Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic ...Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds.展开更多
BACKGROUND The relation between orthodontic treatment and temporomandibular disorders(TMDs)is under debate;the management of TMD during orthodontic treatment has always been a challenge.If TMD symptoms occur during or...BACKGROUND The relation between orthodontic treatment and temporomandibular disorders(TMDs)is under debate;the management of TMD during orthodontic treatment has always been a challenge.If TMD symptoms occur during orthodontic treatment,an immediate pause of orthodontic adjustments is recommended;the treatment can resume when the symptoms are managed and stabilized.CASE SUMMARY This case report presents a patient(26-year-old,female)with angle class I,skeletal class II and TMDs.The treatment was a hybrid of clear aligners,fixed appliances and temporary anchorage devices(TADs).After 3 mo resting and treatment on her TMD,the patient’s TMD symptom alleviated,but her anterior occlusion displayed deep overbite.Therefore,the fixed appliances with TAD were used to correct the anterior deep-bite and level maxillary and mandibular deep curves.After the levelling,the patient showed dual bite with centric relation and maximum intercuspation discrepancy on her occlusion.After careful examination of temporomandibular joints(TMJ)position,the stable bite splint and Invisible Mandibular Advancement appliance were used to reconstruct her occlusion.Eventually,the improved facial appearance and relatively stable occlusion were achieved.The 1-year follow-up records showed there was no obvious change in TMJ morphology,and her occlusion was stable.CONCLUSION TMD screening and monitoring is of great clinical importance in the TMD susceptible patients.Hybrid treatment with clear aligners and fixed appliances and TADs is an effective treatment modality for the complex cases.展开更多
The idea of an oscillating Universe has remained a topic of interest even after the discovery of dark energy. This paper confirms this idea by means of another well-established theory in general relativity, the embedd...The idea of an oscillating Universe has remained a topic of interest even after the discovery of dark energy. This paper confirms this idea by means of another well-established theory in general relativity, the embedding of curved spacetimes in higher-dimensional flat spacetimes: an n-dimensional Riemannian space is said to be of embedding class m if m +n is the lowest dimension of the flat space in which the given space can be embedded;here . So a four-dimensional Riemannian space is of class two and can therefore be embedded in a six-dimensional flat space. A line element of class two can be reduced to a line element of class one by a suitable coordinate transformation. The extra dimension can be either spacelike or timelike, leading to accelerating and decelerating expansions, respectively. Accordingly, it is proposed in this paper that the free parameter occurring in the transformation be a periodic function of time. The result is a mathematical model that can be interpreted as a periodic change in the signature of the embedding space. This signature change may be the best model for an oscillating Universe and complements various models proposed in the literature.展开更多
The study of machine learning has revealed that it can unleash new applications in a variety of disciplines.Many limitations limit their expressiveness,and researchers are working to overcome them to fully exploit the...The study of machine learning has revealed that it can unleash new applications in a variety of disciplines.Many limitations limit their expressiveness,and researchers are working to overcome them to fully exploit the power of data-driven machine learning(ML)and deep learning(DL)techniques.The data imbalance presents major hurdles for classification and prediction problems in machine learning,restricting data analytics and acquiring relevant insights in practically all real-world research domains.In visual learning,network information security,failure prediction,digital marketing,healthcare,and a variety of other domains,raw data suffers from a biased data distribution of one class over the other.This article aims to present a taxonomy of the approaches for handling imbalanced data problems and their comparative study on the classification metrics and their application areas.We have explored very recent trends of techniques employed for solutions to class imbalance problems in datasets and have also discussed their limitations.This article has also identified open challenges for further research in the direction of class data imbalance.展开更多
The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprin...The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.展开更多
