To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development ...Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development of human rights intersect.In view of the close relationship between the actions for addressing climate change and environmental rights,China should integrate the protection of environmental rights into the actions for addressing climate change,so as to achieve simultaneous development of both.In the process of coping with climate change,the right to climate stability that mainly pursues a“harmless”environment and the right to a more livable climate that pursues a“beautiful eco-environment”are specific manifestations of environmental rights and should be the priority of protection efforts.However,there are still some obstacles to achieving the coordinated development of the efforts to address climate change and the protection of environmental rights because traditional rights protection methods mainly give individuals subjective rights with the power to claim and are thus difficult to meet the needs of environmental rights protection in the context of climate change,and there are inherent value differences between responding to climate change and the realization of other human rights.Building a multi-level national obligation system to address climate change,giving full play to the role of courts in responding to climate change through moderate judicial activism,and coordinating the efforts to cope with climate change and the development of human rights under the guidance of a holistic system view are effective ways to overcome the aforementioned difficulties.展开更多
The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance m...The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance method in a 12-inch coplanar AC PDP. The wall charge waveforms show the relationship between the slope ratio of the falling ramp reset pulse and the wall charges at the end of the falling ramp reset pulse which influences the addressing stability. Then the effects of the slope ratio of the linear falling ramp reset pulse on the addressing voltage and addressing time were investigated. The experimental results show that the minimum addressing voltage increases with the increase of the slope ratio of the falling ramp reset pulse, and so does the minimum addressing time. Based on the experimental results, the optimization of the addressing time and the slope ratio of the falling ramp pulse is discussed.展开更多
Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A...Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.展开更多
Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers ...Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study.展开更多
In China, sports and physical activity (PA) have tradition- ally been an integral part of school curricula to promote fitness and enhance healthy growth among children and ado- lescents. Three decades of economic re...In China, sports and physical activity (PA) have tradition- ally been an integral part of school curricula to promote fitness and enhance healthy growth among children and ado- lescents. Three decades of economic reforms, however, have brought major changes in social, economic.展开更多
In the digital synthesis of wideband periodic signals using an Arbitrary Waveform Gen-erator(AWG),the frequency resolution and spectral complexity of the synthesized signals are com-monly limited by the memory capacit...In the digital synthesis of wideband periodic signals using an Arbitrary Waveform Gen-erator(AWG),the frequency resolution and spectral complexity of the synthesized signals are com-monly limited by the memory capacity and clock frequency of the AWG.This paper proposes a novel sequential addressing scheme and then presents several sequences to improve the frequency resolution of the synthesized periodic signals without changing their spectral envelopes and basic time-domain characteristics under the condition of a fixed memory capacity and a fixed clock fre-quency.The main idea of the scheme is using the address generator in an AWG to program and produce addresses to read fixed waveform data in variable order,and thus to generate waveforms of various periods and profiles.The scheme is applied in simulating signal scenarios for military com-munication countermeasure experiments,and achieves high performance.展开更多
The compilation of technology lists addressing climate change has a guiding effect on promoting technological research and development,demonstration,and popularization.It is also crucial for China to strengthen ecolog...The compilation of technology lists addressing climate change has a guiding effect on promoting technological research and development,demonstration,and popularization.It is also crucial for China to strengthen ecological civilization construction,achieve the carbon emission peak and carbon neutrality target,and enhance global climate governance capabilities.This study first proposes the existing classification outline of the technology promotion lists,technology demand lists,and future technology lists.Then,different methodologies are integrated on the basis of the existing outline of four technology lists:China’s existing technological promotion list for addressing climate change,China’s demand list for climate change mitigation technology,China’s key technology list for addressing climate change,and China’s future technology list for addressing climate change.What’s more,core technologies are analyzed in the aspects of technology maturity,carbon reduction cost,carbon reduction potential,economic benefits,social influence,uncertainty,etc.The results show that:key industries and sectors in China already have relatively mature mitigation/adaptation technologies to support the achievement of climate change targets.The multi-sectoral system of promoting climate friendly technologies has been established,which has played an