We proposed an enhanced Reach Extender (RE) called Active Co-existence (ACEX) and investigate its performance with respect to XGS-PON system that co-exist with GPON and TWDM-PON system. The RE is consists of hybrid op...We proposed an enhanced Reach Extender (RE) called Active Co-existence (ACEX) and investigate its performance with respect to XGS-PON system that co-exist with GPON and TWDM-PON system. The RE is consists of hybrid optical amplifier integrated (EDFA and SOA) with Co-existence Element (CEX) module which is installed at the Central Office (CO) together with the OLT system and act as a booster and pre-amplifier for the downstream and upstream optical signal respectively. The results show that the proposed ACEX is capable to support XGS-PON operation for a maximum distance of 35 km with 128 splitting ratio and up to 44 dB link loss.展开更多
The synthesis of evolutionary biology and community ecology aims to understand how genetic variation within one species can shape community properties and how the ecological properties of a community can drive the evo...The synthesis of evolutionary biology and community ecology aims to understand how genetic variation within one species can shape community properties and how the ecological properties of a community can drive the evolution of a species.A rarely explored aspect is whether the interaction of genetic variation and community properties depends on the species'ecological role.Here we investigated the interactions among environmental factors,species diversity,and the within-species genetic diversity of species with different ecological roles.Using high-throughput DNA sequencing,we genotyped a canopydominant tree species,Parashorea chinensis,and an understory-abundant species,Pittosporopsis kerrii,from fifteen plots in Xishuangbanna tropical seasonal rainforest and estimated their adaptive,neutral and total genetic diversity;we also surveyed species diversity and assayed key soil nutrients.Structural equation modelling revealed that soil nitrogen availability created an opposing effect in species diversity and adaptive genetic diversity of the canopy-dominant Pa.chinensis.The increased adaptive genetic diversity of Pa.chinensis led to greater species diversity by promoting co-existence.Increased species diversity reduced the adaptive genetic diversity of the dominant understory species,Pi.kerrii,which was promoted by the adaptive genetic diversity of the canopy-dominant Pa.chinensis.However,such relationships were absent when neutral genetic diversity or total genetic diversity were used in the model.Our results demonstrated the important ecological interaction between adaptive genetic diversity and species diversity,but the pattern of the interaction depends on the identity of the species.Our results highlight the significant ecological role of dominant species in competitive interactions and regulation of community structure.展开更多
The prey-seeking behavior of three spiders (X1-Pirata subpiraticus, X2-Clubiona japonicola and X3-Tetragnatha japonica) for brown plant hopper (X4-Nilaparvata lugens) and rice spittle bug (X5-Cal-litettix versicolor) ...The prey-seeking behavior of three spiders (X1-Pirata subpiraticus, X2-Clubiona japonicola and X3-Tetragnatha japonica) for brown plant hopper (X4-Nilaparvata lugens) and rice spittle bug (X5-Cal-litettix versicolor) was investigated, as well as how interference between and within species occurred, by using a quadratic regression rotational composite design. Six predation models derived from the analysis of interactions among and within predators and preys were developed. The total predatory capacity of spiders on rice insect pests after coexistence for one day can be expressed as follows: Y3 = 32.795 + 2.25X1 + 1.083X2 + 0.5X3 + 10.167X4 + 3.167X5 - 1.67X12 - 2.42X22 - 3.295X32 - 0.045X42 + 0.455X52 - 3.125X1X2 + 0.375X1X3 -0.625X1X4 - 0.375X1X5 + 0.375X2X3 - 0.875X2X4 + 0.125X2X5 + 0.375X3X4 - 0.375X3X5 + 0.125X4X5. The principal efficiency analysis using this model indicated that increases in insect pest density significantly increased predation by predators; this was much greater than the effect of any single predator. X4 had a greater effect than X5; however, X4 and X5 demonstrated little interspecific interference and even promoted each other and increased predation rates as the densities of the two pests increased. Among the three predators, an increase in the density of X, had the greatest effect on the increase in predation, X3 had the second, X2 the third greatest effect. As predator density increased inter- and intra-species interference occurred, which were largely related to the size, activity, niche breadth, niche overlap and searching efficiency of the predators. X2 produced the greatest interference between different individuals and between any other predator species. X3 had the second greatest, which reduced predation levels at high predator densities. Because of these factors, the highest predation rate was obtained at a prey density of 120 per 4 rice-hills. The optimal proportion of the three predators in the multi-predator prey system was X1: X2: X3 = 5.6:1.3:4.1.展开更多
