The proposed universal psychological mechanism for developmental psychology is the mental protective system whose different parts emerge and mature in the eight different stages of psychosocial protective development ...The proposed universal psychological mechanism for developmental psychology is the mental protective system whose different parts emerge and mature in the eight different stages of psychosocial protective development under different social interactions. The proposed eight stages of psychosocial protective development are childhood (infancy, toddlerhood, pre-juvenile age, and juvenile age), adolescence, early young adulthood, late young adulthood, early middle adulthood, late middle adulthood, early late adulthood, and late late adulthood. The mental protection system consists of four socialities (collectivistic, individualistic, interdependent, and generativity), three worldviews (territorial, competitive, and cooperative), and the mental immune system for four regulated and unregulated countermeasures (hyperactivity, phobia, comforter, and rationality) against adversities. During childhood, dependent children have collectivistic sociality under the protection of committed parents and territorial worldview with the boundary of family. Children start with the unregulated mental immune system without delayed gratification due to mental immaturity, and gradually acquire the regulated mental immune system with delayed gratification through mental maturity. Adolescents transit to adulthood. Independent adults have the regulated metal immune system, individualistic sociality with reciprocity, and competitive-cooperative worldviews without boundary. After the age of 50, older people as elder leaders-mentors develop generativity sociality to protect next generation. The paper shows that the mental protective system as the universal psychological mechanism for developmental psychology explains clearly psychosocial protective development, the human evolution, the Piaget’s cognitive development, the Erikson’s psychosocial (ego-social) development, the Confucius’ (educated person’s) six milestones of life, and parent-child relation in the Abrahamic religions (Judaism, Christianity, and Islam) and Confucianism.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D p...Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D projection. The origin of such rotation is the balance of the angular momenta of stars and that of positive and negative charged e-trino pairs, within a 3D ⊗1D?void of the stellar object, the existence of which is based on conservation/parity laws in physics if one starts with homogeneous 5D universe. While the in-phase e-trino pairs are proposed to be responsible for the generation of angular momentum, the anti-phase but oppositely charge pairs necessarily produce currents. In the 5D to 4D projection, one space variable in the 5D manifold was compacted to zero in most other 5D theories (including theories of Kaluza-Klein and Einstein [3] [4]). We have demonstrated, using the Fermat’s Last Theorem [5], that for validity of gauge invariance at the 4D-5D boundary, the 4th space variable in the 5D manifold is mapped into two current rings at both magnetic poles as required by Perelman entropy mapping;these loops are the origin of the dipolar magnetic field. One conclusion we draw is that there is no gravitational singularity, and hence no black holes in the universe, a result strongly supported by the recent discovery of many stars with masses well greater than 100 solar mass [6] [7] [8], without trace of phenomena observed (such as strong gamma and X ray emissions), which are supposed to be associated with black holes. We analyze the properties of such loop currents on the 4D-5D boundary, where Maxwell equations are valid. We derive explicit expressions for the dipolar fields over the whole temperature range. We then compare our prediction with measured surface magnetic fields of many stars. Since there is coupling in distribution between the in-phase and anti-phase pairs of e-trinos, the generated mag-netic field is directly related to the angular momentum, leading to the result that the magnetic field can be expressible in terms of only the mechanical variables (mass M, radius R, rotation period P)of a star, as if Maxwell equations are “hidden”. An explanation for the occurrence of this “un-expected result” is provided in Section (7.6). Therefore we provide satisfactory answers to a number of “mysteries” of magnetism in astrophysics such as the “Magnetic Bode’s Relation/Law” [9] and the experimental finding that B-P graph in the log-log plot is linear. Moreover, we have developed a new method for studying the relations among the data (M, R, P) during stellar evolution. Ten groups of stellar objects, effectively over 2000 samples are used in various parts of the analysis. We also explain the emergence of huge magnetic field in very old stars like White Dwarfs in terms of formation of 2D Semion state on stellar surface and release of magnetic flux as magnetic storms upon changing the 2D state back to 3D structure. Moreover, we provide an explanation, on the ground of the 5D theory, for the detection of extremely weak fields in Venus and Mars and the asymmetric distribution of magnetic field on the Martian surface. We predict the equatorial fields B of the newly discovered Trappist-1 star and the 6 nearest planets. The log B?−?log P graph for the 6 planets is linear and they satisfy the Magnetic Bode’s relation. Based on the above analysis, we have discovered several new laws of stellar magnetism, which are summarized in Section (7.6).展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