The exponential growth of literature is constraining researchers’access to comprehensive information in related fields.While natural language processing(NLP)may offer an effective solution to literature classificatio...The exponential growth of literature is constraining researchers’access to comprehensive information in related fields.While natural language processing(NLP)may offer an effective solution to literature classification,it remains hindered by the lack of labelled dataset.In this article,we introduce a novel method for generating literature classification models through semi-supervised learning,which can generate labelled dataset iteratively with limited human input.We apply this method to train NLP models for classifying literatures related to several research directions,i.e.,battery,superconductor,topological material,and artificial intelligence(AI)in materials science.The trained NLP‘battery’model applied on a larger dataset different from the training and testing dataset can achieve F1 score of 0.738,which indicates the accuracy and reliability of this scheme.Furthermore,our approach demonstrates that even with insufficient data,the not-well-trained model in the first few cycles can identify the relationships among different research fields and facilitate the discovery and understanding of interdisciplinary directions.展开更多
Extensive numerical simulations and scaling analysis are performed to investigate competitive growth between the linear and nonlinear stochastic dynamic growth systems, which belong to the Edwards–Wilkinson(EW) and K...Extensive numerical simulations and scaling analysis are performed to investigate competitive growth between the linear and nonlinear stochastic dynamic growth systems, which belong to the Edwards–Wilkinson(EW) and Kardar–Parisi–Zhang(KPZ) universality classes, respectively. The linear growth systems include the EW equation and the model of random deposition with surface relaxation(RDSR), the nonlinear growth systems involve the KPZ equation and typical discrete models including ballistic deposition(BD), etching, and restricted solid on solid(RSOS). The scaling exponents are obtained in both the(1 + 1)-and(2 + 1)-dimensional competitive growth with the nonlinear growth probability p and the linear proportion 1-p. Our results show that, when p changes from 0 to 1, there exist non-trivial crossover effects from EW to KPZ universality classes based on different competitive growth rules. Furthermore, the growth rate and the porosity are also estimated within various linear and nonlinear growths of cooperation and competition.展开更多
This study analyzed the difference between using a downward breaststroke kick and a horizontal breaststroke kick in a sample of world class elite swimmers.We compared average muscle activity of the gluteus maximus,qua...This study analyzed the difference between using a downward breaststroke kick and a horizontal breaststroke kick in a sample of world class elite swimmers.We compared average muscle activity of the gluteus maximus,quadriceps femoris(vastus medialis and rectus femoris),hamstring/long head of the biceps femoris,gastrocnemius medialis,rectus abdominal,and erector spinae when using the downward breaststroke kick technique.We find that when this sample of swimmers utilized the downward breaststroke kick,max speed and velocity per stroke increased,measured by 12,788 EMG samples,where the results are highly correlated to duration of the aerodynamic buoyant force in breaststroke kick technique.The increases in performance observed from measuring the world class elite swimmers is highly correlated to the duration of the kick aerodynamic buoyant force.Among this sample of elite swimmers,the longer a swimmer demonstrates a buoyant force breaststroke kick,the lower the time in a 100 breaststroke.展开更多
BACKGROUND Severe skeletal class II malocclusion is the indication for combined orthodontic and orthognathic treatment.CASE SUMMARY A woman with a chief complaint of a protruding chin and an inability to close her lip...BACKGROUND Severe skeletal class II malocclusion is the indication for combined orthodontic and orthognathic treatment.CASE SUMMARY A woman with a chief complaint of a protruding chin and an inability to close her lips requested orthodontic camouflage.The treatment plan consisted of extracting the right upper third molar,right lower third molar,left lower second molar,and left upper third molar and moving the maxillary dentition distally using a convenient method involving microimplant nail anchors,push springs,long arm traction hooks,and elastic traction chains.After 52 months of treatment,her overbite and overjet were normal,and her facial profile was favorable.CONCLUSION This method can be used for distal movement of the maxillary dentition and to correct severe skeletal class II malocclusion in adults.展开更多
As an online course-teaching mode,Massive Open Online Course(MOOC)has drawn great attention from both teachers and students.It is necessary to give full play to the advantages of MOOC resources and to enhance teachers...As an online course-teaching mode,Massive Open Online Course(MOOC)has drawn great attention from both teachers and students.It is necessary to give full play to the advantages of MOOC resources and to enhance teachers’consciousness of“identity remodeling”in the process of Integrated Business English flipping classroom teaching.Combining the advantages of MOOC and flipped classroom teaching during before-,during-,and after-class will greatly help promote the overall quality of business English teaching in universities.展开更多
