A finite element method with boundary element method (FEM-BEM) is presented for computing electromagnetic induction. The features of an edge element method including the volume and surface edge element method are inve...A finite element method with boundary element method (FEM-BEM) is presented for computing electromagnetic induction. The features of an edge element method including the volume and surface edge element method are investigated in depth. Surface basis functions of edge elements to an arbitrary shape of target are derived according to the geometrical property of basis functions and applied to discretize the surface integral equation for 3-D general targets. The proposed model is presented to compute resonant frequencies and surface current of underground unexplored ordnance (UXO), and then the electromagnetic responses of single target with different frequencies and positions of sensor are simulated and results are validated by experiments.展开更多
An objective identification technique is used to detect regional extreme low temperature events (RELTE) in China during 1960-2009. Their spatial-temporal characteristics are analyzed. The results indicate that the l...An objective identification technique is used to detect regional extreme low temperature events (RELTE) in China during 1960-2009. Their spatial-temporal characteristics are analyzed. The results indicate that the lowest temperatures of RELTE, together with the frequency distribution of the geometric latitude center, exhibit a double-peak feature. The RELTE frequently happen near the geometric area of 30°N and 42°N before the mid-1980s, but shifted afterwards to 30°N. During 1960-2009, the frequency~ intensity, and the maximum impacted area of RELTE show overall decreasing trends. Due to the contribution of RELTE, with long duratioh and large spatial range, which account for 10% of the total RELTE, there is a significant turning point in the late 1980s. A change to a much more steady state after the late 1990s is identified. In addition, the integrated indices of RELTE are classified and analyzed.展开更多
Seismic events are very complex spatial-temporal phenomena. Seismic catalogues, reporting information about spatial-temporal distribution of the main shocks, are nowadays available for many seismic areas in the world,...Seismic events are very complex spatial-temporal phenomena. Seismic catalogues, reporting information about spatial-temporal distribution of the main shocks, are nowadays available for many seismic areas in the world, very often major events mark the beginning of a series of earthquakes (aflershocks) whose frequency and energy are meanly decreasing in time down to the background level of activity. Azerbaijan is one of the most active segments of the Alpine-Himalayan seismic belt and marks the junction between the African-Arabian and Indian plate to the south, and Eurasian plate to the north. The cluster of earthquakes that struck near Varzeghan-Ahar was centered near the Gosha-Dagh fault, but preliminary data suggested that the fault was not responsible for the temblor. On the late afternoon of Saturday, August 11, 2012, the northwest of Iran was shaken by two of the strong earthquakes in Iranian history. First was hit by Mw (moment magnitude scale) = 6.4 Richter at local time 16:54 (12:23 GMT (Greenwich Mean Time)), and about 11 min later, an Mw = 6.3 struck 10 km to the west. The spatial-temporal clustering of micro earthquakes (aftershocks) near Varzeghan, is parameterized by means of a generalized passion model. The region has known faults but numerous smaller or deeply buried faults remain undated, according to the Geological Survey of Iran.展开更多
Charles Dickens rose to fame as a novelist because he described society in early Victorian Britain both accurately and evocatively. That skill came about through his work as a journalist, and his many first-hand exper...Charles Dickens rose to fame as a novelist because he described society in early Victorian Britain both accurately and evocatively. That skill came about through his work as a journalist, and his many first-hand experiences of events. He continued throughout his life to report on major incidents and newsworthy items, and was able to use those reports as the factual basis of his novels. His experiences of the railways were especially important, and he made great use of them in his novels such as Dombey and Son. Later expereiences included his own involvement in a railway disaster, at Staplehurst in 1865, a major trauma which led him to include the accident at the end of Our Mutual Friend, and led him to write a timely ghost story, The Signalman. No doubt he would have used more such reports had he lived to fulfill his ambitions.展开更多
The meaning of "local" in TV news is not as straightforward as one might imagine. "Local" newscasts in several U.S. markets are outsourced to an independent company located hundreds of miles from the communities s...The meaning of "local" in TV news is not as straightforward as one might imagine. "Local" newscasts in several U.S. markets are outsourced to an independent company located hundreds of miles from the communities served. What are the implications of such a delivery system for coverage of local issues and the Jeffersonian ideal of an informed citizenry? This study employs a content analysis of outsourced and local newscasts, using a data set of more than 1,000 stories from more than 30 hours of newscasts to determine if differences exist on story topics and source types. Does one type of station cover more public affairs stories than the other? Does one type use more official sources, or more perspective from private individuals? Even with the wide array of news sources currently available, local TV news still ranks as the most widely used information source. How well that source delivers information to local audiences is an important question to ask, particularly when the information may be coming from a great distance.展开更多
