From the viewpoints of environmental conservation and energy efficiency,seawater-source heat pump system(SWHP) to provide district cooling and heating is applied in coastal areas.Based on the system,a heat transfer mo...From the viewpoints of environmental conservation and energy efficiency,seawater-source heat pump system(SWHP) to provide district cooling and heating is applied in coastal areas.Based on the system,a heat transfer model was established for cast heat exchanger(CHE) adopted by SWHP systems.The CHE consists of pipes immersed in the seawater and used for transferring heat between the seawater and the heat exchanger pipes of SWHP system.An experimental study was carried out to test the validity of the model.A program was developed in VB language and the effects of inlet temperature,flow rate of the secondary refrigerant and length of CHE on the results were investigated.The results of the numerical simulation are in consistence with the experiments in both winter and summer conditions.As a result,application of SWHP systems with CHE in coastal areas in China is feasible due to the favorable geographical conditions and environment.展开更多
Assemblages of benthic foraminifera in a sediment core(C02)near the western margin of the southern Yellow Sea Mud were studied to decipher the phase evolution of Holocene paleoenvironmental changes associated with the...Assemblages of benthic foraminifera in a sediment core(C02)near the western margin of the southern Yellow Sea Mud were studied to decipher the phase evolution of Holocene paleoenvironmental changes associated with the Holocene marine transgression.It appears that during the early Holocene(11.2 10.1 kyr BP),the faunal was dominated by low salinity and shallow water species Cribrononion subincertum,Buccella frigida and Ammonia beccarii,reflecting a near coast depositional environment.A rapid increase of the relative abundance of Ammonia compressiuscula between 10.1 9.3 kyr BP indicates that the sea level rose rapidly during that time period.From 9.3 7.7 kyr BP,the benthic foraminiferal assemblage was dominated by high percentage of A.compressiscula,suggesting that the sea level was relatively stable.An obvious transition of benthic foraminifera,from the A.compressiuscula-dominated assemblage to an Ammonia ketienziensis-dominated assemblage,occurred between 7.7 6.2 kyr BP,possibly corresponding to a second sea level rapid rise period in the Yellow Sea during the Holocene.This transition may correspond to the gradually strengthened Yellow Sea warm current(YSWC)and finally is established the modern-type circulation in the Yellow Sea.It may also mark the formation of the Yellow Sea cold bottom water(YSCBW)during that period.Since then,the benthic foraminiferal assemblage based on core C02 was dominated by typical YSCBW species,A.ketienziensis,Astrononion italicum and Hanzawaia nipponica,at 6.2 4 kyr BP.A non-deposition period occurred since 4 kyr BP,which possibly related to the hydrology changes caused by the East Asia monsoon.The two obvious benthic foraminiferal transitions recorded in core C02 during the early and middle Holocene provide evidence that the Yellow Sea has undergone a two-phase rapid sea level rise during the Holocene marine transgression.展开更多
Thomas S. Kuhn is one of the leading philosophers and historians of science that investigated in-depth cases of simultaneous discoveries in science. Although his analysis of the discovery of energy conservation and ox...Thomas S. Kuhn is one of the leading philosophers and historians of science that investigated in-depth cases of simultaneous discoveries in science. Although his analysis of the discovery of energy conservation and oxygen did not focus sharply on the priority disputes involved, it is within such contexts that controversy about which scientist was the first to make a discovery takes place. Evidently, Kuhn's recourse to historical case studies is a clear departure from the standpoint of traditional mainstream philosophies of science (namely, logical positivism and falsificationism), which cavalierly dismissed such concerns as irrelevant to philosophical reconstructions of science Challenges to orthodox logistic approaches were prompted by the realisation that the two dominant traditions mentioned above, in their excessive preoccupation with "the logical skeleton of science", have lost contact with real science. As a contribution to what Michael Polanyi referred to as post-critical philosophy, the present study reanalyses the tension-generating potentials of bipolar values shared by members of scientific communities. It traces the origins of the rebellion against logic-dominated philosophies of science, and identifies different