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli...One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier.展开更多
In the poems created by the renowned American poet Emily Dickinson,those related to nature constitute a considerable proportion.However,Dickinson’s attitude toward nature is,in fact,contradictory.On the one hand,Dick...In the poems created by the renowned American poet Emily Dickinson,those related to nature constitute a considerable proportion.However,Dickinson’s attitude toward nature is,in fact,contradictory.On the one hand,Dickinson perceives nature as gentle and kind,akin to a mother.Nature is regarded as“heaven”and embodies harmony.On the other hand,nature possesses its own operational principles and harbors inherent cruelty.According to Dickinson,humans should refrain from excessive interference in the natural order.This article attempts to analyze the similarities in attitude towards nature between Dickinson’s poetry and Taoist philosophy.展开更多
This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while ...This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter.展开更多
The forest coverage rate of Jiangxi Province ranks second in China.It has rich natural resources,a long history of ancient color culture and rich red culture.In the development of nature education,Jiangxi Province has...The forest coverage rate of Jiangxi Province ranks second in China.It has rich natural resources,a long history of ancient color culture and rich red culture.In the development of nature education,Jiangxi Province has great potential and advantages.This paper introduces the development conditions of nature education in Jiangxi Province,summarizes the problems existing in the development of nature education in Jiangxi Province from the aspects of the types of nature education and the construction of nature education base,such as simple content and single form,imperfect infrastructure and lack of professionals,and puts forward some suggestions on the development of nature education in Jiangxi Province.展开更多
A checklist of the macrolichens (foliose, fruticose & squamulose) of Barluk Mountain National Nature Reserve located in northwestern China is presented. It was derived from 47 inventories of preserved and undevelo...A checklist of the macrolichens (foliose, fruticose & squamulose) of Barluk Mountain National Nature Reserve located in northwestern China is presented. It was derived from 47 inventories of preserved and undeveloped areas which yielded more than 670 collections containing 102 taxa (99 species, 1 subspecies, 2 varieties). Eight species were found that were new to Xinjiang, China. Twenty-eight species and 2 varieties were found on rock, 31 species on bark of deciduous and coniferous trees, 26 species on soil and 14 species and 1 subspecies over mosses. Foliose lichens were dominant with 76 species, followed by 16 species of squamulose lichens and 7 species of fruticose lichens.展开更多
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori...Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.展开更多
文摘Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds.
基金Natural Science Foundation of Jiangsu Province, No. SBK2021021787the Major Project of the Health Commission ofJiangsu Province, No. ZD2022025and the Key Project of the Nanjing Health Commission, No. ZKX20048.
文摘BACKGROUND The relation between orthodontic treatment and temporomandibular disorders(TMDs)is under debate;the management of TMD during orthodontic treatment has always been a challenge.If TMD symptoms occur during orthodontic treatment,an immediate pause of orthodontic adjustments is recommended;the treatment can resume when the symptoms are managed and stabilized.CASE SUMMARY This case report presents a patient(26-year-old,female)with angle class I,skeletal class II and TMDs.The treatment was a hybrid of clear aligners,fixed appliances and temporary anchorage devices(TADs).After 3 mo resting and treatment on her TMD,the patient’s TMD symptom alleviated,but her anterior occlusion displayed deep overbite.Therefore,the fixed appliances with TAD were used to correct the anterior deep-bite and level maxillary and mandibular deep curves.After the levelling,the patient showed dual bite with centric relation and maximum intercuspation discrepancy on her occlusion.After careful examination of temporomandibular joints(TMJ)position,the stable bite splint and Invisible Mandibular Advancement appliance were used to reconstruct her occlusion.Eventually,the improved facial appearance and relatively stable occlusion were achieved.The 1-year follow-up records showed there was no obvious change in TMJ morphology,and her occlusion was stable.CONCLUSION TMD screening and monitoring is of great clinical importance in the TMD susceptible patients.Hybrid treatment with clear aligners and fixed appliances and TADs is an effective treatment modality for the complex cases.
