Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m...Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.展开更多
Topographic shielding of cosmic radiation flux is a key parameter in using cosmogenic nuclides to determine surface exposure ages or erosion rates. Traditionally, this parameter is measured in the field and uncertaint...Topographic shielding of cosmic radiation flux is a key parameter in using cosmogenic nuclides to determine surface exposure ages or erosion rates. Traditionally, this parameter is measured in the field and uncertainty and/or inconsistency may exist among different investigators. This paper provides an ArcGIS python code to determine topographic shielding factors using digital elevation models (DEMs). This code can be imported into ArcGIS as a geoprocessing tool with a user-friendly graphical interface. The DEM-derived parameters using this method were validated with field measurements in central Tian Shan. Results indicate that DEM-derived shielding factors are consistent with field-measured values. It provides a valuable tool to save fieldwork efforts and has the potential to provide consistent results for different regions in the world to facilitate the comparison of cosmogenie nuclide results.展开更多
We have given a semantic extension of lattice-valued propositional logic LP(X) in [6]. In this paper, we investigate its corresponding syntactic extension of LP(X) and give the relations between these two extensions.
The flow past a primary cylinder with one tandem control rod and one staggered control rod is simulated in this paper through solving the Navier-Stokes equations. Two examples are simulated to validate the model, and ...The flow past a primary cylinder with one tandem control rod and one staggered control rod is simulated in this paper through solving the Navier-Stokes equations. Two examples are simulated to validate the model, and the results matched well with those of previous researches. The Reynolds number based on the diameter of the primary cylinder is 500. The diameter ratio between the control rod and the primary cylinder (d/D) is 0.25. It was found that the effect of the combination of one upstream tandem control rod and one staggered control rod on the hydrodynamics of the primary cylinder is a linear superposition of the effect of a corresponding single control rod, and the effect of the upstream tandem control rod is dominant at larger spacing ratios such as G/D=2. For the combination of a downstream tandem control rod and a staggered control rod, the effect of the control rods is different from that of the corresponding single control rod in the region of 0.2〈G/D〈0.5 & 30°〈a〈120° and 0.9〈G/D〈1.4 & 30°〈a〈50°, where the additional effect is obvious. In this case, the effect of the downstream tandem control rod is dominant at small spacing ratios (such as G/D=0.1). At moderate spacing ratios such as G/D=0.4, the effects of the tandem control rod and the staggered control rod are comparable in both cases.展开更多
Glial cells in the gut represent the morphological and functional equivalent of astrocytes and microglia in the central nervous system (CNS). In recent years, the role of enteric glial cells (EGCs) has extended fr...Glial cells in the gut represent the morphological and functional equivalent of astrocytes and microglia in the central nervous system (CNS). In recent years, the role of enteric glial cells (EGCs) has extended from that of simple nutritive support for enteric neurons to that of being pivotal participants in the regulation of inflammatory events in the gut. Similar to the CNS astrocytes, the EGCs physiologically express the SIOOB protein that exerts either trophic or toxic effects depending on its concentration in the extracellular milieu. In the CNS, SIOOB overexpression is responsible for the initiation of a gliotic reaction by the release of pro-inflammatory mediators, which may have a deleterious effect on neighboring cells. SlOOB-mediated pro-inflammatory effects are not limited to the brain: SIOOB overexpression is associated with the onset and maintenance of inflammation in the human gut too. In this review we describe the major features of EGCs and SIOOB protein occurring in intestinal inflammation deriving from such.展开更多
SINR distribution and rate overage distribution are crucial for optimization of deployment of Ultra-dense Het Nets.Most existing literatures assume that BSs have full queues and full-buffer traffic.In fact,due to ultr...SINR distribution and rate overage distribution are crucial for optimization of deployment of Ultra-dense Het Nets.Most existing literatures assume that BSs have full queues and full-buffer traffic.In fact,due to ultra-dense deployment of small cells,traffic in small cell varies dramatically in time and space domains.Hence,it is more practical to investigate scenario with burst traffic.In this paper,we consider a two-tier non-uniform ultra-dense Het Net with burst traffic,where macro BSs are located according to Poisson Point Process(PPP),and pico BSs are located according to Poisson Hole Process(PHP).The closed-form expressions of SINR distribution and rate distribution are derived,and then validated through simulation.Our study shows that different from the result of full buffer case,the SINR distribution and rate distribution of users depend on the average transmission probabilities of BSs in burst traffic case.展开更多