Afrikan narratives such as folktales,proverbs and taboos were clear systems and structures on which societies operated.These were used to guide society’s values that promoted trust,accountability,self respect and man...Afrikan narratives such as folktales,proverbs and taboos were clear systems and structures on which societies operated.These were used to guide society’s values that promoted trust,accountability,self respect and many more for the wellbeing of the entire community.This paper discussesone of the Banyankole folktale Kanzanise empimba za Nzima atarikimanya akangaya(Let me stand in the gap of my sister(Nzima)while she is away or else,I will be shamed in case she knows I did not).The purpose of the paper is to demonstrate how Afrikan indigenous knowledge and specifically this folktale Kanzanise empimba za Nzima atarikimanya akangaya inculcated in the community a spirit of care,commitment to one another and transparency which are fundamental values that create peaceful societies.The paper argues that there is a wealth of wisdom residing in the African cultures to be exploited to guide African policy development.This will raise African indigenous knowledge to a platform worth recognition for its contribution towards positive transformation.Furthermore,that the Western systems and structures currently guiding Afrikan policy development are oblivious of the richness of Afrikan indigenous knowledge that united the people.The paper concludes that for Afrikans to contribute to the global agenda,they need to bring to the table of globalization a unique product such as the Afrikan indigenous narratives that contribues to world peace.The paper recommends moving back into our past,identify and promote those unique Afrikan values that sustained Africa before the Western influence.展开更多
A brain tumor associated with an arteriovenous malformation (AVM) is very rare. A 42-year-old female presented with two separate lesions in her right frontal lobe on MRI. An angiogram diagnosed one of the lesions as a...A brain tumor associated with an arteriovenous malformation (AVM) is very rare. A 42-year-old female presented with two separate lesions in her right frontal lobe on MRI. An angiogram diagnosed one of the lesions as an AVM. The second lesion appeared to be a tumor. Tumor removal was difficult due to bleeding from the nearby AVM, necessitating removal of the AVM and allowing complete excision of the tumor. Histopathological analysis revealed the tumor was an anaplastic oligodendroglioma. There was no recurrence of the tumor 5 year after completion of therapy. We discuss the operative strategy in case of synchronous diseases and provide a review of the literature.展开更多
Situated within the Cross River State of Nigeria, the Upper Cross River area covers the northern half of Cross River State comprising Ugep, Obubra, Ikom, Ogoja, and Obudu divisions. Bounded on the north by the Benue r...Situated within the Cross River State of Nigeria, the Upper Cross River area covers the northern half of Cross River State comprising Ugep, Obubra, Ikom, Ogoja, and Obudu divisions. Bounded on the north by the Benue region, west by Ebonyi and Enugu states and east by the Republic of Cameroon, this unique area experienced colonial rule. Christianity established its dominance in this area during colonial times, leaving no room for Islam. However, following the 1967 to 1970 civil war, groups of Islamic traders, clerics, and businessmen started trickling into the area, and settling there. They began to spread their faith in the region hut could not establish their political presence there. Some familiarised themselves with the culture of the indigenous people, and won converts not by force, but via the proselytisation of their faith. Community leaders did not abandon the old verities which bound traditional society in the region together. The pattern was often a pragmatic choice--accepting the best of the faiths resulting in peaceful co-existence and assured social harmony in the region. Pockets of Islamic converts could be found in Ogoja, Obudu, and some strategic commercial locations in the region. Against this backdrop, the paper examines the co-existence of Islam in the Upper Cross River Region (UCRR) and the impact made economically, culturally and religiously on the peoples of the region. The research adopted secondary and primary sources of information in its methodology. It therefore established that the UCRR of Nigeria serves as an excellent example, or a convenient model for the study of mutual religious co-existence between adherents of the Islamic and other faiths in the region.展开更多
