Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania beca...Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania became attractive for the neighboring Hungarian royalty and later on, in the 1 lth century it was annexed into Hungary. For a better control of the newly annexed territory and in order to convert the orthodox population to Catholicism, the Hungarian rulers brought the Szeklers to Transilvania and two centuries later, German originating populations, from Rhine, Luxemburg, and Saxony (the name of Sas people, or Saxon of Transilvania derives from "Saxony"). The aim of this paper is to focus on the Sighisoara County, namely on the easement of certain areas for temporary or permanent maintenance or use by the church and hospitals in the region. That was a common practice in Medieval Europe aimed at ensuring the survival means for these institutions. However, it was not the only one to serve this goal. There were also donations on behalf of various people or allocations of money by the county authorities. The documents attesting this are unpublished, unedited and are to be found in the archives of the Brasov County, Budapest, and Vienna. They are the stepping stone of this paper and hence, they grant its originality. The objectives of the paper are to bring arguments in favor of the thesis that community money was directed towards meeting the needs of the hospitals, as well as towards supporting the widows, the orphans, and the needy ones. Worth noting in this respect is the management of the funds ceded to the church and county hospitals and that actually benefitted the whole community. Moreover, the paper also emphasizes the role played by education, since the latter is an important landmark for a community's development level展开更多
The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation betw...The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation between possession and ownership become more and more universal. There is a potential conflict between possession reform and the announcement of property right of property as a sign of delivery, which has been brought up again in civil law circles. Based on the measure of interest and value analysis, on the possession case of bona fide acquisition system is discussed and reflection, in under the bona fide possession of the application, the modified say. With a view to China' s ongoing property rights legislation to benefit.展开更多
A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this pape...A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this paper analyzes the epic poems"The Garden of Proserpina"so as to identify the hidden creation theme from paradise archetype.展开更多
Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when ...Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when users perform file operations,the semantic integrity of the data can be compromised.Ensuring both data integrity and semantic correctness has become a critical issue that requires attention.We introduce a pioneering solution called Sec-Auditor,the first of its kind with the ability to verify data integrity and semantic correctness simultaneously,while maintaining a constant communication cost independent of the audited data volume.Sec-Auditor also supports public auditing,enabling anyone with access to public information to conduct data audits.This feature makes Sec-Auditor highly adaptable to open data environments,such as the cloud.In Sec-Auditor,users are assigned specific rules that are utilized to verify the accuracy of data semantic.Furthermore,users are given the flexibility to update their own rules as needed.We conduct in-depth analyses of the correctness and security of Sec-Auditor.We also compare several important security attributes with existing schemes,demonstrating the superior properties of Sec-Auditor.Evaluation results demonstrate that even for time-consuming file upload operations,our solution is more efficient than the comparison one.展开更多
With the growing trend toward using cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Many cryptography and security schemes,such as PDP(Provable Data Possession) an...With the growing trend toward using cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Many cryptography and security schemes,such as PDP(Provable Data Possession) and POR(Proofs of Retrievability) were proposed for this problem.Although many efficient schemes for static data have been constructed,only a few dynamic schemes exist,such as DPDP(Dynamic Provable Data Possession).But the DPDP scheme falls short when updates are not proportional to a fixed block size.The FlexList-based Dynamic Provable Data Possession(FlexDPDP) was an optimized scheme for DPDP.However,the update operations(insertion,remove,modification)in Flex DPDP scheme only apply to single node at a time,while multiple consecutive nodes operation is more common in practice.To solve this problem,we propose optimized algorithms for multiple consecutive nodes,which including MultiNodes Insert and Verification,MultiNodes Remove and Verification,MultiNodes Modify and Verification.The cost of our optimized algorithms is also analyzed.For m consecutive nodes,an insertion takes O(m) + O(log N) + O(log m),where N is the number of leaf nodes of FlexList,a remove takes O(log/V),and a modification is the same as the original algorithm.Finally,we compare the optimized algorithms with original FlexList through experiences,and the results show that our scheme has the higher efficiency of time and space.展开更多
