The mechanical properties of red sandstone subjected to cyclic point loading were investigated. Tests were conducted using MTS servohydraulic landmark test system, under cyclic loadings with constant amplitudes and in...The mechanical properties of red sandstone subjected to cyclic point loading were investigated. Tests were conducted using MTS servohydraulic landmark test system, under cyclic loadings with constant amplitudes and increasing multi-level amplitudes. The frequencies range from 0.1 to 5 Hz and lower limit load ratios range from 0 to 0.60. Laboratory investigations were performed to find the effect of the frequency and the lower limit load ratio on the fatigue life and hysteresis properties of sandstone. The results show that the fatigue life of sandstone decreases first and then increases with the increase of frequency and lower limit load ratio. Under the same cycle number, the spacing between hysteresis loops increases with rising frequency and decreasing lower limit load ratio. The existence of “training” and “memory” effects in red sandstone under cyclic point loading was proved.展开更多
The evaluation of permeability in reservoir assessment is a complex problem. Thus, it is difficult to perform direct evaluation permeability with conventional well-logging methods. Considering that reservoir permeabil...The evaluation of permeability in reservoir assessment is a complex problem. Thus, it is difficult to perform direct evaluation permeability with conventional well-logging methods. Considering that reservoir permeability significantly affects mud invasion during drilling, we derive a mathematical model to assess the reservoir permeability based on mud invasion. A numerical model is first used to simulate the process of mud invasion and mud cake growth. Then, based on Darcy's law, an approximation is derived to associate the depth of mud invasion with reservoir permeability. A mathematical model is constructed to evaluate the reservoir permeability as a function of the mud invasion depth in time-lapse logging. Sensitivity analyses of the reservoir porosity, permeability, and water saturation are performed, and the results suggest that the proposed model and method are well suited for oil layers or oil-water layers of low porosity and low permeability. Numerical simulations using field logging and coring data suggest that the evaluated and assumed permeability data agree, validating the proposed model and method.展开更多
Eupatorium adenophorum is one of main invasive plants in China and has caused great economic losses. A study was conducted to determine the biomass allocation, leaf morphology and growth response of E. adenophorum see...Eupatorium adenophorum is one of main invasive plants in China and has caused great economic losses. A study was conducted to determine the biomass allocation, leaf morphology and growth response of E. adenophorum seedlings that grew under five different intensities (relative irradiances RI 10%, 20 %, 30%, 55%, 100%) for 14 months. Results reveal that the species shows typical leaf morphological adaptation to different light conditions. The total biomass of seedlings increased with the increase of light intensity from 10% to 55% RI but decreased at RI 100% (full sunlight). Height growth increased with the increase of light intensity from 10% to 30% RI but decreased when light intensity was over 30% RI. At low light levels, plants enhanced light availability by means of increasing biomass allocation to leaves and formation of larger, thinner leaves with high specific leaf area (SLA), leading to a high leaf area ratio (LAR) and high stem strips length (SSL). The mean relative growth rate (RGR) of the plant increased with the light intensity increase and attained the maximum at 55% RI. The growth of seedlings at 30%-55% RI was much better than that at full light condition. This might be an adaptive strategy that supports the vigorous invasiveness of this species, because a high-shaded canopy could prevent other plant species from surviving and growing. This study indicates that E. adenophorum could adapt to different light conditions, especially to low light habit. This can explain its greater invasiveness.展开更多
Eupatorium adenophorum Spreng. was introduced in Yunnan Province of China around 1940. Since then it has been spreading rapidly, particularly in the southern and southwestern parts of China and caused serious economic...Eupatorium adenophorum Spreng. was introduced in Yunnan Province of China around 1940. Since then it has been spreading rapidly, particularly in the southern and southwestern parts of China and caused serious economic loss. The biological research and inte-grated control on E. adenophorum were carried out from 1980's in Yunnan Province. Together with other 15 invasive external species, the weed has been listed in the White Paper by The State Environmental Protection Administration of China. This paper briefly reviews the studies on natural distribution, biological character, ecological character, chemical component, hazard, potential application and the control of E. adenophorum. The research direction for this invasive external species in future was also discussed.展开更多
