We generalize the congruences of Friedmann-Tamarkine (1909), Lehmer (1938), and Ernvall-Metsänkyla (1991) on the sums of powers of integers weighted by powers of the Fermat quotients to the next Fermat quotient p...We generalize the congruences of Friedmann-Tamarkine (1909), Lehmer (1938), and Ernvall-Metsänkyla (1991) on the sums of powers of integers weighted by powers of the Fermat quotients to the next Fermat quotient power, namely to the third power of the Fermat quotient. Using this result and the Gessel identity (2005) combined with our past work (2021), we are able to relate residues of some truncated convolutions of Bernoulli numbers with some Ernvall-Metsänkyla residues to residues of some full convolutions of the same kind. We also establish some congruences concerning other related weighted sums of powers of integers when these sums are weighted by some analogs of the Teichmüller characters.展开更多
The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these ...The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.展开更多
Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed....Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.As Internet of Things(IoT)and long-term evolution for machine type(LTE-m)are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase.For all the above issues standards’bodies should ensure users’identity and privacy in order to gain the trust of service providers and industries.Against such threats,5G specifications require a rigid and robust privacy procedure.Many research studies have addressed user privacy in 5G networks.This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity(IMSI)using a mutable mobile subscriber identity(MMSI)that changes randomly and avoids the exchange of IMSIs.It maintains authentication and key agreement(AKA)structure compatibility with previous mobile generations and improves user equipment(UE)synchronization with home networks.The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server(HSS).The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly.The proposed solution was verified by ProVerif.展开更多
From the methodological perspective, the thesis summarized leisure tea act, judging-time tea act to map translator's style. Through investigations on all these, the thesis succeeded in confirming the translator...From the methodological perspective, the thesis summarized leisure tea act, judging-time tea act to map translator's style. Through investigations on all these, the thesis succeeded in confirming the translator's styles and pinpointing cultural identity as essential factors influencing their styles. Hopefully, this could help to provide a new angle of view to make research on translator's style. Moreover, the thesis wishes that with analysis of tea culture in Hong Lou Meng the translation of tea relevant acts receive greater priority in the Chinese Classics Translation.展开更多
The trace identity is extended to the quadratic-form identity. The Hamiltonian structures of the multi-component Guo hierarchy, integrable coupling of Guo hierarchy and (2+l)-dimensional Guo hierarchy are obtained ...The trace identity is extended to the quadratic-form identity. The Hamiltonian structures of the multi-component Guo hierarchy, integrable coupling of Guo hierarchy and (2+l)-dimensional Guo hierarchy are obtained by the quadraticform identity. The method can be used to produce the Hamiltonian structures of the other integrable couplings or multi-component hierarchies.展开更多
This paper is going to do a research on the book The Bonesetter's Daughter and will make an analysis of mysterious images appear in the novel which can be considered as symbols that reflect the culture of orient. ...This paper is going to do a research on the book The Bonesetter's Daughter and will make an analysis of mysterious images appear in the novel which can be considered as symbols that reflect the culture of orient. And it also looks into the identity issue of Chinese American women from postcolonial perspective.展开更多
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi...The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition.展开更多
The participation of women in legislation is an important aspect and means of safeguarding women’s rights.Feminist theory,based on criticism of both the“citizenship identity theory as rights”and the“citizenship id...The participation of women in legislation is an important aspect and means of safeguarding women’s rights.Feminist theory,based on criticism of both the“citizenship identity theory as rights”and the“citizenship identity theory as responsibilities,”proposes the“citizenship identity theory as subjectivity.”Observing the current practice of women’s participation in legislation in China,two institutional safeguard principles can be summarized:the“minimum proportion”and the“influence evaluation.”However,each of these principles has its inherent limitations.Therefore,it is necessary to supplement them with the principle of“subjective participation”in a reflective manner.This principle requires women to participate substantively in the legislative process as subjects,express women’s needs and demands,input women’s perspectives and experiences,and reconstruct the distribution of rights and responsibilities in the existing legislation.The three principles complement each other and work together to comprehensively constitute the institutional structure of women’s participation in legislation,thereby promoting the reproduction of corresponding action structures.展开更多
In the article Owen’s and Yang Guobin’s English versions of Wenxin Diaolong are compared from the perspective of a translator’s identity.Owen is a translator of A-merican origin while Yang Guobin is of Chinese orig...In the article Owen’s and Yang Guobin’s English versions of Wenxin Diaolong are compared from the perspective of a translator’s identity.Owen is a translator of A-merican origin while Yang Guobin is of Chinese origin.Their multiple identity as a reader,author,creator and cultural communicator differs much from each other,which produces important influences upon the selection of the strategy of translation.Owen prefers foreignizing translation while Yang favors domesticating translation.The English translation of Wenxin Diaolong provides much value for the research on the translation of Chinese classic literature.展开更多
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay inten...From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction.展开更多