BACKGROUND Intestinal inflammation is a common digestive tract disease, which is usually treated with hormone medicines. Hormone medicines are effective to some extent, but long-term use of them may bring about many c...BACKGROUND Intestinal inflammation is a common digestive tract disease, which is usually treated with hormone medicines. Hormone medicines are effective to some extent, but long-term use of them may bring about many complications.AIM To explore the protective effects of panax notoginseng saponin(PNS) against dextran sulfate sodium(DSS)-induced intestinal inflammatory injury through phosphoinositide-3-kinase protein kinase B(PI3K/AKT) signaling pathway inhibition in rats.METHODS Colitis rat models were generated via DSS induction, and rats were divided into control(no modeling), DSS, DSS + PNS 50 mg/k, and DSS + PNS 100 mg/kg groups. Then, the intestinal injury, oxidative stress parameters, inflammatory indices, tight junction proteins, apoptosis, macrophage polarization, and TLR4/AKT signaling pathway in colon tissues from rats in each of the groups were detected. The PI3 K/AKT signaling pathway in the colon tissue of rats was blocked using the PI3K/AKT signaling pathway inhibitor, LY294002.RESULTS Compared with rats in the control group, rats in the DSS group showed significantly shortened colon lengths, and significantly increased disease activity indices, oxidative stress reactions and inflammatory indices, as well as significantly decreased expression of tight junction-associated proteins. In addition, the DSS group showed significantly increased apoptotic cell numbers,and showed significantly increased M1 macrophages in spleen and colon tissues.They also showed significantly decreased M2 macrophages in colon tissues, as well as activation of the PI3K/AKT signaling pathway(all P < 0.05). Compared with rats in the DSS group, rats in the DSS + PNS group showed significantly lengthened colon lengths, decreased disease activity indices, and significantly alleviated oxidative stress reactions and inflammatory responses. In addition, this group showed significantly increased expression of tight junction-associated proteins, significantly decreased apoptotic cell numbers, and significantly decreased M1 macrophages in spleen and colon tissues. This group further showed significantly increased M2 macrophages in colon tissues, and significantly suppressed activation of the PI3K/AKT signaling pathway, as well as a dose dependency(all P < 0.05). When the PI3K/AKT signaling pathway was inhibited, the apoptosis rate of colon tissue cells in the DSS + LY294002 group was significantly lower than that of the DSS group(P < 0.05).CONCLUSION PNS can protect rats against DSS-induced intestinal inflammatory injury by inhibiting the PI3K/AKT signaling pathway, and therefore may be potentially used in the future as a drug for colitis.展开更多
The physical protection system of the body consists of the protective organs for vulnerable body parts-functions and the protective countermeasures against invaders (pathogens), but to survive, the body also requires ...The physical protection system of the body consists of the protective organs for vulnerable body parts-functions and the protective countermeasures against invaders (pathogens), but to survive, the body also requires the protective social groups for vulnerable social members-functions and the protective instinctive mental countermeasures against adversities such as hardship, danger, and unfamiliarity-uncertainty. As a result, this paper proposes that the mental protection system of the body consists of the social brain to set up the protective social groups for vulnerable social members-functions and the mental immune system to produce the protective mental countermeasures against adversities. This paper proposes that from the social brain, the protective social groups include alliance group for vulnerable individuals, kinship-friendship group for vulnerable children, interdependent specialists group for vulnerable pregnant females, territorial group for social boundary, connective group for social connection, and competitive group for social competition. From the mental immune system, the mental protective countermeasures include comforter against hardship, hyperactivity against danger, phobia against unfamiliarity-uncertainty, and rationality against unfamiliarity-uncertainty. The overactive mental immune system causes mental allergies and auto immune diseases as personality-mental disorders against ubiquitous harmful and harmless perceived adversities, correlating to physical allergies and auto immune diseases against ubiquitous harmful and harmless detected invaders. The mental protection system also produces personality traits, social moralities, social organizations, social systems, religions, and cultures as described in this paper. The mental protective system is the source of protective behaviors.展开更多
A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power system...A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power systems worldwide and has led to operation of power systems closer to their stability limits and to power exchange in new patterns. These issues, as well as the on-going worldwide trend towards deregulation of the entire industry on the one hand and the increased need for accurate and better network monitoring on the other hand, force power utilities exposed to this pressure to demand new solutions for wide area monitoring, protection and control. Wide-area monitoring, protection, and control require communicating the specific-node information to a remote station but all information should be time synchronized so that to neutralize the time difference between information. It gives a complete simultaneous snap shot of the power system. The conventional system is not able to satisfy the time-synchronized requirement of power system. Phasor Measurement Unit (PMU) is enabler of time-synchronized measurement, it communicate the synchronized local information to remote station.展开更多
