On August 1st, the General Administration of Quality Supervision, Inspection and Quarantine (AQSIQ) convened a conference to transmit the spirit of national quality work and study an important speech regarding sta... On August 1st, the General Administration of Quality Supervision, Inspection and Quarantine (AQSIQ) convened a conference to transmit the spirit of national quality work and study an important speech regarding standards from Wen Jiabao,Premier of the State Council.……展开更多
Two satellites were sent into space aboard a LM-4B launch vehicle from the Taiyuan Satellite Launch Center at 06:25 Beijing time on April 30.The Tianhui 2 satellite was placed to a SSO orbit.This was the 303rd launch ...Two satellites were sent into space aboard a LM-4B launch vehicle from the Taiyuan Satellite Launch Center at 06:25 Beijing time on April 30.The Tianhui 2 satellite was placed to a SSO orbit.This was the 303rd launch of the LM series launch vehicle and the first mission of the Shanghai Academy of Spaceflight Technology in 2019.展开更多
After years of investing in better cross-strait relations, Fujian is cashing in In his mind,Gentle Fang leaped from place to place, envisioning his new factory in America...Canada...Australia. "But Xiamen is the ...After years of investing in better cross-strait relations, Fujian is cashing in In his mind,Gentle Fang leaped from place to place, envisioning his new factory in America...Canada...Australia. "But Xiamen is the most desirable place for me," Fang said. "I have been to many places, but only feel at home here." With his ancestors from Zhangzhou, Fujian, and born in Kaohsiung, Taiwan, Fang, now General Manager展开更多
WITH a population of ouer 8 million, the Hui nationality liue ouer the largest area of any other minority nationality in China. The Hui reside in the Ningxia Hui Autonomous Region, Gansu, Shaanxi, Guizhou, Henan, Qing...WITH a population of ouer 8 million, the Hui nationality liue ouer the largest area of any other minority nationality in China. The Hui reside in the Ningxia Hui Autonomous Region, Gansu, Shaanxi, Guizhou, Henan, Qinghai, Yunnan, Hebei, and Shandong provinces, the Xinjiang Uygur Autonomous Region, and the Beijing and Tianjin municipalities.The origin of the Hui people can be traced back to the end of the seventh century, when Arabs and Persians often came to do trade in China along the ancient Silk Road. Some stayed on and started families. Their children have been traced to Guangzhou and Quanzhou. At the beginning of the 13th century, more Arabs, Persian and people from Central Asia came to China, where they married into the Han, the Uygur and the Mongolian nationalities. Gradually a new nationality—the Hui—was formed.With the founding of New China in 1949, the NingxJa Hui Autonomous Region was established. The industrial and agricultural output in the region in 1990 was 12 times that in 1957, when the autonomous region was not yet established. Now the Ningxia Hui Autonomous Region is one of China's four provinces (regions) with the fastest economic development.The Hui people believe in Islam and are noted for their intimacy with each other, their ability to adapt to their enuironment and their strong sense of clan. The Hui have their own special customs, rites and eating habits.Many famous people throughout Chinese history were of the Hui nationality, such as Zhamaluding, an astronomer who lived during the Yuan Dynasty (1271-1368), Zheng He, the famous navigator who lived during the same period, and Li Zhi, the famous thinker and man of letters of the Ming Dynasty (1368-1644). Today's celebrities of the Hui nationality are Ma Jian, the famous scholar on the Islamic religion, the Beijing opera artist Ma Lianliang, and Ma Yanhong, the gymnast who wins the world championships.展开更多
WHEN we talk about "Teacher Du" at the Hebei Institute of Finance and Economics in Shijiazhuang, we cannot help but think of the large, smiling man who often carries an oversized camera bag. In fact, his nam...WHEN we talk about "Teacher Du" at the Hebei Institute of Finance and Economics in Shijiazhuang, we cannot help but think of the large, smiling man who often carries an oversized camera bag. In fact, his name is Norbert duBois, an English teacher from the east coast of the United States. DuBois is fond of photography and has a wide circle of acquaintances. He展开更多
[Objective] The aim was to analyze the causes of low-temperature rain and snow disasters in 2008.[Method] Based on the basic meteorological observation data,a primary study was implemented about the severe cold air an...[Objective] The aim was to analyze the causes of low-temperature rain and snow disasters in 2008.[Method] Based on the basic meteorological observation data,a primary study was implemented about the severe cold air and frozen rain event.The importance of factors causing disaster,territory and human activity in the formation of low-temperature rain and snow disasters were expounded.[Result] The factors triggering the disasters were so strong that were rarely seen in previous (stronger than that in 1954);the specific terrain was beneficial to the occurrence of the frozen rain;the human being’s action amplified the impacts of disaster events while suffering it.Furthermore,a point of view to minimize the climate disaster damage like this severe frozen rain was proposed.Improvement of forecast capability and accuracy,implementation of the demonstration about climatic feasibility,and propagation to public about the natural disaster’s protection and mitigation and so on were functional aspects.[Conclusion] The study provided theoretical basis for the prediction and forecast of low-temperature rain and snow disasters.展开更多
"I'll send you all my dreams,Every day in a letter,Sealed with a kiss."在很久很久以前,想要治愈相思的方法只有两个,要么一早起床,爬过三座山穿过两座城跨过一条河去见那个人,要么将所有的相思与情愫写入一张素花薄纸之..."I'll send you all my dreams,Every day in a letter,Sealed with a kiss."在很久很久以前,想要治愈相思的方法只有两个,要么一早起床,爬过三座山穿过两座城跨过一条河去见那个人,要么将所有的相思与情愫写入一张素花薄纸之上,存入方正信封里以吻封缄,然后用漫长的时光去等待对方的回信。展开更多
A comprehensive study was presented for WLAN 802.11b using error-prone channel. It was theoretically and numerically evaluated the performance of three different network sizes with the bit rates that available in 802....A comprehensive study was presented for WLAN 802.11b using error-prone channel. It was theoretically and numerically evaluated the performance of three different network sizes with the bit rates that available in 802.11b protocol. Results show that throughput does not change with the size of the network for wide range of bit error rates (BERs) and the channel bit rates play a significant role in the main characteristics of the network. A comprehensive explanation has given for the phenomenon of the packet delay suppression at relatively high level of BERs in view of the size of the networks and the BERs. The effect length of the transmitting packets is also investigated.展开更多
