Each language has its own branch of idioms.And Chinese idioms are generally difficult to translate because they are con⁃cise and comprehensive,simple in formality and rich in connotations.This paper aims at analyzing ...Each language has its own branch of idioms.And Chinese idioms are generally difficult to translate because they are con⁃cise and comprehensive,simple in formality and rich in connotations.This paper aims at analyzing the application of the“unpack⁃ing”method in translation of idioms.The backing theory of the“unpacking”method is the famous functional equivalence theory put forward by the great translator,Nida.The paper first illustrates the brought up of the method and its backing theory,functional equivalence,and then makes a tentative analysis of the application of unpacking method in translation of idioms.展开更多
Two photolabile amphiphilic supramolecules were designed and synthesized with mono-dendrite and tri-dendrite, which can reversibly self-assemble to spheroid and wedge-shaped nanoparticles. With multiple branches of te...Two photolabile amphiphilic supramolecules were designed and synthesized with mono-dendrite and tri-dendrite, which can reversibly self-assemble to spheroid and wedge-shaped nanoparticles. With multiple branches of terminal amine labeled PEG, these nanoparticles can associate with a negatively charged oligonucleotide and their usage for oligonucleotide delivery was evaluated. Oligonucleotide/nanoparticle complex containing tri-dendrite can efficiently deliver oligonucleotide into cells via endocytosis, while the complex containing mono-dendrite almost lost their ability to deliver oligonucleotide. Further light activation triggered the dissociation of tri-dendrite supramolecular assembly via 1,4- and 1,6-quinone-methide rearrangement, leading to the efficient unpacking of the oligonucleotide in cells.展开更多
In recent years,Android applications have caused personal privacy leaks frequently.In order to analyze the malicious behavior,taint analysis technology can be used to track the API call chain,build a control-flow grap...In recent years,Android applications have caused personal privacy leaks frequently.In order to analyze the malicious behavior,taint analysis technology can be used to track the API call chain,build a control-flow graph of function,and determine whether there is a security risk.However,with the continuous escalation of offensive and defensive confrontation of source code,more and more applications use reinforcement technology to prevent security practitioners from performing reverse analysis,therefore it is impossible to analyze function-behavior from the source code.Thus,we design a framework of taint analysis that applied to the Android applications,which automatically unpacks the Android APKs,restores the real source code of the App,performs taint analysis,and generates a control-flow graph of function.Experimental tests showed that the system can cope with the current mainstream reinforcement technology and restore the real Dex file quickly.Simultaneously,compared with the number of nodes before packing,the generated control-flow graph had an explosive increase,which effectively assisted manual analysis of App with the privacy leakage behaviors.展开更多
This article describes the pack & unpack performance of the vector using YH-1 supercomputer as its platform, with its emphasis on the pack & unpack technique's unique application to vector computation, in ...This article describes the pack & unpack performance of the vector using YH-1 supercomputer as its platform, with its emphasis on the pack & unpack technique's unique application to vector computation, in the light of vector computer's characteristics and some practical cases. The practical numerical experiment proves that the pack & unpack techniques is a key method to the depth parallel development and vectorization research of large scale scientific computation project, and which is a highly effective method to vectorizing application programs.展开更多
文摘Each language has its own branch of idioms.And Chinese idioms are generally difficult to translate because they are con⁃cise and comprehensive,simple in formality and rich in connotations.This paper aims at analyzing the application of the“unpack⁃ing”method in translation of idioms.The backing theory of the“unpacking”method is the famous functional equivalence theory put forward by the great translator,Nida.The paper first illustrates the brought up of the method and its backing theory,functional equivalence,and then makes a tentative analysis of the application of unpacking method in translation of idioms.
基金National Natural Science Foundation of China(Grant No.21372018)the National Basic Research Program of China(973 Program,Grant No.2013CB933800)+1 种基金Program for New Century Excellent Talents in University(Grant No.NCET-10-0203)the State Key Laboratory of Pharmaceutical Biotechnology(Grant No.KF-GN-201305)
文摘Two photolabile amphiphilic supramolecules were designed and synthesized with mono-dendrite and tri-dendrite, which can reversibly self-assemble to spheroid and wedge-shaped nanoparticles. With multiple branches of terminal amine labeled PEG, these nanoparticles can associate with a negatively charged oligonucleotide and their usage for oligonucleotide delivery was evaluated. Oligonucleotide/nanoparticle complex containing tri-dendrite can efficiently deliver oligonucleotide into cells via endocytosis, while the complex containing mono-dendrite almost lost their ability to deliver oligonucleotide. Further light activation triggered the dissociation of tri-dendrite supramolecular assembly via 1,4- and 1,6-quinone-methide rearrangement, leading to the efficient unpacking of the oligonucleotide in cells.
基金supported by Beijing Natural Science Foundation(No.4214061)。
文摘In recent years,Android applications have caused personal privacy leaks frequently.In order to analyze the malicious behavior,taint analysis technology can be used to track the API call chain,build a control-flow graph of function,and determine whether there is a security risk.However,with the continuous escalation of offensive and defensive confrontation of source code,more and more applications use reinforcement technology to prevent security practitioners from performing reverse analysis,therefore it is impossible to analyze function-behavior from the source code.Thus,we design a framework of taint analysis that applied to the Android applications,which automatically unpacks the Android APKs,restores the real source code of the App,performs taint analysis,and generates a control-flow graph of function.Experimental tests showed that the system can cope with the current mainstream reinforcement technology and restore the real Dex file quickly.Simultaneously,compared with the number of nodes before packing,the generated control-flow graph had an explosive increase,which effectively assisted manual analysis of App with the privacy leakage behaviors.
文摘This article describes the pack & unpack performance of the vector using YH-1 supercomputer as its platform, with its emphasis on the pack & unpack technique's unique application to vector computation, in the light of vector computer's characteristics and some practical cases. The practical numerical experiment proves that the pack & unpack techniques is a key method to the depth parallel development and vectorization research of large scale scientific computation project, and which is a highly effective method to vectorizing application programs.