Guangdong has become a major"window" for invasive plants, and the largest zone, where cross-border and intercontinental migration frequencies reach the peak. The invasive plants in Guangdong are dominated by Mikania...Guangdong has become a major"window" for invasive plants, and the largest zone, where cross-border and intercontinental migration frequencies reach the peak. The invasive plants in Guangdong are dominated by Mikania micrantha, Eichhornia crassipes, Alternanthera philoxeroides, Eupatorium odoratum, and Wedelia trilobata. It is an important way for treating the invasive plants by exploring the prevention methods and making ful use of the characteristics of the invasive plants, and it is of great significance to prevent and utilize alien species in a scientific and effective way in order to control the invasive plants with minimal cost.展开更多
This paper focuses on the intrusion classification of huge amounts of data in a network intrusion detection system. An intrusion detection model based on deep belief nets (DBN) is proposed to conduct intrusion detec...This paper focuses on the intrusion classification of huge amounts of data in a network intrusion detection system. An intrusion detection model based on deep belief nets (DBN) is proposed to conduct intrusion detection,and the principles regarding DBN are discussed.The DBN is composed of a multiple unsupervised restricted Boltzmann machine (RBM) and a supervised back propagation (BP)network.First,the DBN in the proposed model is pre-trained in a fast and greedy way,and each RBM is trained by the contrastive divergence algorithm.Secondly,the whole network is fine-tuned by the supervised BP algorithm,which is employed for classifying the low-dimensional features of the intrusion data generated by the last RBM layer simultaneously.The experimental results on the KDD CUP 1999 dataset demonstrate that the DBN using the RBM network with three or more layers outperforms the self-organizing maps (SOM)and neural network (NN)in intrusion classification.Therefore,the DBN is an efficient approach for intrusion detection in high-dimensional space.展开更多
yTwo exotic species, Sonneratia caseolaris (L.) Engl. and S. apetala B. Ham., were introduced to Futian Mangrove Forest Nature Reserve, Shenzhen Bay, in 1993 for afforestation. Winter cold caused frigid harm but did n...yTwo exotic species, Sonneratia caseolaris (L.) Engl. and S. apetala B. Ham., were introduced to Futian Mangrove Forest Nature Reserve, Shenzhen Bay, in 1993 for afforestation. Winter cold caused frigid harm but did not appear to be an obstacle to the introduction. The cold tolerance of the parental and filial generation increased in several years. The two Sonneratia spp. could propagate by seeds and disperse in Shenzhen Bay. While the two species grew faster than indigenous species, at the same time they promoted the growth of indigenous species, but they could not replace indigenous mangrove species. Suitable habitat was more important than the distance from the source in the natural spreading for the two species. The niche of the two species did not overlap with the niche of indigenous species. The two species did not self regenerate, although they could disperse on localized area in Shenzhen Bay. Therefore, it was unlikely that the two species would pose ecological disaster.展开更多
Objective: To study the relationship between histopathology and clinical prognosis of invasive pituitary adenoma subjected to transsphenoidal surgery. Methods: The enrolled were 82 patients with invasive pituitary ade...Objective: To study the relationship between histopathology and clinical prognosis of invasive pituitary adenoma subjected to transsphenoidal surgery. Methods: The enrolled were 82 patients with invasive pituitary adenomas undergoing transsphenoidal surgery during Jan. 2000 - May 2003 in our department with full MR imaging findings, pathology data and follow-up information. The follow-up duration was 5-30 months. Results: MR imaging findings of invasive pituitary adenoma included: depression of the sellar floor, involvement of sphenoid sinus and cavernous sinus, breakthrough of diaphragma sellae, encasement of internal carotid artery, etc. Pathological examination revealed that the invasion rate of dura in sella turcica was the highest among the structures around tumor. Pituitary adenoma apoplexy was found in 20 cases (24.4%). The total removal rate for PRL-secreting adenomas was significantly lower than that for non-secreting adenomas (P<0.01), but non-, GH-, ACTH-secreting adenomas had no significant differences. The recurrence rate of PRL-secreting adenomas was higher than that of non- and GH-secreting adenomas (P<0.05). Conclusion: Among invasive pituitary adenomas, the therapeutic effects of non-and GH-secreting pituitary adenomas are better than that of PRL-secreting adenomas. Invasive biological behaviors of invasive pituitary adenomas result in radical operation failure and postoperative recurrence.展开更多
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash...The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.展开更多