THE premiere of popular Chinese TV soapie Beijing Love Storywas widely hailed as a major cultural breakthrough in the Nigerian capital of Abuja on September 18. Dubbed into Hausa. one of Nigeria's major languages, th...THE premiere of popular Chinese TV soapie Beijing Love Storywas widely hailed as a major cultural breakthrough in the Nigerian capital of Abuja on September 18. Dubbed into Hausa. one of Nigeria's major languages, the drama formed part of the Experience China program held by China's State Council Information Office (SCIO) in Abuja from September 10 to 19.展开更多
The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak...The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak type double-stage Hall thruster configuration, and a particle-in-cell simulation is carried out to investigate the influences of both acceleration electrode voltage value and zero magnetic point position on the thruster discharge characteristics and performances.The results indicate that increasing the acceleration voltage leads to a larger potential drop in the acceleration stage, allowing ions to gain higher energy, while electrons are easily absorbed by the intermediate electrode, resulting in a decrease in the anode current and ionization rate. When the acceleration voltage reaches 500 V, the thrust and efficiency are maximized, resulting in a 15%increase in efficiency. After the acceleration voltage exceeds 500 V, a potential barrier forms within the channel, leading to a decrease in thruster efficiency. Further study shows that as the second zero magnetic point moves towards the outlet of the channel, more electrons easily traverse the zero magnetic field region, participating in the ionization. The increase in the ionization rate leads to a gradual enhancement in both thrust and efficiency.展开更多
Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national ...Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national challenges with poor viral suppression. The OTZ program aligns with the UNAIDS 95-95-95 goals. It seeks to empower AYPLHIV to be in charge of their treatment and commit to triple zero outcomeszero missed appointments, zero missed drugs, and zero viral loads. The purpose of the study was to assess the impact of the OTZ program on viral load suppression among members of the adolescent club in 68 NARHY, Lagos. Method: A cross-sectional retrospective study to evaluate the impact of the OTZ program on the viral load of 53 AYP enrolled in the OTZ program between March 2019 to December 2019 was analyzed. The Percentage of viral load suppression before enrollment compared with 6 and 12 months after enrollment into the OTZ program. The AYP is grouped into 10 - 14, 15 - 19, and 20 - 24 years. Activities conducted were peer driven monthly meetings with the AYP during which the adolescents interacted on issues relating to improving their treatment outcomes, healthcare workers reviewed their clinical status, viral load result, provider peer counseling, and caregivers engagement to support adherence to medication and ARV refills. Results: Before OTZ, 81% aged 10 - 14 years, 75% aged 15 - 19 years, and 25% aged 20 - 24 years were virally suppressed (VL less than 1000 copies/ml). Six months after enrollment, 94% were virally suppressed95% aged 10 - 14 years, 96% aged 15 - 19 years, and 66% aged 20-24 years. Twelve months after enrollment, 96% of AYP were virally suppressed100% aged 10-14 years, 93% aged 15 - 19 years, and 100% aged 20 - 24 years. Males viral load (VL) suppression improved from 79% to 96% and 92%, while females VL suppression improved from 69% to 93% and 100% at 6 and 12 months respectively. Conclusion: The OTZ activities contributed to improved viral load suppression in the AYP of the facility.展开更多
In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential pol...In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential polynomial,which extends the related result of Li,and Chen et al..An example is given to show that the hypothesis on the zeros of a(z)is necessary.展开更多
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition...In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies.展开更多
The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with ...The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with microscale spatialresolution.However,a bias magnetic field is necessary to fully separate the resonance lines of optically detected magneticresonance(ODMR)spectrum of NV ensembles.This brings disturbances in samples being detected and limits the rangeof application.Here,we demonstrate a method of vector magnetometry in zero bias magnetic field using NV ensembles.By utilizing the anisotropy property of fluorescence excited from NV centers,we analyzed the ODMR spectrum of NVensembles under various polarized angles of excitation laser in zero bias magnetic field with a quantitative numerical modeland reconstructed the magnetic field vector.The minimum magnetic field modulus that can be resolved accurately is downto~0.64 G theoretically depending on the ODMR spectral line width(1.8 MHz),and~2 G experimentally due to noisesin fluorescence signals and errors in calibration.By using 13C purified and low nitrogen concentration diamond combinedwith improving calibration of unknown parameters,the ODMR spectral line width can be further decreased below 0.5 MHz,corresponding to~0.18 G minimum resolvable magnetic field modulus.展开更多
