Antimony tin oxide (ATO) nano-particles doped with different Sb contents were prepared by co-precipitation method, using SnCl4·5H2O and SbCl3 as main raw materials. Microstructure, morphology and reflectivity c...Antimony tin oxide (ATO) nano-particles doped with different Sb contents were prepared by co-precipitation method, using SnCl4·5H2O and SbCl3 as main raw materials. Microstructure, morphology and reflectivity curves were characterized by XRD, FESEM, UV-visible spectroscopy and laser, and the effects of Sb content on crystalline microstructure, crystal size and reflectivity curves of the ATO nano-particles were investigated systematically. The results show that the ATO nano-particles prepared by co-precipitation method have tetragonal rutile structure, with particle size distribution range of several decade nanometer. With the increase of Sb content, the grain size of ATO decreases, and the unit cell volume increases. Compared with the SnO2 particles without Sb, the 1.06 μm laser reflection of ATO nano-particles doped with Sb is obviously lower. With the increase of Sb content, the reflection increases first, then decreases;when the Sb content is 20%, 1.06μm laser reflection of ATO nano-particles is below 0.02%, and the laser reflection performance is the best.展开更多
This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information chan...This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information changes. This change is attributed to translator's idiolect and thinking pattern as well as different languages. The translator's role is obvious in the text translation. How to be invisible? Even if invisibility is possible, the invisibility is like a moon in water, flower in fog. That is vague but invisible.展开更多
To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-f...To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks.展开更多
Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar ...Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar echo and feeds back to the radar system,and then the radar system adaptively designs the transmission waveform. So the close-loop system is formed. The correlations between these transmission waveforms are decreased because of the adaptive change of these transmission waveforms,and the number of illuminations is reduced for adopting the SHT,which lowers the transmission power of the radar system. The radar system using the new method possesses the RF stealth performance. Aiming at the application of radar automatic target recognition(RATR),experimental simulations show the effectiveness and feasibility of the proposed method.展开更多
To achieve the satellite formation control and the succeed formation missions, we present a new stealthy method to determine the relative states between formation satellites. In this method, the combination of a CCD c...To achieve the satellite formation control and the succeed formation missions, we present a new stealthy method to determine the relative states between formation satellites. In this method, the combination of a CCD camera and laser radar is used as the relative measure sensors. To reduce electromagnetic radiation, the laser radar works intermittently to minimize the probability of being discovered. And an unscented Kalman filter (UKF) is applied to estimate the relative states. The observability of this method is analyzed. The validity and effectiveness of the method is demonstrated in a typical application of formation relative navigation.展开更多
Over the past few years, vampire genre has populated young adult (YA) literature. YA literature can be defined as narratives about the individual growth and maturation of adolescent protagonist. Adolescence is the b...Over the past few years, vampire genre has populated young adult (YA) literature. YA literature can be defined as narratives about the individual growth and maturation of adolescent protagonist. Adolescence is the bridging process of growing from childhood to adulthood. Furthermore, it is a turbulent time of rapid physical growth and sexual development. It also creates a critical phase in the formation of identity. In this paper, the author shall identify the ways in which representation of adolescence in an American contemporary young adult novel, Anderson's Thirsty (2008), reflects and shapes the maturation of its young protagonist. The author argues that the transformation of vampire in the novel works as a metaphor for the various changes and maturation process experienced by the protagonist in the novel. Furthermore, the author's discussion will be preceded by a short history of vampire narrative. The author's analysis is supported by psychological theories of adolescence and socio-cultural approach which focuses on the ambiguities of adolescents' identity. Moreover, this paper alludes a psychoanalytic reading of the symbolism of the vampire which refers to Freud's notions of libido and death drive The conclusion of this paper is that Anderson's Thirsty is a paranormal novel which positions the implied readers to understand the trials of an adolescent protagonist during his difficult time of transition from childhood to adulthood.展开更多
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world....With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.展开更多
Conceptual Metaphor Theory believes that sensorimotor information should be an integral element in representing abstract concepts and can be activated as the way of abstract conceptual processing. Metaphor can be a br...Conceptual Metaphor Theory believes that sensorimotor information should be an integral element in representing abstract concepts and can be activated as the way of abstract conceptual processing. Metaphor can be a bridge between the abstract concept of power and the body perception experience since embodiment serves as a basis for metaphorical thinking. Using E-PRIME experimentation, the present study investigated the features in vertical space representation of English power words of second language learners with different levels of proficiency. The statistics indicated that: 1) For such learners, the representation of power words would trigger the vertically spatial metaphor, which brings about "word- space" interaction effect. 2) Chinese English learners with different levels in L2 demonstrate stronger representation abilities in L1 than that of L2, regardless of their L2 proficiency level. 3) Learners' second language proficiency exerts influence upon the representation of the English power words.展开更多
基金Project(10KJB430008)supported by the Natural Science Foundation of Colleges in Jiangsu Province,ChinaProjects(2013(CXZZ13_0421),2012(CXLX12_0425))supported by Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD),ChinaResearch and Innovation Program for College Graduates of Jiangsu Province,China
文摘Antimony tin oxide (ATO) nano-particles doped with different Sb contents were prepared by co-precipitation method, using SnCl4·5H2O and SbCl3 as main raw materials. Microstructure, morphology and reflectivity curves were characterized by XRD, FESEM, UV-visible spectroscopy and laser, and the effects of Sb content on crystalline microstructure, crystal size and reflectivity curves of the ATO nano-particles were investigated systematically. The results show that the ATO nano-particles prepared by co-precipitation method have tetragonal rutile structure, with particle size distribution range of several decade nanometer. With the increase of Sb content, the grain size of ATO decreases, and the unit cell volume increases. Compared with the SnO2 particles without Sb, the 1.06 μm laser reflection of ATO nano-particles doped with Sb is obviously lower. With the increase of Sb content, the reflection increases first, then decreases;when the Sb content is 20%, 1.06μm laser reflection of ATO nano-particles is below 0.02%, and the laser reflection performance is the best.