OBJECTIVE To investigate the expression of the high mobility group boxl(HMGB1) in human cervical squamous epithelial carcinoma (CSEC) and to explore the relationship of HMGB1 expression to the differentiation degr...OBJECTIVE To investigate the expression of the high mobility group boxl(HMGB1) in human cervical squamous epithelial carcinoma (CSEC) and to explore the relationship of HMGB1 expression to the differentiation degree, size, invasion and metastasis of CSEC. METHODS Immunohistochemical staining of tissue microarrays and Western blot analysis were conducted to detect the expression of HMGB1 in the following tissue samples: 30 carcinoma in situ, 90 invasive CSEC without metastasis, 30 invasive CSEC with metastasis, 30 cases of normal cervical squamous epithelia. RESULTS The positive-expression rate of HMGB1 was 58.7% (88/150) in CSEC, showing a significant difference compared to normal cervical squamous epithelia. The expression of HMGB1 was correlated with tumor size, invasion and metastasis of CSEC (respectively, P〈0.01), but had no relationship with the degree of differentiation (P〉0.05). CONCLUSION The over-expression of HMGB1 in CSEC might be a useful parameter as an indication of tumor invasion, metastasis, prognosis and overall biological behavior of human CSEC, as well as a noval target site for gene therapy.展开更多
[Objective] The aim was to conduct investigation and risk assessment of the alien invasive plants in riparian zone of Dongjiang River.[Method] The field survey was carried out by the combination methods of sampling pl...[Objective] The aim was to conduct investigation and risk assessment of the alien invasive plants in riparian zone of Dongjiang River.[Method] The field survey was carried out by the combination methods of sampling plots investigation and route survey,and the whole Dongjiang River was covered.52 sampling points were set in the main streams,and 87 sampling points in tributaries streams,624 quadrats were set in total;multi-index comprehensive evaluation method was adopted for the risk assessment with 6 first-level indexes and 25 second-level indexes.[Result] Through the investigation on the riparian zone of Dongjiang River for 2 years,51 species of alien invasive plants were found,belonging to 17 families and 38 genera.The risk level assessment results of these 51 species showed that 18 species,such as Ageratum conyzoides,belonged to high-level risk with over 60 points;26 species,such as Chenopodium ambrosioides,were between 30 and 60 points which belonged to middle-level risk;7 species,such as Paspalum dilatatum,with less than 30 points belonged to low-level risk.[Conclusion] Basic data on the protection,water environmental management and functional zoning of riparian zone of Dongjiang River were provided.展开更多
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight...Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.展开更多
[Objective]This study was to reveal the essence of mechanism about how the alien invasive plants spread.[Method]Species niche and material/energy flow were used as basic research indicators to analyze the intrinsic me...[Objective]This study was to reveal the essence of mechanism about how the alien invasive plants spread.[Method]Species niche and material/energy flow were used as basic research indicators to analyze the intrinsic mechanism of alien plants invasion.[Result]Most of the invasive plants have not been explicitly defined and their effective control methods not brought forward.[Conclusion]Overrun of alien invasive plants depends on whether the niche of a species could be continuously met at spatial level.Based on this we put forward corresponding control measures,proposed an assumption to establish a cylinder-network model and discussed the definition of alien invasive plants.展开更多
[Objective] The aim of this paper was to discuss the adaptability of ecological nutritional organs of invasive plants.[Method] By dint of high-definition display of plant tissue crystal method and paraffin section met...[Objective] The aim of this paper was to discuss the adaptability of ecological nutritional organs of invasive plants.[Method] By dint of high-definition display of plant tissue crystal method and paraffin section method,the vegetative organs root,stem and leaf cross-section of the organizational structure of Asteraceae Ambrosia trifida L.ragweed(Ambrosia trifida L.)in the suburbs of Changchun City in Jilin Province were inspected.[Result] The structural basis for ecological invasive plant Ambrosia trifida L.vegetative organs was mainly through strengthening the roots of water absorption and transporting function,increasing the water storage function of leaf and stem,reducing the water absorption of stem and leaf for plants to promote water absorption and to enhance the assimilation of leaves to achieve a variety of complex environmental conditions in the rapid growth and development in order to achieve an ecological invasion.[Conclusion] The study provided reference for the biological fundamental research of Ambrosia trifida L.展开更多