post-positivist approaches that have eme^rged over the years which legitimise broadening the frontiers of the philosophy of science. Consequent upon that, some conflicting values or norms shared by members of scientific communities and how they affect the quest for scientific knowledge are underscored. Using as a case study the acrimonious priority dispute between Isaac Newton and Gottfried Leibniz concerning the discovery of calculus, the paper demonstrates that excessive concern for recognition which sometimes leads to protracted priority disputes tends to bring out the worst kind of behaviours towards colleagues even from the greatest scientists. We submit, by way of conclusion, that despite the heroic (almost god-like) reputation of such scientists, they are human and, therefore, subject to the vicissitudes of emotional turbulence just like everyone else.展开更多
Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p...Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or public clouds. Mu tual authentication protocol among entities in the IntraCloud and InterCloud is proposed. Blind signature and bilinear mapping of automorphism groups are adopted to achieve the InterCloud Alli anceAuthentication, which overcome the complexi ty of certificate transmission and the problem of communication bottlenecks that happen in tradi tional certificatebased scheme. Blind key, instead of private key, is adopted for register, which avoids展开更多
Many studies have been conducted by analyzing crash data that included road profile, site conditions, vehicle configurations and weights, driver behavior, etc.. However, limited studies have been conducted evaluating ...Many studies have been conducted by analyzing crash data that included road profile, site conditions, vehicle configurations and weights, driver behavior, etc.. However, limited studies have been conducted evaluating the impact of these factors on crashes and/or rollover through simulations. This is mainly due to lack of availability of verified full vehicle flexible-body models. The verification process is costly as it requires instrumentation of a heavy vehicle, scanning of road surfaces, and collection of data by running the vehicle over different road conditions, performing various maneuvering, etc. This paper presents the reverse engineering process of a class-8 truck and validation of a full flexible-body simulation model of a Wabash 53-foot trailer against the strain data recoded from proving ground testing of an instrumented truck. Simulation results show that, with the exception of the noise from the strain gage data from instrumented test run at 30 mph, there is a good agreement in periodicity and relative amplitude with the ADAMS model. A comparison of strain data from the flex-body model and the instrumented truck shows that the modeling and verification approach presented in this paper can be confidently used to validate the full flexible-body models developed for specific analyses.展开更多
Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the ...Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool.展开更多
The study of the international literary relations in comparative literature includes not only the positivistic relations of different nations and different literary systems, but also the relations of variation among d...The study of the international literary relations in comparative literature includes not only the positivistic relations of different nations and different literary systems, but also the relations of variation among different literatures when it comes to the cross-civilization heterogeneity. Therefore, the positivistic approach and that of variation in the study of international literary relations constitute the two indispensable pillars in this field.展开更多
Sedimentary TOC (total organic carbon), TN (total nitrogen) and C/N (carbon/nitrogen) at selected sites of Lake Victoria basin have provided evidence of phytoplankton productivity, input of nitrates and allochth...Sedimentary TOC (total organic carbon), TN (total nitrogen) and C/N (carbon/nitrogen) at selected sites of Lake Victoria basin have provided evidence of phytoplankton productivity, input of nitrates and allochthonous (land) plant materials/catchment destruction in the basin during the late Holocene period (last 4,000 years to present). TOC and TN in the sediment cores were determined using EuroEA3000 Series Elemental Analyser and radiocarbon dating done using AMS (accelerator mass spectrometry) standard method. Results showed that TOC (13.45%-20.78%) and TN (1.07%-1.92%) values were higher at Napoleon Gulf from about 4,186 years before present (ca. 4,186 yr. BP) to present than at inlet of river Kagera (TOC: 3.27%-6.32% and TN: 