active role in tackling climate change.Currently,climate technology needs are concentrated in the traditional technology and equipment upgrading,renewable energy technology,and management decision-making support technology.The key technologies are concentrated in 3 major areas and 12 technological directions that urgently need a breakthrough.For carbon emmission peak and nentrality,carbon depth reduction and zero carbon emissions and geoengineering technology(CDR and SRM)have played an important role in forming the structure of global emissions and achieving carbon neutrality in the future.Thus,the uncertainty assessment for the comprehensive technology cost effectiveness,technology integration direction,technical maturity,ethics and ecological impacts is supportive to the national technology strategy.Finally,the presented study proposes several policy implications for medium-and long-term technology deployment,improving technology conversion rate,promoting the research and development of core technologies,and forming a technology list collaborative update and release mechanism.展开更多
In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavor...In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavors to locate the source of differences between Chinese & English addressing terms and seek the cultural connotations and pragmatic equivalence of Chinese addressing terms in translation.展开更多
The addressing and routing algorithm on hexagonal networks is still an open problem so far.Although many related works have been done to resolve this problem to some extent,the properties of hexagonal networks are sti...The addressing and routing algorithm on hexagonal networks is still an open problem so far.Although many related works have been done to resolve this problem to some extent,the properties of hexagonal networks are still not explored adequately.In this paper,we first create an oblique coordinate system and redefine the Euclidean space to address the hexagonal nodes.Then an optimal routing algorithm using vectors and angles of the redefined Euclidean space is developed.Compared with the traditional 3-directions scheme and the Cayley graph method,the proposed routing algorithm is more efficient and totally independent of the scale of networks with two-tuples addresses.We also prove that the path(s) obtained by this algorithm is always the shortest one(s).展开更多
A reference database of addressing is an important resource for urban applications. The efficiency of an addressing system depends on both data quality and technical architecture. Data must respect a standard model th...A reference database of addressing is an important resource for urban applications. The efficiency of an addressing system depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to offer a shared resource for multiple users and applications. This paper is to develop an addressing model for Morocco that extends Davis’s and Fonseca’s model presented in their work on the certainty of locations produced by an address geocoding system. We discuss the addressing data dictionary and acquisition plan in Morocco, revealing a diversified data management environment, characterized by multiple sources and actors. As a novelty in the field of GIS, we establish our technical architecture around cloud computing, according Service Oriented Application (SOA) standards. Our approach is based on the three pillars of cloud computing which are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS).展开更多
THE people" is a frequently mentioned phrase,to the extent of being the main theme of the report delivered at the 19th National Congress of the Communist Party of China(CPC)by General Secretary Xi Jinping."W...THE people" is a frequently mentioned phrase,to the extent of being the main theme of the report delivered at the 19th National Congress of the Communist Party of China(CPC)by General Secretary Xi Jinping."We must put the people’s interests above all else,see that the gains of reform and development benefit all our people in a展开更多
People doing business in China should try to know how to address their Chinese counter-parts, especially in formal settings so as to better engage with them. Different cultures mean people are addressed differently.
Autoconfiguration protocols are important in maintaining mobile ad hoc networks (MANETs). In this paper, we present an autoconfiguration protocol called the one-step addressing (OSA) protocol characterized by its simp...Autoconfiguration protocols are important in maintaining mobile ad hoc networks (MANETs). In this paper, we present an autoconfiguration protocol called the one-step addressing (OSA) protocol characterized by its simplicity. Mathematical model is developed to evaluate the performance of the proposed protocol. The results of the model, which are validated by the simulation results, show that the OSA protocol outperforms the well-known token-based protocol in terms of both latency and communications overhead.展开更多
The recently developed RNA-guided clustered regularly interspaced short palindromic repeat (CRISPR)/CRISPR-associated 9 (Cas9) nuclease system has progressed to be an invaluable technology for genome manipulation ...The recently developed RNA-guided clustered regularly interspaced short palindromic repeat (CRISPR)/CRISPR-associated 9 (Cas9) nuclease system has progressed to be an invaluable technology for genome manipulation in somatic cell types and germline model organisms. While the unprecedented advance in human embryo gene editing research has great potential in next-generation therapeutics, it raises various ethical concerns that need to be addressed before being translated for clinical use. Here, we discuss the current and potential applications of CRISPR/Cas9 technology and its limitations in clinical applications, as well as ethical and legal considerations in the treatment, disease prevention or disability in somatic cells or human embryo via gene editing.展开更多