Introduction:Some studles have described the M cells in the deepsubeploardial to midmyooardial layers of the canine ventricle.Transient outward current of potasium(ito)initiate the repolarization ofaction potentials,a...Introduction:Some studles have described the M cells in the deepsubeploardial to midmyooardial layers of the canine ventricle.Transient outward current of potasium(ito)initiate the repolarization ofaction potentials,and has an important effect on the configuration ofaction potential of epicardium and endocardium.So.it is necessary tostudy further about the contribution of ito in M cells.Methods:Standard glass microelectrode was used to observe actionpotential properties of M cell in canine ventricular tissue allce.The whotecell patch clamp was used to investigate the effect of M cell’s ito oh itsaction potential.Results:(1)configuration of action potential:M cell and epicardialpossess prominent spike and dome configuration at early repolarization,but lucks of it in endocardium.(2)Characteristics of action potential:resting potential in M cell was more negtive than of apicardium andendocardium(respectively-88.,-66.5 and -85.9mv),but no statistic’ssignificance.Vmax in M cell possessed much greater than inendocardium and epicardium(299.0,197.6 and 160.4V/s).APD90 in Mcell was longer thin In eplcardium and endocardium(304,227 and211ms when BCL-1000ms);(3)M cell had more rate dependence ofaction potential duration than endocardium and endocardinm when BCLwas 500-5000ms;(4)ito in M cell and epicardium are aignifcantly greaterthan that in endocardium;(5)ito has obvious rate dependence,whenBCL lengthened,ito became strong.Conclutions:M cell possesses special characterlatics of actionpotential,such as obvious spike and dome configuration,much greaterVmax,longer action potential duration and more rate dependence,ito inM cell is one of the ionic busis of its having spike and dome morphologyand obvious rate dependence.vious rite dependence.展开更多
Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. Howeve...Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient.展开更多
Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low pe...Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low performance devices such as Internet of Things,we find that there are still two obstacles for applying PDP schemes.The first one is the heavy computation overhead in generating tags for data blocks,which is essential for setting up any PDP scheme.The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing.In this paper,we propose a novel blockchain-based light-weighted PDP scheme for low performance devices,with an instance deployed on a cloud server.We design a secure outsourced tag generating method for low performance devices,which enables a kind of“hash-sign-switch”two-phase tag computing.With this method,users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation,without leaking their data content.Chaincodes in blockchain network ensure the correctness of such outsourcing and prevent collusion attacks.The security analysis and performance evaluation prove that our scheme is both secure and efficient.展开更多
Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files...Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation.展开更多
This paper is intended to forecast the demand of the car market and the quantity of car possession in our country in 2000 by means of two statistics methods, i.e. tendency inference and regression analysis, and then i...This paper is intended to forecast the demand of the car market and the quantity of car possession in our country in 2000 by means of two statistics methods, i.e. tendency inference and regression analysis, and then its future growth tendency and market demand in our country are analyzed, according to the strategy requirement and the actual facts of our car industry development.展开更多
The first society would be the society of the good will.Already several times discussed,for which the value-oriented life of this year can no longer become an open problem.We define the second society provisionally as...The first society would be the society of the good will.Already several times discussed,for which the value-oriented life of this year can no longer become an open problem.We define the second society provisionally as the one,which is fundamentally not constituted by the above described good will.In the following,we will try to identify it in this abstract description as the society of the“majority”.We see the third society in that political class or elite,which power has been built in the year 1989 and thus became the concretization of that establishment,with which the“first”society identified itself so totally.This tripartition of the real existing Left might also explain,why its political articulation is so fragmented.A Leftist should have today three souls:one of the winners(the elite,as a member of our third class),one of the losers(as a member of our second class)and one of the man of good will(as a member of our first class),who very enjoyed in its total identification with the own system.And authors have drawn some meaningful conclusions.展开更多
This article determined the cause of social suffering by using set theory and also demonstrated that the cause of any suffering is the emptiness quality of Yang and Ying of the phenomena or“ownership”view and have b...This article determined the cause of social suffering by using set theory and also demonstrated that the cause of any suffering is the emptiness quality of Yang and Ying of the phenomena or“ownership”view and have been given its definition.It described the society free from the basic suffering as named enlightened society or enlightenism like one of the formations of the social development and explained its scientific evidence and described the cause and condition of this society’s evolution and development.展开更多
Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ra...Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ray diffraction analysis.展开更多
Over the last five decades or so, historical linguists have proposed as many as four different hypotheses concerning the migration pathway of Proto Nuclear Micronesians (i.e. the ancestors of Nuclear-Micronesian-langu...Over the last five decades or so, historical linguists have proposed as many as four different hypotheses concerning the migration pathway of Proto Nuclear Micronesians (i.e. the ancestors of Nuclear-Micronesian-language speakers): Proto Nuclear Micronesians may have reached Micronesia by moving from northern Vanuatu, from the Cristobal-Malaitan region, from the Admiralty or the St Matthias Islands, or even from somewhere in the vast southeast Solomons-New Hebrides region. This article provides an overview of these hypotheses, coming to the conclusion that there is no conclusive linguistic evidence, historical-comparative or otherwise, for any of the hypotheses. In view of this state of affairs, the article makes use of Johanna Nichols‘s population typology model so as to understand better the migration route of Proto Nuclear Micronesians. This innovative model has been developed to investigate geographical distributions of structural properties with a view to making inferences about human migration. In particular, the structural property of possessive classifiers, which is one of the major structural characteristics of Micronesian languages, is selected in order to ascertain how this structural property is distributed in the wider geographical areas surrounding Micronesia.Proto Nuclear Micronesians must have carried their propensity for a large number of possessive classifiers in their language(s) when travelling from somewhere into Micronesia.展开更多
When the umbrellas were held up against the tear gas attack in the protest on September 28, 2014, the hot issue raised by the marathon-like Yellow Umbrella Movement was not only the matter of politics but also a coinc...When the umbrellas were held up against the tear gas attack in the protest on September 28, 2014, the hot issue raised by the marathon-like Yellow Umbrella Movement was not only the matter of politics but also a coincidence created for the Hong Kong locals to face, or to be faced with an already moot cliche: How the Hongkongese can redef'me and redeem their almost lost socio-cultural identity, particularly under the increasingly hegemonic influences and the socio-cultural invasion of the mainland after the 1997 Handover. My present paper is not intended to discuss the topic of identity on the platform of politics, or the postcolonial studies such as transculturation or cultural hybridty. But instead, I am far more interested in locating such issue on the aesthetic dimension of collective memory, which is revealed in two local contemporary Hong Kong compositions. In the process of shaping and reshaping a form of"HongKongeseness" in which the composers tend to create and the local listeners tend to experience, albeit transient, can appear in every nuance of the sonic metaphor embedded in the pre-existing indigenous tunes of a self-contained compositional work.展开更多
This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region a...This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region and used as the first and the second language for some urban dwellers in the country.It is a working language for the Federal Government of Ethiopia.It serves the same in Gambella,Southern Nations,Nationalities and Peoples’and Benishangul-Gumuz regional states.The Amharic existential,possessive and locative constructions are characterized by using the same existential verb stem all-‘exist’.The verb is defective in its derivation and conjugation.Unlike the prototypical verbs of the language,the existential verb uses a different verb for imperfective and past verb forms.Unlike the regular verbs of the language,the existential verb,which is perfective in form,conveys present tense.It has been observed that indefinite nominals appear as the E(Existent)in existentials and possessives,whereas definite ones appear in locatives.The morphosyntactic features of existentials and locatives are the same in every aspect except the use of definiteness of the E(Existent).The possessives differ from the two constructions in word order and morphological structure of the verb.展开更多
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay inten...From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction.展开更多
<strong>Introduction</strong><strong>:</strong> The key to success is finding the perfect mixture of tactical patterns and sudden breaks of them, which depends on the behavior of the opponent t...<strong>Introduction</strong><strong>:</strong> The key to success is finding the perfect mixture of tactical patterns and sudden breaks of them, which depends on the behavior of the opponent team and is not easy to estimate by just watching matches. According to the specific tactical team behavior of “attack vs. defense” professional football matches are investigated based on a simulation approach, professional football matches are investigated according to the specific tactical team behavior of “attack vs. defense.” <strong>Methods:</strong> The formation patterns of all the sample games are categorized by SOCCER<span style="white-space:nowrap;">©</span> for defense and attack. Monte Carlo-Simulation can evaluate the mathematical, optimal strategy. The interaction simulation between attack and defense shows optimal flexibility rates for both tactical groups. <strong>Approach: </strong>A simulation approach based on 40 position data sets of the 2014/15 German Bundesliga has been conducted to analyze and optimize such strategic team behavior in professional soccer. <strong>Results:</strong> The results revealed that both attack and defense have optimal planning rates to be more successful. The more complex the success indicator, the more successful attacking player groups get. The results also show that defensive player groups always succeed in attacking groups below a specific planning rate value.