In order to maximize the return of investments and at the same time improve the quality in the construction industry of midrise buildings, it is very important to derive an optimal solution to the building structural ...In order to maximize the return of investments and at the same time improve the quality in the construction industry of midrise buildings, it is very important to derive an optimal solution to the building structural system, which would facilitate faster and easier construction activities with minimal quantity of construction material, while maintaining the satisfactory level of building safety and performance. This paper makes a comparative study between a "solid" and a "waffle" slab system. A typical 14-story RC building structure is selected as an example for this study purpose. The first part of this study is focused in deriving an optimal solution for a solid and waffle slab system which are later on considered as constituents of all stories of the 14-story building. In the second part, it is elaborated the effect of both slab systems over the 14-story building model. This study aims to emphasize the advantages of mid-rise buildings constituted of waffle slab system over the buildings characterized with solid types of slabs, in terms of economy, structural safety and performance.展开更多
Peacekeeping missions are increasingly becoming the main focus of military organisations. In contrast with Cold War era, countries are no longer expecting an all out conventional conflict between countries. The contem...Peacekeeping missions are increasingly becoming the main focus of military organisations. In contrast with Cold War era, countries are no longer expecting an all out conventional conflict between countries. The contemporary conflicts are often civil strives with the militaries expected to assist to end them. The tasks extend beyond the traditional military roles of separating warring parties to assisting in reconstruction of the war-torn areas. These tasks place a tremendous demand of the skills possessed by soldiers. To be effective and make meaningful contributions, soldiers are expected to assist in tasks such as negotiations, construction, building roads and bridges. Furthermore, they are also needed to provide traditional security, assist in the initial process of managing government projects and providing essential services such as medical assistance and providing teachers. These additional roles place education at a centre-stage. It becomes necessary for educational offerings to be broadened beyond military-related modules to include other fields such as governance, public development and finance. This shift is necessitated by the realisation that the premature withdrawal of the military and handing over to civilian authorities has more deleterious effects. Furthermore, the inability of stability to be retained in a country threatens not only the security of the country at war but the region and international stability are also at stake.展开更多
The regular occurrence and the high costs of flooding to both road agencies and communities is a strong impetus to investigate the methodologies applied to evaluating flood immunity road projects. Very little literatu...The regular occurrence and the high costs of flooding to both road agencies and communities is a strong impetus to investigate the methodologies applied to evaluating flood immunity road projects. Very little literature exists on methods of evaluating the benefits of improving flood immunity through better road infrastructure. This paper attempts to address some of the numerous issues hindering the accurate evaluation of flood immunity road projects. The methodologies presented in this paper are designed to evaluate benefits that are not normally included or not fully considered in evaluations; such benefits include reduced flood related road accidents, costs of not travelling during the closure period and additional costs from unanticipated flood events. A key focus of the paper is the consideration of the evaluation of improved flood immunity from a network perspective rather than the typical approach of evaluating flood immunity projects in isolation to each other. The application of the proposed methodologies is demonstrated with a hypothetical example of a typical rural network subjected to regular flooding. The results of the analysis, conducted using the proposed methodologies, reveals that the currently applied methodologies account for less than half the likely value of benefits of a package of projects that will prevent the complete isolation of communities during serious flood events.展开更多