Large-scale trapped-ion quantum computers hold great promise to outperform classical computers and are crucially desirable for fnance,pharmaceutical industry,fundamental chemistry and other felds.Currently,a big chall...Large-scale trapped-ion quantum computers hold great promise to outperform classical computers and are crucially desirable for fnance,pharmaceutical industry,fundamental chemistry and other felds.Currently,a big challenge for trapped-ion quantum computers is the poor scalability mainly brought by the optical elements that are used for optical addressing.Metasurfaces provide a promising solution due to their excellent fexibility and integration ability.Here,we propose and numerically demonstrate a scalable of-axis metalens array for optical addressing working at the wavelength of 350 nm.Metalens arrays designed for x linearly polarized and left circularly polarized light respectively can focus the collimated addressing beam array into a compact focused spot array with spot spacing of 5μm,featuring crosstalk below 0.82%.展开更多
China, like many countries, is under great pressure to reduce climate change and adapt to current situations while simultaneously undertaking economic development and transformation. This study takes advantage of clim...China, like many countries, is under great pressure to reduce climate change and adapt to current situations while simultaneously undertaking economic development and transformation. This study takes advantage of climate opportunities and provides a new concept and mode of urban climate services in order to address climate change. Eighteen indicators based on climate and climate-related variables were used to provide an assessment, in the form of an index, of how livable a city is depending on prevailing climatic conditions. The resulting index can also be used to investigate how recent and future changes in the climatic conditions could affect livability. All Chinese cities and regions share the common goals of promoting low-carbon development, improving resilience against climate change, and integrating economic growth with climate actions. Climate services have been developed in China to provide decision-makers this measure of livability. Such a move facilitates sustainable development alongside economic growth by aiding government efforts in climate adaptation and low-carbon development. Our approach represents multidisciplinary and demand-driven research on adaptation to and the impacts of regional climate change, thereby transforming climate science into a climate service and ensuring that climate information can be provided in a scientific, practical, and customized way for policy-makers. The outputs can be used locally to take concrete climate actions and integrate climate services into decision-making processes.展开更多
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such atta...Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.展开更多
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
基金This paper is a phased achievement of the 2022 judicial research major project of the Supreme People’s Court,“Research on Judicial Service to Guarantee Carbon Peak and Carbon Neutrality”(Project Approval No.ZGFYZDKT20220301)the major project of the National Social Science Foundation,“Research on Legal Regulations for Biodiversity Protection under the Overall System View”(Project Approval No.19ZDA162).
文摘Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development of human rights intersect.In view of the close relationship between the actions for addressing climate change and environmental rights,China should integrate the protection of environmental rights into the actions for addressing climate change,so as to achieve simultaneous development of both.In the process of coping with climate change,the right to climate stability that mainly pursues a“harmless”environment and the right to a more livable climate that pursues a“beautiful eco-environment”are specific manifestations of environmental rights and should be the priority of protection efforts.However,there are still some obstacles to achieving the coordinated development of the efforts to address climate change and the protection of environmental rights because traditional rights protection methods mainly give individuals subjective rights with the power to claim and are thus difficult to meet the needs of environmental rights protection in the context of climate change,and there are inherent value differences between responding to climate change and the realization of other human rights.Building a multi-level national obligation system to address climate change,giving full play to the role of courts in responding to climate change through moderate judicial activism,and coordinating the efforts to cope with climate change and the development of human rights under the guidance of a holistic system view are effective ways to overcome the aforementioned difficulties.
基金supported by the 2002 Ministry of Education Project for Science and Technology (2002,No.77)
文摘The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance method in a 12-inch coplanar AC PDP. The wall charge waveforms show the relationship between the slope ratio of the falling ramp reset pulse and the wall charges at the end of the falling ramp reset pulse which influences the addressing stability. Then the effects of the slope ratio of the linear falling ramp reset pulse on the addressing voltage and addressing time were investigated. The experimental results show that the minimum addressing voltage increases with the increase of the slope ratio of the falling ramp reset pulse, and so does the minimum addressing time. Based on the experimental results, the optimization of the addressing time and the slope ratio of the falling ramp pulse is discussed.