As the most primitive and the highest-level media in ancient Chinese society, Gaomei God played a pivotal role in the social life of the Han Dynasty. The stone relief is a vivid portrayal of the Han Dynasty society, a...As the most primitive and the highest-level media in ancient Chinese society, Gaomei God played a pivotal role in the social life of the Han Dynasty. The stone relief is a vivid portrayal of the Han Dynasty society, and we can use the format routine method to fred out the image of Gaomei God in it. Starting from the Gaomei portrait, a research on typology is carried out before the portrait is divided into three types on the basis of its development and evolution, which is followed by a comprehensive analysis of its time, distribution area, configuration combination, carving techniques, image composition, development in a way to sum up the law of Gaomei portrait.展开更多
With diminishing population divident, rising labor costs' will become a medium- to long-term trend and this change will significantly affect price formation and the direction of development in China. This paper uses ...With diminishing population divident, rising labor costs' will become a medium- to long-term trend and this change will significantly affect price formation and the direction of development in China. This paper uses a New Keynesian Phillips Curve (NKPC) model to conduct empirical analysis on all possible drivers of inflation in China. The authors conclude that while monetary expansion and expectation on inflation both have significant, driving impacts on China's inflation, rising labor costs have also become an important driver of China's rising prices. They argue that the solution to China's inflation problem lies not in currency policy and currency controls alone; it must be complemented by other policies that address the root causes of inflation.展开更多
The effect of uncertainty about stochastic diffusion model on dynamic portfolio choice of an investor who maximizes utility of terminal portfolio wealth was studied.It applied stochastic control method to obtain the c...The effect of uncertainty about stochastic diffusion model on dynamic portfolio choice of an investor who maximizes utility of terminal portfolio wealth was studied.It applied stochastic control method to obtain the closed-form solution of optimal dynamic portfolio,and used the Bayesian rule to estimate the model parameters to do an empirical study on two different samples of Shanghai Exchange Composite Index.Results show,model uncertainty results in positive or negative hedging demand of portfolio,which depends on investor's attitude toward risk;the effect of model uncertainty is more significant with the increasing of investment horizon,the decreasing of investor's risk-aversion degree,and the decreasing of information;predictability of risky asset return increases its allocation in portfolio,at the same time,the effect of model uncertainty also strengthens.展开更多
In deformation quantization, static Wigner functions obey functional ,-genvalue equation, which is equivalent to time-independent Schrodinger equation in Hilbert space operator formalism of quantum mechanics. This equ...In deformation quantization, static Wigner functions obey functional ,-genvalue equation, which is equivalent to time-independent Schrodinger equation in Hilbert space operator formalism of quantum mechanics. This equivalence is proved mostly for Hamiltonian with form H^ = (1/2)p^2 + V(x^) [D. Fairlie, Proc. Camb. Phil. Soc. 60 (1964) 581]. In this note we generalize this proof to a very general Hamiltonian H^(x^,p^) and give examples to support it.展开更多
Often conceived as metaphysical approach, in the XX Century, philosophy is object of a crusade antimetaphysical in the movement of Logical Positivism. I will try to demonstrate that a philosophical perspective is conc...Often conceived as metaphysical approach, in the XX Century, philosophy is object of a crusade antimetaphysical in the movement of Logical Positivism. I will try to demonstrate that a philosophical perspective is conceivable even in the scientific conception of the world elaborated by the neopositivists. I discuss this point of view with attention to the turn represented by pragmatic philosophy of Neurath, which represents a crucial passage for the future of philosophy. In this vision, the science is not conceivable without philosophy, namely without an open and pluralist scientific philosophy. The philosophy--so--is not insufficient too for the perspective of scientific conception of the world.展开更多
Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which d...Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography.展开更多
