This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ...This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.展开更多
Summarized the four main sources of CO gas on the working face based on investigation and local observation: firstly,it analyzed the mechanism that CO gas was produced by spontaneous combustion and oxygenation of gob ...Summarized the four main sources of CO gas on the working face based on investigation and local observation: firstly,it analyzed the mechanism that CO gas was produced by spontaneous combustion and oxygenation of gob residual coal;next,it illus- trated the theory that special coal seam deposits natural CO gas,and provided correlative experiment data;and then,it illustrated the reason of the CO gas in working face in- creased relatively in the course of coal cutter's shearing,according to the translation be- tween mechanism energy and inner energy and the rupture of carbon molecule side chain during coal exploitation;lastly,illustrated the reason of CO gas appearance and the rela- tively release quantity during coal mine blasting underground.We find out the source of CO gas on the working face accurately,and provide advantages for appropriate prevention and practical management measures.展开更多
5-aminosalicylate(5-ASA)agents remain the mainstay treatment in ulcerative colitis(UC).A number of oral 5-ASA agents are commercially available,including azobond pro-drugs,as well as delayed-and controlledrelease form...5-aminosalicylate(5-ASA)agents remain the mainstay treatment in ulcerative colitis(UC).A number of oral 5-ASA agents are commercially available,including azobond pro-drugs,as well as delayed-and controlledrelease forms of mesalazine.However,poor adherence due to frequent daily dosing and a large number of tablets has been shown to be an important barrier to successful management of patients with UC.Recently, new,once-daily formulations of mesalazine,including the unique multi-matrix delivery system and mesalazine granules,were proven to be efficacious in inducing and maintaining remission in mild-to-moderate UC,with a good safety profile comparable to that of other oral mesalazine formulations.In addition,they offer the advantage of a low pill burden and might contribute to increased long-term compliance and treatment success in clinical practice.This editorial summarizes the available literature on the short-and medium-term efficacy and safety of the new once-daily mesalazine formulations.展开更多
Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it ha...Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it has some weaknesses. In this paper, a new enhanced simple authenticated key agreement algorithm is proposed to overcome these weaknesses on the basis of analyzing the weaknesses of the related protocols. The new enhanced simple authenticated key agreement algorithm can get over replay attack and password guessing attack, provide perfect forward secrecy, and hold the merits of the simple authenticated key agreement algorithm.展开更多
Formally, national sovereignty can be identified as hard and soft;social-structurally,it consists of politi- cal sovereignty, economic sovereignty and cultural sovereignty. With the globalization of world economy,na- ...Formally, national sovereignty can be identified as hard and soft;social-structurally,it consists of politi- cal sovereignty, economic sovereignty and cultural sovereignty. With the globalization of world economy,na- tional sovereignty is changing.Our country is now confronted by three major challenges: the independence of economic sovereignty,the integrity of political sovereignty and the equality of cultural sovereignty. This research probes how to maximize national benefits under globalization.展开更多
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers...Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.展开更多
In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advo...In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advocating systematic integration of risk assessment within the conventional design process has started to takeoff. Despite this wide recognition and increasing popularity, important factors that could potentially undermine the quality of the results come from both quantitative and qualitative aspects during the risk assessment process. This paper details a promising solution by developing a formalized methodology for risk assessment through effective storing and processing of historical data combined with data generated through first-principle approaches. This method should help to generate appropriate risk models in the selected platform (Bayesian networks) which can be employed for decision making at design stare.展开更多
It is a NP-hard problem to schedule a list of nonresumable jobs to the available intervals of an availability-constrained single machine to minimize the scheduling length. This paper transformed this scheduling proble...It is a NP-hard problem to schedule a list of nonresumable jobs to the available intervals of an availability-constrained single machine to minimize the scheduling length. This paper transformed this scheduling problem into a variant of the variable-sized bin packing problem, put forward eight bin packing algorithms adapted from the classic one-dimensional bin packing problem and investigated their performances from both of the worst-case and the average-case scenarios. Analytical results show that the worst-case performance ratios of the algorithms are not less than 2. Experimental results for average cases show that the Best Fit and the Best Fit Decreasing algorithm outperform any others for independent and precedence-constrained jobs respectively.展开更多
