During the course of 2004, the Chinese trade unions earnestly implemented their strategy of "Organizing for Better Protection," steppedup efforts to regulate industrial relations, effectively defended the legitimate...During the course of 2004, the Chinese trade unions earnestly implemented their strategy of "Organizing for Better Protection," steppedup efforts to regulate industrial relations, effectively defended the legitimate rights and interests of workers.展开更多
EDITOR'S NOTE: All China Federation of Trade Unions (ACFTU) has recently published Blue Paper on the Role of Chinese Trade Unions in Safeguarding the Legitimate Rights and Interests of Workers (2005), which cons...EDITOR'S NOTE: All China Federation of Trade Unions (ACFTU) has recently published Blue Paper on the Role of Chinese Trade Unions in Safeguarding the Legitimate Rights and Interests of Workers (2005), which consist of 11 parts: preserve the correct orientation of Chinese trade unions as a protector of workers' legitimate rights and interests; protect workers' right to join and form trade union; organize and represent workers to exercise the right to equal consultation; protect workers' labor and economic rights; guarantee workers' democratic and political rights; fulfill workers' spiritual and cultural needs; actively participate in adjusting labor relations and handling labor disputes; protect migrant workers' legitimate rights and interests; promote gender equality and protect women workers' special rights and interests; take innovations in the way trade unions protect workers; and mobilize and organize workers to play the role of the working class as the main force in economic construction, and the following is an abstracted edition of it.展开更多
The theory of situated learning as legitimate peripheral participation(LPP)is widely applied in the educational field.But understandings of it are diversified so that quite a lot of these understandings in literature ...The theory of situated learning as legitimate peripheral participation(LPP)is widely applied in the educational field.But understandings of it are diversified so that quite a lot of these understandings in literature are not in conform to the spirit of the theory.Thus,drawing on literature review,this paper attempts to explicate the theory from three aspects:practical and philosophical base,the central ideas of the theory,and its difference from the cognitive learning theory,aiming to contribute to an easier understanding of it by readers and researchers.展开更多
Legitimate defense plays an important role in curbing crimes,maintaining public order and fostering good moral conduct.In China’s judicial practice,cases on legitimate defense raised several controversies on the natu...Legitimate defense plays an important role in curbing crimes,maintaining public order and fostering good moral conduct.In China’s judicial practice,cases on legitimate defense raised several controversies on the nature of legitimate defense,limits of excessive defense and the applicable objects and definition of special defense.The nature of legitimate defense mainly involves defense intention,defense object,defense time and other factors.The defense intention is an important sign to differ the legitimate defense from the illegitimate defense.The object of legitimate defense can only be the unlawful infringer and the actor can only prevent the ongoing illegal infringement.The existence of unlawful infringement of reality is a prerequisite for legitimate defense to be exercised.The unlawful infringement that is justified by defense should be illegal,invasive,urgency and realistic.As an unlawful infringement,the excessive defense needs to be distinguished from the legitimate defense in terms of the defense limit.As for the “necessary limit”,in principle,it means the necessary defense can stop the present unlawful infringement,and there is an obvious difference between the illegitimate defense and legitimate defense in terms of the means of the actor and the intensity of behavior.Defense behavior shall be treated as excessive defense only if it “obviously exceeds necessary limit” and “cause great harm” at the same time.The key to apply the special defense lies in the accurate understanding of the applicable object of special defense,that is,special defense can only be applied to “ongoing physical assault,murder,robbery,rape,kidnap and other violent crimes that seriously endanger personal safety”.展开更多
We propose a legal Unmanned Aerial Vehicle(UAV)surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source,where a UAV works in half-duplex mode and the ...We propose a legal Unmanned Aerial Vehicle(UAV)surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source,where a UAV works in half-duplex mode and the relay/source deploys artificial noise to prevent monitoring.Three schemes are considered for a Multiple-Input Multiple-Output(MIMO)UAV:surveilling followed by jamming;jamming followed by surveilling;and two-stage surveilling.For each scheme,a closed-form expression of surveilling non-outage probability is derived,and surveilling performance under different system configurations is analyzed.Monte Carlo(MC)simulation validates derivation correctness.展开更多
