).However,the following researchers paid more attention to the development of properties,such as lossless recovery,rather than the principle of Shamir’s polynomial-based SS scheme.In this paper,we introduce matrix theory to analyze Shamir’s polynomial-based scheme as well as propose a general(k,n)threshold SIS construction based on matrix theory.Besides,it is proved that Shamir’s polynomial-based SS scheme is a special case of our construction method.Both experimental results and analyses are given to demonstrate the effectiveness of the proposed construction method.展开更多
At Jiancaoping District, a rural part of Taiyuan, the capital city of Shanxi Province, north China, more than 8% of the residents are religious, believing in Catholicism, Christianity, Islam, Buddhism, as well as Chin...At Jiancaoping District, a rural part of Taiyuan, the capital city of Shanxi Province, north China, more than 8% of the residents are religious, believing in Catholicism, Christianity, Islam, Buddhism, as well as China's indigenous religion, Taoism. In other words, all the five religions in China have believers here. In particular, there are 16 villages with altogether 10,000 Catholics living in compact communties. It so happens that most religious people live in mountainous or hilly areas in the district, where adverse natural conditions once rendered them poor.展开更多
基金jointly supported by the National Social Science Foundation of China(Grant No.:14BTQ044)Wuhan University Academic Development Plan for Scholars born after the 1970s for the project of"research on Internet user behavior"Wuhan University Postgraduate English Course on Internet User Behavior and Luo Jia Youth Scholar of Wuhan University
文摘Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat.
基金supported by the National Natural Science Foundation of China(11171013)
文摘In this article, we study the problems of Borel's directions of meromorphic func- tions concerning shared values and prove that if two meromorphie functions of infinite order share three distinct values, their Borel's directions are same.
文摘With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency.
文摘The Supplemental Nutrition Assistance Program (SNAP), the National School Lunch Program (NSLP), the School Breakfast Program (SBP), and the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) share a common goal of helping people with limited financial means obtain better diets than they could otherwise afford, but the programs differ in terms of the groups that they target and the types of assistance they provide. While the programs appear to increase food consumption among households generally and among their intended beneficiaries, we know much less about whether they help other people. This investigation uses 2002-2003 data from the second Child Development Supplement of the Panel Study of Income Dynamics to examine the relationship between households’ participation in the SNAP, SBP, NLSP, and WIC and individual 10 - 17 year-old children’s consumption of particular food items. Our analyses indicate that WIC participation by others in the household is associated with a 22 percent increase in breakfast consumption of milk and a 16 percent increase in breakfast consumption of cereal for the children in our sample, while WIC is associated with a 13 percent decrease in toast consumption. Participation in school meals is also associated with increased consumption of some foods, particularly juice, fruit, and sweet snacks. Household SNAP participation is estimated to have positive associations with some foods but negative associations with others.
基金Funded by the Foundation for 211 Projects of the Ministry of Education During the 10th Five-year Plan Period of China (No. shi wu 211CERS-13).
文摘In this paper, we put forward a collaborative mode based on A/S mode to solve existing problems in the process of developing electromechanical instrument collaborative sharing system (EICSS). The mode architecture, working pattern and development flow of this system were described. The prototype system developed was applied to Lambda 900 Spectrometer in Chongqing University to realize electromechanical instrument networked sharing, and demonstrated desirable expansibility and felxibility to satisfy diverse demands of customers.
基金Supported by the National Basic Research Program of China (2007CB307104), the National Natural Science Foundation of China (60973160), and the Intematiortal Scientific and Technological Cooperation Program (No. $2010GR0902).
文摘In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary users doesn't affect their transmission. Aimed at the selfishness problem of primary users, a seller's market trading mechanism is introduced which can not only stimulate primary users to tolerate larger interference power but also give the primary users an appropriate compensation at the same time, and which has very important practical significance. Based on the mechanism, the achievable maximal gross profit of secondary users and their optimal power allocation scheme in the Rayleigh fading environment are derived, and the interference price of primary users and the average revenue of secondary users' impact on them are also studied. Numerical calculation results are conducted to verify our theoretical results.
文摘The aim of this study was to investigate the effect of dividend distributions and earnings per share by moderating bank size as measured by its total assets on the stock market value of banks operating in Jordan during the period between 2011 and 2016.The hypotheses of the study were tested based on multiple and hierarchical regression method.The most important result of the study is that the earnings per share is the strongest variable that helps in predicting the stock market value of the bank shares,in addition to the significant effect of bank size as measured by its total assets.
