Before the late 2000s,China employed a diplomatic“next generation”approach to its territorial disputes in the South China Sea(SCS).Beginning in the late 2000s,however,China has assumed threatening attitudes,and take...Before the late 2000s,China employed a diplomatic“next generation”approach to its territorial disputes in the South China Sea(SCS).Beginning in the late 2000s,however,China has assumed threatening attitudes,and taken a strong stand against other disputants.Why has China recently shown its assertiveness when dealing with the South China Sea issue?This study argues that two factors-China’s growing naval capabilities and the growing presence of China’s strategic rivals around the South China Sea-led China to adopt a more assertive policy regarding the South China Sea issue.展开更多
This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the rec...This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the reconstitutive coding method for additional individuals in order to conserve the variability of assertion objects. Traditional analysis methods of the main components are applied to coded objects. Certain interpretation aids are presented after the coding process. This method was applied to poverty data.展开更多
For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different...For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different data models. As such, levels of the local schemas are semantically very poor due to the limited expressiveness of traditional data models in which they were designed. Further more, most of the existing schema integration architectural components are inadequately equipped to handle the mapping schemas, especially when the semantics and structural conflicts are involved. This paper introduces an Intelligent Binary Schema Matching system (IBSMS), which exploits the phenomenon of making its components intelligent. That’s equipping its components such as translators and integrators with adequate knowledge about various data models. This allows the components acquire enough intelligence to maneuver or manipulate the correspondence between constructs from different models. In addition, the system has a Binary Matcher, which compares the attribute correspondences of various databases in a pairwise form, in order to establish the equivalences. With the establishment of the mappings, the users shall be able to access them (mappings) for their desired usage.展开更多
Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for...Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at rtmtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain.展开更多
Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of ado...Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of adolescents in Indonesia. Methods: The study was conducted in 31 of PEs to evaluate their knowledge in adolescents. The PEs received health education and were assessed by individual work during the structured three-week programme. Data were collected before and after the training programme as pre- and post-tests. Results: The PE demonstrated significant improvements in their knowledge after attending the three-week structured training programme. The post-test scores had significant effects on the dimensions of PE knowledge scores. The PE become knowledgeable to maintain and monitor adolescents health issues around growth and development and its risk behavior problems of adolescents. Conclusions: The PE become knowledgeable to respond to the adolescent problems and readiness to become PE during puberty.展开更多
Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with ...Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with these cross cutting non-functional concerns. In this regard current work identifies these dependability related non-functional and cross-cutting concerns and proposes design and implementation solutions in an aspect oriented framework that modularizes and separates them from core functionality. The degree of separation has been quantified using software metrics. A Lego NXT Robot based case study has been completed to evaluate the proposed design framework.展开更多
John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following t...John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following three perspectives:the attitudes towards Ben Johnson,the proposals for drama language and the selection,and the attitudes towards French classicism forthe purpose of a further understanding about John Dryden.展开更多
在演绎逻辑中常常碰到蕴涵(implication)、推导(derivation or entailment)和断定(assertion)这些词。弄清这三者的性质和关连,对演绎逻辑基本原理的理解是很重要的。有些逻辑著作没有明确区分蕴涵和推导,或者把二者混为一谈;另一些逻...在演绎逻辑中常常碰到蕴涵(implication)、推导(derivation or entailment)和断定(assertion)这些词。弄清这三者的性质和关连,对演绎逻辑基本原理的理解是很重要的。有些逻辑著作没有明确区分蕴涵和推导,或者把二者混为一谈;另一些逻辑著作则过份强调蕴涵和推导的区别而没有指出二者的关连。至于断定在其间所起的作用,就更少论及了。本文并非全面论述这三个逻辑术语的含义,而只是针对上述容易忽略的情况,对这三个术语的逻辑的性质、区别和关连提出一些分析,在分析过程中又不免涉及真命题的含义问题。展开更多
In this article, we have pointed out that some propositions corresponding to the distance measure between the type-2 fuzzy sets (T2FSs) as provided by Singh (Frontiers of Computer Science, 2014, 8(5), 741-752), ...In this article, we have pointed out that some propositions corresponding to the distance measure between the type-2 fuzzy sets (T2FSs) as provided by Singh (Frontiers of Computer Science, 2014, 8(5), 741-752), are incorrect by a counterexample. Further, these propositions have been corrected in the present manuscript by giving a correct relation between the T2FSs and validating it with a numerical example.展开更多
文摘Before the late 2000s,China employed a diplomatic“next generation”approach to its territorial disputes in the South China Sea(SCS).Beginning in the late 2000s,however,China has assumed threatening attitudes,and taken a strong stand against other disputants.Why has China recently shown its assertiveness when dealing with the South China Sea issue?This study argues that two factors-China’s growing naval capabilities and the growing presence of China’s strategic rivals around the South China Sea-led China to adopt a more assertive policy regarding the South China Sea issue.