An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a...An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.To solve the problem, fuzzy data mining technique is utilized to extract patterns representing the normal behavior of a network. A set of fuzzy association rules mined from the network data are shown as a model of “normal behaviors”. To detect anomalous behaviors, fuzzy association rules are generated from new audit data and the similarity with sets mined from “normal” data is computed. If the similarity values are lower than a threshold value,an alarm is given. Furthermore, genetic algorithms are used to adjust the fuzzy membership functions and to select an appropriate set of features.展开更多
The purpose of this paper is to explore the significance of Chinese invaded cities in the urban planning history through a comparative view of the modern urban planning theories and methodologies of Qingdao (Tsi...The purpose of this paper is to explore the significance of Chinese invaded cities in the urban planning history through a comparative view of the modern urban planning theories and methodologies of Qingdao (Tsingtau) and those of the developed world from the late 19th century to mid 20th century. After reviewing the German Plan in 1898~1906 and the Japanese Plan in 1941, the paper concludes that the basis grounds of the urban planning practices in Qingdao between 1897~1945 were of the realistic physical planning, rather than of the commonly assumed utopian garden city. Therefore, Qingdao, once being a modern planning lab objectively, helped forward the theories and methodologies of the world′s modern urban planning between the late 19th century and mid 20th century.展开更多
[Objective] The research aimed to analyze the formation reason of groundwater hydrochemical characteristics in the dry valley area of Wadi Bay of Libya and provide the scientific basis for the reasonable development u...[Objective] The research aimed to analyze the formation reason of groundwater hydrochemical characteristics in the dry valley area of Wadi Bay of Libya and provide the scientific basis for the reasonable development utilization and the environmental protection of groundwater.[Method] Took Wadi Bay area(dry valley)of Libya as the example,Piper trilinear graphic representation method,the descriptive statistics,the ion ratio coefficient method and the isotope evidence were used to systematically study the special hydrochemical characteristics of shallow groundwater in the arid climate condition in Wadi Bay area of Libya.[Result] The salt content of groundwater in the area was very high,and TDS was during 3.2-8.4 g/L.The main groundwater type was Cl·SO4-Na·Ca,then was Cl·SO4-Na·Ca·Mg.The concentrations of Cl-,Na+ and SO2-4,etc.in the groundwater in 70 km from the sea had the remarkable variation,but the concentrations of Mn2+,Ba2+,Si2+,NH+4 and NO-3 didn't have the same variation phenomenon.[Conclusion] The hydrochemical characteristics of shallow groundwater didn't relate to the dissolution infiltration reaction,the evaporation concentration effect and human activities.The major cause was the mixing effect of salt and fresh water in the invasion process of seawater.展开更多
It is difficult to knowall the relations between Snort rules. To deal with this problem, the topological relations between Snort rules are classified based on the set theory, and a method for calculating the topologic...It is difficult to knowall the relations between Snort rules. To deal with this problem, the topological relations between Snort rules are classified based on the set theory, and a method for calculating the topological relations between Snort rules is proposed. In the existing methods for analyzing the relations of Snort rules, the relations are usually determined only according to the header information of the Snort rules. Without considering the actions of Snort rules, the proposed method improves upon the existing methods and it can classify and calculate the topological relations between Snort rules according to both headers and options information of Snort rules. In addition, the proposed method is implemented by the functional language Haskell. The experimental results showthat the topological relations between Snort rules can be calculated rapidly and effectively. The proposed method also provides an important basis for conflict detection in the succeeding Snort rules.展开更多
基金Projects(51322403,51274254)supported by the National Natural Science Foundation of ChinaProject(2015CB060200)supported by the National Basic Research Program of China
文摘The mechanical properties of red sandstone subjected to cyclic point loading were investigated. Tests were conducted using MTS servohydraulic landmark test system, under cyclic loadings with constant amplitudes and increasing multi-level amplitudes. The frequencies range from 0.1 to 5 Hz and lower limit load ratios range from 0 to 0.60. Laboratory investigations were performed to find the effect of the frequency and the lower limit load ratio on the fatigue life and hysteresis properties of sandstone. The results show that the fatigue life of sandstone decreases first and then increases with the increase of frequency and lower limit load ratio. Under the same cycle number, the spacing between hysteresis loops increases with rising frequency and decreasing lower limit load ratio. The existence of “training” and “memory” effects in red sandstone under cyclic point loading was proved.