文摘This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information changes. This change is attributed to translator's idiolect and thinking pattern as well as different languages. The translator's role is obvious in the text translation. How to be invisible? Even if invisibility is possible, the invisibility is like a moon in water, flower in fog. That is vague but invisible.
基金The National Natural Science Foundation of China(No.61372103)the Natural Science Foundation of Jiangsu Province(No.BK20201265)the Key Laboratory of Computer Network Technology of Jiangsu Province。
文摘To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks.
基金supported by the National Natural Science Foundation of China(No.61661035)the Natural Science Foundation of Jiangxi Province (No.20192BAB207001)the Aviation Science Foundation (No.201920056001)。
文摘Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar echo and feeds back to the radar system,and then the radar system adaptively designs the transmission waveform. So the close-loop system is formed. The correlations between these transmission waveforms are decreased because of the adaptive change of these transmission waveforms,and the number of illuminations is reduced for adopting the SHT,which lowers the transmission power of the radar system. The radar system using the new method possesses the RF stealth performance. Aiming at the application of radar automatic target recognition(RATR),experimental simulations show the effectiveness and feasibility of the proposed method.
文摘To achieve the satellite formation control and the succeed formation missions, we present a new stealthy method to determine the relative states between formation satellites. In this method, the combination of a CCD camera and laser radar is used as the relative measure sensors. To reduce electromagnetic radiation, the laser radar works intermittently to minimize the probability of being discovered. And an unscented Kalman filter (UKF) is applied to estimate the relative states. The observability of this method is analyzed. The validity and effectiveness of the method is demonstrated in a typical application of formation relative navigation.
文摘Over the past few years, vampire genre has populated young adult (YA) literature. YA literature can be defined as narratives about the individual growth and maturation of adolescent protagonist. Adolescence is the bridging process of growing from childhood to adulthood. Furthermore, it is a turbulent time of rapid physical growth and sexual development. It also creates a critical phase in the formation of identity. In this paper, the author shall identify the ways in which representation of adolescence in an American contemporary young adult novel, Anderson's Thirsty (2008), reflects and shapes the maturation of its young protagonist. The author argues that the transformation of vampire in the novel works as a metaphor for the various changes and maturation process experienced by the protagonist in the novel. Furthermore, the author's discussion will be preceded by a short history of vampire narrative. The author's analysis is supported by psychological theories of adolescence and socio-cultural approach which focuses on the ambiguities of adolescents' identity. Moreover, this paper alludes a psychoanalytic reading of the symbolism of the vampire which refers to Freud's notions of libido and death drive The conclusion of this paper is that Anderson's Thirsty is a paranormal novel which positions the implied readers to understand the trials of an adolescent protagonist during his difficult time of transition from childhood to adulthood.
基金Project supported by the Taiwan Information Security Center(TWISC)the Ministry of Science and Technology,Taiwan(Nos.MOST 103-2221-E-259-016-MY2 and MOST 103-2221-E-011-090-MY2)
文摘With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.
文摘Conceptual Metaphor Theory believes that sensorimotor information should be an integral element in representing abstract concepts and can be activated as the way of abstract conceptual processing. Metaphor can be a bridge between the abstract concept of power and the body perception experience since embodiment serves as a basis for metaphorical thinking. Using E-PRIME experimentation, the present study investigated the features in vertical space representation of English power words of second language learners with different levels of proficiency. The statistics indicated that: 1) For such learners, the representation of power words would trigger the vertically spatial metaphor, which brings about "word- space" interaction effect. 2) Chinese English learners with different levels in L2 demonstrate stronger representation abilities in L1 than that of L2, regardless of their L2 proficiency level. 3) Learners' second language proficiency exerts influence upon the representation of the English power words.