incomplete information
Recently Published Documents


TOTAL DOCUMENTS

2939
(FIVE YEARS 508)

H-INDEX

88
(FIVE YEARS 9)

2022 ◽  
Vol 30 (3) ◽  
pp. 0-0

The rapid rise of C2C e-commerce in China has brought serious difficulties to China's tax collection and management. Based on the principle of progressive taxation, the necessity of Taxation on C2C e-commerce is analyzed and discussed. It is shown that the absence of Taxation in C2C e-commerce is contrary to the principle of tax equity and tax neutrality, and the tax revenue is lost.It is demonstrated that it is imperative that China to implement C2C e-commerce taxation in a comprehensive and standardized way. By constructing a hybrid decision game model between C2C business operators and tax authorities, the static game analysis of incomplete information is conducted for the balance of interests between tax authorities and e-commerce operators.


2022 ◽  
Vol 30 (3) ◽  
pp. 1-14
Author(s):  
Jiamian Yu ◽  
Haiyan Yu

The rapid rise of C2C e-commerce in China has brought serious difficulties to China's tax collection and management. Based on the principle of progressive taxation, the necessity of Taxation on C2C e-commerce is analyzed and discussed. It is shown that the absence of Taxation in C2C e-commerce is contrary to the principle of tax equity and tax neutrality, and the tax revenue is lost.It is demonstrated that it is imperative that China to implement C2C e-commerce taxation in a comprehensive and standardized way. By constructing a hybrid decision game model between C2C business operators and tax authorities, the static game analysis of incomplete information is conducted for the balance of interests between tax authorities and e-commerce operators.


Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 260
Author(s):  
Hongyi Li ◽  
Daojing He ◽  
Xiaogang Zhu ◽  
Sammy Chan

In the past decades, due to the popularity of cloning open-source software, 1-day vulnerabilities are prevalent among cyber-physical devices. Detection tools for 1-day vulnerabilities effectively protect users who fail to adopt 1-day vulnerability patches in time. However, manufacturers can non-standardly build the binaries from customized source codes to multiple architectures. The code variants in the downstream binaries decrease the accuracy of 1-day vulnerability detections, especially when signatures of out-of-bounds vulnerabilities contain incomplete information of vulnerabilities and patches. Motivated by the above observations, in this paper, we propose P1OVD, an effective patch-based 1-day out-of-bounds vulnerability detection tool for downstream binaries. P1OVD first generates signatures containing patch information and vulnerability root cause information. Then, P1OVD uses an accurate and robust matching algorithm to scan target binaries. We have evaluated P1OVD on 104 different versions of 30 out-of-bounds vulnerable functions and 620 target binaries in six different compilation environments. The results show that P1OVD achieved an accuracy of 83.06%. Compared to the widely used patch-level vulnerability detection tool ReDeBug, P1OVD ignores 4.07 unnecessary lines on average. The experiments on the x86_64 platform and the O0 optimization show that P1OVD increases the accuracy of the state-of-the-art tool, BinXray, by 8.74%. Besides, it can analyze a single binary in 4 s after a 20-s offline signature extraction on average.


2022 ◽  
Vol 7 (5) ◽  
pp. 36-45
Author(s):  
A. Hosseini ◽  
T. K. Kahnamouei

The aims of the article are to examine the meanings of indirect evidentiality: inference, goal, desire and to search the manifestation of direct evidentiality in Russian exclamatory sentences. We attempt to prove that this category of evidentiality can be found in exclamatory sentences to express the speaker’s emotional attitude to the described situation, and, also, by using the cognitive discourse analysis, we are going to search the ways of realization of the speaker’s and his interlocutor’s intentions in any statement. In our study we analyzed the exclamatory sentences containing certain lexical or grammatical language tools used to express the meanings of direct and indirect evidentiality. The relevance of this work is determined by the necessity of studying the reliable and unreliable sources of information expressed in Russian exclamatory sentences. By means of cognitive discourse analysis, we revealed that the availability of some of introductory words, particles, exclamatory pronouns and etc. according to the context, can contextually point to the personal experience of the speaker or to the unreliable and incomplete information he gets. In these situations the subject of the speech act in relation to what he sees or hears, renders feelings of wonder, happiness and sadness.


2021 ◽  
pp. 441-452
Author(s):  
Alexandra Vintila ◽  
Mihai Daniel Roman

2021 ◽  
Vol 12 (2) ◽  
pp. 267-272
Author(s):  
Nevi Setyaningsih ◽  
Fitriani Fitriani ◽  
Ahmad Faisol

Rough Set Theory (RST) is an essential mathematical tool to deal with imprecise, inconsistent, incomplete information and knowledge Rough Some algebra structures, such as groups, rings, and modules, have been presented on rough set theory. The sub-exact sequence is a generalization of the exact sequence. In this paper, we introduce the notion of a sub-exact sequence of groups. Furthermore, we give some properties of the rough group and rough sub-exact sequence of groups. 


Author(s):  
Marek Stodola ◽  
Stanislav Frolík

We will study binocular vision for 6-DOF robotic manipulator in conformal geometric algebra approach. We will focus on the case where some information as relative cameras positions, has been lost. In particular, we will use the construction of the manipulator to infer a self calibration method for cameras position based in binocular vision with incomplete information.


Sign in / Sign up

Export Citation Format

Share Document