<strong> Conclusion:</strong> Groups are always succeeding. The simulation-based position data analysis shows successful strategic behavior patterns for attack and defense. Attacking player groups need very high flexibility to be successful (stay in ball possession). In contrast, defensive player groups only need to be below a defined flexibility rate to be guaranteed more success.展开更多
The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the q...The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the quest motif from our modern hero's discovery journey in Possession.展开更多
文摘Transilvania is a province of the actual state of Romania, geographically situated in the middle of the country, in the inner arch of the Carpathians. Starting with the 10th century, the territory of Transilvania became attractive for the neighboring Hungarian royalty and later on, in the 1 lth century it was annexed into Hungary. For a better control of the newly annexed territory and in order to convert the orthodox population to Catholicism, the Hungarian rulers brought the Szeklers to Transilvania and two centuries later, German originating populations, from Rhine, Luxemburg, and Saxony (the name of Sas people, or Saxon of Transilvania derives from "Saxony"). The aim of this paper is to focus on the Sighisoara County, namely on the easement of certain areas for temporary or permanent maintenance or use by the church and hospitals in the region. That was a common practice in Medieval Europe aimed at ensuring the survival means for these institutions. However, it was not the only one to serve this goal. There were also donations on behalf of various people or allocations of money by the county authorities. The documents attesting this are unpublished, unedited and are to be found in the archives of the Brasov County, Budapest, and Vienna. They are the stepping stone of this paper and hence, they grant its originality. The objectives of the paper are to bring arguments in favor of the thesis that community money was directed towards meeting the needs of the hospitals, as well as towards supporting the widows, the orphans, and the needy ones. Worth noting in this respect is the management of the funds ceded to the church and county hospitals and that actually benefitted the whole community. Moreover, the paper also emphasizes the role played by education, since the latter is an important landmark for a community's development level
文摘The system of bona fide acquisition of movables is a very important system in civil law since modem times. However, in modem society, the further development of concept delivery makes the phenomenon of separation between possession and ownership become more and more universal. There is a potential conflict between possession reform and the announcement of property right of property as a sign of delivery, which has been brought up again in civil law circles. Based on the measure of interest and value analysis, on the possession case of bona fide acquisition system is discussed and reflection, in under the bona fide possession of the application, the modified say. With a view to China' s ongoing property rights legislation to benefit.
文摘A.S.Byatt's Possession has its own appraisal of public and critic alike for its original structure, as well as for the novelty and complexity of its themes. With Northrop Frye's archetypal criticism, this paper analyzes the epic poems"The Garden of Proserpina"so as to identify the hidden creation theme from paradise archetype.
基金This research was supported by the Qinghai Provincial High-End Innovative and Entrepreneurial Talents Project.
文摘Currently,there is a growing trend among users to store their data in the cloud.However,the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks.Additionally,when users perform file operations,the semantic integrity of the data can be compromised.Ensuring both data integrity and semantic correctness has become a critical issue that requires attention.We introduce a pioneering solution called Sec-Auditor,the first of its kind with the ability to verify data integrity and semantic correctness simultaneously,while maintaining a constant communication cost independent of the audited data volume.Sec-Auditor also supports public auditing,enabling anyone with access to public information to conduct data audits.This feature makes Sec-Auditor highly adaptable to open data environments,such as the cloud.In Sec-Auditor,users are assigned specific rules that are utilized to verify the accuracy of data semantic.Furthermore,users are given the flexibility to update their own rules as needed.We conduct in-depth analyses of the correctness and security of Sec-Auditor.We also compare several important security attributes with existing schemes,demonstrating the superior properties of Sec-Auditor.Evaluation results demonstrate that even for time-consuming file upload operations,our solution is more efficient than the comparison one.