The bar code is one of the identification technologies used more successfully in the world. This technology was first developed as the second half of the twentieth century and quickly achieved acceptance in both indus...The bar code is one of the identification technologies used more successfully in the world. This technology was first developed as the second half of the twentieth century and quickly achieved acceptance in both industry and commerce. In this paper studies are discussed on the design, development and printing of one-dimensional barcodes of the symbologies Code 39 and Interleaved 2 of 5. There are also discussed techniques for recovering the information encoded in the bar code, which can be extended to other symbologies. The purpose of the paper is the development of an open solution with the objective to make the decoding of barcodes using computer vision techniques possible, which will be divided into four basic stages: acquisition, pre-processing, processing and presentation of results. Practical tests conducted with samples show satisfactory results, validating the operating principles of the elements involved. The proposed objective was achieved and practical tests validated the operating principles of the elements addressed by providing contribution to that segment decoding barcodes.展开更多
Terrain referenced navigation estimates an aircraft navigation status by utilizing a radar altimeter measuring a distance between the aircraft and terrain elevation. Accurate digital elevation map is essential to esti...Terrain referenced navigation estimates an aircraft navigation status by utilizing a radar altimeter measuring a distance between the aircraft and terrain elevation. Accurate digital elevation map is essential to estimate the aircraft states correctly. However, the elevation map cannot represent the real terrain perfectly and there exists map error between the estimated and the true maps. In this paper, an influence of the map error on measurement equation is analyzed and a technique to incorporate the error in the filter is proposed. The map error is divided into two sources, accuracy error and resolution error. The effectiveness of the suggested technique is verified by simulation results. The method modifies a sensor noise covariance only so there is no additional computational burden from the conventional filter.展开更多
This paper is based on the interviews that the author carried out between 2005 and 2006 on the Nholowemwizana custom in Plumtree, Zimbabwe. Here the author deploys the concept of cultural violence following the peace ...This paper is based on the interviews that the author carried out between 2005 and 2006 on the Nholowemwizana custom in Plumtree, Zimbabwe. Here the author deploys the concept of cultural violence following the peace researcher Johan Galtung, who suggested speaking of cultural violence as aspects of culture that can be used to justify or legitimize direct or structural violence, and may be exemplified by religion and ideology, language and art, empirical science and formal science (Galtung, 1969, pp. 167-191). Using the example of the Nholowemwizana custom among the Kalanga people, the paper will highlight the extent to which women in this society have been exposed to cultural, gender based violence and direct sexual violence. However literature on Nholowemwizana is scarce in Zimbabwe. As such the paper will borrow from literature on cultural violence in general. The paper also acknowledges the fact that not all culture is violent, and that in some certain aspects of culture that permit gender based violence especially in African societies. The starting point for this paper is the question of what role cultural arguments have played in the abuse of women through the Nholowemwizana custom.展开更多
Nowadays, the image construction of Hainan International Tourism Islands has been vigorously promoted. The research is going to make an empirical analysis of Hainan tourism image, adopting IPA analysis method. General...Nowadays, the image construction of Hainan International Tourism Islands has been vigorously promoted. The research is going to make an empirical analysis of Hainan tourism image, adopting IPA analysis method. Generally speaking, there is a big gap between the Hainan tourist destination and tourists' expectations. The Hainan Tourist Destination image is mainly built on natural-advantage-resource projects such as natural sceneries, air quality, and climate, etc., meanwhile, the relatively insufficient constructions of soft-wares such as tourism-related facilities, as well as the quality of tourism services, etc., are the focus of future efforts.展开更多
The application of advanced high strength steel (AHSS) has an important significance in the development of the lightweight of automobile, but the parts made of AHSS usually have defects, such as fracture and large a...The application of advanced high strength steel (AHSS) has an important significance in the development of the lightweight of automobile, but the parts made of AHSS usually have defects, such as fracture and large amount of springback, etc. In this paper, a model of multi-pass roll form- ing and springback process of AHSS is established with finite element software ABAQUS. Then a roll forming experiment is performed, and simulation and experimental results have been compared and analyzed. The model is established under complex contact conditions, including self-contact condi- tion. The results shows that during the process of sheet bending, large Mises stresses appear at ben- ding corners. The smaller the bending radius is, the larger the Mises stress and strain are. Thick- ness of sheet metal changes exceeds a certain limit, the differently if the bending radius is different. When the bending radius change tendency of the sheet thickness turns from increase to decrease.展开更多
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.