With the ever increasing popularity of international standardized English proficiency tests,the test takers' craze for them has nev er been greater.However,the issue of the inequity which comes from the legitimate...With the ever increasing popularity of international standardized English proficiency tests,the test takers' craze for them has nev er been greater.However,the issue of the inequity which comes from the legitimate knowledge which decides a test-taker's score hasn't been fully exposed.The theoretical study of this issue in this paper helps explore the legitimate knowledge tested in international English proficiency tests.By examining the legitimate knowledge in the sample tests of IELTS and TOEFL,the study reveals the underlying bias which constitutes a decent score for the test takers.In the end,the study proposes a more balanced assessment model for discussion.展开更多
this paper suggested a model to address two important but unexplored questions-how EPC affects the buildings energy-saving performance and how institutional legitimacy of ESCOs moderates the relationship between EPC a...this paper suggested a model to address two important but unexplored questions-how EPC affects the buildings energy-saving performance and how institutional legitimacy of ESCOs moderates the relationship between EPC and buildings energy-saving performance.The results indicate that the implementation of EPC has a positive effect on building senergy-saving performance.And also,the sociopolitical legitimacy positively moderates the relationship between the implement of EPC and buildings energy-saving performance and the cognitive legitimacy positively moderates the relationship between the implement of EPC and buildings energy-saving performance.展开更多
Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stol...Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87–99%accuracy,82–98%for ELM,and 81–94%for SVM.The proposed pipeline achieves a 100%true positive and 0%false-negative rate for almost all classifiers.展开更多
This study seeks to gain an insight into political speech subtitle,focusing on de/legitimation as a macro-linguistic discursive strategy reflecting micro-linguistic discursive strategies so as to exemplify as to how s...This study seeks to gain an insight into political speech subtitle,focusing on de/legitimation as a macro-linguistic discursive strategy reflecting micro-linguistic discursive strategies so as to exemplify as to how such a discursive representation could be mediated through translation as a socio-communicative action and translation studies as a growing interdisciplinary field of inquiry.To this end,a twofold theoretical framework at both macro-linguistic and micro-linguistic levels is employed-consisting of a quadruple categorization of legitimation developed by Van Leeuwen(2008)[38]on political discourse(PD)and Fairclough's(2003)[12]critical discourse analysis(CDA)model on linguistic modality-to analyze one of the political speeches delivered by the Iranian former president Mahmood Ahmadinejad and subtitled into English by MEMRITV(Middle East Media Research Institute TV).The results,confirming political discourse and its translation as a means of de/legitimation,indicate that although there are no overt manipulations regarding the discourse of de/legitimation in the target text(TT),the manipulation of micro-linguistic device of modality constitutes a degree of covert manipulation of de-legitimizing discourse,altering the author's(the source text enunciator's)commitment to truth.It is concluded that viewing translation of political discourse as a means of de/legitimization in the context of micro-linguistic aspects such as modality could probably open a fruitful avenue to discourse studies in general and translation studies in particular.However,to comparatively achieve more reliable and informative results,adopting eclectic approaches to the critical study of PD seems to be more promising.展开更多
Whether the legitimate boundary of human genome editing is gene therapy or genetic enhancement is an issue of fierce debate. To safeguard basic human rights such as the right to autonomous development and personal dig...Whether the legitimate boundary of human genome editing is gene therapy or genetic enhancement is an issue of fierce debate. To safeguard basic human rights such as the right to autonomous development and personal dignity, and protection of the current human social ethics and moral outlook and natural evolution order, gene therapy should be permitted while genetic enhancement should be prohibited. After the boundary of the genome editing application category is clearly defined, the risk that social inequality may increase, the biosafety and damage risk and the privacy and personal information disclosure risk brought by human genome editing should be analyzed.Based on this, the legal approach to regulating genome editing should be to adopt an inclusive and prudent hierarchical supervision idea ensuring universal access to genome editing under the social permission theory. A human rights impact assessment system and an in-process framework for diversified risk evaluation and inclusive and prudent hierarchical supervision, determine a posterior attribution principle and dynamically standardize genome editing application order in a closed-loop way.展开更多