基金supported in part by the National Natural Science Foundation of China under Grant No.61440014&&No.61300196the Liaoning Province Doctor Startup Fundunder Grant No.20141012+2 种基金the Liaoning Province Science and Technology Projects under Grant No.2013217004the Shenyang Province Science and Technology Projects under Grant Nothe Fundamental Research Funds for the Central Universities under Grant No.N130317002 and No.N130317003
文摘With the growing trend toward using cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Many cryptography and security schemes,such as PDP(Provable Data Possession) and POR(Proofs of Retrievability) were proposed for this problem.Although many efficient schemes for static data have been constructed,only a few dynamic schemes exist,such as DPDP(Dynamic Provable Data Possession).But the DPDP scheme falls short when updates are not proportional to a fixed block size.The FlexList-based Dynamic Provable Data Possession(FlexDPDP) was an optimized scheme for DPDP.However,the update operations(insertion,remove,modification)in Flex DPDP scheme only apply to single node at a time,while multiple consecutive nodes operation is more common in practice.To solve this problem,we propose optimized algorithms for multiple consecutive nodes,which including MultiNodes Insert and Verification,MultiNodes Remove and Verification,MultiNodes Modify and Verification.The cost of our optimized algorithms is also analyzed.For m consecutive nodes,an insertion takes O(m) + O(log N) + O(log m),where N is the number of leaf nodes of FlexList,a remove takes O(log/V),and a modification is the same as the original algorithm.Finally,we compare the optimized algorithms with original FlexList through experiences,and the results show that our scheme has the higher efficiency of time and space.
文摘Introduction:Some studles have described the M cells in the deepsubeploardial to midmyooardial layers of the canine ventricle.Transient outward current of potasium(ito)initiate the repolarization ofaction potentials,and has an important effect on the configuration ofaction potential of epicardium and endocardium.So.it is necessary tostudy further about the contribution of ito in M cells.Methods:Standard glass microelectrode was used to observe actionpotential properties of M cell in canine ventricular tissue allce.The whotecell patch clamp was used to investigate the effect of M cell’s ito oh itsaction potential.Results:(1)configuration of action potential:M cell and epicardialpossess prominent spike and dome configuration at early repolarization,but lucks of it in endocardium.(2)Characteristics of action potential:resting potential in M cell was more negtive than of apicardium andendocardium(respectively-88.,-66.5 and -85.9mv),but no statistic’ssignificance.Vmax in M cell possessed much greater than inendocardium and epicardium(299.0,197.6 and 160.4V/s).APD90 in Mcell was longer thin In eplcardium and endocardium(304,227 and211ms when BCL-1000ms);(3)M cell had more rate dependence ofaction potential duration than endocardium and endocardinm when BCLwas 500-5000ms;(4)ito in M cell and epicardium are aignifcantly greaterthan that in endocardium;(5)ito has obvious rate dependence,whenBCL lengthened,ito became strong.Conclutions:M cell possesses special characterlatics of actionpotential,such as obvious spike and dome configuration,much greaterVmax,longer action potential duration and more rate dependence,ito inM cell is one of the ionic busis of its having spike and dome morphologyand obvious rate dependence.vious rite dependence.
基金supported in part by National High Tech Research and Development Program(863 Program)of China(No.2015 AA016005)
文摘Increment of mobile cloud video motivates mobile users to utilize cloud storage service to address their demands, cloud storage provider always furnish a location-independent platform for managing user's data. However, mobile users wonder if their cloud video data leakage or dynamic migration to illegal service providers. In this paper, we design a novel provable data possession protocol based on data geographic location attribute, which allows data owner to auditing the integrity of their video data, which put forward an ideal choice for remote data possession checking in the mobile cloud storage. In our proposed scheme, we check out whether the video data dynamic migrate to an unspecified location (such as: overseas) by adding data geographic location attribute tag into provable data possession protocol. Moreover, we make sure the security of our proposed scheme under the Computational Diffic-Hellman assumption. The analysis and experiment results demonstrate that our proposed scheme is provably secure and efficient.