基金supported by the Professional Development Award of the University of Tennessee
文摘Topographic shielding of cosmic radiation flux is a key parameter in using cosmogenic nuclides to determine surface exposure ages or erosion rates. Traditionally, this parameter is measured in the field and uncertainty and/or inconsistency may exist among different investigators. This paper provides an ArcGIS python code to determine topographic shielding factors using digital elevation models (DEMs). This code can be imported into ArcGIS as a geoprocessing tool with a user-friendly graphical interface. The DEM-derived parameters using this method were validated with field measurements in central Tian Shan. Results indicate that DEM-derived shielding factors are consistent with field-measured values. It provides a valuable tool to save fieldwork efforts and has the potential to provide consistent results for different regions in the world to facilitate the comparison of cosmogenie nuclide results.
基金Supported by the National Natural Science Foundation of China(60474022)
文摘We have given a semantic extension of lattice-valued propositional logic LP(X) in [6]. In this paper, we investigate its corresponding syntactic extension of LP(X) and give the relations between these two extensions.
基金the support from the National Natural Science Foundation of China(Nos.11372188,and 51490674)the National Basic Research Program of China(973 Program)(No.2015CB251203)
文摘The flow past a primary cylinder with one tandem control rod and one staggered control rod is simulated in this paper through solving the Navier-Stokes equations. Two examples are simulated to validate the model, and the results matched well with those of previous researches. The Reynolds number based on the diameter of the primary cylinder is 500. The diameter ratio between the control rod and the primary cylinder (d/D) is 0.25. It was found that the effect of the combination of one upstream tandem control rod and one staggered control rod on the hydrodynamics of the primary cylinder is a linear superposition of the effect of a corresponding single control rod, and the effect of the upstream tandem control rod is dominant at larger spacing ratios such as G/D=2. For the combination of a downstream tandem control rod and a staggered control rod, the effect of the control rods is different from that of the corresponding single control rod in the region of 0.2〈G/D〈0.5 & 30°〈a〈120° and 0.9〈G/D〈1.4 & 30°〈a〈50°, where the additional effect is obvious. In this case, the effect of the downstream tandem control rod is dominant at small spacing ratios (such as G/D=0.1). At moderate spacing ratios such as G/D=0.4, the effects of the tandem control rod and the staggered control rod are comparable in both cases.
基金Supported by research funds from the Italian Ministry of University and Research (COFIN Projects No. 2004062155 to GS and RC)
文摘Glial cells in the gut represent the morphological and functional equivalent of astrocytes and microglia in the central nervous system (CNS). In recent years, the role of enteric glial cells (EGCs) has extended from that of simple nutritive support for enteric neurons to that of being pivotal participants in the regulation of inflammatory events in the gut. Similar to the CNS astrocytes, the EGCs physiologically express the SIOOB protein that exerts either trophic or toxic effects depending on its concentration in the extracellular milieu. In the CNS, SIOOB overexpression is responsible for the initiation of a gliotic reaction by the release of pro-inflammatory mediators, which may have a deleterious effect on neighboring cells. SlOOB-mediated pro-inflammatory effects are not limited to the brain: SIOOB overexpression is associated with the onset and maintenance of inflammation in the human gut too. In this review we describe the major features of EGCs and SIOOB protein occurring in intestinal inflammation deriving from such.