基金financially supported by the Open Fund(No.PLC201103) of the State Key Laboratory of Oil and Gas Reservoir Geology and Exploration(Chengdu University of Technology)Open Fund(No.PRP/OPEN-1302) of the State Key Laboratory of Petroleum Resources and Prospecting(China University of Petroleum,Beijing)+2 种基金PetroChina Innovation Foundation(No.2015D-5006-0304)National Natural Science Foundation of China(No.41304078)Sinopec Foundation(No.P14136)
文摘The evaluation of permeability in reservoir assessment is a complex problem. Thus, it is difficult to perform direct evaluation permeability with conventional well-logging methods. Considering that reservoir permeability significantly affects mud invasion during drilling, we derive a mathematical model to assess the reservoir permeability based on mud invasion. A numerical model is first used to simulate the process of mud invasion and mud cake growth. Then, based on Darcy's law, an approximation is derived to associate the depth of mud invasion with reservoir permeability. A mathematical model is constructed to evaluate the reservoir permeability as a function of the mud invasion depth in time-lapse logging. Sensitivity analyses of the reservoir porosity, permeability, and water saturation are performed, and the results suggest that the proposed model and method are well suited for oil layers or oil-water layers of low porosity and low permeability. Numerical simulations using field logging and coring data suggest that the evaluated and assumed permeability data agree, validating the proposed model and method.
基金This study is supported by Doctor Fund Project of Educa-tion Department (20050290003), Knowledge Innovation Project of Chinese Academy of Sciences (KSCX1-SW-13-0X-0X) and the National Natural Science Foundation of China (30470337)
文摘Eupatorium adenophorum is one of main invasive plants in China and has caused great economic losses. A study was conducted to determine the biomass allocation, leaf morphology and growth response of E. adenophorum seedlings that grew under five different intensities (relative irradiances RI 10%, 20 %, 30%, 55%, 100%) for 14 months. Results reveal that the species shows typical leaf morphological adaptation to different light conditions. The total biomass of seedlings increased with the increase of light intensity from 10% to 55% RI but decreased at RI 100% (full sunlight). Height growth increased with the increase of light intensity from 10% to 30% RI but decreased when light intensity was over 30% RI. At low light levels, plants enhanced light availability by means of increasing biomass allocation to leaves and formation of larger, thinner leaves with high specific leaf area (SLA), leading to a high leaf area ratio (LAR) and high stem strips length (SSL). The mean relative growth rate (RGR) of the plant increased with the light intensity increase and attained the maximum at 55% RI. The growth of seedlings at 30%-55% RI was much better than that at full light condition. This might be an adaptive strategy that supports the vigorous invasiveness of this species, because a high-shaded canopy could prevent other plant species from surviving and growing. This study indicates that E. adenophorum could adapt to different light conditions, especially to low light habit. This can explain its greater invasiveness.