基金The work is supported by the National Key Research and Development Program of China(No.2018YFC1604002)the National Natural Science Foundation of China(Nos.U1836204,U1936208,U1936216 and 62002197).
文摘Provable Data Possession(PDP)schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading.However,with the emerging of network consisting of low performance devices such as Internet of Things,we find that there are still two obstacles for applying PDP schemes.The first one is the heavy computation overhead in generating tags for data blocks,which is essential for setting up any PDP scheme.The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing.In this paper,we propose a novel blockchain-based light-weighted PDP scheme for low performance devices,with an instance deployed on a cloud server.We design a secure outsourced tag generating method for low performance devices,which enables a kind of“hash-sign-switch”two-phase tag computing.With this method,users with low performance devices can employ third party auditors to compute modular exponential operations that accounts for the largest portion of computation overhead in tag generation,without leaking their data content.Chaincodes in blockchain network ensure the correctness of such outsourcing and prevent collusion attacks.The security analysis and performance evaluation prove that our scheme is both secure and efficient.
基金supported by Major Program of Shanghai Science and Technology Commission under Grant No.10DZ1500200Collaborative Applied Research and Development Project between Morgan Stanley and Shanghai Jiao Tong University, China
文摘Nowadays, an increasing number of persons choose to outsource their computing demands and storage demands to the Cloud. In order to ensure the integrity of the data in the untrusted Cloud, especially the dynamic files which can be updated online, we propose an improved dynamic provable data possession model. We use some homomorphic tags to verify the integrity of the file and use some hash values generated by some secret values and tags to prevent replay attack and forgery attack. Compared with previous works, our proposal reduces the computational and communication complexity from O(logn) to O(1). We did some experiments to ensure this improvement and extended the model to file sharing situation.
文摘This paper is intended to forecast the demand of the car market and the quantity of car possession in our country in 2000 by means of two statistics methods, i.e. tendency inference and regression analysis, and then its future growth tendency and market demand in our country are analyzed, according to the strategy requirement and the actual facts of our car industry development.
文摘The first society would be the society of the good will.Already several times discussed,for which the value-oriented life of this year can no longer become an open problem.We define the second society provisionally as the one,which is fundamentally not constituted by the above described good will.In the following,we will try to identify it in this abstract description as the society of the“majority”.We see the third society in that political class or elite,which power has been built in the year 1989 and thus became the concretization of that establishment,with which the“first”society identified itself so totally.This tripartition of the real existing Left might also explain,why its political articulation is so fragmented.A Leftist should have today three souls:one of the winners(the elite,as a member of our third class),one of the losers(as a member of our second class)and one of the man of good will(as a member of our first class),who very enjoyed in its total identification with the own system.And authors have drawn some meaningful conclusions.
文摘This article determined the cause of social suffering by using set theory and also demonstrated that the cause of any suffering is the emptiness quality of Yang and Ying of the phenomena or“ownership”view and have been given its definition.It described the society free from the basic suffering as named enlightened society or enlightenism like one of the formations of the social development and explained its scientific evidence and described the cause and condition of this society’s evolution and development.
文摘Isovaleroyl oxokadsurane,a novel dibenzocyclooctadiene lignan pos- sessing a spirobenzofuranoid skeleton was isolated from the stems of Kadsura coccinea.Its structure and relative configuration were determined by X-ray diffraction analysis.
