Learn More
a r t i c l e i n f o This research presents an integrated information processing model of phishing susceptibility grounded in the prior research in information process and interpersonal deception. We refine and validate the model using a sample of intended victims of an actual phishing attack. The data provides strong support for the model's theoretical(More)
Three steroids and one nordammarane triterpenoid were isolated for the first time from the endophytic fungus Pichia guilliermondii Ppf9 derived from the medicinal plant Paris polyphylla var. yunnanensis. By means of physicochemical and spectrometric analysis, they were identified as ergosta-5,7,22-trienol (1), 5α,8α-epidioxyergosta-6,22-dien-3β-ol (2),(More)
Soil salinity is a major constraint to rice production. Understanding the genetic basis of salt tolerance is crucial for the improvement of salt tolerance through breeding. Previous quantitative trait locus (QTL) studies for salt tolerance were mainly derived from bi-parental segregating populations and relatively little is known about the results from(More)
— The paper firstly presents a mobile humanoid robot whose upper human-like body is rigidly mounted on the mobile platform with three wheels: two driving wheels and one caster wheel. The wheeled mobile platform moves on the ground subjected to nonholonomic constraints. Then the static equilibrium of the robot on a plane is discussed and tip-over stability(More)
Closed‐loop inverse kinematics (CLIK) algorithm mostly resolves the redundancy at the velocity level. In this paper we extend the CLIK algorithm to the acceleration level to meet some applications that require the joint accelerations. The redundancy resolutions at the velocities and acceleration levels via pseudoinverse method are analyzed respectively. The(More)
— This paper presents a kind of method for the inverse kinematics of a seven degrees of freedom (DoF) arm installed on a mobile humanoid robot. Due to the redundancy of 7-DoF open-chain arm, the closed-loop inverse kinematics via pseudoinverse method is used to solve the corresponding joint trajectories if the end-effector trajectory is given. Because of(More)
Email plays an important role in the digital economy but is threatened by increasingly sophisticated cybercrimes. A number of security services have been developed, including an email authentication service designed to cope with email threats. It remains unknown how users perceive and evaluate these security services and consequently form their adoption(More)
—Tracking a surface via the end-effector of a ma-nipulator is a tough issue, one not only should implement the position and force control , but also monitor and sense the actual contacting state between the end-effector and the object's surface. In this paper, we present an approach integrating the tactile sensing with force-torque information as the(More)