基金This study was supported by Project of Chinese Academy of Science Knowledge Innovation Program (KSCX1-SW-13-0X-0X) and National Natural Science Foundation of China (30470337)
文摘Eupatorium adenophorum Spreng. was introduced in Yunnan Province of China around 1940. Since then it has been spreading rapidly, particularly in the southern and southwestern parts of China and caused serious economic loss. The biological research and inte-grated control on E. adenophorum were carried out from 1980's in Yunnan Province. Together with other 15 invasive external species, the weed has been listed in the White Paper by The State Environmental Protection Administration of China. This paper briefly reviews the studies on natural distribution, biological character, ecological character, chemical component, hazard, potential application and the control of E. adenophorum. The research direction for this invasive external species in future was also discussed.
基金Guangdong Boluo Agro-technique Extension Center-South China Agricultural Univeristy Cooperation Project(7700-H13510)~~
文摘Guangdong has become a major"window" for invasive plants, and the largest zone, where cross-border and intercontinental migration frequencies reach the peak. The invasive plants in Guangdong are dominated by Mikania micrantha, Eichhornia crassipes, Alternanthera philoxeroides, Eupatorium odoratum, and Wedelia trilobata. It is an important way for treating the invasive plants by exploring the prevention methods and making ful use of the characteristics of the invasive plants, and it is of great significance to prevent and utilize alien species in a scientific and effective way in order to control the invasive plants with minimal cost.
基金The National Key Technology R&D Program during the 12th Five-Year Plan Period(No.2013BAK01B02)the National Natural Science Foundation of China(No.61373176)the Scientific Research Projects of Shaanxi Educational Committee(No.14JK1693)
文摘This paper focuses on the intrusion classification of huge amounts of data in a network intrusion detection system. An intrusion detection model based on deep belief nets (DBN) is proposed to conduct intrusion detection,and the principles regarding DBN are discussed.The DBN is composed of a multiple unsupervised restricted Boltzmann machine (RBM) and a supervised back propagation (BP)network.First,the DBN in the proposed model is pre-trained in a fast and greedy way,and each RBM is trained by the contrastive divergence algorithm.Secondly,the whole network is fine-tuned by the supervised BP algorithm,which is employed for classifying the low-dimensional features of the intrusion data generated by the last RBM layer simultaneously.The experimental results on the KDD CUP 1999 dataset demonstrate that the DBN using the RBM network with three or more layers outperforms the self-organizing maps (SOM)and neural network (NN)in intrusion classification.Therefore,the DBN is an efficient approach for intrusion detection in high-dimensional space.
文摘yTwo exotic species, Sonneratia caseolaris (L.) Engl. and S. apetala B. Ham., were introduced to Futian Mangrove Forest Nature Reserve, Shenzhen Bay, in 1993 for afforestation. Winter cold caused frigid harm but did not appear to be an obstacle to the introduction. The cold tolerance of the parental and filial generation increased in several years. The two Sonneratia spp. could propagate by seeds and disperse in Shenzhen Bay. While the two species grew faster than indigenous species, at the same time they promoted the growth of indigenous species, but they could not replace indigenous mangrove species. Suitable habitat was more important than the distance from the source in the natural spreading for the two species. The niche of the two species did not overlap with the niche of indigenous species. The two species did not self regenerate, although they could disperse on localized area in Shenzhen Bay. Therefore, it was unlikely that the two species would pose ecological disaster.
基金This project was supported by a grant from the National Natural Science Foundation of China (No. 39670736).
文摘Objective: To study the relationship between histopathology and clinical prognosis of invasive pituitary adenoma subjected to transsphenoidal surgery. Methods: The enrolled were 82 patients with invasive pituitary adenomas undergoing transsphenoidal surgery during Jan. 2000 - May 2003 in our department with full MR imaging findings, pathology data and follow-up information. The follow-up duration was 5-30 months. Results: MR imaging findings of invasive pituitary adenoma included: depression of the sellar floor, involvement of sphenoid sinus and cavernous sinus, breakthrough of diaphragma sellae, encasement of internal carotid artery, etc. Pathological examination revealed that the invasion rate of dura in sella turcica was the highest among the structures around tumor. Pituitary adenoma apoplexy was found in 20 cases (24.4%). The total removal rate for PRL-secreting adenomas was significantly lower than that for non-secreting adenomas (P<0.01), but non-, GH-, ACTH-secreting adenomas had no significant differences. The recurrence rate of PRL-secreting adenomas was higher than that of non- and GH-secreting adenomas (P<0.05). Conclusion: Among invasive pituitary adenomas, the therapeutic effects of non-and GH-secreting pituitary adenomas are better than that of PRL-secreting adenomas. Invasive biological behaviors of invasive pituitary adenomas result in radical operation failure and postoperative recurrence.