In this paper,according to the Fujian Seismic Network earthquake catalog records,the T now method and the Four Stations Continuous Location method( hereinafter called FSCL)put forward by Jin Xing are inspected by usin...In this paper,according to the Fujian Seismic Network earthquake catalog records,the T now method and the Four Stations Continuous Location method( hereinafter called FSCL)put forward by Jin Xing are inspected by using P-wave arrival information of the first four stations of each seismic event. Results show that for earthquakes within the network,both methods can obtain similar location results and location deviations are small for the majority of the events. For earthquakes outside the network,the location deviation may be amplified as the epicentral distance increases,owing to the seismic station distribution which spread toward the side of the epicenter and the small opening angle between seismic stations used for locating and epicenter. For the FSCL method,the impacts of the wave velocity on the location results may be significant for earthquakes outside the network.Thus,selecting a velocity model which is similar to the actual structure of the wave velocity will contribute to improving location results of earthquakes. The FSCL method can locate more seismic events than the T now method. It concludes that the T now method makes use of mistake information from some non-triggering stations in earthquake catalog,and some P-wave arrivals are not included in the earthquake catalog due to discontinuous records or unclear records of the seismic phase,which induces incorrect location.展开更多
Many techniques have been used in the courts to demonstrate the criticalities of a delay event on the project schedule. At this time, there is no standard method to analyze a delay claim. This paper first introduced a...Many techniques have been used in the courts to demonstrate the criticalities of a delay event on the project schedule. At this time, there is no standard method to analyze a delay claim. This paper first introduced a fictional case study that has most types of delay and acceleration events that might be faced on a real project. The case study is applied to all current techniques of delay claims that have been identified from previous studies. The comparison uses the delay claim issues as criteria to evaluate all the delay claim techniques from the case study results. The case study result and discussion demonstrate that the Day-by-Day technique satisfies all the desired criteria while other techniques lack some.展开更多
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani...Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.展开更多
Military talents are those who have higher culture and scientific quality, much strong innovation consciousness and thinking ability. The overall objective of military talent training is to cultivate the comprehensive...Military talents are those who have higher culture and scientific quality, much strong innovation consciousness and thinking ability. The overall objective of military talent training is to cultivate the comprehensive-quality military personnel that meet the requirements of military modernization and preparations for military struggle. In this paper, we construct the military talent training objectives model, and on this basis, we propose the innovative military talent training mode, from the perspective of curriculum content system and talent quality assurance system.展开更多
Homoploid hybrid speciation (HHS) involves the recombination of two differentiated genomes into a novel, func- tional one without a change in chromosome number. Theoretically, there are numerous ways for two parenta...Homoploid hybrid speciation (HHS) involves the recombination of two differentiated genomes into a novel, func- tional one without a change in chromosome number. Theoretically, there are numerous ways for two parental genomes to recom- bine. Hence, chance may play a large role in the formation of a hybrid species. If these genome combinations can evolve rapidly following hybridization and sympatric situations are numerous, recurrent homoploid hybrid speciation is a possibility. We argue that three different, but not mutually exclusive, types of contingencies could influence this process. First, many of these "hopeful monsters" of recombinant parent genotypes would likely have low fitness. Only specific combinations of parental genomic con- tributions may produce viable, intra-fertile hybrid species able to accommodate potential constraints arising from intragenomic conflict. Second, ecological conditions (competition, geography of the contact zones or the initial frequency of both parent spe- cies) might favor different outcomes ranging from sympatric coexistence to the formation of hybrid swarms and ultimately hybrid speciation. Finally, history may also play an important role in promoting or constraining recurrent HHS if multiple hybridization events occur sequentially and parental divergence or isolation differs along this continuum. We discuss under which conditions HHS may occur multiple times in parallel and to what extent recombination and selection may fuse the parent genomes in the same or different ways. We conclude by examining different approaches that might help to solve this intriguing evolutionary puz- zle [Current Zoology 59 (5): 667-674, 2013].展开更多