文摘The idea of an oscillating Universe has remained a topic of interest even after the discovery of dark energy. This paper confirms this idea by means of another well-established theory in general relativity, the embedding of curved spacetimes in higher-dimensional flat spacetimes: an n-dimensional Riemannian space is said to be of embedding class m if m +n is the lowest dimension of the flat space in which the given space can be embedded;here . So a four-dimensional Riemannian space is of class two and can therefore be embedded in a six-dimensional flat space. A line element of class two can be reduced to a line element of class one by a suitable coordinate transformation. The extra dimension can be either spacelike or timelike, leading to accelerating and decelerating expansions, respectively. Accordingly, it is proposed in this paper that the free parameter occurring in the transformation be a periodic function of time. The result is a mathematical model that can be interpreted as a periodic change in the signature of the embedding space. This signature change may be the best model for an oscillating Universe and complements various models proposed in the literature.
文摘The study of machine learning has revealed that it can unleash new applications in a variety of disciplines.Many limitations limit their expressiveness,and researchers are working to overcome them to fully exploit the power of data-driven machine learning(ML)and deep learning(DL)techniques.The data imbalance presents major hurdles for classification and prediction problems in machine learning,restricting data analytics and acquiring relevant insights in practically all real-world research domains.In visual learning,network information security,failure prediction,digital marketing,healthcare,and a variety of other domains,raw data suffers from a biased data distribution of one class over the other.This article aims to present a taxonomy of the approaches for handling imbalanced data problems and their comparative study on the classification metrics and their application areas.We have explored very recent trends of techniques employed for solutions to class imbalance problems in datasets and have also discussed their limitations.This article has also identified open challenges for further research in the direction of class data imbalance.
基金supported by National Key R&D Program of China(2019YFB2102303)National Natural Science Foundation of China(NSFC61971014,NSFC11675199)Young Backbone Teacher Training Program of Henan Colleges and Universities(2021GGJS170).
文摘The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods.
基金funded by the Informatization Plan of Chinese Academy of Sciences(Grant No.CASWX2021SF-0102)the National Key R&D Program of China(Grant Nos.2022YFA1603903,2022YFA1403800,and 2021YFA0718700)+1 种基金the National Natural Science Foundation of China(Grant Nos.11925408,11921004,and 12188101)the Chinese Academy of Sciences(Grant No.XDB33000000)。
文摘The exponential growth of literature is constraining researchers’access to comprehensive information in related fields.While natural language processing(NLP)may offer an effective solution to literature classification,it remains hindered by the lack of labelled dataset.In this article,we introduce a novel method for generating literature classification models through semi-supervised learning,which can generate labelled dataset iteratively with limited human input.We apply this method to train NLP models for classifying literatures related to several research directions,i.e.,battery,superconductor,topological material,and artificial intelligence(AI)in materials science.The trained NLP‘battery’model applied on a larger dataset different from the training and testing dataset can achieve F1 score of 0.738,which indicates the accuracy and reliability of this scheme.Furthermore,our approach demonstrates that even with insufficient data,the not-well-trained model in the first few cycles can identify the relationships among different research fields and facilitate the discovery and understanding of interdisciplinary directions.
基金supported by Undergraduate Training Program for Innovation and Entrepreneurship of China University of Mining and Technology (CUMT)(Grant No. 202110290059Z)Fundamental Research Funds for the Central Universities of CUMT (Grant No. 2020ZDPYMS33)。
文摘Extensive numerical simulations and scaling analysis are performed to investigate competitive growth between the linear and nonlinear stochastic dynamic growth systems, which belong to the Edwards–Wilkinson(EW) and Kardar–Parisi–Zhang(KPZ) universality classes, respectively. The linear growth systems include the EW equation and the model of random deposition with surface relaxation(RDSR), the nonlinear growth systems involve the KPZ equation and typical discrete models including ballistic deposition(BD), etching, and restricted solid on solid(RSOS). The scaling exponents are obtained in both the(1 + 1)-and(2 + 1)-dimensional competitive growth with the nonlinear growth probability p and the linear proportion 1-p. Our results show that, when p changes from 0 to 1, there exist non-trivial crossover effects from EW to KPZ universality classes based on different competitive growth rules. Furthermore, the growth rate and the porosity are also estimated within various linear and nonlinear growths of cooperation and competition.