文摘This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the reconstitutive coding method for additional individuals in order to conserve the variability of assertion objects. Traditional analysis methods of the main components are applied to coded objects. Certain interpretation aids are presented after the coding process. This method was applied to poverty data.
文摘For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different data models. As such, levels of the local schemas are semantically very poor due to the limited expressiveness of traditional data models in which they were designed. Further more, most of the existing schema integration architectural components are inadequately equipped to handle the mapping schemas, especially when the semantics and structural conflicts are involved. This paper introduces an Intelligent Binary Schema Matching system (IBSMS), which exploits the phenomenon of making its components intelligent. That’s equipping its components such as translators and integrators with adequate knowledge about various data models. This allows the components acquire enough intelligence to maneuver or manipulate the correspondence between constructs from different models. In addition, the system has a Binary Matcher, which compares the attribute correspondences of various databases in a pairwise form, in order to establish the equivalences. With the establishment of the mappings, the users shall be able to access them (mappings) for their desired usage.
基金the National Natural Science Foundation of China (60773006)the Specialized Research Fund for the Doctoral Program of Higher Education of China (20060486045)
文摘Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at rtmtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain.
基金supported by the Ministry of Research,Technology,and Higher Education(Kementerian Riset,Teknologi,dan Pendidikan Tinggi/KEMENRISTEK-DIKTI)at the expense of Hibah Bersaing Research 2016
文摘Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of adolescents in Indonesia. Methods: The study was conducted in 31 of PEs to evaluate their knowledge in adolescents. The PEs received health education and were assessed by individual work during the structured three-week programme. Data were collected before and after the training programme as pre- and post-tests. Results: The PE demonstrated significant improvements in their knowledge after attending the three-week structured training programme. The post-test scores had significant effects on the dimensions of PE knowledge scores. The PE become knowledgeable to maintain and monitor adolescents health issues around growth and development and its risk behavior problems of adolescents. Conclusions: The PE become knowledgeable to respond to the adolescent problems and readiness to become PE during puberty.
文摘Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with these cross cutting non-functional concerns. In this regard current work identifies these dependability related non-functional and cross-cutting concerns and proposes design and implementation solutions in an aspect oriented framework that modularizes and separates them from core functionality. The degree of separation has been quantified using software metrics. A Lego NXT Robot based case study has been completed to evaluate the proposed design framework.
文摘John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following three perspectives:the attitudes towards Ben Johnson,the proposals for drama language and the selection,and the attitudes towards French classicism forthe purpose of a further understanding about John Dryden.
文摘在演绎逻辑中常常碰到蕴涵(implication)、推导(derivation or entailment)和断定(assertion)这些词。弄清这三者的性质和关连,对演绎逻辑基本原理的理解是很重要的。有些逻辑著作没有明确区分蕴涵和推导,或者把二者混为一谈;另一些逻辑著作则过份强调蕴涵和推导的区别而没有指出二者的关连。至于断定在其间所起的作用,就更少论及了。本文并非全面论述这三个逻辑术语的含义,而只是针对上述容易忽略的情况,对这三个术语的逻辑的性质、区别和关连提出一些分析,在分析过程中又不免涉及真命题的含义问题。
文摘In this article, we have pointed out that some propositions corresponding to the distance measure between the type-2 fuzzy sets (T2FSs) as provided by Singh (Frontiers of Computer Science, 2014, 8(5), 741-752), are incorrect by a counterexample. Further, these propositions have been corrected in the present manuscript by giving a correct relation between the T2FSs and validating it with a numerical example.