This paper aims to present a case study that consists in the analysis of work effort per unit of software systems Development and Enhancement Projects (D&EP) depending on technological factors. That analysis was c...This paper aims to present a case study that consists in the analysis of work effort per unit of software systems Development and Enhancement Projects (D&EP) depending on technological factors. That analysis was commissioned by one of the largest public institutions in Poland. This is the COSMIC (Common Software Measurement International Consortium) function points method that is chosen by this institution as a point of reference for size of software systems developed/enhanced for supporting its functions and therefore this method is the base for the analysis of D&EP work effort per unit with regard to technological factors.展开更多
文摘The proposed universal psychological mechanism for developmental psychology is the mental protective system whose different parts emerge and mature in the eight different stages of psychosocial protective development under different social interactions. The proposed eight stages of psychosocial protective development are childhood (infancy, toddlerhood, pre-juvenile age, and juvenile age), adolescence, early young adulthood, late young adulthood, early middle adulthood, late middle adulthood, early late adulthood, and late late adulthood. The mental protection system consists of four socialities (collectivistic, individualistic, interdependent, and generativity), three worldviews (territorial, competitive, and cooperative), and the mental immune system for four regulated and unregulated countermeasures (hyperactivity, phobia, comforter, and rationality) against adversities. During childhood, dependent children have collectivistic sociality under the protection of committed parents and territorial worldview with the boundary of family. Children start with the unregulated mental immune system without delayed gratification due to mental immaturity, and gradually acquire the regulated mental immune system with delayed gratification through mental maturity. Adolescents transit to adulthood. Independent adults have the regulated metal immune system, individualistic sociality with reciprocity, and competitive-cooperative worldviews without boundary. After the age of 50, older people as elder leaders-mentors develop generativity sociality to protect next generation. The paper shows that the mental protective system as the universal psychological mechanism for developmental psychology explains clearly psychosocial protective development, the human evolution, the Piaget’s cognitive development, the Erikson’s psychosocial (ego-social) development, the Confucius’ (educated person’s) six milestones of life, and parent-child relation in the Abrahamic religions (Judaism, Christianity, and Islam) and Confucianism.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D projection. The origin of such rotation is the balance of the angular momenta of stars and that of positive and negative charged e-trino pairs, within a 3D ⊗1D?void of the stellar object, the existence of which is based on conservation/parity laws in physics if one starts with homogeneous 5D universe. While the in-phase e-trino pairs are proposed to be responsible for the generation of angular momentum, the anti-phase but oppositely charge pairs necessarily produce currents. In the 5D to 4D projection, one space variable in the 5D manifold was compacted to zero in most other 5D theories (including theories of Kaluza-Klein and Einstein [3] [4]). We have demonstrated, using the Fermat’s Last Theorem [5], that for validity of gauge invariance at the 4D-5D boundary, the 4th space variable in the 5D manifold is mapped into two current rings at both magnetic poles as required by Perelman entropy mapping;these loops are the origin of the dipolar magnetic field. One conclusion we draw is that there is no gravitational singularity, and hence no black holes in the universe, a result strongly supported by the recent discovery of many stars with masses well greater than 100 solar mass [6] [7] [8], without trace of phenomena observed (such as strong gamma and X ray emissions), which are supposed to be associated with black holes. We analyze the properties of such loop currents on the 4D-5D boundary, where Maxwell equations are valid. We derive explicit expressions for the dipolar fields over the whole temperature range. We then compare our prediction with measured surface magnetic fields of many stars. Since there is coupling in distribution between the in-phase and anti-phase pairs of e-trinos, the generated mag-netic field is directly related to the angular momentum, leading to the result that the magnetic field can be expressible in terms of only the mechanical variables (mass M, radius R, rotation period P)of a star, as if Maxwell equations are “hidden”. An explanation for the occurrence of this “un-expected result” is provided in Section (7.6). Therefore we provide satisfactory answers to a number of “mysteries” of magnetism in astrophysics such as the “Magnetic Bode’s Relation/Law” [9] and the experimental finding that B-P graph in the log-log plot is linear. Moreover, we have developed a new method for studying the relations among the data (M, R, P) during stellar evolution. Ten groups of stellar objects, effectively over 2000 samples are used in various parts of the analysis. We also explain the emergence of huge magnetic field in very old stars like White Dwarfs in terms of formation of 2D Semion state on stellar surface and release of magnetic flux as magnetic storms upon changing the 2D state back to 3D structure. Moreover, we provide an explanation, on the ground of the 5D theory, for the detection of extremely weak fields in Venus and Mars and the asymmetric distribution of magnetic field on the Martian surface. We predict the equatorial fields B of the newly discovered Trappist-1 star and the 6 nearest planets. The log B?−?log P graph for the 6 planets is linear and they satisfy the Magnetic Bode’s relation. Based on the above analysis, we have discovered several new laws of stellar magnetism, which are summarized in Section (7.6).