文摘Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.
文摘Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study.
文摘In China, sports and physical activity (PA) have tradition- ally been an integral part of school curricula to promote fitness and enhance healthy growth among children and ado- lescents. Three decades of economic reforms, however, have brought major changes in social, economic.
基金the National Grand Fundamental Research 973 Program of China (No.2004CB318109)the National High-Technology Research and Development Plan of China (No.2006AA01Z452)
文摘In the digital synthesis of wideband periodic signals using an Arbitrary Waveform Gen-erator(AWG),the frequency resolution and spectral complexity of the synthesized signals are com-monly limited by the memory capacity and clock frequency of the AWG.This paper proposes a novel sequential addressing scheme and then presents several sequences to improve the frequency resolution of the synthesized periodic signals without changing their spectral envelopes and basic time-domain characteristics under the condition of a fixed memory capacity and a fixed clock fre-quency.The main idea of the scheme is using the address generator in an AWG to program and produce addresses to read fixed waveform data in variable order,and thus to generate waveforms of various periods and profiles.The scheme is applied in simulating signal scenarios for military com-munication countermeasure experiments,and achieves high performance.
基金Special Programm for Compiling the Fourth National Assessment Report on Climate Change of the Ministry of Science and Technology.
文摘The compilation of technology lists addressing climate change has a guiding effect on promoting technological research and development,demonstration,and popularization.It is also crucial for China to strengthen ecological civilization construction,achieve the carbon emission peak and carbon neutrality target,and enhance global climate governance capabilities.This study first proposes the existing classification outline of the technology promotion lists,technology demand lists,and future technology lists.Then,different methodologies are integrated on the basis of the existing outline of four technology lists:China’s existing technological promotion list for addressing climate change,China’s demand list for climate change mitigation technology,China’s key technology list for addressing climate change,and China’s future technology list for addressing climate change.What’s more,core technologies are analyzed in the aspects of technology maturity,carbon reduction cost,carbon reduction potential,economic benefits,social influence,uncertainty,etc.The results show that:key industries and sectors in China already have relatively mature mitigation/adaptation technologies to support the achievement of climate change targets.The multi-sectoral system of promoting climate friendly technologies has been established,which has played an active role in tackling climate change.Currently,climate technology needs are concentrated in the traditional technology and equipment upgrading,renewable energy technology,and management decision-making support technology.The key technologies are concentrated in 3 major areas and 12 technological directions that urgently need a breakthrough.For carbon emmission peak and nentrality,carbon depth reduction and zero carbon emissions and geoengineering technology(CDR and SRM)have played an important role in forming the structure of global emissions and achieving carbon neutrality in the future.Thus,the uncertainty assessment for the comprehensive technology cost effectiveness,technology integration direction,technical maturity,ethics and ecological impacts is supportive to the national technology strategy.Finally,the presented study proposes several policy implications for medium-and long-term technology deployment,improving technology conversion rate,promoting the research and development of core technologies,and forming a technology list collaborative update and release mechanism.
文摘In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavors to locate the source of differences between Chinese & English addressing terms and seek the cultural connotations and pragmatic equivalence of Chinese addressing terms in translation.
基金supported in part by International Researcher Exchange Project of National Science Foundation of China and Centre national de la recherche scientifique de France(NSFC-CNRS)under Grant No.61211130104national information security project 242 under Grant No.2014A104National Science Foundation of China under Grants No.60932003,61271220,61202266,61172053
文摘The addressing and routing algorithm on hexagonal networks is still an open problem so far.Although many related works have been done to resolve this problem to some extent,the properties of hexagonal networks are still not explored adequately.In this paper,we first create an oblique coordinate system and redefine the Euclidean space to address the hexagonal nodes.Then an optimal routing algorithm using vectors and angles of the redefined Euclidean space is developed.Compared with the traditional 3-directions scheme and the Cayley graph method,the proposed routing algorithm is more efficient and totally independent of the scale of networks with two-tuples addresses.We also prove that the path(s) obtained by this algorithm is always the shortest one(s).