The idea of abolishing the death penalty is increasingly accepted as a goal by scholars in the field of criminal law, who have put aside all consideration of national realities and the crime situation. Among the facto...The idea of abolishing the death penalty is increasingly accepted as a goal by scholars in the field of criminal law, who have put aside all consideration of national realities and the crime situation. Among the factors that have brought about this theoretical consensus is a very important one: statistical data on those counlries that have abolished capital punishment, together with the assumption these figures promote: the fiction that "abolition of the death penalty is a world trend." Looking objectively at the number of countries that have abolished the death penalty, reflecting upon the unscientific nature of the statistics that scholars have swallowed whole, and exploring the current international situation are all valuable activities that may significantly assist our thinking on this issue in the context of Chinese realities and help us avoid the pitfalls and blandishments of figures in academic research. China's stage of historical development and overall situation mean that this is not the time for the immediate abolition of the death penalty.展开更多
Targeted observation is an observation strategy by which the concerned phenomenon is observed. In geoscienee, targeted ob- servation is mainly related to the forecasts of weather events or predictions of climate event...Targeted observation is an observation strategy by which the concerned phenomenon is observed. In geoscienee, targeted ob- servation is mainly related to the forecasts of weather events or predictions of climate events. This paper will first review the history of targeted observation, and then introduce the main methods used in targeted observation. The discussion on the theo- retical basis of targeted observation includes its advantages and limitations. After presenting the current situation of domestic and international targeted observations in atmospheric and oceanic sciences, the methods used for targeted observation, and their effect evaluation and testing are mainly discussed here. Finally, the author presents his suggestion about the prospect of further development in the field, and how to extend the method of targeted observation to deal with numerical model errors.展开更多
The component-based business architecture integration of military information systems is a popu- lar research topic in the field of military operational research. Identifying enterprise-level business components is an...The component-based business architecture integration of military information systems is a popu- lar research topic in the field of military operational research. Identifying enterprise-level business components is an important issue in business architecture integration. Currently used methodologies for business component identification tend to focus on software-level business components, and ignore such enterprise concerns in business architectures as organizations and resources. Moreover, approaches to enterprise-level business component identi- fication have proven laborious. In this study, we propose a novel approach to enterprise-level business component identification by considering overall cohesion, coupling, granularity, maintainability, and reusability. We first define and formulate enterprise-level business components based on the component business model and the Department of Defense Architecture Framework (DoDAF) models. To quantify the indices of business components, we formulate a create, read, update, and delete (CRUD) matrix and use six metrics as criteria. We then formulate business com- ponent identification as a multi:objective optimization problem and solve it by a novel meta-heuristic optimization algorithm called the 'simulated annealing hybrid genetic algorithm (SHGA)'. Case studies showed that our approach is more practical and efficient for enterprise-level business component identification than prevalent approaches.展开更多
文摘A finite element method with boundary element method (FEM-BEM) is presented for computing electromagnetic induction. The features of an edge element method including the volume and surface edge element method are investigated in depth. Surface basis functions of edge elements to an arbitrary shape of target are derived according to the geometrical property of basis functions and applied to discretize the surface integral equation for 3-D general targets. The proposed model is presented to compute resonant frequencies and surface current of underground unexplored ordnance (UXO), and then the electromagnetic responses of single target with different frequencies and positions of sensor are simulated and results are validated by experiments.
基金supported by the Special Scientific Research Projects for Public Interest(No.GYHY201006021 and GYHY201106016)the National Natural Science Foundation of China(No.41205040 and 40930952)
文摘An objective identification technique is used to detect regional extreme low temperature events (RELTE) in China during 1960-2009. Their spatial-temporal characteristics are analyzed. The results indicate that the lowest temperatures of RELTE, together with the frequency distribution of the geometric latitude center, exhibit a double-peak feature. The RELTE frequently happen near the geometric area of 30°N and 42°N before the mid-1980s, but shifted afterwards to 30°N. During 1960-2009, the frequency~ intensity, and the maximum impacted area of RELTE show overall decreasing trends. Due to the contribution of RELTE, with long duratioh and large spatial range, which account for 10% of the total RELTE, there is a significant turning point in the late 1980s. A change to a much more steady state after the late 1990s is identified. In addition, the integrated indices of RELTE are classified and analyzed.