Desperately trying to cure their financial ailments, central banks in the West fired up their money-printing machines to pour liquidity into their respective banking systems. While this no doubt helped thaw the credit...Desperately trying to cure their financial ailments, central banks in the West fired up their money-printing machines to pour liquidity into their respective banking systems. While this no doubt helped thaw the credit freeze, it also inadvertently sowed the seeds of inflation. Andy Xie, a renowned independent Shanghai-based economist and former Morgan Stanley chief economist for Asia, discussed this issue in a recent interview with the Securities Times. Edited excerpts follow:展开更多
Historical and legal evidence proves China’s indisputable sovereignty over the South China Sea At the foreign ministers’ meeting of the ASEAN Regional Forum in Viet Nam on July 23, U.S.Secretary of State Hillary Cli...Historical and legal evidence proves China’s indisputable sovereignty over the South China Sea At the foreign ministers’ meeting of the ASEAN Regional Forum in Viet Nam on July 23, U.S.Secretary of State Hillary Clinton said the UnitedState Hillary Clinton said the United States has a national interest in the South China Sea, hinting that Washington may interfere in the territorial disputes in the area. Her remarks caused a strong reaction from China.展开更多
Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious c...Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious communication link by two full-duplex legitimate monitors(LMs)based on multi-agent deep deterministic policy gradient(MADDPG)algorithm in two phases.In phase 1,the suspicious transmitter sends information to the suspicious assistant relay,and the assistant relay decodes and forwards the received message to the suspicious receiver in phase 2.Meanwhile,two LMs cooperatively emit jamming to suspicious relay and receiver during each phase.Particularly,each LM is considered to be an energy-limited device,and eavesdropping is a long-term process,so we adopt expected eavesdropping energy efficiency(EEE)over a period of time to evaluate eavesdropping performance.However,for two LMs,how to cooperatively make jamming power decision at each hop in a dynamic environment is a huge challenge.Therefore,MADDPG algorithm,as a multi-agent reinforcement learning approach with the advantage of dynamic decision-making,is utilized to solve the issue of jamming power decision for each LM.In the simulation,the results show that our proposed cooperative jamming scheme can obtain higher expected EEE.展开更多
The relationship between plant and pollinator is considered as the mutualism because plant benefits from the pollinator’s transport of male gametes and pollinator benefits from plant’s reward.Nectar robbers are freq...The relationship between plant and pollinator is considered as the mutualism because plant benefits from the pollinator’s transport of male gametes and pollinator benefits from plant’s reward.Nectar robbers are frequently described as cheaters in the plant-pollinator mutualism,because it is assumed that they obtain a reward(nectar)without providing a service(pollination).Nectar robbers are birds,insects,or other flower visitors that remove nectar from flowers through a hole pierced or bitten in the corolla.Nectar robbing repre-sents a complex relationship between animals and plants.Whether plants benefit from the relationship is always a con-troversial issue in earlier studies.This paper is a review of the recent literatures on nectar robbing and attempts to acquire an expanded understanding of the ecological and evolutionary roles that robbers play.Understanding the effects of nectar robbers on the plants that they visited and other flower visi-tors is especially important when one considers the high rates of robbing that a plant population may experience and the high percentage of all flower visitors that nectar robbers make to some species.There are two standpoints in explaining why animals forage on flowers and steal nectar in an illegitimate behavior.One is that animals can only get food in illegitimate way because of the mismatch of the morphologies of animals’mouthparts and floral structure.The other point of view argues that nectar robbing is a relatively more efficient,thus more energy-saving way for animals to get nectar from flowers.This is probably associated with the difficulty of changing attitudes that have been held for a long time.In the case of positive effect,the bodies of nectar robbers frequently touch the sex organs of plants during their visiting to the flowers and causing pollination.The neutral effect,nectar robbers’behavior may destruct the corollas of flowers,but they neither touch the sex organs nor destroy the ovules.Their behavior does not affect the fruit sets or seed sets of the hosting plant.Besides the direct impacts on plants,nectar robbers may also have an indirect effect on the behavior of the legitimate pollinators.Under some circumstances,the change in pollinator behavior could result in improved repro-ductive fitness of plants through increased pollen flow and out-crossing.展开更多
