Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i...Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms.展开更多
We calculate the lowest-order quantum-interference correction to the density of states (DOS) of weakly-disordered two-dimensional (2D) tight-binding square lattices around half filling. The impurities are assumed to b...We calculate the lowest-order quantum-interference correction to the density of states (DOS) of weakly-disordered two-dimensional (2D) tight-binding square lattices around half filling. The impurities are assumed to be randomly distributed on small fractions of the sites, and have a-strong potential yielding a unitary-limit scattering. In addition to the usual diffusive modes in the retarded-advanced channel, there appear diffusive pi modes in the retarded-retarded (or advanced-advanced) channel due to the existence of particle-hole symmetry. It is found that the pi-mode diffuson gives rise to a logarithmic suppression to the DOS near the band center, which prevails over the positive correction contributed by pi-mode cooperon. As a result, the DOS is subject to a negative total correction. This result is qualitatively different from the divergent behavior of the DOS at the band center predicted previously for disordered 2D two-sublattice models with the particle-hole symmetry.展开更多
Based on optimal foraging theory,prey animals from the Shuidonggou Locality 12(SDG12) are divided into three types according to body size and defense traits:high-ranked large game,low-ranked slow small game,and low-ra...Based on optimal foraging theory,prey animals from the Shuidonggou Locality 12(SDG12) are divided into three types according to body size and defense traits:high-ranked large game,low-ranked slow small game,and low-ranked fast small game.Application of the Reciprocal of Simpson's Index to the three types of animals from SDG12 yields a relatively high level of evenness,which implies a broader meat diet of the SDG12 hominids.Compared to values of taxonomic evenness from Mediterranean sites,it is suggested that this dietary expansion probably resulted from the occurrence of the Broad Spectrum Revolution rather than from climatic changes in the Shuidonggou area.Comparative studies between the Natufian phases in Hayonim Cave and the SDG12 validate this argument.展开更多
Using degree distribution to assess network vulnerability represents a promising direction of network analysis.However,the traditional degree distribution model is inadequate for analyzing the vulnerability of spatial...Using degree distribution to assess network vulnerability represents a promising direction of network analysis.However,the traditional degree distribution model is inadequate for analyzing the vulnerability of spatial networks because it does not take into consideration the geographical aspects of spatial networks.This paper proposes a spatially weighted degree model in which both the functional class and the length of network links are considered to be important factors for determining the node degrees of spatial networks.A weight coefficient is used in this new model to account for the contribution of each factor to the node degree.The proposed model is compared with the traditional degree model and an accessibility-based vulnerability model in the vulnerabil-ity analysis of a highway network.Experiment results indicate that,although node degrees of spatial networks derived from the tra-ditional degree model follow a random distribution,node degrees determined by the spatially weighted model exhibit a scale-free distribution,which is a common characteristic of robust networks.Compared to the accessibility-based model,the proposed model has similar performance in identifying critical nodes but with higher computational efficiency and better ability to reveal the overall vulnerability of a spatial network.展开更多
In this study, comparative heat flux measurements for a sharp cone model were conducted by utilizing a high enthalpy shock tunnel JF-10 and a large-scale shock tunnel JF-12, responsible for providing nonequilibrium an...In this study, comparative heat flux measurements for a sharp cone model were conducted by utilizing a high enthalpy shock tunnel JF-10 and a large-scale shock tunnel JF-12, responsible for providing nonequilibrium and perfect gas flows, respectively. Experiments were performed at the Key Laboratory of High Temperature Gas Dynamics(LHD), Institute of Mechanics, Chinese Academy of Sciences. Corresponding numerical simulations were also conducted in effort to better understand the phenomena accompanying in these experiments. By assessing the consistency and accuracy of all the data gathered during this study, a detailed comparison of sharp cone heat transfer under a totally different kind of freestream conditions was build and analyzed. One specific parameter, defined as the product of the Stanton number and the square root of the Reynold number, was found to be more characteristic for the aerodynamic heating phenomena encountered in hypersonic flight. Adequate use of said parameter practically eliminates the variability caused by the deferent flow conditions, regardless of whether the flow is in dissociation or the boundary condition is catalytic. Essentially, the parameter identified in this study reduces the amount of ground experimental data necessary and eases data extrapolation to flight.展开更多
The harmonic metric for Schwarzschild black hole with a uniform velocity is presented. In the limit of weak field and low velocity, this metric reduces to the post-Newtonian approximation for one moving point mass. As...The harmonic metric for Schwarzschild black hole with a uniform velocity is presented. In the limit of weak field and low velocity, this metric reduces to the post-Newtonian approximation for one moving point mass. As an application, we derive the dynamics of particle and photon in the weak-field limit for the moving Schwarzschild black hole with an arbitrary velocity. It is found that the relativistic motion of gravitational source can induce an additional centripetal force on the test particle, which may be comparable to or even larger than the conventional Newtonian gravitational force.展开更多
基金supported by Fundamental Research Funds of the Central Universities under Grant no. N120317001 and N100704001Program for New Century Excellent Talents in University (NCET13-0113)+1 种基金Natural Science Foundation of Liaoning Province of China under Grant no. 201202059Program for Liaoning Excellent Talents in University under LR2013011
文摘Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms.