文摘Seismic events are very complex spatial-temporal phenomena. Seismic catalogues, reporting information about spatial-temporal distribution of the main shocks, are nowadays available for many seismic areas in the world, very often major events mark the beginning of a series of earthquakes (aflershocks) whose frequency and energy are meanly decreasing in time down to the background level of activity. Azerbaijan is one of the most active segments of the Alpine-Himalayan seismic belt and marks the junction between the African-Arabian and Indian plate to the south, and Eurasian plate to the north. The cluster of earthquakes that struck near Varzeghan-Ahar was centered near the Gosha-Dagh fault, but preliminary data suggested that the fault was not responsible for the temblor. On the late afternoon of Saturday, August 11, 2012, the northwest of Iran was shaken by two of the strong earthquakes in Iranian history. First was hit by Mw (moment magnitude scale) = 6.4 Richter at local time 16:54 (12:23 GMT (Greenwich Mean Time)), and about 11 min later, an Mw = 6.3 struck 10 km to the west. The spatial-temporal clustering of micro earthquakes (aftershocks) near Varzeghan, is parameterized by means of a generalized passion model. The region has known faults but numerous smaller or deeply buried faults remain undated, according to the Geological Survey of Iran.
文摘Charles Dickens rose to fame as a novelist because he described society in early Victorian Britain both accurately and evocatively. That skill came about through his work as a journalist, and his many first-hand experiences of events. He continued throughout his life to report on major incidents and newsworthy items, and was able to use those reports as the factual basis of his novels. His experiences of the railways were especially important, and he made great use of them in his novels such as Dombey and Son. Later expereiences included his own involvement in a railway disaster, at Staplehurst in 1865, a major trauma which led him to include the accident at the end of Our Mutual Friend, and led him to write a timely ghost story, The Signalman. No doubt he would have used more such reports had he lived to fulfill his ambitions.
文摘The meaning of "local" in TV news is not as straightforward as one might imagine. "Local" newscasts in several U.S. markets are outsourced to an independent company located hundreds of miles from the communities served. What are the implications of such a delivery system for coverage of local issues and the Jeffersonian ideal of an informed citizenry? This study employs a content analysis of outsourced and local newscasts, using a data set of more than 1,000 stories from more than 30 hours of newscasts to determine if differences exist on story topics and source types. Does one type of station cover more public affairs stories than the other? Does one type use more official sources, or more perspective from private individuals? Even with the wide array of news sources currently available, local TV news still ranks as the most widely used information source. How well that source delivers information to local audiences is an important question to ask, particularly when the information may be coming from a great distance.
文摘In order to maximize the return of investments and at the same time improve the quality in the construction industry of midrise buildings, it is very important to derive an optimal solution to the building structural system, which would facilitate faster and easier construction activities with minimal quantity of construction material, while maintaining the satisfactory level of building safety and performance. This paper makes a comparative study between a "solid" and a "waffle" slab system. A typical 14-story RC building structure is selected as an example for this study purpose. The first part of this study is focused in deriving an optimal solution for a solid and waffle slab system which are later on considered as constituents of all stories of the 14-story building. In the second part, it is elaborated the effect of both slab systems over the 14-story building model. This study aims to emphasize the advantages of mid-rise buildings constituted of waffle slab system over the buildings characterized with solid types of slabs, in terms of economy, structural safety and performance.