Evaluation,especially negative evaluation,is an important element in academic book reviews.Unfortunately,previous studies on evaluation strategies in Chinese and English book reviews are still limited in number.Recent...Evaluation,especially negative evaluation,is an important element in academic book reviews.Unfortunately,previous studies on evaluation strategies in Chinese and English book reviews are still limited in number.Recently,identity construction has been a hot research issue in various fields of social science.However,few studies have ever been conducted on how book reviewers construct various identities with the use of evaluation strategies.As such,this thesis tries to investigate how the negative evaluation,the most direct face-threatening evaluation,are linked closely to author’ s identity construction in Chinese and English book reviews,how the Chinese and English book reviewers make salient their appropriate identities with the skillful use of discourse strategies so as to avoid possible face-threatening.The present study collects fifteen Chinese and fifteen English academic book reviews as research data.An analysis of the data indicates that while there are similarities,there are also distinctive differences in the use of negative evaluation strategies and author’ s identity construction in Chinese and English book reviews.Specifically,with the use of negative evaluation,four important identities are constructed,namely,the author’ s identities as an authoritative writer,a polite and friendly evaluator,a responsible opinion holder and a kind academic ally.展开更多
Writer identity in academic writing has long been ignored by developing L2 writers.Moreover,research has much focused on the reader in shaping writing,and treated the role of the writer as unproblematic.In this essay,...Writer identity in academic writing has long been ignored by developing L2 writers.Moreover,research has much focused on the reader in shaping writing,and treated the role of the writer as unproblematic.In this essay,the construction of writer identity in developing writers’academic writing practice will be explored through a review of some relevant literature research and gain insights for the development of writer apprentices and writing instruction.展开更多
User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore ...User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore the rich image resources generated by users,and the existing attempts touch on the multimodal domain,but still face the challenge of semantic differences between text and images.Given this,we investigate the UIL task across different social media platforms based on multimodal user-generated contents(UGCs).We innovatively introduce the efficient user identity linkage via aligned multi-modal features and temporal correlation(EUIL)approach.The method first generates captions for user-posted images with the BLIP model,alleviating the problem of missing textual information.Subsequently,we extract aligned text and image features with the CLIP model,which closely aligns the two modalities and significantly reduces the semantic gap.Accordingly,we construct a set of adapter modules to integrate the multimodal features.Furthermore,we design a temporal weight assignment mechanism to incorporate the temporal dimension of user behavior.We evaluate the proposed scheme on the real-world social dataset TWIN,and the results show that our method reaches 86.39%accuracy,which demonstrates the excellence in handling multimodal data,and provides strong algorithmic support for UIL.展开更多
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an i...In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et aL's scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice.展开更多
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform...The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs.展开更多
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo...Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients.展开更多
文摘We generalize the congruences of Friedmann-Tamarkine (1909), Lehmer (1938), and Ernvall-Metsänkyla (1991) on the sums of powers of integers weighted by powers of the Fermat quotients to the next Fermat quotient power, namely to the third power of the Fermat quotient. Using this result and the Gessel identity (2005) combined with our past work (2021), we are able to relate residues of some truncated convolutions of Bernoulli numbers with some Ernvall-Metsänkyla residues to residues of some full convolutions of the same kind. We also establish some congruences concerning other related weighted sums of powers of integers when these sums are weighted by some analogs of the Teichmüller characters.
基金The Universiti Kebangsaan Malaysia(UKM)Research Grant Scheme GGPM-2020-028 funded this research.
文摘The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.
基金This Research was supported by Taif University Researchers Supporting Project Number(TURSP-2020/216),Taif University,Taif,Saudi Arabia。
文摘Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.As Internet of Things(IoT)and long-term evolution for machine type(LTE-m)are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase.For all the above issues standards’bodies should ensure users’identity and privacy in order to gain the trust of service providers and industries.Against such threats,5G specifications require a rigid and robust privacy procedure.Many research studies have addressed user privacy in 5G networks.This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity(IMSI)using a mutable mobile subscriber identity(MMSI)that changes randomly and avoids the exchange of IMSIs.It maintains authentication and key agreement(AKA)structure compatibility with previous mobile generations and improves user equipment(UE)synchronization with home networks.The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server(HSS).The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly.The proposed solution was verified by ProVerif.
文摘From the methodological perspective, the thesis summarized leisure tea act, judging-time tea act to map translator's style. Through investigations on all these, the thesis succeeded in confirming the translator's styles and pinpointing cultural identity as essential factors influencing their styles. Hopefully, this could help to provide a new angle of view to make research on translator's style. Moreover, the thesis wishes that with analysis of tea culture in Hong Lou Meng the translation of tea relevant acts receive greater priority in the Chinese Classics Translation.