On August 20, 2002, the construction-starting ceremonies of the north-channel projects for sending power from west to east were solemnly held at one main meeting place and five sub-meeting places simultaneously. The n...On August 20, 2002, the construction-starting ceremonies of the north-channel projects for sending power from west to east were solemnly held at one main meeting place and five sub-meeting places simultaneously. The north-channel projects for sending power from west to east started to construct this time include three transmission and substation projects and four power source projects. This paper makes a brief introduction to the seven projects.展开更多
This paper inquires firstly into the influence of environmental potential population on population movements in China. We think that there are intimate relationships between the changes of the environmental potential ...This paper inquires firstly into the influence of environmental potential population on population movements in China. We think that there are intimate relationships between the changes of the environmental potential population and the population movements: from southeast to northwest, from the coastland to the borderland in the early 30 years of the founding of the People’s Republic of China and the reversion of direction of population movements in recent ten years. Then we come to the conclusion that it has been inappropriate for a large-scale population movement of reclaiming and cultivating wasteland, because the actual population has universally surpassed the environmental potential population in most areas of China. But it is still appropriate and necessary for these movements, such as intelligence or science migration of population, limited population movement within the area of some provinces, population concentration on small towns and temporary fluidity of population.展开更多
In IPv6 based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through autoconfiguration. The Stateless address autoconfiguration(SLAAC) has proven to face several sec...In IPv6 based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through autoconfiguration. The Stateless address autoconfiguration(SLAAC) has proven to face several security issues. Even though the Secure Neighbor Discovery(SeND) uses Cryptographically Generated Addresses(CGA) to address these issues, it creates other concerns such as need for CA to authenticate hosts, exposure to CPU exhaustion attacks and high computational intensity. These issues are major concern for MANETs as it possesses limited bandwidth and processing power. The paper proposes empirically strong Light Weight Cryptographic Address Generation(LW-CGA) using entropy gathered from system states. Even the system users cannot monitor these system states; hence LW-CGA provides high security with minimal computational complexity and proves to be more suitable for MANETs. The LW-CGA and SeND are implemented and tested to study the performances. The evaluation shows that LW-CGA with good runtime throughput takes minimal address generation latency.展开更多
The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kind...The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kinds of energy:such as: Electrical, Magnetic, Electromagnetic,Chemical, Thermic, Gravity & antigravity, Light,Sound vibration and motor, etc. These messages are sent by specialized cells(transmitters)through the communication system tospecialized receptors which can perform the transformation and the transportation and code modifica-tion of the message energy and the message to another energy and code understandable by the masterof the human body "the Brain". "The Brain" will analyse the message and responds accordingly by sending order messages to dif-ferent parts of the body following the same role, i. e., by an electrical messages which can be trans-formed to another type of energy messages, like, chemical, motor, thermal, etc. by special receptorsand transmitters in the organ or the related tissues.展开更多
In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of sel...In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of selfcertifying addresses have become a highly popular and standardized method,of which Cryptographically Generated Addresses(CGA)is a prime example.CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership.Even though the CGA technique is highly effective,this method is still subject to several vulnerabilities with respect to security,in addition to certain limitations in its performance.In this study,the authors present an intensive systematic review of the literature to explore the technical specifications of CGA,its challenges,and existing proposals to enhance the protocol.Given that CGA generation is a time-consuming process,this limitation has hampered the application of CGA in mobile environments where nodes have limited energy and storage.Fulfilling Hash2 conditions in CGA is the heaviest and most timeconsuming part of SEND.To improve the performance of CGA,we replaced the Secure Hash Algorithm(SHA1)with the Message Digest(MD5)hash function.Furthermore,this study also analyzes the possible methods through which a CGA could be attacked.In conducting this analysis,Denial-of-Service(DoS)attacks were identified as the main method of attack toward the CGA verification process,which compromise and threaten the privacy of CGA.Therefore,we propose some modifications to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more security conscious.展开更多
文摘 On August 1st, the General Administration of Quality Supervision, Inspection and Quarantine (AQSIQ) convened a conference to transmit the spirit of national quality work and study an important speech regarding standards from Wen Jiabao,Premier of the State Council.……
文摘Two satellites were sent into space aboard a LM-4B launch vehicle from the Taiyuan Satellite Launch Center at 06:25 Beijing time on April 30.The Tianhui 2 satellite was placed to a SSO orbit.This was the 303rd launch of the LM series launch vehicle and the first mission of the Shanghai Academy of Spaceflight Technology in 2019.