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ...The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.展开更多
This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study ...This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study of ring theory, depict relationships between elements of a ring that multiply to zero. The paper explores the development and implementation of algorithms in MAPLE for constructing these ZDGs. The comparative study aims to discern the strengths, limitations, and computational efficiency of different MAPLE algorithms for creating zero divisor graphs offering insights for mathematicians, researchers, and computational enthusiasts involved in ring theory and mathematical computations.展开更多
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ...Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats.展开更多
In the context of globalization,zero translation words are more and more frequently used in news discourse.This article aims to explore the reasons for the frequent use of zero translation words in news discourse and ...In the context of globalization,zero translation words are more and more frequently used in news discourse.This article aims to explore the reasons for the frequent use of zero translation words in news discourse and their impact on news discourse from the perspectives of translation studies and journalism and communication studies.展开更多
基于MIKE ZERO 2020软件中的HD水动力学模块和AD对流扩散模块,建立郁江贵港市河段的水文、水质信息耦合模型,对郁江贵港河段的水位、流量以及污染物在水体中迁移扩散衰减情况进行了模拟分析。根据郁江近年来的水文资料对模型进行率定并...基于MIKE ZERO 2020软件中的HD水动力学模块和AD对流扩散模块,建立郁江贵港市河段的水文、水质信息耦合模型,对郁江贵港河段的水位、流量以及污染物在水体中迁移扩散衰减情况进行了模拟分析。根据郁江近年来的水文资料对模型进行率定并验证。将该模型应用于2023年6月21日~7月6日的洪水过程,结果表明,所建立的模型在率定和验证及应用期间模拟效果均表现良好,模拟精度高。充分证明该模型适用于模拟郁江贵港河段的水文、水质信息变化特征,为提高贵港市防洪、水情预报及水污染预测提供了重要的技术支撑。展开更多
文摘We proposed an enhanced Reach Extender (RE) called Active Co-existence (ACEX) and investigate its performance with respect to XGS-PON system that co-exist with GPON and TWDM-PON system. The RE is consists of hybrid optical amplifier integrated (EDFA and SOA) with Co-existence Element (CEX) module which is installed at the Central Office (CO) together with the OLT system and act as a booster and pre-amplifier for the downstream and upstream optical signal respectively. The results show that the proposed ACEX is capable to support XGS-PON operation for a maximum distance of 35 km with 128 splitting ratio and up to 44 dB link loss.
基金supported by the Strategic Priority Research Program of Chinese Academy of Sciences,Grant No.XDB31000000the National Natural Science Foundation of China(No.31370267).
文摘The synthesis of evolutionary biology and community ecology aims to understand how genetic variation within one species can shape community properties and how the ecological properties of a community can drive the evolution of a species.A rarely explored aspect is whether the interaction of genetic variation and community properties depends on the species'ecological role.Here we investigated the interactions among environmental factors,species diversity,and the within-species genetic diversity of species with different ecological roles.Using high-throughput DNA sequencing,we genotyped a canopydominant tree species,Parashorea chinensis,and an understory-abundant species,Pittosporopsis kerrii,from fifteen plots in Xishuangbanna tropical seasonal rainforest and estimated their adaptive,neutral and total genetic diversity;we also surveyed species diversity and assayed key soil nutrients.Structural equation modelling revealed that soil nitrogen availability created an opposing effect in species diversity and adaptive genetic diversity of the canopy-dominant Pa.chinensis.The increased adaptive genetic diversity of Pa.chinensis led to greater species diversity by promoting co-existence.Increased species diversity reduced the adaptive genetic diversity of the dominant understory species,Pi.kerrii,which was promoted by the adaptive genetic diversity of the canopy-dominant Pa.chinensis.However,such relationships were absent when neutral genetic diversity or total genetic diversity were used in the model.Our results demonstrated the important ecological interaction between adaptive genetic diversity and species diversity,but the pattern of the interaction depends on the identity of the species.Our results highlight the significant ecological role of dominant species in competitive interactions and regulation of community structure.