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
基金National Natural Science Foundation of China,No.81704059Scientific Research Project of Hebei Province Traditional Chinese Medicine Administration,No.2017130。
文摘BACKGROUND Intestinal inflammation is a common digestive tract disease, which is usually treated with hormone medicines. Hormone medicines are effective to some extent, but long-term use of them may bring about many complications.AIM To explore the protective effects of panax notoginseng saponin(PNS) against dextran sulfate sodium(DSS)-induced intestinal inflammatory injury through phosphoinositide-3-kinase protein kinase B(PI3K/AKT) signaling pathway inhibition in rats.METHODS Colitis rat models were generated via DSS induction, and rats were divided into control(no modeling), DSS, DSS + PNS 50 mg/k, and DSS + PNS 100 mg/kg groups. Then, the intestinal injury, oxidative stress parameters, inflammatory indices, tight junction proteins, apoptosis, macrophage polarization, and TLR4/AKT signaling pathway in colon tissues from rats in each of the groups were detected. The PI3 K/AKT signaling pathway in the colon tissue of rats was blocked using the PI3K/AKT signaling pathway inhibitor, LY294002.RESULTS Compared with rats in the control group, rats in the DSS group showed significantly shortened colon lengths, and significantly increased disease activity indices, oxidative stress reactions and inflammatory indices, as well as significantly decreased expression of tight junction-associated proteins. In addition, the DSS group showed significantly increased apoptotic cell numbers,and showed significantly increased M1 macrophages in spleen and colon tissues.They also showed significantly decreased M2 macrophages in colon tissues, as well as activation of the PI3K/AKT signaling pathway(all P < 0.05). Compared with rats in the DSS group, rats in the DSS + PNS group showed significantly lengthened colon lengths, decreased disease activity indices, and significantly alleviated oxidative stress reactions and inflammatory responses. In addition, this group showed significantly increased expression of tight junction-associated proteins, significantly decreased apoptotic cell numbers, and significantly decreased M1 macrophages in spleen and colon tissues. This group further showed significantly increased M2 macrophages in colon tissues, and significantly suppressed activation of the PI3K/AKT signaling pathway, as well as a dose dependency(all P < 0.05). When the PI3K/AKT signaling pathway was inhibited, the apoptosis rate of colon tissue cells in the DSS + LY294002 group was significantly lower than that of the DSS group(P < 0.05).CONCLUSION PNS can protect rats against DSS-induced intestinal inflammatory injury by inhibiting the PI3K/AKT signaling pathway, and therefore may be potentially used in the future as a drug for colitis.
文摘The physical protection system of the body consists of the protective organs for vulnerable body parts-functions and the protective countermeasures against invaders (pathogens), but to survive, the body also requires the protective social groups for vulnerable social members-functions and the protective instinctive mental countermeasures against adversities such as hardship, danger, and unfamiliarity-uncertainty. As a result, this paper proposes that the mental protection system of the body consists of the social brain to set up the protective social groups for vulnerable social members-functions and the mental immune system to produce the protective mental countermeasures against adversities. This paper proposes that from the social brain, the protective social groups include alliance group for vulnerable individuals, kinship-friendship group for vulnerable children, interdependent specialists group for vulnerable pregnant females, territorial group for social boundary, connective group for social connection, and competitive group for social competition. From the mental immune system, the mental protective countermeasures include comforter against hardship, hyperactivity against danger, phobia against unfamiliarity-uncertainty, and rationality against unfamiliarity-uncertainty. The overactive mental immune system causes mental allergies and auto immune diseases as personality-mental disorders against ubiquitous harmful and harmless perceived adversities, correlating to physical allergies and auto immune diseases against ubiquitous harmful and harmless detected invaders. The mental protection system also produces personality traits, social moralities, social organizations, social systems, religions, and cultures as described in this paper. The mental protective system is the source of protective behaviors.
文摘A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power systems worldwide and has led to operation of power systems closer to their stability limits and to power exchange in new patterns. These issues, as well as the on-going worldwide trend towards deregulation of the entire industry on the one hand and the increased need for accurate and better network monitoring on the other hand, force power utilities exposed to this pressure to demand new solutions for wide area monitoring, protection and control. Wide-area monitoring, protection, and control require communicating the specific-node information to a remote station but all information should be time synchronized so that to neutralize the time difference between information. It gives a complete simultaneous snap shot of the power system. The conventional system is not able to satisfy the time-synchronized requirement of power system. Phasor Measurement Unit (PMU) is enabler of time-synchronized measurement, it communicate the synchronized local information to remote station.
文摘This paper aims to present a case study that consists in the analysis of work effort per unit of software systems Development and Enhancement Projects (D&EP) depending on technological factors. That analysis was commissioned by one of the largest public institutions in Poland. This is the COSMIC (Common Software Measurement International Consortium) function points method that is chosen by this institution as a point of reference for size of software systems developed/enhanced for supporting its functions and therefore this method is the base for the analysis of D&EP work effort per unit with regard to technological factors.