This article examines the various ways in which the Northern Wei emperor Wenchengdi (440465; r. 452-465) was portrayed to his subjects. As is the case with many monarchs in many countries, he played different parts ...This article examines the various ways in which the Northern Wei emperor Wenchengdi (440465; r. 452-465) was portrayed to his subjects. As is the case with many monarchs in many countries, he played different parts before different groups. For his soldiers, he was represented as a great hunter and marksman; to farmers in the lowlands, as a caring protector and benefactor; to potentially rebellious groups on the periphery, as a strong and steady observer of their actions. At the same time, it was in his reign that the Northern Wei court began efforts to use Buddhism as an overarching way to justify rule to all within the realm, by initiating construction of the famous cave-temples at Yungang, where "Buddhas became emperors and emperors Buddhas." The spectacles through which Wenchengdi was portrayed are contextualized by a parallel examination of the very difficult life of the person behind the pomp and circumstance.展开更多
This paper discusses the criteria according to which literature iscategorized as "high (-brow) literature" or "low (-brow) literature" in modem China. I suggest that these standards change over time and are in...This paper discusses the criteria according to which literature iscategorized as "high (-brow) literature" or "low (-brow) literature" in modem China. I suggest that these standards change over time and are intimately tied to the problematics of canonization, legitimization, and cultural hegemony. In modem China, the criteria are also closely related to class differentiation. Furthermore, I contend that, in the Chinese academic world, there is often a tendency to interpret certain forms of middle-brow literature as belletristic literature that breaks though the boundary between "high (-brow) literature" and "low (-brow) literature." In discussing "middle-brow" literature in modem China, this paper takes "Mandarin Ducks and Butterfly" literature as the object of its analysis and proposes that middle-brow literature is essentially the moralization of political and social issues, which serves to displace social-economic and political concerns. This is usually accomplished through the glorification of conservative ethical-moral viewpoints.展开更多
Through a formal analysis of this seminar work of Lu Xun, the author observes that the narrative and dramatic motivation of Ah Q--The Real Story is an intense yet futile search for a proper name and identity within a ...Through a formal analysis of this seminar work of Lu Xun, the author observes that the narrative and dramatic motivation of Ah Q--The Real Story is an intense yet futile search for a proper name and identity within a system of naming and identity-formation as the system, by default, repels the identity-seeking and "homecoming" effort of the sign in question ("Ah Q"). Based on this observation, the author goes on to argue that the origin of Chinese modernism lies in a highly political awareness of one's loss of cultural belonging and thus one's collective alienation from the matrix of tradition and indeed existence. Departing from conventional reading of this work, often anchored in sociopolitical interpretations of class, nation, and group psychology centered on the "critique of national characteristics" discourse, this article maintains that the true ambition and literary energy of Lu Xun's masterpiece can only be fully grasped when one confronts this epic cul^tral-political struggle to regain a cultural system's power and legitimation to name one's own existence and define one's own value.展开更多
文摘During the course of 2004, the Chinese trade unions earnestly implemented their strategy of "Organizing for Better Protection," steppedup efforts to regulate industrial relations, effectively defended the legitimate rights and interests of workers.
文摘EDITOR'S NOTE: All China Federation of Trade Unions (ACFTU) has recently published Blue Paper on the Role of Chinese Trade Unions in Safeguarding the Legitimate Rights and Interests of Workers (2005), which consist of 11 parts: preserve the correct orientation of Chinese trade unions as a protector of workers' legitimate rights and interests; protect workers' right to join and form trade union; organize and represent workers to exercise the right to equal consultation; protect workers' labor and economic rights; guarantee workers' democratic and political rights; fulfill workers' spiritual and cultural needs; actively participate in adjusting labor relations and handling labor disputes; protect migrant workers' legitimate rights and interests; promote gender equality and protect women workers' special rights and interests; take innovations in the way trade unions protect workers; and mobilize and organize workers to play the role of the working class as the main force in economic construction, and the following is an abstracted edition of it.
文摘The theory of situated learning as legitimate peripheral participation(LPP)is widely applied in the educational field.But understandings of it are diversified so that quite a lot of these understandings in literature are not in conform to the spirit of the theory.Thus,drawing on literature review,this paper attempts to explicate the theory from three aspects:practical and philosophical base,the central ideas of the theory,and its difference from the cognitive learning theory,aiming to contribute to an easier understanding of it by readers and researchers.