基金The National Natural Science Foundation of China(No.71071033)the Innovation Project of Jiangsu Postgraduate Education(No.CX10B_058Z)
文摘The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.
文摘OBJECTIVE To investigate the expression of the high mobility group boxl(HMGB1) in human cervical squamous epithelial carcinoma (CSEC) and to explore the relationship of HMGB1 expression to the differentiation degree, size, invasion and metastasis of CSEC. METHODS Immunohistochemical staining of tissue microarrays and Western blot analysis were conducted to detect the expression of HMGB1 in the following tissue samples: 30 carcinoma in situ, 90 invasive CSEC without metastasis, 30 invasive CSEC with metastasis, 30 cases of normal cervical squamous epithelia. RESULTS The positive-expression rate of HMGB1 was 58.7% (88/150) in CSEC, showing a significant difference compared to normal cervical squamous epithelia. The expression of HMGB1 was correlated with tumor size, invasion and metastasis of CSEC (respectively, P〈0.01), but had no relationship with the degree of differentiation (P〉0.05). CONCLUSION The over-expression of HMGB1 in CSEC might be a useful parameter as an indication of tumor invasion, metastasis, prognosis and overall biological behavior of human CSEC, as well as a noval target site for gene therapy.
基金Supported by National Water Pollution Control and Management Technology Major Project of ChinaEcological Function Partition Research of Level Three and Level Four in Key Watershed(2012ZX07501002)the Fundamental Work Project of Ministry ofScience and Technology (2006FY111000)~~
文摘[Objective] The aim was to conduct investigation and risk assessment of the alien invasive plants in riparian zone of Dongjiang River.[Method] The field survey was carried out by the combination methods of sampling plots investigation and route survey,and the whole Dongjiang River was covered.52 sampling points were set in the main streams,and 87 sampling points in tributaries streams,624 quadrats were set in total;multi-index comprehensive evaluation method was adopted for the risk assessment with 6 first-level indexes and 25 second-level indexes.[Result] Through the investigation on the riparian zone of Dongjiang River for 2 years,51 species of alien invasive plants were found,belonging to 17 families and 38 genera.The risk level assessment results of these 51 species showed that 18 species,such as Ageratum conyzoides,belonged to high-level risk with over 60 points;26 species,such as Chenopodium ambrosioides,were between 30 and 60 points which belonged to middle-level risk;7 species,such as Paspalum dilatatum,with less than 30 points belonged to low-level risk.[Conclusion] Basic data on the protection,water environmental management and functional zoning of riparian zone of Dongjiang River were provided.
文摘Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.
基金Supported by Joint Research Fund from National Natural Science Foundation of China(NSFC)-Yunnan Province(U0933601)Students Research Fund from Southwest Forestry University(1001)~~
文摘[Objective]This study was to reveal the essence of mechanism about how the alien invasive plants spread.[Method]Species niche and material/energy flow were used as basic research indicators to analyze the intrinsic mechanism of alien plants invasion.[Result]Most of the invasive plants have not been explicitly defined and their effective control methods not brought forward.[Conclusion]Overrun of alien invasive plants depends on whether the niche of a species could be continuously met at spatial level.Based on this we put forward corresponding control measures,proposed an assumption to establish a cylinder-network model and discussed the definition of alien invasive plants.