文摘Peacekeeping missions are increasingly becoming the main focus of military organisations. In contrast with Cold War era, countries are no longer expecting an all out conventional conflict between countries. The contemporary conflicts are often civil strives with the militaries expected to assist to end them. The tasks extend beyond the traditional military roles of separating warring parties to assisting in reconstruction of the war-torn areas. These tasks place a tremendous demand of the skills possessed by soldiers. To be effective and make meaningful contributions, soldiers are expected to assist in tasks such as negotiations, construction, building roads and bridges. Furthermore, they are also needed to provide traditional security, assist in the initial process of managing government projects and providing essential services such as medical assistance and providing teachers. These additional roles place education at a centre-stage. It becomes necessary for educational offerings to be broadened beyond military-related modules to include other fields such as governance, public development and finance. This shift is necessitated by the realisation that the premature withdrawal of the military and handing over to civilian authorities has more deleterious effects. Furthermore, the inability of stability to be retained in a country threatens not only the security of the country at war but the region and international stability are also at stake.
文摘The regular occurrence and the high costs of flooding to both road agencies and communities is a strong impetus to investigate the methodologies applied to evaluating flood immunity road projects. Very little literature exists on methods of evaluating the benefits of improving flood immunity through better road infrastructure. This paper attempts to address some of the numerous issues hindering the accurate evaluation of flood immunity road projects. The methodologies presented in this paper are designed to evaluate benefits that are not normally included or not fully considered in evaluations; such benefits include reduced flood related road accidents, costs of not travelling during the closure period and additional costs from unanticipated flood events. A key focus of the paper is the consideration of the evaluation of improved flood immunity from a network perspective rather than the typical approach of evaluating flood immunity projects in isolation to each other. The application of the proposed methodologies is demonstrated with a hypothetical example of a typical rural network subjected to regular flooding. The results of the analysis, conducted using the proposed methodologies, reveals that the currently applied methodologies account for less than half the likely value of benefits of a package of projects that will prevent the complete isolation of communities during serious flood events.
基金funded by the National Key Technology R&D Program of China(2009BAK55B02)
文摘In this paper,according to the Fujian Seismic Network earthquake catalog records,the T now method and the Four Stations Continuous Location method( hereinafter called FSCL)put forward by Jin Xing are inspected by using P-wave arrival information of the first four stations of each seismic event. Results show that for earthquakes within the network,both methods can obtain similar location results and location deviations are small for the majority of the events. For earthquakes outside the network,the location deviation may be amplified as the epicentral distance increases,owing to the seismic station distribution which spread toward the side of the epicenter and the small opening angle between seismic stations used for locating and epicenter. For the FSCL method,the impacts of the wave velocity on the location results may be significant for earthquakes outside the network.Thus,selecting a velocity model which is similar to the actual structure of the wave velocity will contribute to improving location results of earthquakes. The FSCL method can locate more seismic events than the T now method. It concludes that the T now method makes use of mistake information from some non-triggering stations in earthquake catalog,and some P-wave arrivals are not included in the earthquake catalog due to discontinuous records or unclear records of the seismic phase,which induces incorrect location.
文摘Many techniques have been used in the courts to demonstrate the criticalities of a delay event on the project schedule. At this time, there is no standard method to analyze a delay claim. This paper first introduced a fictional case study that has most types of delay and acceleration events that might be faced on a real project. The case study is applied to all current techniques of delay claims that have been identified from previous studies. The comparison uses the delay claim issues as criteria to evaluate all the delay claim techniques from the case study results. The case study result and discussion demonstrate that the Day-by-Day technique satisfies all the desired criteria while other techniques lack some.
基金supported in part by National Natural Science Foundation of China(NSFC)under Grant No.61100228 and 61202479the National High-tech R&D Program of China under Grant No.2012AA013101+1 种基金the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030601 and XDA06010701Open Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province Grant No.2015IOT03
文摘Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead.
文摘Military talents are those who have higher culture and scientific quality, much strong innovation consciousness and thinking ability. The overall objective of military talent training is to cultivate the comprehensive-quality military personnel that meet the requirements of military modernization and preparations for military struggle. In this paper, we construct the military talent training objectives model, and on this basis, we propose the innovative military talent training mode, from the perspective of curriculum content system and talent quality assurance system.