0.30%-0.59%) from about 190 years before present (ca. 190 yr. BP) to present. Generally TOC and TN had a negative correlation (r = -0.37, p = 0.04, n = 32) at Napoleon Gulf in the last 4,186 years to present signifying that C/N ratios were governed mostly by phytoplankton productivity which markedly increased during some periods in the last 370 years to present possibly as a result of increased input of nitrates. However, the periods from about 4,186 years to 1,684 years before present (ca. 4,186 yr. BP to 1,684 yr. BP) and some periods between the last 370 years to present indicated increased input of allochthonous plant materials/catchment destruction. On overall, there was a positive correlation between C/N and TOC at inlet of river Kagera (r = 0.57, p = 0.01, n = 20) in the last 190 years to present possibly signifying that C/N ratios were governed mainly by input of allochthonous plant materials hence increased catchment destruction. Input of land plant materials (catchment destruction) along Kagera basin declined during some period after 1950 AD. However the most recent years have shown increased input of land plant materials (catchment destruction) in Kagera basin.展开更多
In this paper, five national meteorological stations in Anhui province are taken as typical examples to explore the effects of local urbanization on their thermal environment by using Landsat data from 1990 to 2010. S...In this paper, five national meteorological stations in Anhui province are taken as typical examples to explore the effects of local urbanization on their thermal environment by using Landsat data from 1990 to 2010. Satellite-based land use/land cover(LULC), land surface temperature(LST), normalized difference vegetation index(NDVI) are used to investigate the effects. The study shows that LULC around meteorological stations changed significantly due to urban expansion. Fast urbanization is the main factor that affects the spatial-temporal distribution of thermal environment around meteorological stations. Moreover, the normalized LST and NDVI exhibit strong inverse correlations around meteorological stations, so the variability of LST can be monitored through evaluating the variability of NDVI. In addition, station-relocation plays an important role in improving representativeness of thermal environment. Notably, the environment representativeness was improved, but when using the data from the station to study climate change, the relocation-induced inhomogeneous data should be considered and adjusted. Consequently,controlling the scale and layout of the urban buildings and constructions around meteorological stations is an effective method to ameliorate observational thermal environment and to improve regional representativeness of station observation. The present work provides observational evidences that high resolution Landsat images can be used to evaluate the thermal environment of meteorological stations.展开更多
According to green view and history data, the demonstrated method is applied to analyze the green rationality on the present structure of thermal, hydraulic and nuclear electric power resource; the green trend of larg...According to green view and history data, the demonstrated method is applied to analyze the green rationality on the present structure of thermal, hydraulic and nuclear electric power resource; the green trend of large-scale on thermal power generating unit in our history; the distribution of between water and coal resource with the space structure of electric power installed capacity, and recommending the premise, dominance and direction of building our green electric power structure in the future.展开更多
This paper analyzes the distribution patterns and spatial dynamic transitions of foreign direct investment (FDI) and pollution from 2000 to 2009 in China's provinces by using the comprehensive pollution index (CEP...This paper analyzes the distribution patterns and spatial dynamic transitions of foreign direct investment (FDI) and pollution from 2000 to 2009 in China's provinces by using the comprehensive pollution index (CEPI) and exploratory spatial data analysis. Findings suggest that FDI as well as environmental pollution in our provinces exists an obvious spatial autocorrelation, both of them have remarkable characteristics of path dependence and form different accumulation areas. Currently, the accumulations of highlevel FDI correspond to low-level environmental pollution, while the accumulations of low-level FDI are associated with high-level environmental pollution. Furthermore, the authors have empirically analyzed the impact of FDI on China's environmental pollution by spatial error model (SEM) and spatial lag model (SLM) respeetively. Findings suggest that the geographical clustering of FDI has a positive impact on China's environment, in general, "Pollution Haven Hypothesis" is invalid in China. In addition, there are remarkable differences in the impact of FDI on environmental pollution due to different sources, the foreign capital from offshore financial centers has significantly alleviated pollution in China while that from developed countries in East Asia and the West has played an insignificant role in environmental pollution.展开更多
