In 2009, the nuclear power plants under China National Nuclear Corporation (CNNC) continuously kept reliable operation. CNNC's seven nuclear power units accumulatively generated 38.25
On February 24, 1993, when the appraisal meeting of the Sino-Japanese Joint Research Project of Well-off Household Residences was held in Beijing, Person-in-charge from the China Building Technology Development and Re...On February 24, 1993, when the appraisal meeting of the Sino-Japanese Joint Research Project of Well-off Household Residences was held in Beijing, Person-in-charge from the China Building Technology Development and Research Centre and the Japan International Cooperation Undertakings Group signed the project appraisal report. It marked the successful completion of this three-year joint research project.展开更多
The study empirically assesses how macroprudential policy interacts with systemic risk,industrial production,and monetary intervention on a global level from January 2006 to December 2018.We adopt the aggregate proxie...The study empirically assesses how macroprudential policy interacts with systemic risk,industrial production,and monetary intervention on a global level from January 2006 to December 2018.We adopt the aggregate proxies of these variables,capturing their global effects,and use a novel econometric technique,namely,smooth local projections.The study finds that global macroprudential policy leads the monetary policy,exhibiting a countercyclical pattern concerning industrial production.The latter has an inverse bidirectional linkage with systemic risk.Thus,an ex-ante tight macroprudential policy can indirectly mitigate global systemic risk through its pro-growth effect on industrial production,although no convincing evidence exists for the direct impact of a macroprudential intervention on systemic risk.The study results endure several extensions and a robustness check,which builds on alternative measures of global systemic stress and real economic activity,thereby legitimizing the increased importance attached to the macroprudential policy since the 2007–2009 global financial crisis.展开更多
This paper proposes a robust Immersion and Invariance(I&I)adaptive coordinated controller for a class of uncertain linear-motor-driven biaxial gantry system subject to external disturbances for high-accuracy conto...This paper proposes a robust Immersion and Invariance(I&I)adaptive coordinated controller for a class of uncertain linear-motor-driven biaxial gantry system subject to external disturbances for high-accuracy contour tracking.Firstly,the dynamic model of the gantry system is transformed into task coordinate frame,through which the contour tracking can be regarded as a regulation problem.Based on the transformed system dynamics,an I&I-based adaptation law with smooth projection is proposed to estimate the unknown parameters.Different from traditional adaptive control,the proposed robust I&I adaptive control introduces a new term called tuning function in adaptation law to shape the dynamic behaviour of the estimation vector.Then the stability of the closed-loop system is proved by Lyapunov theory.Finally,comparative experiments are executed on an industrial biaxial gantry system with two different cases to verify the effectiveness of the proposed control law.展开更多
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch...Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynchronous multi-party network with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally composable (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is preserved under concurrent composition of an unbounded number of protocol executions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and security reductions.展开更多
文摘In 2009, the nuclear power plants under China National Nuclear Corporation (CNNC) continuously kept reliable operation. CNNC's seven nuclear power units accumulatively generated 38.25
文摘On February 24, 1993, when the appraisal meeting of the Sino-Japanese Joint Research Project of Well-off Household Residences was held in Beijing, Person-in-charge from the China Building Technology Development and Research Centre and the Japan International Cooperation Undertakings Group signed the project appraisal report. It marked the successful completion of this three-year joint research project.
文摘The study empirically assesses how macroprudential policy interacts with systemic risk,industrial production,and monetary intervention on a global level from January 2006 to December 2018.We adopt the aggregate proxies of these variables,capturing their global effects,and use a novel econometric technique,namely,smooth local projections.The study finds that global macroprudential policy leads the monetary policy,exhibiting a countercyclical pattern concerning industrial production.The latter has an inverse bidirectional linkage with systemic risk.Thus,an ex-ante tight macroprudential policy can indirectly mitigate global systemic risk through its pro-growth effect on industrial production,although no convincing evidence exists for the direct impact of a macroprudential intervention on systemic risk.The study results endure several extensions and a robustness check,which builds on alternative measures of global systemic stress and real economic activity,thereby legitimizing the increased importance attached to the macroprudential policy since the 2007–2009 global financial crisis.
基金the National Natural Science Foundation of China[Grant Number 61673050].
文摘This paper proposes a robust Immersion and Invariance(I&I)adaptive coordinated controller for a class of uncertain linear-motor-driven biaxial gantry system subject to external disturbances for high-accuracy contour tracking.Firstly,the dynamic model of the gantry system is transformed into task coordinate frame,through which the contour tracking can be regarded as a regulation problem.Based on the transformed system dynamics,an I&I-based adaptation law with smooth projection is proposed to estimate the unknown parameters.Different from traditional adaptive control,the proposed robust I&I adaptive control introduces a new term called tuning function in adaptation law to shape the dynamic behaviour of the estimation vector.Then the stability of the closed-loop system is proved by Lyapunov theory.Finally,comparative experiments are executed on an industrial biaxial gantry system with two different cases to verify the effectiveness of the proposed control law.
基金the National Natural Science Foundation of China (Grant Nos. 60702059, 60633020 and 60573036)by the MIC of Korea, under the ITRC support program supervised by the IITA (IITA-2006-C1090-0603-0026)
文摘Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynchronous multi-party network with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally composable (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is preserved under concurrent composition of an unbounded number of protocol executions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and security reductions.