文摘The prey-seeking behavior of three spiders (X1-Pirata subpiraticus, X2-Clubiona japonicola and X3-Tetragnatha japonica) for brown plant hopper (X4-Nilaparvata lugens) and rice spittle bug (X5-Cal-litettix versicolor) was investigated, as well as how interference between and within species occurred, by using a quadratic regression rotational composite design. Six predation models derived from the analysis of interactions among and within predators and preys were developed. The total predatory capacity of spiders on rice insect pests after coexistence for one day can be expressed as follows: Y3 = 32.795 + 2.25X1 + 1.083X2 + 0.5X3 + 10.167X4 + 3.167X5 - 1.67X12 - 2.42X22 - 3.295X32 - 0.045X42 + 0.455X52 - 3.125X1X2 + 0.375X1X3 -0.625X1X4 - 0.375X1X5 + 0.375X2X3 - 0.875X2X4 + 0.125X2X5 + 0.375X3X4 - 0.375X3X5 + 0.125X4X5. The principal efficiency analysis using this model indicated that increases in insect pest density significantly increased predation by predators; this was much greater than the effect of any single predator. X4 had a greater effect than X5; however, X4 and X5 demonstrated little interspecific interference and even promoted each other and increased predation rates as the densities of the two pests increased. Among the three predators, an increase in the density of X, had the greatest effect on the increase in predation, X3 had the second, X2 the third greatest effect. As predator density increased inter- and intra-species interference occurred, which were largely related to the size, activity, niche breadth, niche overlap and searching efficiency of the predators. X2 produced the greatest interference between different individuals and between any other predator species. X3 had the second greatest, which reduced predation levels at high predator densities. Because of these factors, the highest predation rate was obtained at a prey density of 120 per 4 rice-hills. The optimal proportion of the three predators in the multi-predator prey system was X1: X2: X3 = 5.6:1.3:4.1.
文摘Afrikan narratives such as folktales,proverbs and taboos were clear systems and structures on which societies operated.These were used to guide society’s values that promoted trust,accountability,self respect and many more for the wellbeing of the entire community.This paper discussesone of the Banyankole folktale Kanzanise empimba za Nzima atarikimanya akangaya(Let me stand in the gap of my sister(Nzima)while she is away or else,I will be shamed in case she knows I did not).The purpose of the paper is to demonstrate how Afrikan indigenous knowledge and specifically this folktale Kanzanise empimba za Nzima atarikimanya akangaya inculcated in the community a spirit of care,commitment to one another and transparency which are fundamental values that create peaceful societies.The paper argues that there is a wealth of wisdom residing in the African cultures to be exploited to guide African policy development.This will raise African indigenous knowledge to a platform worth recognition for its contribution towards positive transformation.Furthermore,that the Western systems and structures currently guiding Afrikan policy development are oblivious of the richness of Afrikan indigenous knowledge that united the people.The paper concludes that for Afrikans to contribute to the global agenda,they need to bring to the table of globalization a unique product such as the Afrikan indigenous narratives that contribues to world peace.The paper recommends moving back into our past,identify and promote those unique Afrikan values that sustained Africa before the Western influence.
文摘A brain tumor associated with an arteriovenous malformation (AVM) is very rare. A 42-year-old female presented with two separate lesions in her right frontal lobe on MRI. An angiogram diagnosed one of the lesions as an AVM. The second lesion appeared to be a tumor. Tumor removal was difficult due to bleeding from the nearby AVM, necessitating removal of the AVM and allowing complete excision of the tumor. Histopathological analysis revealed the tumor was an anaplastic oligodendroglioma. There was no recurrence of the tumor 5 year after completion of therapy. We discuss the operative strategy in case of synchronous diseases and provide a review of the literature.