The Kuvasali landslide disaster in Malava, Western Kenya, which caused harmful geo-environmental hazards to the villagers in August 2007, formed the premise of this paper. The existing landslide vulnerability occurren...The Kuvasali landslide disaster in Malava, Western Kenya, which caused harmful geo-environmental hazards to the villagers in August 2007, formed the premise of this paper. The existing landslide vulnerability occurrence ratings have been identified and documented using participatory approaches to ascertain the adoptive indigenous methods, which helped mitigation against the negative impacts by determining the slope steepness using Abney level. The geological set up, settlement and climatic factors, relating to landslides, revealed that the affected homesteads were on a steep slope of approximately 70%, with underlying metamorphosed basement rocks comprising ofgneisses, schists and granite intrusions. The steep escarpment overlying these rocks, where the landslide occurred, consists of volcanic rocks and black cotton clayey soils. The slope has scattered vegetation cover due to farming, while the low-lying area is planted with sugar cane and maize plantations. The landslide disaster led to loss of lives, injuries and damage to property. Natural resources, including water points, suffered siltation. Mitigation measures such as geo-hazard mapping and zoning, awareness training and campaigns for the local people focusing on hazard-prone areas resulting from poor land use practices have been recommended.展开更多
The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certifi...The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certificate agent, the cloud user generates a trust base and extends it to its VMs. For each service running on the VM, a hash value is generated from all the necessary modules, and these hash values are organized and maintained with a specially designed hash tree whose root is extended from the user's trust base. Before the VM loads a service, the hash tree is verified from the coordinated hash value to check the trustworthiness of the service.展开更多
This paper is preoccupied with the delineation of the dialectic of poverty and wealth in Festus Iyayi's Violence. The unbridled struggle between the bourgeois and the proletariat in the novel constitutes the onus of ...This paper is preoccupied with the delineation of the dialectic of poverty and wealth in Festus Iyayi's Violence. The unbridled struggle between the bourgeois and the proletariat in the novel constitutes the onus of the dialectical materialism which underlies an axiomatic focus of societal superstructure. An application of Kenneth Boulding's theory of protest to the Nigerian social milieu, poignantly reveals that there is a potent foregrounding of the class stratification between the rich and the poor. The paper will further examine how this dichotomy between the highly placed and the down trodden in the novel has graphically accentuated the poverty index in contemporary Nigeria.展开更多
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expec...With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.展开更多
基金Project(2006BAJ04A15-03) supported by the National Science and Technology Pillar Program during the Eleventh Five-year Plan Period
文摘From the viewpoints of environmental conservation and energy efficiency,seawater-source heat pump system(SWHP) to provide district cooling and heating is applied in coastal areas.Based on the system,a heat transfer model was established for cast heat exchanger(CHE) adopted by SWHP systems.The CHE consists of pipes immersed in the seawater and used for transferring heat between the seawater and the heat exchanger pipes of SWHP system.An experimental study was carried out to test the validity of the model.A program was developed in VB language and the effects of inlet temperature,flow rate of the secondary refrigerant and length of CHE on the results were investigated.The results of the numerical simulation are in consistence with the experiments in both winter and summer conditions.As a result,application of SWHP systems with CHE in coastal areas in China is feasible due to the favorable geographical conditions and environment.