文摘We calculate the lowest-order quantum-interference correction to the density of states (DOS) of weakly-disordered two-dimensional (2D) tight-binding square lattices around half filling. The impurities are assumed to be randomly distributed on small fractions of the sites, and have a-strong potential yielding a unitary-limit scattering. In addition to the usual diffusive modes in the retarded-advanced channel, there appear diffusive pi modes in the retarded-retarded (or advanced-advanced) channel due to the existence of particle-hole symmetry. It is found that the pi-mode diffuson gives rise to a logarithmic suppression to the DOS near the band center, which prevails over the positive correction contributed by pi-mode cooperon. As a result, the DOS is subject to a negative total correction. This result is qualitatively different from the divergent behavior of the DOS at the band center predicted previously for disordered 2D two-sublattice models with the particle-hole symmetry.
基金supported by Strategic Priority Research Program of the Chinese Academy of Sciences(Grant No.XDA05130302)Knowledge Innovation Program of Chinese Academy of Sciences(Grant No.KZCX2-EW-QN110)National Basic Research Program of China(Grant No.2010CB950203)
文摘Based on optimal foraging theory,prey animals from the Shuidonggou Locality 12(SDG12) are divided into three types according to body size and defense traits:high-ranked large game,low-ranked slow small game,and low-ranked fast small game.Application of the Reciprocal of Simpson's Index to the three types of animals from SDG12 yields a relatively high level of evenness,which implies a broader meat diet of the SDG12 hominids.Compared to values of taxonomic evenness from Mediterranean sites,it is suggested that this dietary expansion probably resulted from the occurrence of the Broad Spectrum Revolution rather than from climatic changes in the Shuidonggou area.Comparative studies between the Natufian phases in Hayonim Cave and the SDG12 validate this argument.
基金Supported by the Institute of Crustal Dynamics Funds (No. ZDJ2009‐01, No. ZDJ2007‐13)
文摘Using degree distribution to assess network vulnerability represents a promising direction of network analysis.However,the traditional degree distribution model is inadequate for analyzing the vulnerability of spatial networks because it does not take into consideration the geographical aspects of spatial networks.This paper proposes a spatially weighted degree model in which both the functional class and the length of network links are considered to be important factors for determining the node degrees of spatial networks.A weight coefficient is used in this new model to account for the contribution of each factor to the node degree.The proposed model is compared with the traditional degree model and an accessibility-based vulnerability model in the vulnerabil-ity analysis of a highway network.Experiment results indicate that,although node degrees of spatial networks derived from the tra-ditional degree model follow a random distribution,node degrees determined by the spatially weighted model exhibit a scale-free distribution,which is a common characteristic of robust networks.Compared to the accessibility-based model,the proposed model has similar performance in identifying critical nodes but with higher computational efficiency and better ability to reveal the overall vulnerability of a spatial network.
基金the National Natural Science Foundation of China(Grant Nos.1140227511472280 and 11532014)
文摘In this study, comparative heat flux measurements for a sharp cone model were conducted by utilizing a high enthalpy shock tunnel JF-10 and a large-scale shock tunnel JF-12, responsible for providing nonequilibrium and perfect gas flows, respectively. Experiments were performed at the Key Laboratory of High Temperature Gas Dynamics(LHD), Institute of Mechanics, Chinese Academy of Sciences. Corresponding numerical simulations were also conducted in effort to better understand the phenomena accompanying in these experiments. By assessing the consistency and accuracy of all the data gathered during this study, a detailed comparison of sharp cone heat transfer under a totally different kind of freestream conditions was build and analyzed. One specific parameter, defined as the product of the Stanton number and the square root of the Reynold number, was found to be more characteristic for the aerodynamic heating phenomena encountered in hypersonic flight. Adequate use of said parameter practically eliminates the variability caused by the deferent flow conditions, regardless of whether the flow is in dissociation or the boundary condition is catalytic. Essentially, the parameter identified in this study reduces the amount of ground experimental data necessary and eases data extrapolation to flight.
基金Supported by the Program for New Century Excellent Talents in University under Grant No.NCET-10-0702the National Basic Research Program of China(973 Program)under Grant No.2013CB328904the Ph.D.Programs Foundation of Ministry of Education of China under Grant No.20110184110016
文摘The harmonic metric for Schwarzschild black hole with a uniform velocity is presented. In the limit of weak field and low velocity, this metric reduces to the post-Newtonian approximation for one moving point mass. As an application, we derive the dynamics of particle and photon in the weak-field limit for the moving Schwarzschild black hole with an arbitrary velocity. It is found that the relativistic motion of gravitational source can induce an additional centripetal force on the test particle, which may be comparable to or even larger than the conventional Newtonian gravitational force.