To realize real-time monitoring and short-term forecasting and forewarning of coalmine ventilation systems(CVS), in this paper, we first established a joint surface and underground CVS safety management system consist...To realize real-time monitoring and short-term forecasting and forewarning of coalmine ventilation systems(CVS), in this paper, we first established a joint surface and underground CVS safety management system consisting of main ventilation fan, safety-partition linked passageways, and air-required locations. We then applied chaos theory to identify the air quantity and gas concentration of underground partition boundaries, and adopted a fixed data quantity, multi-step progressive, weighted first-order local-domain method to setup a chaos prediction model and a CVS safety forecasting and forewarning system formed by the normal change level, orange forewarning level, and red alarm level. We next conduct the on-field application of the system in a coalmine in Jining, Shandong, China. The results showed that (1) in the statistical scale of 5 min, the changes in both air quantity and gas concentration along CVS partition airflow boundaries were characteristic of chaos and could be used for short-term chaos prediction, and the latter was more chaotic than the former;(2) the setup chaos prediction model had a higher prediction precision and the established safety prediction system could not only predict the variation in CVS stability but also reflect the rationality of underground mining intensity. Thus, this CVS safety forecasting and forewarning system is of better application value.展开更多
The safety most important factor profile is one of the the plasma discharge. For limiter configuration, people usually use the following cylindrical approximation formula to calculate it q(r)=5r^2BT/RIp where r is t...The safety most important factor profile is one of the the plasma discharge. For limiter configuration, people usually use the following cylindrical approximation formula to calculate it q(r)=5r^2BT/RIp where r is the minor radius of the plasma toms, R is the major radius (in m) , BT is the toroidal magnetic field (in T), Ip is the total toroidal current(in MA).展开更多
The deposition onto an ordered mesoporous carbon(OMC)support of well dispersed PtM(M = Ru,Fe,Mo)alloy nanoparticles(NPs)were synthesized by a direct replication method using SBA-15 as the hard template,furfuryl ...The deposition onto an ordered mesoporous carbon(OMC)support of well dispersed PtM(M = Ru,Fe,Mo)alloy nanoparticles(NPs)were synthesized by a direct replication method using SBA-15 as the hard template,furfuryl alcohol and trimethylbeneze as the primary carbon sources,and metal acetylacetonate as the alloying metal precursor and secondary carbon source.The physicochemical properties of the PtM-OMC catalysts were characterized by N2 adsorption-desorption,X-ray diffraction,transmission electron microscopy,X-ray absorption near edge structure,and extended X-ray absorption fine structure.The alloy PtM NPs have an average size of 2-3 nm and were well dispersed in the pore channels of the OMC support.The second metal(M)in the PtM NPs was mostly in the reduced state,and formed a typical core(Pt)-shell(M)structure.Cyclic voltammetry measurements showed that these PtM-OMC electrodes had excellent electrocatalytic activities and tolerance to CO poisoning during the methanol oxidation reaction,which surpassed those of typical activated carbon-supported PtRu catalysts.In particular,the PtFe-OMC catalyst,which exhibited the best performance,can be a practical anodic electrocatalyst in direct methanol fuel cells due to its superior stability,excellent CO tolerance,and low production cost.展开更多
The authors examine the relation between the perturbed Cauchy singular integral with its kernel density belong to H* and unperturbed one and show that the Cauchy singular integral is stable under perturbation of the ...The authors examine the relation between the perturbed Cauchy singular integral with its kernel density belong to H* and unperturbed one and show that the Cauchy singular integral is stable under perturbation of the curve of integration.展开更多
In this paper, we developed a new parametrization method to calculate the localization length in one-dimensionalAnderson model with diagonal disorder.This method can avoid the divergence difficulty encountered in thec...In this paper, we developed a new parametrization method to calculate the localization length in one-dimensionalAnderson model with diagonal disorder.This method can avoid the divergence difficulty encountered in theconventional methods, and significantly save computing time as well.展开更多
文摘This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.