文摘A reference database of addressing is an important resource for urban applications. The efficiency of an addressing system depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to offer a shared resource for multiple users and applications. This paper is to develop an addressing model for Morocco that extends Davis’s and Fonseca’s model presented in their work on the certainty of locations produced by an address geocoding system. We discuss the addressing data dictionary and acquisition plan in Morocco, revealing a diversified data management environment, characterized by multiple sources and actors. As a novelty in the field of GIS, we establish our technical architecture around cloud computing, according Service Oriented Application (SOA) standards. Our approach is based on the three pillars of cloud computing which are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS).
文摘THE people" is a frequently mentioned phrase,to the extent of being the main theme of the report delivered at the 19th National Congress of the Communist Party of China(CPC)by General Secretary Xi Jinping."We must put the people’s interests above all else,see that the gains of reform and development benefit all our people in a
文摘People doing business in China should try to know how to address their Chinese counter-parts, especially in formal settings so as to better engage with them. Different cultures mean people are addressed differently.
文摘Autoconfiguration protocols are important in maintaining mobile ad hoc networks (MANETs). In this paper, we present an autoconfiguration protocol called the one-step addressing (OSA) protocol characterized by its simplicity. Mathematical model is developed to evaluate the performance of the proposed protocol. The results of the model, which are validated by the simulation results, show that the OSA protocol outperforms the well-known token-based protocol in terms of both latency and communications overhead.
文摘The recently developed RNA-guided clustered regularly interspaced short palindromic repeat (CRISPR)/CRISPR-associated 9 (Cas9) nuclease system has progressed to be an invaluable technology for genome manipulation in somatic cell types and germline model organisms. While the unprecedented advance in human embryo gene editing research has great potential in next-generation therapeutics, it raises various ethical concerns that need to be addressed before being translated for clinical use. Here, we discuss the current and potential applications of CRISPR/Cas9 technology and its limitations in clinical applications, as well as ethical and legal considerations in the treatment, disease prevention or disability in somatic cells or human embryo via gene editing.
基金supported by the National Natural Science Foundation of China(Grant Nos.62075073,62135004,and 62075129)the Fundamental Research Funds for the Central Universities(No.2019kfyXKJC038)+1 种基金State Key Laboratory of Advanced Optical Communication Systems and Networks,Shanghai Jiao Tong University(No.2021GZKF007)Key R&D Project of Hubei Province(No.2021BAA003).
文摘Large-scale trapped-ion quantum computers hold great promise to outperform classical computers and are crucially desirable for fnance,pharmaceutical industry,fundamental chemistry and other felds.Currently,a big challenge for trapped-ion quantum computers is the poor scalability mainly brought by the optical elements that are used for optical addressing.Metasurfaces provide a promising solution due to their excellent fexibility and integration ability.Here,we propose and numerically demonstrate a scalable of-axis metalens array for optical addressing working at the wavelength of 350 nm.Metalens arrays designed for x linearly polarized and left circularly polarized light respectively can focus the collimated addressing beam array into a compact focused spot array with spot spacing of 5μm,featuring crosstalk below 0.82%.
基金This work was jointly supported by the National Key R&D Program of China(2018YFA0606302)by the UK–China Research&Innovation Partnership Fund through the Met Office CSSP China as part of the Newton Fund.
文摘China, like many countries, is under great pressure to reduce climate change and adapt to current situations while simultaneously undertaking economic development and transformation. This study takes advantage of climate opportunities and provides a new concept and mode of urban climate services in order to address climate change. Eighteen indicators based on climate and climate-related variables were used to provide an assessment, in the form of an index, of how livable a city is depending on prevailing climatic conditions. The resulting index can also be used to investigate how recent and future changes in the climatic conditions could affect livability. All Chinese cities and regions share the common goals of promoting low-carbon development, improving resilience against climate change, and integrating economic growth with climate actions. Climate services have been developed in China to provide decision-makers this measure of livability. Such a move facilitates sustainable development alongside economic growth by aiding government efforts in climate adaptation and low-carbon development. Our approach represents multidisciplinary and demand-driven research on adaptation to and the impacts of regional climate change, thereby transforming climate science into a climate service and ensuring that climate information can be provided in a scientific, practical, and customized way for policy-makers. The outputs can be used locally to take concrete climate actions and integrate climate services into decision-making processes.
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
文摘Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.