基金the Supreme People’s Procuratorate Procuratorial Theory Research Project in 2018—“Study on the System of Sentencing Suggestions in Pleasant Plea”(GJ2018D26)
文摘Legitimate defense plays an important role in curbing crimes,maintaining public order and fostering good moral conduct.In China’s judicial practice,cases on legitimate defense raised several controversies on the nature of legitimate defense,limits of excessive defense and the applicable objects and definition of special defense.The nature of legitimate defense mainly involves defense intention,defense object,defense time and other factors.The defense intention is an important sign to differ the legitimate defense from the illegitimate defense.The object of legitimate defense can only be the unlawful infringer and the actor can only prevent the ongoing illegal infringement.The existence of unlawful infringement of reality is a prerequisite for legitimate defense to be exercised.The unlawful infringement that is justified by defense should be illegal,invasive,urgency and realistic.As an unlawful infringement,the excessive defense needs to be distinguished from the legitimate defense in terms of the defense limit.As for the “necessary limit”,in principle,it means the necessary defense can stop the present unlawful infringement,and there is an obvious difference between the illegitimate defense and legitimate defense in terms of the means of the actor and the intensity of behavior.Defense behavior shall be treated as excessive defense only if it “obviously exceeds necessary limit” and “cause great harm” at the same time.The key to apply the special defense lies in the accurate understanding of the applicable object of special defense,that is,special defense can only be applied to “ongoing physical assault,murder,robbery,rape,kidnap and other violent crimes that seriously endanger personal safety”.
基金This work is partially supported by the National Key Research and Development Project of China under Grant 2020YFB1806805.
文摘We propose a legal Unmanned Aerial Vehicle(UAV)surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source,where a UAV works in half-duplex mode and the relay/source deploys artificial noise to prevent monitoring.Three schemes are considered for a Multiple-Input Multiple-Output(MIMO)UAV:surveilling followed by jamming;jamming followed by surveilling;and two-stage surveilling.For each scheme,a closed-form expression of surveilling non-outage probability is derived,and surveilling performance under different system configurations is analyzed.Monte Carlo(MC)simulation validates derivation correctness.
文摘With the ever increasing popularity of international standardized English proficiency tests,the test takers' craze for them has nev er been greater.However,the issue of the inequity which comes from the legitimate knowledge which decides a test-taker's score hasn't been fully exposed.The theoretical study of this issue in this paper helps explore the legitimate knowledge tested in international English proficiency tests.By examining the legitimate knowledge in the sample tests of IELTS and TOEFL,the study reveals the underlying bias which constitutes a decent score for the test takers.In the end,the study proposes a more balanced assessment model for discussion.
文摘this paper suggested a model to address two important but unexplored questions-how EPC affects the buildings energy-saving performance and how institutional legitimacy of ESCOs moderates the relationship between EPC and buildings energy-saving performance.The results indicate that the implementation of EPC has a positive effect on building senergy-saving performance.And also,the sociopolitical legitimacy positively moderates the relationship between the implement of EPC and buildings energy-saving performance and the cognitive legitimacy positively moderates the relationship between the implement of EPC and buildings energy-saving performance.
文摘Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87–99%accuracy,82–98%for ELM,and 81–94%for SVM.The proposed pipeline achieves a 100%true positive and 0%false-negative rate for almost all classifiers.