文摘After years of investing in better cross-strait relations, Fujian is cashing in In his mind,Gentle Fang leaped from place to place, envisioning his new factory in America...Canada...Australia. "But Xiamen is the most desirable place for me," Fang said. "I have been to many places, but only feel at home here." With his ancestors from Zhangzhou, Fujian, and born in Kaohsiung, Taiwan, Fang, now General Manager
文摘WITH a population of ouer 8 million, the Hui nationality liue ouer the largest area of any other minority nationality in China. The Hui reside in the Ningxia Hui Autonomous Region, Gansu, Shaanxi, Guizhou, Henan, Qinghai, Yunnan, Hebei, and Shandong provinces, the Xinjiang Uygur Autonomous Region, and the Beijing and Tianjin municipalities.The origin of the Hui people can be traced back to the end of the seventh century, when Arabs and Persians often came to do trade in China along the ancient Silk Road. Some stayed on and started families. Their children have been traced to Guangzhou and Quanzhou. At the beginning of the 13th century, more Arabs, Persian and people from Central Asia came to China, where they married into the Han, the Uygur and the Mongolian nationalities. Gradually a new nationality—the Hui—was formed.With the founding of New China in 1949, the NingxJa Hui Autonomous Region was established. The industrial and agricultural output in the region in 1990 was 12 times that in 1957, when the autonomous region was not yet established. Now the Ningxia Hui Autonomous Region is one of China's four provinces (regions) with the fastest economic development.The Hui people believe in Islam and are noted for their intimacy with each other, their ability to adapt to their enuironment and their strong sense of clan. The Hui have their own special customs, rites and eating habits.Many famous people throughout Chinese history were of the Hui nationality, such as Zhamaluding, an astronomer who lived during the Yuan Dynasty (1271-1368), Zheng He, the famous navigator who lived during the same period, and Li Zhi, the famous thinker and man of letters of the Ming Dynasty (1368-1644). Today's celebrities of the Hui nationality are Ma Jian, the famous scholar on the Islamic religion, the Beijing opera artist Ma Lianliang, and Ma Yanhong, the gymnast who wins the world championships.
文摘WHEN we talk about "Teacher Du" at the Hebei Institute of Finance and Economics in Shijiazhuang, we cannot help but think of the large, smiling man who often carries an oversized camera bag. In fact, his name is Norbert duBois, an English teacher from the east coast of the United States. DuBois is fond of photography and has a wide circle of acquaintances. He
基金Supported by Chinese Meteorological Bureau Business Program in 2009 " National Meteorological Disaster Risk Zone"Hunan Province Meteorological Bureau Key Science and Research Program (200801)
文摘[Objective] The aim was to analyze the causes of low-temperature rain and snow disasters in 2008.[Method] Based on the basic meteorological observation data,a primary study was implemented about the severe cold air and frozen rain event.The importance of factors causing disaster,territory and human activity in the formation of low-temperature rain and snow disasters were expounded.[Result] The factors triggering the disasters were so strong that were rarely seen in previous (stronger than that in 1954);the specific terrain was beneficial to the occurrence of the frozen rain;the human being’s action amplified the impacts of disaster events while suffering it.Furthermore,a point of view to minimize the climate disaster damage like this severe frozen rain was proposed.Improvement of forecast capability and accuracy,implementation of the demonstration about climatic feasibility,and propagation to public about the natural disaster’s protection and mitigation and so on were functional aspects.[Conclusion] The study provided theoretical basis for the prediction and forecast of low-temperature rain and snow disasters.