基金Supported by the "863" Program (No.2009AA01Z241)the National Natural Science Foundation of China (No.60772062)+2 种基金Key Scientific Research Project of Office of Education in Jiangsu Province (No.06KJA51001)Scientific Research Project of Office of Education in Jiangsu Province (No.8KJB510015)Startup Funding (No.NY208048)
文摘We study a spectrum sharing problem where multiple systems coexist and interfere with each other. First, an analysis is proposed for distributed spectrum sharing based on Prisoners' Dilemma (PD) in Cognitive Radios (CRs). In one-shot game, selfish and rational CRs greedily full spread their own spectrum space in order to maximize their own rates, which leads to Nash Equilibrium (N.E.). But with long term interaction, i.e., Iterated Prisoner's Dilemma (IPD), CRs can come to cooperate and acquire the social optimal point by using different evolutionary strategies such as Tit For Tat (TFT), Generous TFT (GTFT), etc. Also we compare the performances of the different evolutionary strategies in noise-free and noisy environments for two-player games. Finally, N-player IPD (N-IPD) is simulated to verify our conclusions that TFT is a good strategy for spectrum sharing in CRs.
文摘ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on April 12, 2010 that Infonetics, a leading market research firm, has recently released a 2G/3G Mobile Infrastructure and Subscribers Report on the global wireless communication equipment market in 2009. According to the report, major changes have occurred in the shares of the global wireless communication market.
文摘This study examines the association between firm value and ownership structure, when board and controlling stockholders' voting rights deviate from obligations. The measurement of the corporate governance variables is different from prior research. The author further investigates whether monitoring mechanisms can alleviate the agency problem due to percentage of outside directors. The empirical results show that the higher board voting rights-obligations is deviated, which means the weaker relation with the firm value. The author also finds the monitoring from outside directors can reduce the agency problems from board's deviation and thus can improve firm value. But the results of the controlling stockholders' deviation are mixed or insignificant. This research has implications for Taiwan's regulators who are striving to improve the information, transparency, and corporate governance of board and controlling shareholders' voting rights-obligations deviation.
文摘A community with a shared future for mankind refers to equal, all-win, safe and inclusive human collective organizations between countries. Xi Jinping's thought on building a community with a shared future for mankind is deeply rooted in the excellent traditional Chinese culture, and is the "Chinese diagnosis" made, and "Chinese plans" proposed, for world problems. It provides the realistic possibility to advocate for and construct a community with a shared future for mankind for development, peace and security of the world and global governance. We should adhere to the principles of step-bystep implementation, equality and mutual assistance, respect for differences, eco-friendly development and inclusiveness, to achieve a community with a shared future for mankind.
文摘Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image can be reconstructed by collecting sufficient shadow images.In recent years,many SIS schemes are proposed,among which Shamir’s polynomial-based SIS scheme and visual secret sharing(VSS)also called visual cryptography scheme(VCS)are the primary branches.However,as the basic research issues,the security analysis and security level classification of SIS are rarely discussed.In this paper,based on the study of image feature and typical SIS schemes,four security levels are classified as well as the security of typical SIS schemes are analyzed.Furthermore,experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics.
文摘Accurately measuring labor's share of income is of great importance for China 'S national policies, particularly its labor compensation policies during the 12th Five Year Plan period. This paper first analyses the measurement problems of labor's share of income from the perspectives of definition and data and their influences on the accuracy of the measurement results. Then it sums up and appraises several adjustment methods for existing measurement problems. Finally, the author estimates the operating surplus of private, unincorporated enterprises (OSPUE) in China using data from Urban household survey (UHS), Rural household survey (RHS) and population survey, and further makes a correction to labor's share of income in China from 1993 to 2008 with data from flow of funds accounts. Finally, the author conducted trend analysis and international comparisons using the results obtained from the first part of the paper.
文摘Shamir proposed a classic polynomial-based secret sharing(SS)scheme,which is also widely applied in secret image sharing(SIS).However,the following researchers paid more attention to the development of properties,such as lossless recovery,rather than the principle of Shamir’s polynomial-based SS scheme.In this paper,we introduce matrix theory to analyze Shamir’s polynomial-based scheme as well as propose a general(k,n)threshold SIS construction based on matrix theory.Besides,it is proved that Shamir’s polynomial-based SS scheme is a special case of our construction method.Both experimental results and analyses are given to demonstrate the effectiveness of the proposed construction method.
文摘At Jiancaoping District, a rural part of Taiyuan, the capital city of Shanxi Province, north China, more than 8% of the residents are religious, believing in Catholicism, Christianity, Islam, Buddhism, as well as China's indigenous religion, Taoism. In other words, all the five religions in China have believers here. In particular, there are 16 villages with altogether 10,000 Catholics living in compact communties. It so happens that most religious people live in mountainous or hilly areas in the district, where adverse natural conditions once rendered them poor.