基金Supported by Educational Department Fund Program of Jilin Province[Jilin Education Science(2011)No.191,Jilin Education Sci-ence(2011)No.359]Natural Science Fund Program of Changchun Normal College(2011)~~
文摘[Objective] The aim of this paper was to discuss the adaptability of ecological nutritional organs of invasive plants.[Method] By dint of high-definition display of plant tissue crystal method and paraffin section method,the vegetative organs root,stem and leaf cross-section of the organizational structure of Asteraceae Ambrosia trifida L.ragweed(Ambrosia trifida L.)in the suburbs of Changchun City in Jilin Province were inspected.[Result] The structural basis for ecological invasive plant Ambrosia trifida L.vegetative organs was mainly through strengthening the roots of water absorption and transporting function,increasing the water storage function of leaf and stem,reducing the water absorption of stem and leaf for plants to promote water absorption and to enhance the assimilation of leaves to achieve a variety of complex environmental conditions in the rapid growth and development in order to achieve an ecological invasion.[Conclusion] The study provided reference for the biological fundamental research of Ambrosia trifida L.
文摘An intrusion detection (ID) model is proposed based on the fuzzy data mining method. A major difficulty of anomaly ID is that patterns of the normal behavior change with time. In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.To solve the problem, fuzzy data mining technique is utilized to extract patterns representing the normal behavior of a network. A set of fuzzy association rules mined from the network data are shown as a model of “normal behaviors”. To detect anomalous behaviors, fuzzy association rules are generated from new audit data and the similarity with sets mined from “normal” data is computed. If the similarity values are lower than a threshold value,an alarm is given. Furthermore, genetic algorithms are used to adjust the fuzzy membership functions and to select an appropriate set of features.
文摘The purpose of this paper is to explore the significance of Chinese invaded cities in the urban planning history through a comparative view of the modern urban planning theories and methodologies of Qingdao (Tsingtau) and those of the developed world from the late 19th century to mid 20th century. After reviewing the German Plan in 1898~1906 and the Japanese Plan in 1941, the paper concludes that the basis grounds of the urban planning practices in Qingdao between 1897~1945 were of the realistic physical planning, rather than of the commonly assumed utopian garden city. Therefore, Qingdao, once being a modern planning lab objectively, helped forward the theories and methodologies of the world′s modern urban planning between the late 19th century and mid 20th century.
基金Supported by the International Cooperation Item "Groundwater Quality Management in the Coastal Region of Libya"Scientific Research Initial Fund of Returned Overseas Students in Ministry of Education"Innovation Team" Item of Basic Scientific Research Operating Cost in Jilin University(20082004)~~
文摘[Objective] The research aimed to analyze the formation reason of groundwater hydrochemical characteristics in the dry valley area of Wadi Bay of Libya and provide the scientific basis for the reasonable development utilization and the environmental protection of groundwater.[Method] Took Wadi Bay area(dry valley)of Libya as the example,Piper trilinear graphic representation method,the descriptive statistics,the ion ratio coefficient method and the isotope evidence were used to systematically study the special hydrochemical characteristics of shallow groundwater in the arid climate condition in Wadi Bay area of Libya.[Result] The salt content of groundwater in the area was very high,and TDS was during 3.2-8.4 g/L.The main groundwater type was Cl·SO4-Na·Ca,then was Cl·SO4-Na·Ca·Mg.The concentrations of Cl-,Na+ and SO2-4,etc.in the groundwater in 70 km from the sea had the remarkable variation,but the concentrations of Mn2+,Ba2+,Si2+,NH+4 and NO-3 didn't have the same variation phenomenon.[Conclusion] The hydrochemical characteristics of shallow groundwater didn't relate to the dissolution infiltration reaction,the evaporation concentration effect and human activities.The major cause was the mixing effect of salt and fresh water in the invasion process of seawater.
基金The National Natural Science Foundation of China(No.60973122,61572256)
文摘It is difficult to knowall the relations between Snort rules. To deal with this problem, the topological relations between Snort rules are classified based on the set theory, and a method for calculating the topological relations between Snort rules is proposed. In the existing methods for analyzing the relations of Snort rules, the relations are usually determined only according to the header information of the Snort rules. Without considering the actions of Snort rules, the proposed method improves upon the existing methods and it can classify and calculate the topological relations between Snort rules according to both headers and options information of Snort rules. In addition, the proposed method is implemented by the functional language Haskell. The experimental results showthat the topological relations between Snort rules can be calculated rapidly and effectively. The proposed method also provides an important basis for conflict detection in the succeeding Snort rules.