文摘Over the last five decades or so, historical linguists have proposed as many as four different hypotheses concerning the migration pathway of Proto Nuclear Micronesians (i.e. the ancestors of Nuclear-Micronesian-language speakers): Proto Nuclear Micronesians may have reached Micronesia by moving from northern Vanuatu, from the Cristobal-Malaitan region, from the Admiralty or the St Matthias Islands, or even from somewhere in the vast southeast Solomons-New Hebrides region. This article provides an overview of these hypotheses, coming to the conclusion that there is no conclusive linguistic evidence, historical-comparative or otherwise, for any of the hypotheses. In view of this state of affairs, the article makes use of Johanna Nichols‘s population typology model so as to understand better the migration route of Proto Nuclear Micronesians. This innovative model has been developed to investigate geographical distributions of structural properties with a view to making inferences about human migration. In particular, the structural property of possessive classifiers, which is one of the major structural characteristics of Micronesian languages, is selected in order to ascertain how this structural property is distributed in the wider geographical areas surrounding Micronesia.Proto Nuclear Micronesians must have carried their propensity for a large number of possessive classifiers in their language(s) when travelling from somewhere into Micronesia.
文摘When the umbrellas were held up against the tear gas attack in the protest on September 28, 2014, the hot issue raised by the marathon-like Yellow Umbrella Movement was not only the matter of politics but also a coincidence created for the Hong Kong locals to face, or to be faced with an already moot cliche: How the Hongkongese can redef'me and redeem their almost lost socio-cultural identity, particularly under the increasingly hegemonic influences and the socio-cultural invasion of the mainland after the 1997 Handover. My present paper is not intended to discuss the topic of identity on the platform of politics, or the postcolonial studies such as transculturation or cultural hybridty. But instead, I am far more interested in locating such issue on the aesthetic dimension of collective memory, which is revealed in two local contemporary Hong Kong compositions. In the process of shaping and reshaping a form of"HongKongeseness" in which the composers tend to create and the local listeners tend to experience, albeit transient, can appear in every nuance of the sonic metaphor embedded in the pre-existing indigenous tunes of a self-contained compositional work.
文摘This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region and used as the first and the second language for some urban dwellers in the country.It is a working language for the Federal Government of Ethiopia.It serves the same in Gambella,Southern Nations,Nationalities and Peoples’and Benishangul-Gumuz regional states.The Amharic existential,possessive and locative constructions are characterized by using the same existential verb stem all-‘exist’.The verb is defective in its derivation and conjugation.Unlike the prototypical verbs of the language,the existential verb uses a different verb for imperfective and past verb forms.Unlike the regular verbs of the language,the existential verb,which is perfective in form,conveys present tense.It has been observed that indefinite nominals appear as the E(Existent)in existentials and possessives,whereas definite ones appear in locatives.The morphosyntactic features of existentials and locatives are the same in every aspect except the use of definiteness of the E(Existent).The possessives differ from the two constructions in word order and morphological structure of the verb.
文摘From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction.
文摘<strong>Introduction</strong><strong>:</strong> The key to success is finding the perfect mixture of tactical patterns and sudden breaks of them, which depends on the behavior of the opponent team and is not easy to estimate by just watching matches. According to the specific tactical team behavior of “attack vs. defense” professional football matches are investigated based on a simulation approach, professional football matches are investigated according to the specific tactical team behavior of “attack vs. defense.” <strong>Methods:</strong> The formation patterns of all the sample games are categorized by SOCCER<span style="white-space:nowrap;">©</span> for defense and attack. Monte Carlo-Simulation can evaluate the mathematical, optimal strategy. The interaction simulation between attack and defense shows optimal flexibility rates for both tactical groups. <strong>Approach: </strong>A simulation approach based on 40 position data sets of the 2014/15 German Bundesliga has been conducted to analyze and optimize such strategic team behavior in professional soccer. <strong>Results:</strong> The results revealed that both attack and defense have optimal planning rates to be more successful. The more complex the success indicator, the more successful attacking player groups get. The results also show that defensive player groups always succeed in attacking groups below a specific planning rate value.<strong> Conclusion:</strong> Groups are always succeeding. The simulation-based position data analysis shows successful strategic behavior patterns for attack and defense. Attacking player groups need very high flexibility to be successful (stay in ball possession). In contrast, defensive player groups only need to be below a defined flexibility rate to be guaranteed more success.
文摘The author of the paper analyzes the story"Glass Coffin"in A. S. Byatt's Possession and compares it with Brothers Grimm's fairy tale with the same name. Through the study, the author identifies the quest motif from our modern hero's discovery journey in Possession.