基金partially supported by National 863 Program(2014AA01A702)National Basic Research Program of China(973 Program 2012CB316004)National Natural Science Foundation(61271205,61221002 and 61201170)
文摘SINR distribution and rate overage distribution are crucial for optimization of deployment of Ultra-dense Het Nets.Most existing literatures assume that BSs have full queues and full-buffer traffic.In fact,due to ultra-dense deployment of small cells,traffic in small cell varies dramatically in time and space domains.Hence,it is more practical to investigate scenario with burst traffic.In this paper,we consider a two-tier non-uniform ultra-dense Het Net with burst traffic,where macro BSs are located according to Poisson Point Process(PPP),and pico BSs are located according to Poisson Hole Process(PHP).The closed-form expressions of SINR distribution and rate distribution are derived,and then validated through simulation.Our study shows that different from the result of full buffer case,the SINR distribution and rate distribution of users depend on the average transmission probabilities of BSs in burst traffic case.
文摘As the most primitive and the highest-level media in ancient Chinese society, Gaomei God played a pivotal role in the social life of the Han Dynasty. The stone relief is a vivid portrayal of the Han Dynasty society, and we can use the format routine method to fred out the image of Gaomei God in it. Starting from the Gaomei portrait, a research on typology is carried out before the portrait is divided into three types on the basis of its development and evolution, which is followed by a comprehensive analysis of its time, distribution area, configuration combination, carving techniques, image composition, development in a way to sum up the law of Gaomei portrait.
基金This paper was made possible by grants from the National Social Science Foundation, the Ministry of Education, the 985 Project, and the School of Humanities and Social Sciences at Nanjing University.
文摘With diminishing population divident, rising labor costs' will become a medium- to long-term trend and this change will significantly affect price formation and the direction of development in China. This paper uses a New Keynesian Phillips Curve (NKPC) model to conduct empirical analysis on all possible drivers of inflation in China. The authors conclude that while monetary expansion and expectation on inflation both have significant, driving impacts on China's inflation, rising labor costs have also become an important driver of China's rising prices. They argue that the solution to China's inflation problem lies not in currency policy and currency controls alone; it must be complemented by other policies that address the root causes of inflation.
基金Key program of Natural Science Research of High Education of Anhui Province of China(No.KJ2009A157)
文摘The effect of uncertainty about stochastic diffusion model on dynamic portfolio choice of an investor who maximizes utility of terminal portfolio wealth was studied.It applied stochastic control method to obtain the closed-form solution of optimal dynamic portfolio,and used the Bayesian rule to estimate the model parameters to do an empirical study on two different samples of Shanghai Exchange Composite Index.Results show,model uncertainty results in positive or negative hedging demand of portfolio,which depends on investor's attitude toward risk;the effect of model uncertainty is more significant with the increasing of investment horizon,the decreasing of investor's risk-aversion degree,and the decreasing of information;predictability of risky asset return increases its allocation in portfolio,at the same time,the effect of model uncertainty also strengthens.
基金supported by National Natural Science Foundation of China under Grant No.10675106
文摘In deformation quantization, static Wigner functions obey functional ,-genvalue equation, which is equivalent to time-independent Schrodinger equation in Hilbert space operator formalism of quantum mechanics. This equivalence is proved mostly for Hamiltonian with form H^ = (1/2)p^2 + V(x^) [D. Fairlie, Proc. Camb. Phil. Soc. 60 (1964) 581]. In this note we generalize this proof to a very general Hamiltonian H^(x^,p^) and give examples to support it.
文摘Often conceived as metaphysical approach, in the XX Century, philosophy is object of a crusade antimetaphysical in the movement of Logical Positivism. I will try to demonstrate that a philosophical perspective is conceivable even in the scientific conception of the world elaborated by the neopositivists. I discuss this point of view with attention to the turn represented by pragmatic philosophy of Neurath, which represents a crucial passage for the future of philosophy. In this vision, the science is not conceivable without philosophy, namely without an open and pluralist scientific philosophy. The philosophy--so--is not insufficient too for the perspective of scientific conception of the world.
