At the present paper,adult populations of the psocid, Liposcelis bostrychophila ,were exposed respectively for 30 generations to two atmospheres containing 0 5% and 1% O 2 (N 2 in mixture as balance),in order to...At the present paper,adult populations of the psocid, Liposcelis bostrychophila ,were exposed respectively for 30 generations to two atmospheres containing 0 5% and 1% O 2 (N 2 in mixture as balance),in order to select strains resistant to low O 2 content (LOC) atmosphere.Selection pressure was maintained at around 70% mortality.At the 30th generation,comparison of sensitivity between the selected strains (LOC1 and LOC2) and the original susceptible strain (CA S) indicated a tolerance factor (TF) at the 50% mortality level (LT 50 ) of 4 7 and 3 9 fold,respectively.Throughout the selection process,log time against probit mortality lines remained roughly parallel and the slopes remained lower than that of CA S strain until the last generation.The implication is that at high level of selection,multiple genetic factors continued act together even at the 30th generation to select for adaptation to survival at depleted O 2 concentration.Up to 30th generation,two selected strains still possessed the genetic potential to develop resistance to LOC.Removal of selection pressure for 5 generations from 2 sub populations of two selected strains from 25th generation caused significant reduction in resistance.In the absence of CA exposure,the two selected strains all possessed the reproductive disadvantages or fitness defect.LOC1 and LOC2 were calculated by R 0 to have a fitness value of 0 56 and 0 75 relative to unselected strain,respectively.展开更多
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
The similarities of the non-linear chemical (NLC) fingerprints of Radix Glycyrrhizaes from four producing areas and eight other traditional Chinese medicines (TCMs) were calculated, using a systemic similarity cal...The similarities of the non-linear chemical (NLC) fingerprints of Radix Glycyrrhizaes from four producing areas and eight other traditional Chinese medicines (TCMs) were calculated, using a systemic similarity calculation method proposed and three other main calculation ones (Euclidean distance, correlation coefficient and included angle cosine). All of the correlation coefficient similarities of different TCMs are higher than 0.952, and the included angle cosines are all higher than 0.962. So, both the conelation coefficient and included angle cosine similarities are unable to be used as the criteria for quantitatively evaluating the similarities of NLC fingerprints of TCMs. Although all of the Euclidean distance similarities of Berry Liquorices from four producing areas are less than 73, those of the other eight TCMs are all more than 180. The Euclidean distance cannot reflect the relative magnitudes of the feature differences in the NLC fingerprints very correctly. The systemic similarity method is the best among the four ones. All of the systemic similarities of Berry Liquorices from the four producing areas are higher than 0.962, while those of the other eight TCMs are all lower than 0.805, and the systemic similarity can reflect the differences between samples most faithfully, and can be used as a quantitative one evaluating the similarities of NLC fingerprints of TCMs, by which TCM could be distinguished and evaluated quickly, simply and exactly.展开更多
This article deals with the short story “Hiato”, part of the collection Tutaméia: Tereeiras estdrias by Joāo Guimarāes Rosa. When Tutaméia was released, it caused some discomfort for being too inventive...This article deals with the short story “Hiato”, part of the collection Tutaméia: Tereeiras estdrias by Joāo Guimarāes Rosa. When Tutaméia was released, it caused some discomfort for being too inventive. We will analyze the story in relation to the book proposal and the literary field when it was released. The short story presents an allegory of deform or an indetermination procedure that creates deformations in the form. “Hiato” is related to the author's concept of fiction as a representation that validates itself through the relations it establishes with cultural representations. These relations of representation with culture call attention to the significances that history aggregates to linguistic uses and, simultaneously, proposes meaninglessness of decisive representational moments. The effect is a critical reflection on the historicity of representations in culture which fiction makes undetermined as a future strategy.展开更多
The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarante...The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.展开更多
A milestone in the Year of Biodiversity is that the Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversi...A milestone in the Year of Biodiversity is that the Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD) was adopted in the 10th Conference of Parties (COP 10) held in Nagoya, Japan, Oct 18- 29, 2010. Traditional knowledge (TK) is a key issue in the Protocol’s text and its negotiating period. This paper aimed to protect TK by defining its concepts and categories and promoting benefit-sharing with TK’s holders. Based on the analysis for the TK concepts of relevant international organizations and conventions, in particularly on the author’s current years’ research work on TK in the ethnic areas of China, this paper proposes the categories and the classification system for the TK associated with biological resources, i.e. (i) the knowledge for traditional use of agricultural bio-species and genetic resources; (ii) the knowledge for traditional use of medicinal bio-species;(iii) traditional technical innovations for bio- resource use and traditional practices for farming and living styles; (iv) traditional cultures such as customary laws and community protocols that are related to conservation and sustainable use of bio-resources; and (v) traditional geographically biological indicators. Furthermore, this paper introduced the provisions for access and benefit-sharing of TK and proposed to share fairly and equitably the benefits produced from use of TK with indigenous people, local communities and other kinds of holders such as a country for the ancient documented TK. In addition, aimed to the existing problems for traditional knowledge protection, the national strategy for TK protection was introduced and measures for TK inheritance, development, utilization and protection measures were put forward, which are significant for TK’s popularization and beneficial to local communities of the ethnic groups in China.展开更多
