Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in th...Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in this paper.Through selecting 257 accident investigation reports,45 causative factors and nine accident types are obtained by the three-level coding process of the grounded theory,and the interaction of these factors is analyzed based on the“2-4”model.Accordingly,the aviation accident causation network is constructed based on complex network theory which has scale-free characteristics and small-world properties,the characteristics of causative factors are analyzed by the topology of the network,and the key causative factors of the accidents are identified by the technique for order of preference by similarity to ideal solution(TOPSIS)method.The comparison results show that the method proposed in this paper has the advantages of independent of expert experience,quantitative analysis of accident causative factors and statistical analysis of a lot of accident data,and it has better applicability and advancement.展开更多
This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ...This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.展开更多
The benzoin group caged compound has received strong interests due to its excellent photo- deprotection properties and wide use in chemical and biological studies. We used timeresolved infrared spectroscopy to investi...The benzoin group caged compound has received strong interests due to its excellent photo- deprotection properties and wide use in chemical and biological studies. We used timeresolved infrared spectroscopy to investigate the photochemical reaction of the benzoin caged compound, o-(2-methylbenzoyl)-DL-benzoin under 266 nm laser irradiation. Taking advantage of the specific vibrational marker bands and the IR discerning capability, we have detected and identified the uncaging product 2-methylbenzoic acid, and two intermediate radicals of benzoyl and 2-methylbenzoate benzyl in the transient infrared spectra. Our results provide spectral evidence to support the homolytic cleavage reaction of C-C=O bond in competition with the deprotection reaction. Moreover, the product yields of 2-methylbenzoic acid and benzoyl radical were observed to be affected by solvents and a largely water contalning solvent can be in favor of the deprotection reaction.展开更多
Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it ha...Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it has some weaknesses. In this paper, a new enhanced simple authenticated key agreement algorithm is proposed to overcome these weaknesses on the basis of analyzing the weaknesses of the related protocols. The new enhanced simple authenticated key agreement algorithm can get over replay attack and password guessing attack, provide perfect forward secrecy, and hold the merits of the simple authenticated key agreement algorithm.展开更多
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers...Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.展开更多
Objective: To investigate the knowledge level related to compliance in patients with epilepsy. Methods: Eighty-seven patients with epilepsy were tested in the city of Xi’an with a knowledge questionnaire containing 2...Objective: To investigate the knowledge level related to compliance in patients with epilepsy. Methods: Eighty-seven patients with epilepsy were tested in the city of Xi’an with a knowledge questionnaire containing 21 questions related to compliance. Results: Over 39.5% of patients did not know that epilepsy is the result of abnormal firing of neurons, while 29.9% were uncertain or did not realize that epilepsy attacks can bring up accidents such as traffic accidents, drowning and trauma. A total of 36.6% of responders thought that the best therapy for epilepsy could be found in Traditional Chinese Medicine. As many as 36.8% of tested patients were uncertain or did not know that frequent epilepsy attacks can affect their intelligence. Up to 36% were unaware of the possible consequence of sudden withdrawal of anti-epileptic drugs (AED). Among responders, 39.1% did not know the right treatment method of epilepsy. That AED can control seizure attacks were doubted in 57.5% of epileptic patients. Furthermore, 32.2% did not know whether the disease could be cured. Conclusion: In this group of epileptic patients, generally they do not have enough indispensable knowledge to cope with epilepsy. They urgently need for proper health education besides effective AED to control seizure attacks and improve their quality of life.展开更多
基金supported by the Civil Aviation Joint Fund of National Natural Science Foundation of China(No.U1533112)。
文摘Accident causation analysis is of great importance for accident prevention.In order to improve the aviation safety,a new analysis method of aviation accident causation based on complex network theory is proposed in this paper.Through selecting 257 accident investigation reports,45 causative factors and nine accident types are obtained by the three-level coding process of the grounded theory,and the interaction of these factors is analyzed based on the“2-4”model.Accordingly,the aviation accident causation network is constructed based on complex network theory which has scale-free characteristics and small-world properties,the characteristics of causative factors are analyzed by the topology of the network,and the key causative factors of the accidents are identified by the technique for order of preference by similarity to ideal solution(TOPSIS)method.The comparison results show that the method proposed in this paper has the advantages of independent of expert experience,quantitative analysis of accident causative factors and statistical analysis of a lot of accident data,and it has better applicability and advancement.
文摘This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.
基金This work was supported by the National Natural Science Foundation of China (No.21333012 and No.21425313) and the National Basic Research Program of China (No.2013CB834602).
文摘The benzoin group caged compound has received strong interests due to its excellent photo- deprotection properties and wide use in chemical and biological studies. We used timeresolved infrared spectroscopy to investigate the photochemical reaction of the benzoin caged compound, o-(2-methylbenzoyl)-DL-benzoin under 266 nm laser irradiation. Taking advantage of the specific vibrational marker bands and the IR discerning capability, we have detected and identified the uncaging product 2-methylbenzoic acid, and two intermediate radicals of benzoyl and 2-methylbenzoate benzyl in the transient infrared spectra. Our results provide spectral evidence to support the homolytic cleavage reaction of C-C=O bond in competition with the deprotection reaction. Moreover, the product yields of 2-methylbenzoic acid and benzoyl radical were observed to be affected by solvents and a largely water contalning solvent can be in favor of the deprotection reaction.
基金This work was supported by National"863"High Technology Research and Development Programof China under grant 2002AA145090
文摘Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it has some weaknesses. In this paper, a new enhanced simple authenticated key agreement algorithm is proposed to overcome these weaknesses on the basis of analyzing the weaknesses of the related protocols. The new enhanced simple authenticated key agreement algorithm can get over replay attack and password guessing attack, provide perfect forward secrecy, and hold the merits of the simple authenticated key agreement algorithm.
基金Supported by the High Technology Research and Development Programme of China (No. 2007AA01Z473)
文摘Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment.
文摘Objective: To investigate the knowledge level related to compliance in patients with epilepsy. Methods: Eighty-seven patients with epilepsy were tested in the city of Xi’an with a knowledge questionnaire containing 21 questions related to compliance. Results: Over 39.5% of patients did not know that epilepsy is the result of abnormal firing of neurons, while 29.9% were uncertain or did not realize that epilepsy attacks can bring up accidents such as traffic accidents, drowning and trauma. A total of 36.6% of responders thought that the best therapy for epilepsy could be found in Traditional Chinese Medicine. As many as 36.8% of tested patients were uncertain or did not know that frequent epilepsy attacks can affect their intelligence. Up to 36% were unaware of the possible consequence of sudden withdrawal of anti-epileptic drugs (AED). Among responders, 39.1% did not know the right treatment method of epilepsy. That AED can control seizure attacks were doubted in 57.5% of epileptic patients. Furthermore, 32.2% did not know whether the disease could be cured. Conclusion: In this group of epileptic patients, generally they do not have enough indispensable knowledge to cope with epilepsy. They urgently need for proper health education besides effective AED to control seizure attacks and improve their quality of life.