基金supported by the National Basic Research Program of China (973 Program 2010CB428901)the National Natural Science Foundation of China (40976031,91228207)
文摘Assemblages of benthic foraminifera in a sediment core(C02)near the western margin of the southern Yellow Sea Mud were studied to decipher the phase evolution of Holocene paleoenvironmental changes associated with the Holocene marine transgression.It appears that during the early Holocene(11.2 10.1 kyr BP),the faunal was dominated by low salinity and shallow water species Cribrononion subincertum,Buccella frigida and Ammonia beccarii,reflecting a near coast depositional environment.A rapid increase of the relative abundance of Ammonia compressiuscula between 10.1 9.3 kyr BP indicates that the sea level rose rapidly during that time period.From 9.3 7.7 kyr BP,the benthic foraminiferal assemblage was dominated by high percentage of A.compressiscula,suggesting that the sea level was relatively stable.An obvious transition of benthic foraminifera,from the A.compressiuscula-dominated assemblage to an Ammonia ketienziensis-dominated assemblage,occurred between 7.7 6.2 kyr BP,possibly corresponding to a second sea level rapid rise period in the Yellow Sea during the Holocene.This transition may correspond to the gradually strengthened Yellow Sea warm current(YSWC)and finally is established the modern-type circulation in the Yellow Sea.It may also mark the formation of the Yellow Sea cold bottom water(YSCBW)during that period.Since then,the benthic foraminiferal assemblage based on core C02 was dominated by typical YSCBW species,A.ketienziensis,Astrononion italicum and Hanzawaia nipponica,at 6.2 4 kyr BP.A non-deposition period occurred since 4 kyr BP,which possibly related to the hydrology changes caused by the East Asia monsoon.The two obvious benthic foraminiferal transitions recorded in core C02 during the early and middle Holocene provide evidence that the Yellow Sea has undergone a two-phase rapid sea level rise during the Holocene marine transgression.
文摘Thomas S. Kuhn is one of the leading philosophers and historians of science that investigated in-depth cases of simultaneous discoveries in science. Although his analysis of the discovery of energy conservation and oxygen did not focus sharply on the priority disputes involved, it is within such contexts that controversy about which scientist was the first to make a discovery takes place. Evidently, Kuhn's recourse to historical case studies is a clear departure from the standpoint of traditional mainstream philosophies of science (namely, logical positivism and falsificationism), which cavalierly dismissed such concerns as irrelevant to philosophical reconstructions of science Challenges to orthodox logistic approaches were prompted by the realisation that the two dominant traditions mentioned above, in their excessive preoccupation with "the logical skeleton of science", have lost contact with real science. As a contribution to what Michael Polanyi referred to as post-critical philosophy, the present study reanalyses the tension-generating potentials of bipolar values shared by members of scientific communities. It traces the origins of the rebellion against logic-dominated philosophies of science, and identifies different post-positivist approaches that have eme^rged over the years which legitimise broadening the frontiers of the philosophy of science. Consequent upon that, some conflicting values or norms shared by members of scientific communities and how they affect the quest for scientific knowledge are underscored. Using as a case study the acrimonious priority dispute between Isaac Newton and Gottfried Leibniz concerning the discovery of calculus, the paper demonstrates that excessive concern for recognition which sometimes leads to protracted priority disputes tends to bring out the worst kind of behaviours towards colleagues even from the greatest scientists. We submit, by way of conclusion, that despite the heroic (almost god-like) reputation of such scientists, they are human and, therefore, subject to the vicissitudes of emotional turbulence just like everyone else.
基金the National Natural Science Foundation of China,the Innovation Group Project of Beijing Institute of Technology
文摘Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or public clouds. Mu tual authentication protocol among entities in the IntraCloud and InterCloud is proposed. Blind signature and bilinear mapping of automorphism groups are adopted to achieve the InterCloud Alli anceAuthentication, which overcome the complexi ty of certificate transmission and the problem of communication bottlenecks that happen in tradi tional certificatebased scheme. Blind key, instead of private key, is adopted for register, which avoids
文摘Many studies have been conducted by analyzing crash data that included road profile, site conditions, vehicle configurations and weights, driver behavior, etc.. However, limited studies have been conducted evaluating the impact of these factors on crashes and/or rollover through simulations. This is mainly due to lack of availability of verified full vehicle flexible-body models. The verification process is costly as it requires instrumentation of a heavy vehicle, scanning of road surfaces, and collection of data by running the vehicle over different road conditions, performing various maneuvering, etc. This paper presents the reverse engineering process of a class-8 truck and validation of a full flexible-body simulation model of a Wabash 53-foot trailer against the strain data recoded from proving ground testing of an instrumented truck. Simulation results show that, with the exception of the noise from the strain gage data from instrumented test run at 30 mph, there is a good agreement in periodicity and relative amplitude with the ADAMS model. A comparison of strain data from the flex-body model and the instrumented truck shows that the modeling and verification approach presented in this paper can be confidently used to validate the full flexible-body models developed for specific analyses.
基金supported by the National Key Research and Development Program of China (No. 2017YFC0820603)
文摘Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool.
文摘The study of the international literary relations in comparative literature includes not only the positivistic relations of different nations and different literary systems, but also the relations of variation among different literatures when it comes to the cross-civilization heterogeneity. Therefore, the positivistic approach and that of variation in the study of international literary relations constitute the two indispensable pillars in this field.
文摘Sedimentary TOC (total organic carbon), TN (total nitrogen) and C/N (carbon/nitrogen) at selected sites of Lake Victoria basin have provided evidence of phytoplankton productivity, input of nitrates and allochthonous (land) plant materials/catchment destruction in the basin during the late Holocene period (last 4,000 years to present). TOC and TN in the sediment cores were determined using EuroEA3000 Series Elemental Analyser and radiocarbon dating done using AMS (accelerator mass spectrometry) standard method. Results showed that TOC (13.45%-20.78%) and TN (1.07%-1.92%) values were higher at Napoleon Gulf from about 4,186 years before present (ca. 4,186 yr. BP) to present than at inlet of river Kagera (TOC: 3.27%-6.32% and TN: 0.30%-0.59%) from about 190 years before present (ca. 190 yr. BP) to present. Generally TOC and TN had a negative correlation (r = -0.37, p = 0.04, n = 32) at Napoleon Gulf in the last 4,186 years to present signifying that C/N ratios were governed mostly by phytoplankton productivity which markedly increased during some periods in the last 370 years to present possibly as a result of increased input of nitrates. However, the periods from about 4,186 years to 1,684 years before present (ca. 4,186 yr. BP to 1,684 yr. BP) and some periods between the last 370 years to present indicated increased input of allochthonous plant materials/catchment destruction. On overall, there was a positive correlation between C/N and TOC at inlet of river Kagera (r = 0.57, p = 0.01, n = 20) in the last 190 years to present possibly signifying that C/N ratios were governed mainly by input of allochthonous plant materials hence increased catchment destruction. Input of land plant materials (catchment destruction) along Kagera basin declined during some period after 1950 AD. However the most recent years have shown increased input of land plant materials (catchment destruction) in Kagera basin.
基金supported by the National Natural Science Foundation of China(41205126 and 41475085)Anhui Provincial Natural Science Foundation(1408085MKL60 and1508085MD64)Meteorological Research Fund of Anhui Meteorological Bureau(KM201520)
文摘In this paper, five national meteorological stations in Anhui province are taken as typical examples to explore the effects of local urbanization on their thermal environment by using Landsat data from 1990 to 2010. Satellite-based land use/land cover(LULC), land surface temperature(LST), normalized difference vegetation index(NDVI) are used to investigate the effects. The study shows that LULC around meteorological stations changed significantly due to urban expansion. Fast urbanization is the main factor that affects the spatial-temporal distribution of thermal environment around meteorological stations. Moreover, the normalized LST and NDVI exhibit strong inverse correlations around meteorological stations, so the variability of LST can be monitored through evaluating the variability of NDVI. In addition, station-relocation plays an important role in improving representativeness of thermal environment. Notably, the environment representativeness was improved, but when using the data from the station to study climate change, the relocation-induced inhomogeneous data should be considered and adjusted. Consequently,controlling the scale and layout of the urban buildings and constructions around meteorological stations is an effective method to ameliorate observational thermal environment and to improve regional representativeness of station observation. The present work provides observational evidences that high resolution Landsat images can be used to evaluate the thermal environment of meteorological stations.
文摘According to green view and history data, the demonstrated method is applied to analyze the green rationality on the present structure of thermal, hydraulic and nuclear electric power resource; the green trend of large-scale on thermal power generating unit in our history; the distribution of between water and coal resource with the space structure of electric power installed capacity, and recommending the premise, dominance and direction of building our green electric power structure in the future.
文摘This paper analyzes the distribution patterns and spatial dynamic transitions of foreign direct investment (FDI) and pollution from 2000 to 2009 in China's provinces by using the comprehensive pollution index (CEPI) and exploratory spatial data analysis. Findings suggest that FDI as well as environmental pollution in our provinces exists an obvious spatial autocorrelation, both of them have remarkable characteristics of path dependence and form different accumulation areas. Currently, the accumulations of highlevel FDI correspond to low-level environmental pollution, while the accumulations of low-level FDI are associated with high-level environmental pollution. Furthermore, the authors have empirically analyzed the impact of FDI on China's environmental pollution by spatial error model (SEM) and spatial lag model (SLM) respeetively. Findings suggest that the geographical clustering of FDI has a positive impact on China's environment, in general, "Pollution Haven Hypothesis" is invalid in China. In addition, there are remarkable differences in the impact of FDI on environmental pollution due to different sources, the foreign capital from offshore financial centers has significantly alleviated pollution in China while that from developed countries in East Asia and the West has played an insignificant role in environmental pollution.
文摘The Kuvasali landslide disaster in Malava, Western Kenya, which caused harmful geo-environmental hazards to the villagers in August 2007, formed the premise of this paper. The existing landslide vulnerability occurrence ratings have been identified and documented using participatory approaches to ascertain the adoptive indigenous methods, which helped mitigation against the negative impacts by determining the slope steepness using Abney level. The geological set up, settlement and climatic factors, relating to landslides, revealed that the affected homesteads were on a steep slope of approximately 70%, with underlying metamorphosed basement rocks comprising ofgneisses, schists and granite intrusions. The steep escarpment overlying these rocks, where the landslide occurred, consists of volcanic rocks and black cotton clayey soils. The slope has scattered vegetation cover due to farming, while the low-lying area is planted with sugar cane and maize plantations. The landslide disaster led to loss of lives, injuries and damage to property. Natural resources, including water points, suffered siltation. Mitigation measures such as geo-hazard mapping and zoning, awareness training and campaigns for the local people focusing on hazard-prone areas resulting from poor land use practices have been recommended.
基金supported by the National Natural Science Foundation of China(No.6127249261572521)+1 种基金Natural Science Foundation of Shaanxi Provence(No.2013JM8012)Fundamental Research Project of CAPF(No.WJY201520)
文摘The trustworthiness of virtual machines is a big security issue in cloud computing. In this paper, we aimed at designing a practical trustworthiness mechanism in virtual environment. With the assist of a third certificate agent, the cloud user generates a trust base and extends it to its VMs. For each service running on the VM, a hash value is generated from all the necessary modules, and these hash values are organized and maintained with a specially designed hash tree whose root is extended from the user's trust base. Before the VM loads a service, the hash tree is verified from the coordinated hash value to check the trustworthiness of the service.
文摘This paper is preoccupied with the delineation of the dialectic of poverty and wealth in Festus Iyayi's Violence. The unbridled struggle between the bourgeois and the proletariat in the novel constitutes the onus of the dialectical materialism which underlies an axiomatic focus of societal superstructure. An application of Kenneth Boulding's theory of protest to the Nigerian social milieu, poignantly reveals that there is a potent foregrounding of the class stratification between the rich and the poor. The paper will further examine how this dichotomy between the highly placed and the down trodden in the novel has graphically accentuated the poverty index in contemporary Nigeria.
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.
基金supported by China Fundamental Research Funds for the Central University under Grant No.BUPT 2009RC1022
文摘With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.