文摘Summarized the four main sources of CO gas on the working face based on investigation and local observation: firstly,it analyzed the mechanism that CO gas was produced by spontaneous combustion and oxygenation of gob residual coal;next,it illus- trated the theory that special coal seam deposits natural CO gas,and provided correlative experiment data;and then,it illustrated the reason of the CO gas in working face in- creased relatively in the course of coal cutter's shearing,according to the translation be- tween mechanism energy and inner energy and the rupture of carbon molecule side chain during coal exploitation;lastly,illustrated the reason of CO gas appearance and the rela- tively release quantity during coal mine blasting underground.We find out the source of CO gas on the working face accurately,and provide advantages for appropriate prevention and practical management measures.
文摘5-aminosalicylate(5-ASA)agents remain the mainstay treatment in ulcerative colitis(UC).A number of oral 5-ASA agents are commercially available,including azobond pro-drugs,as well as delayed-and controlledrelease forms of mesalazine.However,poor adherence due to frequent daily dosing and a large number of tablets has been shown to be an important barrier to successful management of patients with UC.Recently, new,once-daily formulations of mesalazine,including the unique multi-matrix delivery system and mesalazine granules,were proven to be efficacious in inducing and maintaining remission in mild-to-moderate UC,with a good safety profile comparable to that of other oral mesalazine formulations.In addition,they offer the advantage of a low pill burden and might contribute to increased long-term compliance and treatment success in clinical practice.This editorial summarizes the available literature on the short-and medium-term efficacy and safety of the new once-daily mesalazine formulations.
基金This work was supported by National"863"High Technology Research and Development Programof China under grant 2002AA145090
文摘Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it has some weaknesses. In this paper, a new enhanced simple authenticated key agreement algorithm is proposed to overcome these weaknesses on the basis of analyzing the weaknesses of the related protocols. The new enhanced simple authenticated key agreement algorithm can get over replay attack and password guessing attack, provide perfect forward secrecy, and hold the merits of the simple authenticated key agreement algorithm.
文摘Formally, national sovereignty can be identified as hard and soft;social-structurally,it consists of politi- cal sovereignty, economic sovereignty and cultural sovereignty. With the globalization of world economy,na- tional sovereignty is changing.Our country is now confronted by three major challenges: the independence of economic sovereignty,the integrity of political sovereignty and the equality of cultural sovereignty. This research probes how to maximize national benefits under globalization.
基金Supported by the High Technology Research and Development Programme of China (No. 2007AA01Z473)
文摘Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.
基金the financial support received by the University of Strathclyde in the form of a postgraduate research scholarship for the duration of the second author’s P hD studies
文摘In the past fifteen years, the attention of ship safety treatment as an objective rather than a constraint has started to sweep through the whole maritime industry. The risk-based ship design (RBD) methodology, advocating systematic integration of risk assessment within the conventional design process has started to takeoff. Despite this wide recognition and increasing popularity, important factors that could potentially undermine the quality of the results come from both quantitative and qualitative aspects during the risk assessment process. This paper details a promising solution by developing a formalized methodology for risk assessment through effective storing and processing of historical data combined with data generated through first-principle approaches. This method should help to generate appropriate risk models in the selected platform (Bayesian networks) which can be employed for decision making at design stare.
