Dragons and dragon slayers belong to a system ofsemiology.They are images with messages.Differentcultures in the world have assigned to these imageshistorical limits,conditions of use,and introducedmultiple meanings i...Dragons and dragon slayers belong to a system ofsemiology.They are images with messages.Differentcultures in the world have assigned to these imageshistorical limits,conditions of use,and introducedmultiple meanings into them.Dragons do not exist,therefore dragon slayers do not either.However,they have become an artificial existence in most cul-tures,and this existence have passed from a closed,silent existence to an oral state,open to appropria-tion by society,for there is no regulation,either nat-ural or not,which forbids imagination.Few symbols saturate human civilization sobroadly and thoroughly as those of the dragon:proudly flicking its tail across the tapestries展开更多
Whether or not Chinese over-the-top (OTT) content service WeChat, in Chinese, Weixin, should start charging users for its services has recently been the subject of heated debate.
People in Japan reacted to the bewilderment they felt at the fall of Ming by creating a bifurcated view of China, evident in encyclopedias and gazeteers: On the one hand, there was the traditional China represented b...People in Japan reacted to the bewilderment they felt at the fall of Ming by creating a bifurcated view of China, evident in encyclopedias and gazeteers: On the one hand, there was the traditional China represented by the Ming; on the other, there was the new China ruled by the Dattan or the Tatars. Such was the power of the Ming as an image that it endured in Japanese literature and theater for centuries after its fall. This article explores the preservation in popular discourse of the Ming as the most natural representation of China, focusing on Chikamatsu Monzaemon's hit jrruri play The Battles of Coxinga (Kokusen'ya kassen), first staged in 1715 and produced many times after that, showing how the political turmoil was filtered through both misunderstandings and creative fabrications. It shows that The Battles of Coxinga creates a fantastic image of China, as opposed to the barbaric Dattan, by drawing on historical memories internal to Japan and readily available images of foreignness. I argue that the preservation of the Ming in popular theater offered audiences a means of rethinking Japan's position as the inheritor of a "universal" Chinese essence in an age when knowledge of the world was being dramatically expanded by imported European cartography, complicating earlier views of a world centered on the Three Realms or the Sinocentric world order.展开更多
本文让我们认识了一种Egyptian Tortoise,其学名是Testudo Kleinmanni,是世界上最小的龟种之一。其生活环境险恶,并有“保护色”: It is found in both sandy and fairly rocky habitats(生活环境)and its lightbrown color blends(混和...本文让我们认识了一种Egyptian Tortoise,其学名是Testudo Kleinmanni,是世界上最小的龟种之一。其生活环境险恶,并有“保护色”: It is found in both sandy and fairly rocky habitats(生活环境)and its lightbrown color blends(混和)in with the local soil color. 但是,这种保护色也许能帮助它们对付其他动物,然而,“保护色”却对付不了本应是它们朋友的人类!现在,Testudo Kleinmanni已被列为most endangeredtortoises。 本文透露的信息让我们略感欣慰:拯救Testudo Kleinmanni已经成了一个国际行动。 世界野生动物横遭“灭顶之灾”的原因似乎有其共同之处,值得我们深思: Overgrazing(过度放牧)and the expansion of agriculture and tourism threatentheir existence…展开更多
Damage assessment of the wing under blast wave is essential to the vulnerability reduction design of aircraft. This paper introduces a critical relative distance prediction method of aircraft wing damage based on the ...Damage assessment of the wing under blast wave is essential to the vulnerability reduction design of aircraft. This paper introduces a critical relative distance prediction method of aircraft wing damage based on the back-propagation artificial neural network(BP-ANN), which is trained by finite element simulation results. Moreover, the finite element method(FEM) for wing blast damage simulation has been validated by ground explosion tests and further used for damage mode determination and damage characteristics analysis. The analysis results indicate that the wing is more likely to be damaged when the root is struck from vertical directions than others for a small charge. With the increase of TNT equivalent charge, the main damage mode of the wing gradually changes from the local skin tearing to overall structural deformation and the overpressure threshold of wing damage decreases rapidly. Compared to the FEM-based damage assessment, the BP-ANN-based method can predict the wing damage under a random blast wave with an average relative error of 4.78%. The proposed method and conclusions can be used as a reference for damage assessment under blast wave and low-vulnerability design of aircraft structures.展开更多