文摘At the present paper,adult populations of the psocid, Liposcelis bostrychophila ,were exposed respectively for 30 generations to two atmospheres containing 0 5% and 1% O 2 (N 2 in mixture as balance),in order to select strains resistant to low O 2 content (LOC) atmosphere.Selection pressure was maintained at around 70% mortality.At the 30th generation,comparison of sensitivity between the selected strains (LOC1 and LOC2) and the original susceptible strain (CA S) indicated a tolerance factor (TF) at the 50% mortality level (LT 50 ) of 4 7 and 3 9 fold,respectively.Throughout the selection process,log time against probit mortality lines remained roughly parallel and the slopes remained lower than that of CA S strain until the last generation.The implication is that at high level of selection,multiple genetic factors continued act together even at the 30th generation to select for adaptation to survival at depleted O 2 concentration.Up to 30th generation,two selected strains still possessed the genetic potential to develop resistance to LOC.Removal of selection pressure for 5 generations from 2 sub populations of two selected strains from 25th generation caused significant reduction in resistance.In the absence of CA exposure,the two selected strains all possessed the reproductive disadvantages or fitness defect.LOC1 and LOC2 were calculated by R 0 to have a fitness value of 0 56 and 0 75 relative to unselected strain,respectively.
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
基金Project(2009GJD20033) supported by the National Science and Technology Ministry of China
文摘The similarities of the non-linear chemical (NLC) fingerprints of Radix Glycyrrhizaes from four producing areas and eight other traditional Chinese medicines (TCMs) were calculated, using a systemic similarity calculation method proposed and three other main calculation ones (Euclidean distance, correlation coefficient and included angle cosine). All of the correlation coefficient similarities of different TCMs are higher than 0.952, and the included angle cosines are all higher than 0.962. So, both the conelation coefficient and included angle cosine similarities are unable to be used as the criteria for quantitatively evaluating the similarities of NLC fingerprints of TCMs. Although all of the Euclidean distance similarities of Berry Liquorices from four producing areas are less than 73, those of the other eight TCMs are all more than 180. The Euclidean distance cannot reflect the relative magnitudes of the feature differences in the NLC fingerprints very correctly. The systemic similarity method is the best among the four ones. All of the systemic similarities of Berry Liquorices from the four producing areas are higher than 0.962, while those of the other eight TCMs are all lower than 0.805, and the systemic similarity can reflect the differences between samples most faithfully, and can be used as a quantitative one evaluating the similarities of NLC fingerprints of TCMs, by which TCM could be distinguished and evaluated quickly, simply and exactly.
文摘This article deals with the short story “Hiato”, part of the collection Tutaméia: Tereeiras estdrias by Joāo Guimarāes Rosa. When Tutaméia was released, it caused some discomfort for being too inventive. We will analyze the story in relation to the book proposal and the literary field when it was released. The short story presents an allegory of deform or an indetermination procedure that creates deformations in the form. “Hiato” is related to the author's concept of fiction as a representation that validates itself through the relations it establishes with cultural representations. These relations of representation with culture call attention to the significances that history aggregates to linguistic uses and, simultaneously, proposes meaninglessness of decisive representational moments. The effect is a critical reflection on the historicity of representations in culture which fiction makes undetermined as a future strategy.
文摘The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.
基金National Key Research Program (2007BAC03A08) "111 Program" (2008-B08044)
文摘A milestone in the Year of Biodiversity is that the Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD) was adopted in the 10th Conference of Parties (COP 10) held in Nagoya, Japan, Oct 18- 29, 2010. Traditional knowledge (TK) is a key issue in the Protocol’s text and its negotiating period. This paper aimed to protect TK by defining its concepts and categories and promoting benefit-sharing with TK’s holders. Based on the analysis for the TK concepts of relevant international organizations and conventions, in particularly on the author’s current years’ research work on TK in the ethnic areas of China, this paper proposes the categories and the classification system for the TK associated with biological resources, i.e. (i) the knowledge for traditional use of agricultural bio-species and genetic resources; (ii) the knowledge for traditional use of medicinal bio-species;(iii) traditional technical innovations for bio- resource use and traditional practices for farming and living styles; (iv) traditional cultures such as customary laws and community protocols that are related to conservation and sustainable use of bio-resources; and (v) traditional geographically biological indicators. Furthermore, this paper introduced the provisions for access and benefit-sharing of TK and proposed to share fairly and equitably the benefits produced from use of TK with indigenous people, local communities and other kinds of holders such as a country for the ancient documented TK. In addition, aimed to the existing problems for traditional knowledge protection, the national strategy for TK protection was introduced and measures for TK inheritance, development, utilization and protection measures were put forward, which are significant for TK’s popularization and beneficial to local communities of the ethnic groups in China.