文摘Homoploid hybrid speciation (HHS) involves the recombination of two differentiated genomes into a novel, func- tional one without a change in chromosome number. Theoretically, there are numerous ways for two parental genomes to recom- bine. Hence, chance may play a large role in the formation of a hybrid species. If these genome combinations can evolve rapidly following hybridization and sympatric situations are numerous, recurrent homoploid hybrid speciation is a possibility. We argue that three different, but not mutually exclusive, types of contingencies could influence this process. First, many of these "hopeful monsters" of recombinant parent genotypes would likely have low fitness. Only specific combinations of parental genomic con- tributions may produce viable, intra-fertile hybrid species able to accommodate potential constraints arising from intragenomic conflict. Second, ecological conditions (competition, geography of the contact zones or the initial frequency of both parent spe- cies) might favor different outcomes ranging from sympatric coexistence to the formation of hybrid swarms and ultimately hybrid speciation. Finally, history may also play an important role in promoting or constraining recurrent HHS if multiple hybridization events occur sequentially and parental divergence or isolation differs along this continuum. We discuss under which conditions HHS may occur multiple times in parallel and to what extent recombination and selection may fuse the parent genomes in the same or different ways. We conclude by examining different approaches that might help to solve this intriguing evolutionary puz- zle [Current Zoology 59 (5): 667-674, 2013].
文摘The idea of abolishing the death penalty is increasingly accepted as a goal by scholars in the field of criminal law, who have put aside all consideration of national realities and the crime situation. Among the factors that have brought about this theoretical consensus is a very important one: statistical data on those counlries that have abolished capital punishment, together with the assumption these figures promote: the fiction that "abolition of the death penalty is a world trend." Looking objectively at the number of countries that have abolished the death penalty, reflecting upon the unscientific nature of the statistics that scholars have swallowed whole, and exploring the current international situation are all valuable activities that may significantly assist our thinking on this issue in the context of Chinese realities and help us avoid the pitfalls and blandishments of figures in academic research. China's stage of historical development and overall situation mean that this is not the time for the immediate abolition of the death penalty.
基金sponsored by the National Natural Science Foundation of China(Grant No.41230420)the National Basic Research Program of China(Grant No.2012CB417404)
文摘Targeted observation is an observation strategy by which the concerned phenomenon is observed. In geoscienee, targeted ob- servation is mainly related to the forecasts of weather events or predictions of climate events. This paper will first review the history of targeted observation, and then introduce the main methods used in targeted observation. The discussion on the theo- retical basis of targeted observation includes its advantages and limitations. After presenting the current situation of domestic and international targeted observations in atmospheric and oceanic sciences, the methods used for targeted observation, and their effect evaluation and testing are mainly discussed here. Finally, the author presents his suggestion about the prospect of further development in the field, and how to extend the method of targeted observation to deal with numerical model errors.
基金Project supported by the National.Natural Science Foundation of China (No. 71571189)
文摘The component-based business architecture integration of military information systems is a popu- lar research topic in the field of military operational research. Identifying enterprise-level business components is an important issue in business architecture integration. Currently used methodologies for business component identification tend to focus on software-level business components, and ignore such enterprise concerns in business architectures as organizations and resources. Moreover, approaches to enterprise-level business component identi- fication have proven laborious. In this study, we propose a novel approach to enterprise-level business component identification by considering overall cohesion, coupling, granularity, maintainability, and reusability. We first define and formulate enterprise-level business components based on the component business model and the Department of Defense Architecture Framework (DoDAF) models. To quantify the indices of business components, we formulate a create, read, update, and delete (CRUD) matrix and use six metrics as criteria. We then formulate business com- ponent identification as a multi:objective optimization problem and solve it by a novel meta-heuristic optimization algorithm called the 'simulated annealing hybrid genetic algorithm (SHGA)'. Case studies showed that our approach is more practical and efficient for enterprise-level business component identification than prevalent approaches.