文摘Situated within the Cross River State of Nigeria, the Upper Cross River area covers the northern half of Cross River State comprising Ugep, Obubra, Ikom, Ogoja, and Obudu divisions. Bounded on the north by the Benue region, west by Ebonyi and Enugu states and east by the Republic of Cameroon, this unique area experienced colonial rule. Christianity established its dominance in this area during colonial times, leaving no room for Islam. However, following the 1967 to 1970 civil war, groups of Islamic traders, clerics, and businessmen started trickling into the area, and settling there. They began to spread their faith in the region hut could not establish their political presence there. Some familiarised themselves with the culture of the indigenous people, and won converts not by force, but via the proselytisation of their faith. Community leaders did not abandon the old verities which bound traditional society in the region together. The pattern was often a pragmatic choice--accepting the best of the faiths resulting in peaceful co-existence and assured social harmony in the region. Pockets of Islamic converts could be found in Ogoja, Obudu, and some strategic commercial locations in the region. Against this backdrop, the paper examines the co-existence of Islam in the Upper Cross River Region (UCRR) and the impact made economically, culturally and religiously on the peoples of the region. The research adopted secondary and primary sources of information in its methodology. It therefore established that the UCRR of Nigeria serves as an excellent example, or a convenient model for the study of mutual religious co-existence between adherents of the Islamic and other faiths in the region.
文摘THE premiere of popular Chinese TV soapie Beijing Love Storywas widely hailed as a major cultural breakthrough in the Nigerian capital of Abuja on September 18. Dubbed into Hausa. one of Nigeria's major languages, the drama formed part of the Experience China program held by China's State Council Information Office (SCIO) in Abuja from September 10 to 19.
基金supported by National Natural Science Foundation of China (Nos. 11975062, 11605021 and 12375009)the Fundamental Research Funds for the Central Universities (No. 3132023192)。
文摘The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak type double-stage Hall thruster configuration, and a particle-in-cell simulation is carried out to investigate the influences of both acceleration electrode voltage value and zero magnetic point position on the thruster discharge characteristics and performances.The results indicate that increasing the acceleration voltage leads to a larger potential drop in the acceleration stage, allowing ions to gain higher energy, while electrons are easily absorbed by the intermediate electrode, resulting in a decrease in the anode current and ionization rate. When the acceleration voltage reaches 500 V, the thrust and efficiency are maximized, resulting in a 15%increase in efficiency. After the acceleration voltage exceeds 500 V, a potential barrier forms within the channel, leading to a decrease in thruster efficiency. Further study shows that as the second zero magnetic point moves towards the outlet of the channel, more electrons easily traverse the zero magnetic field region, participating in the ionization. The increase in the ionization rate leads to a gradual enhancement in both thrust and efficiency.
文摘Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national challenges with poor viral suppression. The OTZ program aligns with the UNAIDS 95-95-95 goals. It seeks to empower AYPLHIV to be in charge of their treatment and commit to triple zero outcomeszero missed appointments, zero missed drugs, and zero viral loads. The purpose of the study was to assess the impact of the OTZ program on viral load suppression among members of the adolescent club in 68 NARHY, Lagos. Method: A cross-sectional retrospective study to evaluate the impact of the OTZ program on the viral load of 53 AYP enrolled in the OTZ program between March 2019 to December 2019 was analyzed. The Percentage of viral load suppression before enrollment compared with 6 and 12 months after enrollment into the OTZ program. The AYP is grouped into 10 - 14, 15 - 19, and 20 - 24 years. Activities conducted were peer driven monthly meetings with the AYP during which the adolescents interacted on issues relating to improving their treatment outcomes, healthcare workers reviewed their clinical status, viral load result, provider peer counseling, and caregivers engagement to support adherence to medication and ARV refills. Results: Before OTZ, 81% aged 10 - 14 years, 75% aged 15 - 19 years, and 25% aged 20 - 24 years were virally suppressed (VL less than 1000 copies/ml). Six months after enrollment, 94% were virally suppressed95% aged 10 - 14 years, 96% aged 15 - 19 years, and 66% aged 20-24 years. Twelve months after enrollment, 96% of AYP were virally suppressed100% aged 10-14 years, 93% aged 15 - 19 years, and 100% aged 20 - 24 years. Males viral load (VL) suppression improved from 79% to 96% and 92%, while females VL suppression improved from 69% to 93% and 100% at 6 and 12 months respectively. Conclusion: The OTZ activities contributed to improved viral load suppression in the AYP of the facility.
