In the era of the Internet, image encryption plays an important role in information security. Chaotic systems and DNA operations have been proven to be powerful for image encryption. To further enhance the security of image, in this paper, we propose a novel algorithm that combines the fractional-order hyperchaotic Lorenz system and DNA computing for image encryption. Specifically, the algorithm consists of four parts: firstly, we use a fractional-order hyperchaotic Lorenz system to generate a pseudorandom sequence that will be utilized (...) during the whole encryption process; secondly, a simple but effective diffusion scheme is performed to spread the little change in one pixel to all the other pixels; thirdly, the plain image is encoded by DNA rules and corresponding DNA operations are performed; finally, global permutation and 2D and 3D permutation are performed on pixels, bits, and acid bases. The extensive experimental results on eight publicly available testing images demonstrate that the encryption algorithm can achieve state-of-the-art performance in terms of security and robustness when compared with some existing methods, showing that the FOHCLDNA is promising for image encryption. (shrink)
In the eighth century, Wu Jing selected exchanges between Emperor Taizong and his ministers that he deemed key to good governance. This collection of dialogues has been used for the education of emperors, political elites and general readers ever since, and is a standard reference work in East Asian political thought. Consisting of ten volumes, subdivided into forty topics, The Essentials of Governance addresses core themes of Chinese thinking about the politics of power, from the body politic, presenting and receiving (...) criticism, recruitment, the education of the imperial clan, political virtues and vices, to cultural policy, agriculture, law, taxation, border policy, and how to avoid disaster and dynastic fall. Presented with introductory commentary that offers insights into its historical context and global reception, this accessible and reliable translation brings together ten scholars of Chinese intellectual history to offer a nuanced edition that preserves the organisation, tone and flow of the original. (shrink)
Within the same pathogen-stress framework as proposed by Fincher & Thornhill (F&T), we argue further that pathogen stress promotes matrilocal rather than patrilocal family ties which, in turn, slow down the process of modernity; and that pathogen stress promotes social learning or copying, including the adoption of foreign religions.
Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. This article presents a brain-inspired computing of attention value of surrounding environment changes with a processes-based cognition model by introducing a ratio valueλof EC-implications within considered periods. Theoretical models for computation of warning level of EC-implications to the universal video recognition efficiency are further established. Imbedding (...) proposed models into the online algorithms is suggested as a future research priority towards precision security for critical applications and, furthermore, schemes for a practical implementation of such integration are also preliminarily discussed. (shrink)
In response to numerous recent cases involving materially misstated financial information arising from fraudulent financial reporting, companies, auditors, and academics have increased their focus on strengthening internal controls as a means of deterring such unethical behaviors. However, prior research suggests that stronger controls may actually exacerbate the very opportunistic behavior the controls are intended to curb. The current study investigates whether the efficacy of an implemented control is conditioned on not only the strength of the control, but also on how (...) the firm frames the purpose for implementing the control. A monitoring purpose frames controls as reducing managers’ opportunities to engage in self-interested behavior, while a coordinating purpose frames controls as facilitating coordination between the firm and its managers. We posit that the efficacy of stronger controls to reduce unethical fraudulent reporting depends on the control frame. Using an experiment, this study investigates the interactive effect of control strength and control frame on managers’ fraudulent reporting decisions. As predicted, our results show that when controls are framed for monitoring purposes, stronger controls result in less fraudulent reporting than weaker controls. Conversely, when controls are framed for coordinating purposes, stronger controls result in more fraudulent reporting than weaker controls. Our results suggest that an inconsistency between the firm’s choice of the control strength and the control frame reduces the efficacy of the implemented control to curb unethical reporting behaviors. Furthermore, supplemental analysis shows that managers’ rationalization helps explain the interactive effect of control strength and communicated control purpose on fraudulent reporting. (shrink)