文摘It is a NP-hard problem to schedule a list of nonresumable jobs to the available intervals of an availability-constrained single machine to minimize the scheduling length. This paper transformed this scheduling problem into a variant of the variable-sized bin packing problem, put forward eight bin packing algorithms adapted from the classic one-dimensional bin packing problem and investigated their performances from both of the worst-case and the average-case scenarios. Analytical results show that the worst-case performance ratios of the algorithms are not less than 2. Experimental results for average cases show that the Best Fit and the Best Fit Decreasing algorithm outperform any others for independent and precedence-constrained jobs respectively.
基金supported by the National Natural Science Foundation of China(Nos.51304128 and 51674158)the Natural Science Foundation of Shandong Province(No.ZR2013EEQ015)
文摘To realize real-time monitoring and short-term forecasting and forewarning of coalmine ventilation systems(CVS), in this paper, we first established a joint surface and underground CVS safety management system consisting of main ventilation fan, safety-partition linked passageways, and air-required locations. We then applied chaos theory to identify the air quantity and gas concentration of underground partition boundaries, and adopted a fixed data quantity, multi-step progressive, weighted first-order local-domain method to setup a chaos prediction model and a CVS safety forecasting and forewarning system formed by the normal change level, orange forewarning level, and red alarm level. We next conduct the on-field application of the system in a coalmine in Jining, Shandong, China. The results showed that (1) in the statistical scale of 5 min, the changes in both air quantity and gas concentration along CVS partition airflow boundaries were characteristic of chaos and could be used for short-term chaos prediction, and the latter was more chaotic than the former;(2) the setup chaos prediction model had a higher prediction precision and the established safety prediction system could not only predict the variation in CVS stability but also reflect the rationality of underground mining intensity. Thus, this CVS safety forecasting and forewarning system is of better application value.
文摘The safety most important factor profile is one of the the plasma discharge. For limiter configuration, people usually use the following cylindrical approximation formula to calculate it q(r)=5r^2BT/RIp where r is the minor radius of the plasma toms, R is the major radius (in m) , BT is the toroidal magnetic field (in T), Ip is the total toroidal current(in MA).
基金supported by the Ministry of Science and Technology(NSC98-2113-M001-017-MY3,NSC101-2113-M001-020-MY3),Taiwan,China~~
文摘The deposition onto an ordered mesoporous carbon(OMC)support of well dispersed PtM(M = Ru,Fe,Mo)alloy nanoparticles(NPs)were synthesized by a direct replication method using SBA-15 as the hard template,furfuryl alcohol and trimethylbeneze as the primary carbon sources,and metal acetylacetonate as the alloying metal precursor and secondary carbon source.The physicochemical properties of the PtM-OMC catalysts were characterized by N2 adsorption-desorption,X-ray diffraction,transmission electron microscopy,X-ray absorption near edge structure,and extended X-ray absorption fine structure.The alloy PtM NPs have an average size of 2-3 nm and were well dispersed in the pore channels of the OMC support.The second metal(M)in the PtM NPs was mostly in the reduced state,and formed a typical core(Pt)-shell(M)structure.Cyclic voltammetry measurements showed that these PtM-OMC electrodes had excellent electrocatalytic activities and tolerance to CO poisoning during the methanol oxidation reaction,which surpassed those of typical activated carbon-supported PtRu catalysts.In particular,the PtFe-OMC catalyst,which exhibited the best performance,can be a practical anodic electrocatalyst in direct methanol fuel cells due to its superior stability,excellent CO tolerance,and low production cost.
基金Supported by the Natural Science Foundation of Fujian Province(2008J0187)
文摘The authors examine the relation between the perturbed Cauchy singular integral with its kernel density belong to H* and unperturbed one and show that the Cauchy singular integral is stable under perturbation of the curve of integration.
基金Supported by National Natural Science Foundation of China under Grant No.10374093the National Program for Basic Research of MOST of Chinathe Knowledge Innovation Project of Chinese Academy of Sciences
文摘In this paper, we developed a new parametrization method to calculate the localization length in one-dimensionalAnderson model with diagonal disorder.This method can avoid the divergence difficulty encountered in theconventional methods, and significantly save computing time as well.