Cloud computing(CC)is developing as a powerful and flexible computational structure for providing ubiquitous service to users.It receives interrelated software and hardware resources in an integrated manner distinct f...Cloud computing(CC)is developing as a powerful and flexible computational structure for providing ubiquitous service to users.It receives interrelated software and hardware resources in an integrated manner distinct from the classical computational environment.The variation of software and hardware resources were combined and composed as a resource pool.The software no more resided in the single hardware environment,it can be executed on the schedule of resource pools to optimize resource consumption.Optimizing energy consumption in CC environments is the question that allows utilizing several energy conservation approaches for effective resource allocation.This study introduces a Battle Royale Optimization-based Resource Scheduling Scheme for Cloud Computing Environment(BRORSS-CCE)technique.The presented BRORSS-CCE technique majorly schedules the available resources for maximum utilization and effectual makespan.In the BRORSS-CCE technique,the BRO is a population-based algorithm where all the individuals are denoted by a soldier/player who likes to go towards the optimal place and ultimate survival.The BRORSS-CCE technique can be employed to balance the load,distribute resources based on demand and assure services to all requests.The experimental validation of the BRORSS-CCE technique is tested under distinct aspects.The experimental outcomes indicated the enhancements of the BRORSS-CCE technique over other models.展开更多
Aspect-Based Sentiment Analysis(ABSA)on Arabic corpus has become an active research topic in recent days.ABSA refers to a fine-grained Sentiment Analysis(SA)task that focuses on the extraction of the conferred aspects...Aspect-Based Sentiment Analysis(ABSA)on Arabic corpus has become an active research topic in recent days.ABSA refers to a fine-grained Sentiment Analysis(SA)task that focuses on the extraction of the conferred aspects and the identification of respective sentiment polarity from the provided text.Most of the prevailing Arabic ABSA techniques heavily depend upon dreary feature-engineering and pre-processing tasks and utilize external sources such as lexicons.In literature,concerning the Arabic language text analysis,the authors made use of regular Machine Learning(ML)techniques that rely on a group of rare sources and tools.These sources were used for processing and analyzing the Arabic language content like lexicons.However,an important challenge in this domain is the unavailability of sufficient and reliable resources.In this background,the current study introduces a new Battle Royale Optimization with Fuzzy Deep Learning for Arabic Aspect Based Sentiment Classification(BROFDL-AASC)technique.The aim of the presented BROFDL-AASC model is to detect and classify the sentiments in the Arabic language.In the presented BROFDL-AASC model,data pre-processing is performed at first to convert the input data into a useful format.Besides,the BROFDL-AASC model includes Discriminative Fuzzy-based Restricted Boltzmann Machine(DFRBM)model for the identification and categorization of sentiments.Furthermore,the BRO algorithm is exploited for optimal fine-tuning of the hyperparameters related to the FBRBM model.This scenario establishes the novelty of current study.The performance of the proposed BROFDL-AASC model was validated and the outcomes demonstrate the supremacy of BROFDL-AASC model over other existing models.展开更多
“If you know both the enemy and yourself well, you need not to fear for the results of a hundred battles,” wrote Sun Tzu, a Chinese philosopher, in his famous the Art of War about 2,500 years ago. This is particular...“If you know both the enemy and yourself well, you need not to fear for the results of a hundred battles,” wrote Sun Tzu, a Chinese philosopher, in his famous the Art of War about 2,500 years ago. This is particularly true in the ever-lasting war against human viruses. Recently, a vital piece of information has been acquired concerning enteroviruses, which could cause many severe brain infections and even death in children. A recent study published in Cell unravels how these viruses sneak into cells with the help of accomplices from the host, opening a new window on developing drugs to specifically fight against them.展开更多
Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the s...Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the simulation system could be how to reasonably determine simulation model input and build a bridge to link battle damage model and battle damage laws knowledge.In this paper,we propose a novel knowledge-oriented modeling method for influencing factors of battle damage in military industrial logistics,integrating conceptual analysis,conceptual modeling,quantitative modeling and simulation implementation.We conceptualize influencing factors of battle damage by using the principle of hierarchical decomposition,thus classifying the related battle damage knowledge logically.Then,we construct the conceptual model of influencing factors of battle damage by using Entity-Relations hip approach,thus describing their interactions reasonably.Subsequently,we extract the important influencing factors by using social network analysis,thus evaluating their importance quantitatively and further clarifying the elements of simulation.Finally,we develop an agent-based military industry logistics simulation system by taking the modeling results on influencing factors of battle damage as simulation model input,and obtain simulation model output,i.e.,new battle damage laws knowledge,thus verifying feasibility and effectiveness of the proposed method.The results show that this method can be used to support human decision-making and action.展开更多
Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interve...Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interventional medicine(IM)", or simply Intervention by our team,and "Interventional Radiology" is used no more. It has even been given the name "Third clinical Medicine" by us. Chinese intervention has established an independent association for interventional doctors, as well as independent interventional societies in many provinces. The national interventional society will likely be set up at some point in time. Chinese interve ntion has set up their own clinical wards, with much attention paid to a clinical, professional, and normalized direction for development, and established special nursing units. According to us, turf battle is meaningless. "The Third clinical Medicine" belongs to all human beings. It could also be predicted that interventional history will follow the same evolutionary rule as other disciplines, i.e., "long divided, must unite; long united, must divide".展开更多
Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the uns...Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM).展开更多
After the founding of the People’s Republic of China, the Chinese people have been struggling against poverty amid national development under the leadership of the Communist Party of China(CPC). Since reform and open...After the founding of the People’s Republic of China, the Chinese people have been struggling against poverty amid national development under the leadership of the Communist Party of China(CPC). Since reform and opening up, in particular, China has planned for and organized development-oriented poverty reduction practices on a broad scale with remarkable achievements and blazed a new path of development-oriented poverty reduction with Chinese characteristics. This path is both an essential component of Chinese socialism and a result of the CPC’s ideological improvement on poverty reduction. Since the 18 th CPC National Congress in 2012, the whole Party, country, and society have been called upon to fight the battle against poverty on a full-scale under the guidance of General Secretary Xi Jinping’s important statements on poverty reduction, unveiling a new stage for China’s development-oriented poverty reduction in the new era. China’s unprecedented poverty reduction achievements have enriched the path of poverty reduction with Chinese characteristics. Xi Jinping’s insightful and coherent statements on poverty reduction represent the latest results of Marxist anti-poverty theories and comprise an essential part of Xi Jinping Thought on Socialism with Chinese Characteristics for the New Era. His guidelines are the basis for the brilliant achievements of China’s poverty reduction endeavors, and will contribute Chinese experience and wisdom to global poverty governance.展开更多
Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuse...Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuses on a Self-Election dynamic honeypot framework which aims to bewilder attackers by coordinating and switching roles periodically to form a huge dynamic puzzle.In this paper,we discuss the UDP Spokesman synchronization scheme and the Self-Election coordination method,perform the framework simulation of the dynamic array honeypot with NS2,carry out the prototype implementation by Java,and then validate the effectiveness and feasibility on the simulation and prototype system.The promising results of applying this framework to mitigate the effects of attacks are shown and analyzed.Our work demonstrates that the Self-Election dynamic array honeypot system is feasible and effective for proactive network confrontation.展开更多
To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are cl...To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are classified into three types,which are aircraft,ship and submarine. Then,the attack ability value and defense ability value for each type of armed forces are estimated by using BP neural network,whose training results of sample data are consistent with the estimation results. Next,compared the assessment values through an improved Bradley-Terry model and constructed a Bayesian network to do the global assessment,the winning probabilities of both combat sides are obtained. Finally,the winning probability estimation for a navy battle is given to illustrate the validity of the proposed scheme.展开更多
This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countr...This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method.展开更多
Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal...Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal emphasis on rural and urban poverty,(iii)preventing people in the deeply poor regions from slipping back to poverty,(iv)combining external assistance with endogenous development,and(v)enhancing social protection and targeted fiscal support for aiding the poor.Following the new trends of poverty reduction,policymakers should update their strategic approach,adopt new poverty reduction standards,target at a broader group of poor groups,promote pro-poor development,and improve poverty governance.Lastly,this paper puts forward the following policy recommendations for reducing poverty in China post-2020:(i)maintaining policy continuity and stability during the transition period;(ii)creating regular poverty relief mechanisms for urban and rural residents;(iii)improving the targeted identification and dynamic adjustment of target groups for poverty reduction;and(iv)reducing poverty through social protection and development.展开更多
Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize...Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize communication cost and overhead due to it in the ad hoc networks, thus efforts are being made to make the communications more energy efficient. The application spectrum and use cases of wireless sensor networks includes many critical applications as environmental monitoring, to resource monitoring, to Industrial measurements, to public safety applications and last but not the least to sensitive applications as military sector applications .The erratic size of such networks and along with its exotic topology pose a magnificent set of challenges to the routing algorithms designed and implemented within such networks. The present work concentrates on the comparative analysis of some of reactive and proactive protocols used in the wireless sensor networks. The parameter for comparative analysis is the energy consumption for different simulation time and for different mobility conditions based scenario.展开更多
From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle o...From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle of the sexes in James Thurber’s literary works.展开更多
Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel ...Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel John Boyd’s theory of OODA loop that deals with information superiority. Building a robust, mobile and capable network that could provide for novel appliances and information superiority is the main challenge which modernizers are facing. Network, suitable for future combat operations, and able to transport a vast amount of information on a battlefield, is expensive to build. Every mistake in design and the need to correct those mistakes could halt development in an army for years. Therefore, system dependability analysis during system design phase is needed. In this report, the concept of a future Battle Network System is described. The Report evaluates operational environment of BNS and possible failure reasons of the service, and illustrates the change in BNS Quality of Service due to probable transport layer errors. This paper describes the method of testing the concept of proposed network systems on the drawing board, and emphasizes design points for a new system. Nevertheless, the proposed method is by no means conclusive. Rather, it describes an engineering approach to define the main problems while creating MANET-based networking systems.展开更多
文摘Dragons and dragon slayers belong to a system ofsemiology.They are images with messages.Differentcultures in the world have assigned to these imageshistorical limits,conditions of use,and introducedmultiple meanings into them.Dragons do not exist,therefore dragon slayers do not either.However,they have become an artificial existence in most cul-tures,and this existence have passed from a closed,silent existence to an oral state,open to appropria-tion by society,for there is no regulation,either nat-ural or not,which forbids imagination.Few symbols saturate human civilization sobroadly and thoroughly as those of the dragon:proudly flicking its tail across the tapestries
文摘Whether or not Chinese over-the-top (OTT) content service WeChat, in Chinese, Weixin, should start charging users for its services has recently been the subject of heated debate.
文摘People in Japan reacted to the bewilderment they felt at the fall of Ming by creating a bifurcated view of China, evident in encyclopedias and gazeteers: On the one hand, there was the traditional China represented by the Ming; on the other, there was the new China ruled by the Dattan or the Tatars. Such was the power of the Ming as an image that it endured in Japanese literature and theater for centuries after its fall. This article explores the preservation in popular discourse of the Ming as the most natural representation of China, focusing on Chikamatsu Monzaemon's hit jrruri play The Battles of Coxinga (Kokusen'ya kassen), first staged in 1715 and produced many times after that, showing how the political turmoil was filtered through both misunderstandings and creative fabrications. It shows that The Battles of Coxinga creates a fantastic image of China, as opposed to the barbaric Dattan, by drawing on historical memories internal to Japan and readily available images of foreignness. I argue that the preservation of the Ming in popular theater offered audiences a means of rethinking Japan's position as the inheritor of a "universal" Chinese essence in an age when knowledge of the world was being dramatically expanded by imported European cartography, complicating earlier views of a world centered on the Three Realms or the Sinocentric world order.