文摘This study seeks to gain an insight into political speech subtitle,focusing on de/legitimation as a macro-linguistic discursive strategy reflecting micro-linguistic discursive strategies so as to exemplify as to how such a discursive representation could be mediated through translation as a socio-communicative action and translation studies as a growing interdisciplinary field of inquiry.To this end,a twofold theoretical framework at both macro-linguistic and micro-linguistic levels is employed-consisting of a quadruple categorization of legitimation developed by Van Leeuwen(2008)[38]on political discourse(PD)and Fairclough's(2003)[12]critical discourse analysis(CDA)model on linguistic modality-to analyze one of the political speeches delivered by the Iranian former president Mahmood Ahmadinejad and subtitled into English by MEMRITV(Middle East Media Research Institute TV).The results,confirming political discourse and its translation as a means of de/legitimation,indicate that although there are no overt manipulations regarding the discourse of de/legitimation in the target text(TT),the manipulation of micro-linguistic device of modality constitutes a degree of covert manipulation of de-legitimizing discourse,altering the author's(the source text enunciator's)commitment to truth.It is concluded that viewing translation of political discourse as a means of de/legitimization in the context of micro-linguistic aspects such as modality could probably open a fruitful avenue to discourse studies in general and translation studies in particular.However,to comparatively achieve more reliable and informative results,adopting eclectic approaches to the critical study of PD seems to be more promising.
基金phased achievement of both Research of the Theory of Legal principles in the Modern Hermeneutic Horizon(Project Approval No.21AFX003)of the National Social Science Fund of China2021 Annual Special Scientific Research Fund for Academic Postgraduates(Project Approval No.2021LAW005)Law School,Beijing Normal University.
文摘Whether the legitimate boundary of human genome editing is gene therapy or genetic enhancement is an issue of fierce debate. To safeguard basic human rights such as the right to autonomous development and personal dignity, and protection of the current human social ethics and moral outlook and natural evolution order, gene therapy should be permitted while genetic enhancement should be prohibited. After the boundary of the genome editing application category is clearly defined, the risk that social inequality may increase, the biosafety and damage risk and the privacy and personal information disclosure risk brought by human genome editing should be analyzed.Based on this, the legal approach to regulating genome editing should be to adopt an inclusive and prudent hierarchical supervision idea ensuring universal access to genome editing under the social permission theory. A human rights impact assessment system and an in-process framework for diversified risk evaluation and inclusive and prudent hierarchical supervision, determine a posterior attribution principle and dynamically standardize genome editing application order in a closed-loop way.
文摘Desperately trying to cure their financial ailments, central banks in the West fired up their money-printing machines to pour liquidity into their respective banking systems. While this no doubt helped thaw the credit freeze, it also inadvertently sowed the seeds of inflation. Andy Xie, a renowned independent Shanghai-based economist and former Morgan Stanley chief economist for Asia, discussed this issue in a recent interview with the Securities Times. Edited excerpts follow:
文摘Historical and legal evidence proves China’s indisputable sovereignty over the South China Sea At the foreign ministers’ meeting of the ASEAN Regional Forum in Viet Nam on July 23, U.S.Secretary of State Hillary Clinton said the UnitedState Hillary Clinton said the United States has a national interest in the South China Sea, hinting that Washington may interfere in the territorial disputes in the area. Her remarks caused a strong reaction from China.
基金the National Natural Science Foundation of China under Grant 61971190the Fundamental Research Funds for the Central Universities under Grant 2019MS089+2 种基金the Hebei Province Natural Science Foundation under Grant F2016502062 and Grant E2019502039the Beijing Natural Science Foundation under Grant 4164101the Key Project of Science and Technology Research in Higher Education of Hebei Province under Grant ZD2021406。
文摘Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious communication link by two full-duplex legitimate monitors(LMs)based on multi-agent deep deterministic policy gradient(MADDPG)algorithm in two phases.In phase 1,the suspicious transmitter sends information to the suspicious assistant relay,and the assistant relay decodes and forwards the received message to the suspicious receiver in phase 2.Meanwhile,two LMs cooperatively emit jamming to suspicious relay and receiver during each phase.Particularly,each LM is considered to be an energy-limited device,and eavesdropping is a long-term process,so we adopt expected eavesdropping energy efficiency(EEE)over a period of time to evaluate eavesdropping performance.However,for two LMs,how to cooperatively make jamming power decision at each hop in a dynamic environment is a huge challenge.Therefore,MADDPG algorithm,as a multi-agent reinforcement learning approach with the advantage of dynamic decision-making,is utilized to solve the issue of jamming power decision for each LM.In the simulation,the results show that our proposed cooperative jamming scheme can obtain higher expected EEE.
基金This work was supported by Specialized Research Fund for the Doctoral Program of Higher Education.