文摘This study analyzed the difference between using a downward breaststroke kick and a horizontal breaststroke kick in a sample of world class elite swimmers.We compared average muscle activity of the gluteus maximus,quadriceps femoris(vastus medialis and rectus femoris),hamstring/long head of the biceps femoris,gastrocnemius medialis,rectus abdominal,and erector spinae when using the downward breaststroke kick technique.We find that when this sample of swimmers utilized the downward breaststroke kick,max speed and velocity per stroke increased,measured by 12,788 EMG samples,where the results are highly correlated to duration of the aerodynamic buoyant force in breaststroke kick technique.The increases in performance observed from measuring the world class elite swimmers is highly correlated to the duration of the kick aerodynamic buoyant force.Among this sample of elite swimmers,the longer a swimmer demonstrates a buoyant force breaststroke kick,the lower the time in a 100 breaststroke.
基金Supported by Medical Science Research Project Plan by Health Commission of the Hebei Province,No.20220063.
文摘BACKGROUND Severe skeletal class II malocclusion is the indication for combined orthodontic and orthognathic treatment.CASE SUMMARY A woman with a chief complaint of a protruding chin and an inability to close her lips requested orthodontic camouflage.The treatment plan consisted of extracting the right upper third molar,right lower third molar,left lower second molar,and left upper third molar and moving the maxillary dentition distally using a convenient method involving microimplant nail anchors,push springs,long arm traction hooks,and elastic traction chains.After 52 months of treatment,her overbite and overjet were normal,and her facial profile was favorable.CONCLUSION This method can be used for distal movement of the maxillary dentition and to correct severe skeletal class II malocclusion in adults.
基金“Provincial Online and Offline Hybrid First-Class Course-Integrated Business English 1-of Zhejiang Province in 2020”.
文摘As an online course-teaching mode,Massive Open Online Course(MOOC)has drawn great attention from both teachers and students.It is necessary to give full play to the advantages of MOOC resources and to enhance teachers’consciousness of“identity remodeling”in the process of Integrated Business English flipping classroom teaching.Combining the advantages of MOOC and flipped classroom teaching during before-,during-,and after-class will greatly help promote the overall quality of business English teaching in universities.
文摘One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier.
文摘In the poems created by the renowned American poet Emily Dickinson,those related to nature constitute a considerable proportion.However,Dickinson’s attitude toward nature is,in fact,contradictory.On the one hand,Dickinson perceives nature as gentle and kind,akin to a mother.Nature is regarded as“heaven”and embodies harmony.On the other hand,nature possesses its own operational principles and harbors inherent cruelty.According to Dickinson,humans should refrain from excessive interference in the natural order.This article attempts to analyze the similarities in attitude towards nature between Dickinson’s poetry and Taoist philosophy.
文摘This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter.
基金Research Project on Basic Education in Jiangxi Province(SZUNDZH2021-1136,SZUNDZH2020-1138).
文摘The forest coverage rate of Jiangxi Province ranks second in China.It has rich natural resources,a long history of ancient color culture and rich red culture.In the development of nature education,Jiangxi Province has great potential and advantages.This paper introduces the development conditions of nature education in Jiangxi Province,summarizes the problems existing in the development of nature education in Jiangxi Province from the aspects of the types of nature education and the construction of nature education base,such as simple content and single form,imperfect infrastructure and lack of professionals,and puts forward some suggestions on the development of nature education in Jiangxi Province.
文摘A checklist of the macrolichens (foliose, fruticose & squamulose) of Barluk Mountain National Nature Reserve located in northwestern China is presented. It was derived from 47 inventories of preserved and undeveloped areas which yielded more than 670 collections containing 102 taxa (99 species, 1 subspecies, 2 varieties). Eight species were found that were new to Xinjiang, China. Twenty-eight species and 2 varieties were found on rock, 31 species on bark of deciduous and coniferous trees, 26 species on soil and 14 species and 1 subspecies over mosses. Foliose lichens were dominant with 76 species, followed by 16 species of squamulose lichens and 7 species of fruticose lichens.
文摘Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.