文摘In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential polynomial,which extends the related result of Li,and Chen et al..An example is given to show that the hypothesis on the zeros of a(z)is necessary.
基金the financial support received from NATO under the Emerging Security Challenges Division programthe support received from NPRP (10-0105-17017) from the Qatar National Research Fund (a member of Qatar Foundation)+1 种基金the support received from the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Department of National Defence (DND) under the Discovery Grant and DND Supplemental Programssupported in part by funding from the Innovation for Defence Excellence and Security (IDEaS) program from the Department of National Defence (DND)。
文摘In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies.
基金supported by the National Key R&D Program of China(Grant Nos.2021YFB3202800 and 2023YF0718400)Chinese Academy of Sciences(Grant No.ZDZBGCH2021002)+2 种基金Chinese Academy of Sciences(Grant No.GJJSTD20200001)Innovation Program for Quantum Science and Technology(Grant No.2021ZD0303204)Anhui Initiative in Quantum Information Technologies,USTC Tang Scholar,and the Fundamental Research Funds for the Central Universities.
文摘The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with microscale spatialresolution.However,a bias magnetic field is necessary to fully separate the resonance lines of optically detected magneticresonance(ODMR)spectrum of NV ensembles.This brings disturbances in samples being detected and limits the rangeof application.Here,we demonstrate a method of vector magnetometry in zero bias magnetic field using NV ensembles.By utilizing the anisotropy property of fluorescence excited from NV centers,we analyzed the ODMR spectrum of NVensembles under various polarized angles of excitation laser in zero bias magnetic field with a quantitative numerical modeland reconstructed the magnetic field vector.The minimum magnetic field modulus that can be resolved accurately is downto~0.64 G theoretically depending on the ODMR spectral line width(1.8 MHz),and~2 G experimentally due to noisesin fluorescence signals and errors in calibration.By using 13C purified and low nitrogen concentration diamond combinedwith improving calibration of unknown parameters,the ODMR spectral line width can be further decreased below 0.5 MHz,corresponding to~0.18 G minimum resolvable magnetic field modulus.
基金This work was supported by National Natural Science Foundation of China(U2133208,U20A20161).
文摘The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system.
文摘This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study of ring theory, depict relationships between elements of a ring that multiply to zero. The paper explores the development and implementation of algorithms in MAPLE for constructing these ZDGs. The comparative study aims to discern the strengths, limitations, and computational efficiency of different MAPLE algorithms for creating zero divisor graphs offering insights for mathematicians, researchers, and computational enthusiasts involved in ring theory and mathematical computations.
文摘Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats.
文摘In the context of globalization,zero translation words are more and more frequently used in news discourse.This article aims to explore the reasons for the frequent use of zero translation words in news discourse and their impact on news discourse from the perspectives of translation studies and journalism and communication studies.
文摘基于MIKE ZERO 2020软件中的HD水动力学模块和AD对流扩散模块,建立郁江贵港市河段的水文、水质信息耦合模型,对郁江贵港河段的水位、流量以及污染物在水体中迁移扩散衰减情况进行了模拟分析。根据郁江近年来的水文资料对模型进行率定并验证。将该模型应用于2023年6月21日~7月6日的洪水过程,结果表明,所建立的模型在率定和验证及应用期间模拟效果均表现良好,模拟精度高。充分证明该模型适用于模拟郁江贵港河段的水文、水质信息变化特征,为提高贵港市防洪、水情预报及水污染预测提供了重要的技术支撑。