The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Emotional intelligence concludes three aspects, which are skills of how to evaluate and express their own and others' emotions correctively, ability to regulate their own and others' emotions effectively and the ability to motivate people and finally achieve goals by using emotion. The relationship between emotional intelligence and performance is the main subject of emotional intelligence under organizational...
A high gain axial-mode helical antenna with parasitic element is proposed. A metal wafer is used as parasitic element, loaded in the front of general axial-mode helical antenna to achieve the aim of improving antenna gain. The diameter of the wafer and the distance between the wafer and the end of the helical wire, which can influence the antenna characteristics, are both simulated and optimized by...
Externality controlling is important problem in environmental protection. And, the overall model of externality controlling is very rare during relative studies. For attempting to guide externality management, the paper tried to create a theory-model of externality controlling using target programming method, and, created relative coordinate figure. At last, data analysis corroborated conclusion of...
With serious situation of data leakage in many enterprises, sensitive dataflow protection based on Trusted Virtual Domains (TVD) has been gradually paid much attention to. Remote attestation among two or more entities across trusted virtual domains is an important means to ensure sensitive dataflow, but the existing schemes could not satisfy the higher requirements of flexibility and security in the...
Abstract-A novel steganography algorithm CRCsteg based on CRC method is proposed. CRCsteg exploits the 1-1 and onto mapping from x^j-1 to {R(x)}\{0} over GF(2^k), s.t.1 ?? j ?? 2^k-1 and k = deg(R) +1, to embed the positive integer j into 2^k-1 bits cover stream. The new method has similar performance with previous matrices embedding schemes, and much simpler embedding/extracting codes and computation,...
Virtualization makes virtual machines with a wide range of security requirements run simultaneously on the same commodity hardware. Direct Anonymous Attestation (DAA) for virtual machine is a cryptographic mechanism that enables remote attestation of virtual machine instances ( VMIs ) while preserving privacy under the user's control. However, trusted platform module (TPM) with only limited storage...
To establish model of externality controlling, described value functions under outsourcing model of administrator giving pollution controlling business to pollution releasing enterprise in externality controlling, and analyzed externality decisions under different information conditions. Under asymmetric information condition, administrator as principal, the enterprise as agent, established outsourcing's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.