文摘The relationship between plant and pollinator is considered as the mutualism because plant benefits from the pollinator’s transport of male gametes and pollinator benefits from plant’s reward.Nectar robbers are frequently described as cheaters in the plant-pollinator mutualism,because it is assumed that they obtain a reward(nectar)without providing a service(pollination).Nectar robbers are birds,insects,or other flower visitors that remove nectar from flowers through a hole pierced or bitten in the corolla.Nectar robbing repre-sents a complex relationship between animals and plants.Whether plants benefit from the relationship is always a con-troversial issue in earlier studies.This paper is a review of the recent literatures on nectar robbing and attempts to acquire an expanded understanding of the ecological and evolutionary roles that robbers play.Understanding the effects of nectar robbers on the plants that they visited and other flower visi-tors is especially important when one considers the high rates of robbing that a plant population may experience and the high percentage of all flower visitors that nectar robbers make to some species.There are two standpoints in explaining why animals forage on flowers and steal nectar in an illegitimate behavior.One is that animals can only get food in illegitimate way because of the mismatch of the morphologies of animals’mouthparts and floral structure.The other point of view argues that nectar robbing is a relatively more efficient,thus more energy-saving way for animals to get nectar from flowers.This is probably associated with the difficulty of changing attitudes that have been held for a long time.In the case of positive effect,the bodies of nectar robbers frequently touch the sex organs of plants during their visiting to the flowers and causing pollination.The neutral effect,nectar robbers’behavior may destruct the corollas of flowers,but they neither touch the sex organs nor destroy the ovules.Their behavior does not affect the fruit sets or seed sets of the hosting plant.Besides the direct impacts on plants,nectar robbers may also have an indirect effect on the behavior of the legitimate pollinators.Under some circumstances,the change in pollinator behavior could result in improved repro-ductive fitness of plants through increased pollen flow and out-crossing.
文摘This article examines the various ways in which the Northern Wei emperor Wenchengdi (440465; r. 452-465) was portrayed to his subjects. As is the case with many monarchs in many countries, he played different parts before different groups. For his soldiers, he was represented as a great hunter and marksman; to farmers in the lowlands, as a caring protector and benefactor; to potentially rebellious groups on the periphery, as a strong and steady observer of their actions. At the same time, it was in his reign that the Northern Wei court began efforts to use Buddhism as an overarching way to justify rule to all within the realm, by initiating construction of the famous cave-temples at Yungang, where "Buddhas became emperors and emperors Buddhas." The spectacles through which Wenchengdi was portrayed are contextualized by a parallel examination of the very difficult life of the person behind the pomp and circumstance.
文摘This paper discusses the criteria according to which literature iscategorized as "high (-brow) literature" or "low (-brow) literature" in modem China. I suggest that these standards change over time and are intimately tied to the problematics of canonization, legitimization, and cultural hegemony. In modem China, the criteria are also closely related to class differentiation. Furthermore, I contend that, in the Chinese academic world, there is often a tendency to interpret certain forms of middle-brow literature as belletristic literature that breaks though the boundary between "high (-brow) literature" and "low (-brow) literature." In discussing "middle-brow" literature in modem China, this paper takes "Mandarin Ducks and Butterfly" literature as the object of its analysis and proposes that middle-brow literature is essentially the moralization of political and social issues, which serves to displace social-economic and political concerns. This is usually accomplished through the glorification of conservative ethical-moral viewpoints.
文摘Through a formal analysis of this seminar work of Lu Xun, the author observes that the narrative and dramatic motivation of Ah Q--The Real Story is an intense yet futile search for a proper name and identity within a system of naming and identity-formation as the system, by default, repels the identity-seeking and "homecoming" effort of the sign in question ("Ah Q"). Based on this observation, the author goes on to argue that the origin of Chinese modernism lies in a highly political awareness of one's loss of cultural belonging and thus one's collective alienation from the matrix of tradition and indeed existence. Departing from conventional reading of this work, often anchored in sociopolitical interpretations of class, nation, and group psychology centered on the "critique of national characteristics" discourse, this article maintains that the true ambition and literary energy of Lu Xun's masterpiece can only be fully grasped when one confronts this epic cul^tral-political struggle to regain a cultural system's power and legitimation to name one's own existence and define one's own value.