文摘The trace identity is extended to the quadratic-form identity. The Hamiltonian structures of the multi-component Guo hierarchy, integrable coupling of Guo hierarchy and (2+l)-dimensional Guo hierarchy are obtained by the quadraticform identity. The method can be used to produce the Hamiltonian structures of the other integrable couplings or multi-component hierarchies.
文摘This paper is going to do a research on the book The Bonesetter's Daughter and will make an analysis of mysterious images appear in the novel which can be considered as symbols that reflect the culture of orient. And it also looks into the identity issue of Chinese American women from postcolonial perspective.
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
文摘The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition.
基金a phased project of the “Research on the Principles of Argumentation of Ratio Legis (Reasons) in Local Legislation” (Project Approval Number 2023EFX002)a Youth Project of Shanghai Philosophy and Social Science Planning in 2023。
文摘The participation of women in legislation is an important aspect and means of safeguarding women’s rights.Feminist theory,based on criticism of both the“citizenship identity theory as rights”and the“citizenship identity theory as responsibilities,”proposes the“citizenship identity theory as subjectivity.”Observing the current practice of women’s participation in legislation in China,two institutional safeguard principles can be summarized:the“minimum proportion”and the“influence evaluation.”However,each of these principles has its inherent limitations.Therefore,it is necessary to supplement them with the principle of“subjective participation”in a reflective manner.This principle requires women to participate substantively in the legislative process as subjects,express women’s needs and demands,input women’s perspectives and experiences,and reconstruct the distribution of rights and responsibilities in the existing legislation.The three principles complement each other and work together to comprehensively constitute the institutional structure of women’s participation in legislation,thereby promoting the reproduction of corresponding action structures.
基金supported by the Humanities and Social Sciences Research Program of the Ministry of Education in 2016(16YJA740013)the major program of Teaching Research of Anhui Province(2016jyxm0798)+2 种基金the program of Foreign Languages Teaching and Research of National Institutions of Higher Learning(2015AH0034A)the Specialized Fund for the Basic Research Program for the Central Universities(JS2015HGXJ0074)the Philosophy and Social Sciences Program of Hefei University of Technology(2017)
文摘In the article Owen’s and Yang Guobin’s English versions of Wenxin Diaolong are compared from the perspective of a translator’s identity.Owen is a translator of A-merican origin while Yang Guobin is of Chinese origin.Their multiple identity as a reader,author,creator and cultural communicator differs much from each other,which produces important influences upon the selection of the strategy of translation.Owen prefers foreignizing translation while Yang favors domesticating translation.The English translation of Wenxin Diaolong provides much value for the research on the translation of Chinese classic literature.
文摘From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction.
文摘Evaluation,especially negative evaluation,is an important element in academic book reviews.Unfortunately,previous studies on evaluation strategies in Chinese and English book reviews are still limited in number.Recently,identity construction has been a hot research issue in various fields of social science.However,few studies have ever been conducted on how book reviewers construct various identities with the use of evaluation strategies.As such,this thesis tries to investigate how the negative evaluation,the most direct face-threatening evaluation,are linked closely to author’ s identity construction in Chinese and English book reviews,how the Chinese and English book reviewers make salient their appropriate identities with the skillful use of discourse strategies so as to avoid possible face-threatening.The present study collects fifteen Chinese and fifteen English academic book reviews as research data.An analysis of the data indicates that while there are similarities,there are also distinctive differences in the use of negative evaluation strategies and author’ s identity construction in Chinese and English book reviews.Specifically,with the use of negative evaluation,four important identities are constructed,namely,the author’ s identities as an authoritative writer,a polite and friendly evaluator,a responsible opinion holder and a kind academic ally.
文摘Writer identity in academic writing has long been ignored by developing L2 writers.Moreover,research has much focused on the reader in shaping writing,and treated the role of the writer as unproblematic.In this essay,the construction of writer identity in developing writers’academic writing practice will be explored through a review of some relevant literature research and gain insights for the development of writer apprentices and writing instruction.
文摘User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore the rich image resources generated by users,and the existing attempts touch on the multimodal domain,but still face the challenge of semantic differences between text and images.Given this,we investigate the UIL task across different social media platforms based on multimodal user-generated contents(UGCs).We innovatively introduce the efficient user identity linkage via aligned multi-modal features and temporal correlation(EUIL)approach.The method first generates captions for user-posted images with the BLIP model,alleviating the problem of missing textual information.Subsequently,we extract aligned text and image features with the CLIP model,which closely aligns the two modalities and significantly reduces the semantic gap.Accordingly,we construct a set of adapter modules to integrate the multimodal features.Furthermore,we design a temporal weight assignment mechanism to incorporate the temporal dimension of user behavior.We evaluate the proposed scheme on the real-world social dataset TWIN,and the results show that our method reaches 86.39%accuracy,which demonstrates the excellence in handling multimodal data,and provides strong algorithmic support for UIL.
文摘In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et aL's scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice.
文摘The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs.
文摘Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients.