Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate ...Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate quality problems and find solutions.To address this problem,a knowledge graph based method is employed to extract multi-source heterogeneous cable knowledge entities.The method utilizes the bidirectional encoder representations from transformers(BERT)network to embed word vectors into the input text,then extracts the contextual features of the input sequence through the bidirectional long short-term memory(BiLSTM)network,and finally inputs them into the conditional random field(CRF)network to predict entity categories.Simultaneously,by using the entities extracted by this model as the data layer,a knowledge graph based method has been constructed.Compared to other traditional extraction methods,the entity extraction method used in this study demonstrates significant improvements in metrics such as precision,recall and an F1 score.Ultimately,employing cable test data from a particular aerospace precision machining company,the study has constructed the knowledge graph based method in the field to achieve visualized queries and the traceability and localization of quality problems.展开更多
[Objective] This study aimed to explore the characteristics of ecological water requirement in Maijishan Scenic Spot. [Methed] The characteristics of ecologi- cal water requirement in Maijishan Scenic Spot were analyz...[Objective] This study aimed to explore the characteristics of ecological water requirement in Maijishan Scenic Spot. [Methed] The characteristics of ecologi- cal water requirement in Maijishan Scenic Spot were analyzed based on,the data of soil humidity and meteorology of the spot. [Result] The result showed that the actual annual ecological water requirement in the spot was 678×10^6 m^3, and the proportion of soil water and evapotranspiration were 21% and 79%, respectively; the minimum annual ecological water requirement quota in the spot was 480.27×10^6 m^3, and the proportion of soil water and evapotranspiration were 16% and 84%, respectively; the minimum annual suitable ecological water requirement quota in the spot was 624.22×10^6 m^3, and the proportion of soil water and evapotranspiration were 18% and 82%, respectively. The precipitation was 614×10^6 m^3, and consumptive water surplus reached up to 78×10^6 m^3. The years when the precipitation was higher than the evapotranspiration accounted for 76%. Since 1980s, the evapotranspiration showed a linearly increasing trend. The precipitation was higher than the evapotranspiration from Jun. to Oct. and less than the evapotranspiration from Nov. to Dec. and Jan. to May. Evapotranspiration water requirement was regulated by soil water. The dis- parity between precipitation and evapotranspiration was huge in spring, thus having certain influence on waterfalls and streams in the spot. [Conclusion] The results of this study provided a basis for the rational use and long-term planning of the water sources in Maijishan Scenic Spot.展开更多
This study was to analyze the mineral elements in famous tea varieties in Sichuan Province. Eighteen mineral elements in the samples of 13 famous tea varieties in Sichuan Province were measured via related instruments...This study was to analyze the mineral elements in famous tea varieties in Sichuan Province. Eighteen mineral elements in the samples of 13 famous tea varieties in Sichuan Province were measured via related instruments. The results showed, of all the 18 measured samples, that the contents of K, P, S, Ca and Mg were relatively higher( 〉1 500 mg/kg) in famous tea varieties in Sichuan Province, while those of Ba, Cr, V, Co and Se were relatively lower( 〈 10 mg/kg) ; compared to common green tea, the famous tea varieties in Sichuan Province contained higher contents of K, Zn, P, Na, Ni, Cu, S, Se and Co(0.38% -115.65% higher than that in common green tea), and lower contents of Mg, Mn, AI, Ca, V, Rb, Fe and Cr(7.20% -46.67% lower than that in common green tea); of the 13 tested tea varieties, Hongyanyingchun, Yongchuanxiuya and Qingchengxueya were rich in mineral elements, while Yuchengyunwu and Yuqiancha lacked in mineral elements. The re- suits show that Hongyanyingchun, Yongchuanxiuya and Qingchengxueya are the elites in the famous tea varieties in Sichuan Province.展开更多
With an Iris Intrepid II XSP ICP full spectrum ICP emission spectrometer,trace elements including Se,Fe,Mn,Cd,Cr,Co,Ni,Cu,Pb and Zn in Huangshan teas were determined.The best analysis conditions were selected by exper...With an Iris Intrepid II XSP ICP full spectrum ICP emission spectrometer,trace elements including Se,Fe,Mn,Cd,Cr,Co,Ni,Cu,Pb and Zn in Huangshan teas were determined.The best analysis conditions were selected by experiments.The method is simple and rapid,and the precision and accuracy are all in line with the requirements.This method was used to analyze actual tea samples with satisfactory results.展开更多
Based on the determinative factors school of capital structure theory, this paper uses the data of 35 Chinese energy listed companies from 2000 to 2003, and adopts multi-variable regression method to make an empirical...Based on the determinative factors school of capital structure theory, this paper uses the data of 35 Chinese energy listed companies from 2000 to 2003, and adopts multi-variable regression method to make an empirical study of the influencing factors of their capital structure. The results indicate that the factors of size, income volatility, and the concentration of owner’s equity have positive relation with the capital structure, while the relation between profit- ability and capital structure is negative. It is also found that the influencing of growth and secured asset on the capital structure are relatively insignificant.展开更多
The wastewater discharged from the 1.0 Mt/a ethylene unit at Maoming Petrochemical Company was separated according to its quality, and a major part ofwastewater with better quality was properly treated via the process...The wastewater discharged from the 1.0 Mt/a ethylene unit at Maoming Petrochemical Company was separated according to its quality, and a major part ofwastewater with better quality was properly treated via the process of"IRABF + high-efficiency fiber filtering + disinfection" to make the wastewater quality comply with the quality of recycled cooling water, so that the technique for reused petrochemical wastewater was more reliable technically and more reasonable economically,展开更多
This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the sce...This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy.展开更多
Chinese noun-classifier compound words show different properties in lexical meaning and syntactic collocation. The complexity of these compounds lies in the grammaticalization of classifiers’ system. Some nouns used...Chinese noun-classifier compound words show different properties in lexical meaning and syntactic collocation. The complexity of these compounds lies in the grammaticalization of classifiers’ system. Some nouns used as classifiers in the position of classifier are not grammaticalized into real classifiers which are temporary classifiers. So some of them are real noun-classifier compounds and some belong to noun-noun compounds. This paper attempts to analyze the structural relation between noun morpheme and classifier morpheme within the word. It also explains that the noun and the classifier compound in the position of light noun in the nP structure.展开更多
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp...A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.展开更多
Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Network...Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Networks(FFSNs)are usually used as proxies of phishing websites and malwares,and hide upstream servers that host actual content.In this paper,by analysing recursive DNS traffic,we develop a fast-flux domain detection method which combines both real-time detection and long-term monitoring.Experimental results demonstrate that our solution can achieve significantly higher detection accuracy values than previous flux-score based algorithms,and is light-weight in terms of resource consumption.We evaluate the performance of the proposed fast-flux detection and tracking solution during a 180-day period of deployment on our university’s DNS servers.Based on the tracking results,we successfully identify the changes in the distribution of FFSN and their roles in recent Internet attacks.展开更多
This study introduces a method to quantify the sceaic value of wetland landscapes and provides the guid- ance on the allocation of efforts for the purpose of preserving the most important environments. Dongting Lake, ...This study introduces a method to quantify the sceaic value of wetland landscapes and provides the guid- ance on the allocation of efforts for the purpose of preserving the most important environments. Dongting Lake, a tra-ditional tourist location, is one of the five largest freshwater lakes in China and a Grade 5A National Scenic Region. This study objectively analyzes the scenic resources of South Dongting Lake, and presents a model based on Quantifi- cation Theory I to assess wetland scenic landscapes. Employing a multilinear regression relationship between land-scape factors and their associated scenic value, we built up the Wetland Landscape Quantification Model (WLQM), which was used to classify 221 landscapes into five grades. Finally, some suggestions are proposed regarding quantita-tive assessment and its use for the sustainable development of wetland environments.展开更多
The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.Howev...The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.However,the major limitation of DPI systems is that their signature library is mainly extracted manually,which makes it hard to efficiently obtain the signature of new applications.Hence,in this paper,we propose an automatic signature extraction mechanism using Principal Component Analysis(PCA)technology,which is able to extract the signature automatically.In the proposed method,the signatures are expressed in the form of serial consistent sequences constructed by principal components instead of normally separated substrings in the original data extracted from the traditional methods.Extensive experiments based on numerous sets of data have been carried out to evaluate the performance of the proposed scheme,and the results prove that the newly proposed method can achieve good performance in terms of accuracy and efficiency.展开更多
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du...Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.展开更多
The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that ...The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that principles are common and describe the fundamental mode of the organization of matter. The regeneration of its elements is the basic goal of the control of an object. The control systems try to allow elements to optimize their state depending on circumstances and occasionally in advance. The input system is the first one from these systems. It controls the input of material for the regeneration and at the same time is the source of primary information concerning its state in the environment and its development in time. The system of the control of the distribution of the energy named TOT is another element of the control. The system named EM0 controls the process of the regeneration on the basis of information about the successfulness of elements involved into the regeneration. Finally, the system named EM 1 controls the dynamics of the boundary of the object on the basis of information describing the tension on this boundary. The second goal of the control of an object, besides the regeneration, is to optimize the existence of the object as whole. New global criteria arise and are used throughout the process of the control for this sake.展开更多
The work at hand analyzes the visibility of cultural identity of"Mexico" on the YouTube platform (Retrieved from http://www.youtube.com). It is focused on qualitative and quantitative analyses of a sampling of 80...The work at hand analyzes the visibility of cultural identity of"Mexico" on the YouTube platform (Retrieved from http://www.youtube.com). It is focused on qualitative and quantitative analyses of a sampling of 80 videos that appear when the word "Mexico" is applied in various search formats within the site itself. User profile is also analyzed, along with video title, labels, date of upload, length, view count, thematic category, and commentaries. From this sampling of videos, an analysis is made upon the cultural identity of "Mexico" within a postmodernist framework of multicultural, fragmented, and decentralized identities (Friedman, 1994), parting from the theory of cultural hybridization (Pieterse, 2004), and under the logic of a media convergent culture (Jenkins, 2004a).展开更多
Microarray and deep sequencing technologies have provided unprecedented opportunities for mapping genome mutations,RNA transcripts,transcription factor binding,and histone modifications at high resolution at the genom...Microarray and deep sequencing technologies have provided unprecedented opportunities for mapping genome mutations,RNA transcripts,transcription factor binding,and histone modifications at high resolution at the genome-wide level.This has revolutionized the way in which transcriptomes,regulatory networks and epigenetic regulations have been studied and large amounts of heterogeneous data have been generated.Although efforts are being made to integrate these datasets unbiasedly and efficiently,how best to do this still remains a challenge.Here we review major impacts of high-throughput genome-wide data generation,their relevance to human diseases,and various bioinformatics approaches for data integration.Finally,we provide a case study on inflammatory diseases.展开更多
文摘Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate quality problems and find solutions.To address this problem,a knowledge graph based method is employed to extract multi-source heterogeneous cable knowledge entities.The method utilizes the bidirectional encoder representations from transformers(BERT)network to embed word vectors into the input text,then extracts the contextual features of the input sequence through the bidirectional long short-term memory(BiLSTM)network,and finally inputs them into the conditional random field(CRF)network to predict entity categories.Simultaneously,by using the entities extracted by this model as the data layer,a knowledge graph based method has been constructed.Compared to other traditional extraction methods,the entity extraction method used in this study demonstrates significant improvements in metrics such as precision,recall and an F1 score.Ultimately,employing cable test data from a particular aerospace precision machining company,the study has constructed the knowledge graph based method in the field to achieve visualized queries and the traceability and localization of quality problems.
基金Supported by the Special Fund for Agro-scientific Research in the Public Interest,China(GYHY201106029)~~
文摘[Objective] This study aimed to explore the characteristics of ecological water requirement in Maijishan Scenic Spot. [Methed] The characteristics of ecologi- cal water requirement in Maijishan Scenic Spot were analyzed based on,the data of soil humidity and meteorology of the spot. [Result] The result showed that the actual annual ecological water requirement in the spot was 678×10^6 m^3, and the proportion of soil water and evapotranspiration were 21% and 79%, respectively; the minimum annual ecological water requirement quota in the spot was 480.27×10^6 m^3, and the proportion of soil water and evapotranspiration were 16% and 84%, respectively; the minimum annual suitable ecological water requirement quota in the spot was 624.22×10^6 m^3, and the proportion of soil water and evapotranspiration were 18% and 82%, respectively. The precipitation was 614×10^6 m^3, and consumptive water surplus reached up to 78×10^6 m^3. The years when the precipitation was higher than the evapotranspiration accounted for 76%. Since 1980s, the evapotranspiration showed a linearly increasing trend. The precipitation was higher than the evapotranspiration from Jun. to Oct. and less than the evapotranspiration from Nov. to Dec. and Jan. to May. Evapotranspiration water requirement was regulated by soil water. The dis- parity between precipitation and evapotranspiration was huge in spring, thus having certain influence on waterfalls and streams in the spot. [Conclusion] The results of this study provided a basis for the rational use and long-term planning of the water sources in Maijishan Scenic Spot.
文摘This study was to analyze the mineral elements in famous tea varieties in Sichuan Province. Eighteen mineral elements in the samples of 13 famous tea varieties in Sichuan Province were measured via related instruments. The results showed, of all the 18 measured samples, that the contents of K, P, S, Ca and Mg were relatively higher( 〉1 500 mg/kg) in famous tea varieties in Sichuan Province, while those of Ba, Cr, V, Co and Se were relatively lower( 〈 10 mg/kg) ; compared to common green tea, the famous tea varieties in Sichuan Province contained higher contents of K, Zn, P, Na, Ni, Cu, S, Se and Co(0.38% -115.65% higher than that in common green tea), and lower contents of Mg, Mn, AI, Ca, V, Rb, Fe and Cr(7.20% -46.67% lower than that in common green tea); of the 13 tested tea varieties, Hongyanyingchun, Yongchuanxiuya and Qingchengxueya were rich in mineral elements, while Yuchengyunwu and Yuqiancha lacked in mineral elements. The re- suits show that Hongyanyingchun, Yongchuanxiuya and Qingchengxueya are the elites in the famous tea varieties in Sichuan Province.
文摘With an Iris Intrepid II XSP ICP full spectrum ICP emission spectrometer,trace elements including Se,Fe,Mn,Cd,Cr,Co,Ni,Cu,Pb and Zn in Huangshan teas were determined.The best analysis conditions were selected by experiments.The method is simple and rapid,and the precision and accuracy are all in line with the requirements.This method was used to analyze actual tea samples with satisfactory results.
文摘Based on the determinative factors school of capital structure theory, this paper uses the data of 35 Chinese energy listed companies from 2000 to 2003, and adopts multi-variable regression method to make an empirical study of the influencing factors of their capital structure. The results indicate that the factors of size, income volatility, and the concentration of owner’s equity have positive relation with the capital structure, while the relation between profit- ability and capital structure is negative. It is also found that the influencing of growth and secured asset on the capital structure are relatively insignificant.
文摘The wastewater discharged from the 1.0 Mt/a ethylene unit at Maoming Petrochemical Company was separated according to its quality, and a major part ofwastewater with better quality was properly treated via the process of"IRABF + high-efficiency fiber filtering + disinfection" to make the wastewater quality comply with the quality of recycled cooling water, so that the technique for reused petrochemical wastewater was more reliable technically and more reasonable economically,
基金supported by the National Key Basic Research Program of China (973 Program) under Grant No. 2009CB320505the Fundamental Research Funds for the Central Universities under Grant No. 2011RC0508+2 种基金the National Natural Science Foundation of China under Grant No. 61003282China Next Generation Internet Project "Research and Trial on Evolving Next Generation Network Intelligence Capability Enhancement"the National Science and Technology Major Project "Research about Architecture of Mobile Internet" under Grant No. 2011ZX03002-001-01
文摘This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy.
文摘Chinese noun-classifier compound words show different properties in lexical meaning and syntactic collocation. The complexity of these compounds lies in the grammaticalization of classifiers’ system. Some nouns used as classifiers in the position of classifier are not grammaticalized into real classifiers which are temporary classifiers. So some of them are real noun-classifier compounds and some belong to noun-noun compounds. This paper attempts to analyze the structural relation between noun morpheme and classifier morpheme within the word. It also explains that the noun and the classifier compound in the position of light noun in the nP structure.
基金Project(61379057)supported by the National Natural Science Foundation of ChinaProject supported by the Construct Program of the Key Discipline in Hunan University of Arts and Science,China+1 种基金Project(2012BS01)supported by Science Technology Research and Development Projects of Changde,ChinaProject supported by Science and the MEST2012-002521,NRF,Korea
文摘A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.
基金supported by the National Basic Research Program of China(973 Program)under Grant No.2013CB329603Huawei Innovation Research Program+1 种基金the Opening Project of Key Laboratory of Information Network Security of Ministry of Public Security under Grant No.C11608the National Natural Science Foundation of China under Grant No.61271220
文摘Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Networks(FFSNs)are usually used as proxies of phishing websites and malwares,and hide upstream servers that host actual content.In this paper,by analysing recursive DNS traffic,we develop a fast-flux domain detection method which combines both real-time detection and long-term monitoring.Experimental results demonstrate that our solution can achieve significantly higher detection accuracy values than previous flux-score based algorithms,and is light-weight in terms of resource consumption.We evaluate the performance of the proposed fast-flux detection and tracking solution during a 180-day period of deployment on our university’s DNS servers.Based on the tracking results,we successfully identify the changes in the distribution of FFSN and their roles in recent Internet attacks.
基金Under the auspices of National Key Technology and Science Project of Water(No.2008ZX07101-004)National High Technology Research and Development Program of China(No.2003AA06011000-04)Natural Talent Introduction Foundation of Nanjing University(No.021122420105)
文摘This study introduces a method to quantify the sceaic value of wetland landscapes and provides the guid- ance on the allocation of efforts for the purpose of preserving the most important environments. Dongting Lake, a tra-ditional tourist location, is one of the five largest freshwater lakes in China and a Grade 5A National Scenic Region. This study objectively analyzes the scenic resources of South Dongting Lake, and presents a model based on Quantifi- cation Theory I to assess wetland scenic landscapes. Employing a multilinear regression relationship between land-scape factors and their associated scenic value, we built up the Wetland Landscape Quantification Model (WLQM), which was used to classify 221 landscapes into five grades. Finally, some suggestions are proposed regarding quantita-tive assessment and its use for the sustainable development of wetland environments.
基金supported by the National Natural Science Foundation of China under Grant No.61003282Beijing Higher Education Young Elite Teacher Project+3 种基金China Next Generation Internet(CNGI)Project"Research and Trial on Evolving Next Generation Network Intelligence Capability Enhancement(NICE)"the National Basic Research Program(973 Program)under Grant No.2009CB320-505the National Science and Technology Major Project"Research about Architecture of Mobile Internet"under Grant No.2011ZX03-002-001-01the National High Technology Research and Development Program(863 Program)under Grant No.2011AA010704
文摘The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.However,the major limitation of DPI systems is that their signature library is mainly extracted manually,which makes it hard to efficiently obtain the signature of new applications.Hence,in this paper,we propose an automatic signature extraction mechanism using Principal Component Analysis(PCA)technology,which is able to extract the signature automatically.In the proposed method,the signatures are expressed in the form of serial consistent sequences constructed by principal components instead of normally separated substrings in the original data extracted from the traditional methods.Extensive experiments based on numerous sets of data have been carried out to evaluate the performance of the proposed scheme,and the results prove that the newly proposed method can achieve good performance in terms of accuracy and efficiency.
基金This work was supported by China Nature Science Fund .Serial No.60073059and60273078
文摘Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.
文摘The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that principles are common and describe the fundamental mode of the organization of matter. The regeneration of its elements is the basic goal of the control of an object. The control systems try to allow elements to optimize their state depending on circumstances and occasionally in advance. The input system is the first one from these systems. It controls the input of material for the regeneration and at the same time is the source of primary information concerning its state in the environment and its development in time. The system of the control of the distribution of the energy named TOT is another element of the control. The system named EM0 controls the process of the regeneration on the basis of information about the successfulness of elements involved into the regeneration. Finally, the system named EM 1 controls the dynamics of the boundary of the object on the basis of information describing the tension on this boundary. The second goal of the control of an object, besides the regeneration, is to optimize the existence of the object as whole. New global criteria arise and are used throughout the process of the control for this sake.
文摘The work at hand analyzes the visibility of cultural identity of"Mexico" on the YouTube platform (Retrieved from http://www.youtube.com). It is focused on qualitative and quantitative analyses of a sampling of 80 videos that appear when the word "Mexico" is applied in various search formats within the site itself. User profile is also analyzed, along with video title, labels, date of upload, length, view count, thematic category, and commentaries. From this sampling of videos, an analysis is made upon the cultural identity of "Mexico" within a postmodernist framework of multicultural, fragmented, and decentralized identities (Friedman, 1994), parting from the theory of cultural hybridization (Pieterse, 2004), and under the logic of a media convergent culture (Jenkins, 2004a).
文摘Microarray and deep sequencing technologies have provided unprecedented opportunities for mapping genome mutations,RNA transcripts,transcription factor binding,and histone modifications at high resolution at the genome-wide level.This has revolutionized the way in which transcriptomes,regulatory networks and epigenetic regulations have been studied and large amounts of heterogeneous data have been generated.Although efforts are being made to integrate these datasets unbiasedly and efficiently,how best to do this still remains a challenge.Here we review major impacts of high-throughput genome-wide data generation,their relevance to human diseases,and various bioinformatics approaches for data integration.Finally,we provide a case study on inflammatory diseases.