基金supported by the National Natural Science Foundation of China under Grants No.61003262,No.60873237,No.61100205,No.60873001the Fundamental Research Funds for the Central Universities under Grant No.2009RC0212
文摘Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography.
文摘The bar code is one of the identification technologies used more successfully in the world. This technology was first developed as the second half of the twentieth century and quickly achieved acceptance in both industry and commerce. In this paper studies are discussed on the design, development and printing of one-dimensional barcodes of the symbologies Code 39 and Interleaved 2 of 5. There are also discussed techniques for recovering the information encoded in the bar code, which can be extended to other symbologies. The purpose of the paper is the development of an open solution with the objective to make the decoding of barcodes using computer vision techniques possible, which will be divided into four basic stages: acquisition, pre-processing, processing and presentation of results. Practical tests conducted with samples show satisfactory results, validating the operating principles of the elements involved. The proposed objective was achieved and practical tests validated the operating principles of the elements addressed by providing contribution to that segment decoding barcodes.
文摘Terrain referenced navigation estimates an aircraft navigation status by utilizing a radar altimeter measuring a distance between the aircraft and terrain elevation. Accurate digital elevation map is essential to estimate the aircraft states correctly. However, the elevation map cannot represent the real terrain perfectly and there exists map error between the estimated and the true maps. In this paper, an influence of the map error on measurement equation is analyzed and a technique to incorporate the error in the filter is proposed. The map error is divided into two sources, accuracy error and resolution error. The effectiveness of the suggested technique is verified by simulation results. The method modifies a sensor noise covariance only so there is no additional computational burden from the conventional filter.
文摘This paper is based on the interviews that the author carried out between 2005 and 2006 on the Nholowemwizana custom in Plumtree, Zimbabwe. Here the author deploys the concept of cultural violence following the peace researcher Johan Galtung, who suggested speaking of cultural violence as aspects of culture that can be used to justify or legitimize direct or structural violence, and may be exemplified by religion and ideology, language and art, empirical science and formal science (Galtung, 1969, pp. 167-191). Using the example of the Nholowemwizana custom among the Kalanga people, the paper will highlight the extent to which women in this society have been exposed to cultural, gender based violence and direct sexual violence. However literature on Nholowemwizana is scarce in Zimbabwe. As such the paper will borrow from literature on cultural violence in general. The paper also acknowledges the fact that not all culture is violent, and that in some certain aspects of culture that permit gender based violence especially in African societies. The starting point for this paper is the question of what role cultural arguments have played in the abuse of women through the Nholowemwizana custom.
文摘Nowadays, the image construction of Hainan International Tourism Islands has been vigorously promoted. The research is going to make an empirical analysis of Hainan tourism image, adopting IPA analysis method. Generally speaking, there is a big gap between the Hainan tourist destination and tourists' expectations. The Hainan Tourist Destination image is mainly built on natural-advantage-resource projects such as natural sceneries, air quality, and climate, etc., meanwhile, the relatively insufficient constructions of soft-wares such as tourism-related facilities, as well as the quality of tourism services, etc., are the focus of future efforts.
基金Supported by the National Natural Science Foundation of China(No.51205004,51475003)Beijing Natural Science Foundation(No.3152010)Beijing Education Committee Science and Technology Program(No.KM201510009004)
文摘The application of advanced high strength steel (AHSS) has an important significance in the development of the lightweight of automobile, but the parts made of AHSS usually have defects, such as fracture and large amount of springback, etc. In this paper, a model of multi-pass roll form- ing and springback process of AHSS is established with finite element software ABAQUS. Then a roll forming experiment is performed, and simulation and experimental results have been compared and analyzed. The model is established under complex contact conditions, including self-contact condi- tion. The results shows that during the process of sheet bending, large Mises stresses appear at ben- ding corners. The smaller the bending radius is, the larger the Mises stress and strain are. Thick- ness of sheet metal changes exceeds a certain limit, the differently if the bending radius is different. When the bending radius change tendency of the sheet thickness turns from increase to decrease.