文摘"I'll send you all my dreams,Every day in a letter,Sealed with a kiss."在很久很久以前,想要治愈相思的方法只有两个,要么一早起床,爬过三座山穿过两座城跨过一条河去见那个人,要么将所有的相思与情愫写入一张素花薄纸之上,存入方正信封里以吻封缄,然后用漫长的时光去等待对方的回信。
文摘A comprehensive study was presented for WLAN 802.11b using error-prone channel. It was theoretically and numerically evaluated the performance of three different network sizes with the bit rates that available in 802.11b protocol. Results show that throughput does not change with the size of the network for wide range of bit error rates (BERs) and the channel bit rates play a significant role in the main characteristics of the network. A comprehensive explanation has given for the phenomenon of the packet delay suppression at relatively high level of BERs in view of the size of the networks and the BERs. The effect length of the transmitting packets is also investigated.
文摘On August 20, 2002, the construction-starting ceremonies of the north-channel projects for sending power from west to east were solemnly held at one main meeting place and five sub-meeting places simultaneously. The north-channel projects for sending power from west to east started to construct this time include three transmission and substation projects and four power source projects. This paper makes a brief introduction to the seven projects.
文摘This paper inquires firstly into the influence of environmental potential population on population movements in China. We think that there are intimate relationships between the changes of the environmental potential population and the population movements: from southeast to northwest, from the coastland to the borderland in the early 30 years of the founding of the People’s Republic of China and the reversion of direction of population movements in recent ten years. Then we come to the conclusion that it has been inappropriate for a large-scale population movement of reclaiming and cultivating wasteland, because the actual population has universally surpassed the environmental potential population in most areas of China. But it is still appropriate and necessary for these movements, such as intelligence or science migration of population, limited population movement within the area of some provinces, population concentration on small towns and temporary fluidity of population.
文摘In IPv6 based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through autoconfiguration. The Stateless address autoconfiguration(SLAAC) has proven to face several security issues. Even though the Secure Neighbor Discovery(SeND) uses Cryptographically Generated Addresses(CGA) to address these issues, it creates other concerns such as need for CA to authenticate hosts, exposure to CPU exhaustion attacks and high computational intensity. These issues are major concern for MANETs as it possesses limited bandwidth and processing power. The paper proposes empirically strong Light Weight Cryptographic Address Generation(LW-CGA) using entropy gathered from system states. Even the system users cannot monitor these system states; hence LW-CGA provides high security with minimal computational complexity and proves to be more suitable for MANETs. The LW-CGA and SeND are implemented and tested to study the performances. The evaluation shows that LW-CGA with good runtime throughput takes minimal address generation latency.
文摘The code message is the language of the human body communication systems.Each organ has a main code and each message has a special code. These codes resemble the computer codes. The messages can be from different kinds of energy:such as: Electrical, Magnetic, Electromagnetic,Chemical, Thermic, Gravity & antigravity, Light,Sound vibration and motor, etc. These messages are sent by specialized cells(transmitters)through the communication system tospecialized receptors which can perform the transformation and the transportation and code modifica-tion of the message energy and the message to another energy and code understandable by the masterof the human body "the Brain". "The Brain" will analyse the message and responds accordingly by sending order messages to dif-ferent parts of the body following the same role, i. e., by an electrical messages which can be trans-formed to another type of energy messages, like, chemical, motor, thermal, etc. by special receptorsand transmitters in the organ or the related tissues.
基金supported by Dana Impak Perdana fund,no.UKM DIP-2018-040 and Fundamental Research Grant Scheme fund no FRGS/1/2018/TK04/UKM/02/7 under Author R.Hassan.
文摘In networking,one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers.To resolve this issue,the use of selfcertifying addresses have become a highly popular and standardized method,of which Cryptographically Generated Addresses(CGA)is a prime example.CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership.Even though the CGA technique is highly effective,this method is still subject to several vulnerabilities with respect to security,in addition to certain limitations in its performance.In this study,the authors present an intensive systematic review of the literature to explore the technical specifications of CGA,its challenges,and existing proposals to enhance the protocol.Given that CGA generation is a time-consuming process,this limitation has hampered the application of CGA in mobile environments where nodes have limited energy and storage.Fulfilling Hash2 conditions in CGA is the heaviest and most timeconsuming part of SEND.To improve the performance of CGA,we replaced the Secure Hash Algorithm(SHA1)with the Message Digest(MD5)hash function.Furthermore,this study also analyzes the possible methods through which a CGA could be attacked.In conducting this analysis,Denial-of-Service(DoS)attacks were identified as the main method of attack toward the CGA verification process,which compromise and threaten the privacy of CGA.Therefore,we propose some modifications to the CGA standard verification algorithm to mitigate DoS attacks and to make CGA more security conscious.