文摘本文让我们认识了一种Egyptian Tortoise,其学名是Testudo Kleinmanni,是世界上最小的龟种之一。其生活环境险恶,并有“保护色”: It is found in both sandy and fairly rocky habitats(生活环境)and its lightbrown color blends(混和)in with the local soil color. 但是,这种保护色也许能帮助它们对付其他动物,然而,“保护色”却对付不了本应是它们朋友的人类!现在,Testudo Kleinmanni已被列为most endangeredtortoises。 本文透露的信息让我们略感欣慰:拯救Testudo Kleinmanni已经成了一个国际行动。 世界野生动物横遭“灭顶之灾”的原因似乎有其共同之处,值得我们深思: Overgrazing(过度放牧)and the expansion of agriculture and tourism threatentheir existence…
基金supported by the Natural Science Foundation of Shaanxi Province (Grant No. 2020JQ-122)the Fund support of Science and Technology on Transient Impact Laboratory。
文摘Damage assessment of the wing under blast wave is essential to the vulnerability reduction design of aircraft. This paper introduces a critical relative distance prediction method of aircraft wing damage based on the back-propagation artificial neural network(BP-ANN), which is trained by finite element simulation results. Moreover, the finite element method(FEM) for wing blast damage simulation has been validated by ground explosion tests and further used for damage mode determination and damage characteristics analysis. The analysis results indicate that the wing is more likely to be damaged when the root is struck from vertical directions than others for a small charge. With the increase of TNT equivalent charge, the main damage mode of the wing gradually changes from the local skin tearing to overall structural deformation and the overpressure threshold of wing damage decreases rapidly. Compared to the FEM-based damage assessment, the BP-ANN-based method can predict the wing damage under a random blast wave with an average relative error of 4.78%. The proposed method and conclusions can be used as a reference for damage assessment under blast wave and low-vulnerability design of aircraft structures.
文摘Cloud computing(CC)is developing as a powerful and flexible computational structure for providing ubiquitous service to users.It receives interrelated software and hardware resources in an integrated manner distinct from the classical computational environment.The variation of software and hardware resources were combined and composed as a resource pool.The software no more resided in the single hardware environment,it can be executed on the schedule of resource pools to optimize resource consumption.Optimizing energy consumption in CC environments is the question that allows utilizing several energy conservation approaches for effective resource allocation.This study introduces a Battle Royale Optimization-based Resource Scheduling Scheme for Cloud Computing Environment(BRORSS-CCE)technique.The presented BRORSS-CCE technique majorly schedules the available resources for maximum utilization and effectual makespan.In the BRORSS-CCE technique,the BRO is a population-based algorithm where all the individuals are denoted by a soldier/player who likes to go towards the optimal place and ultimate survival.The BRORSS-CCE technique can be employed to balance the load,distribute resources based on demand and assure services to all requests.The experimental validation of the BRORSS-CCE technique is tested under distinct aspects.The experimental outcomes indicated the enhancements of the BRORSS-CCE technique over other models.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R281)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4340237DSR52。
文摘Aspect-Based Sentiment Analysis(ABSA)on Arabic corpus has become an active research topic in recent days.ABSA refers to a fine-grained Sentiment Analysis(SA)task that focuses on the extraction of the conferred aspects and the identification of respective sentiment polarity from the provided text.Most of the prevailing Arabic ABSA techniques heavily depend upon dreary feature-engineering and pre-processing tasks and utilize external sources such as lexicons.In literature,concerning the Arabic language text analysis,the authors made use of regular Machine Learning(ML)techniques that rely on a group of rare sources and tools.These sources were used for processing and analyzing the Arabic language content like lexicons.However,an important challenge in this domain is the unavailability of sufficient and reliable resources.In this background,the current study introduces a new Battle Royale Optimization with Fuzzy Deep Learning for Arabic Aspect Based Sentiment Classification(BROFDL-AASC)technique.The aim of the presented BROFDL-AASC model is to detect and classify the sentiments in the Arabic language.In the presented BROFDL-AASC model,data pre-processing is performed at first to convert the input data into a useful format.Besides,the BROFDL-AASC model includes Discriminative Fuzzy-based Restricted Boltzmann Machine(DFRBM)model for the identification and categorization of sentiments.Furthermore,the BRO algorithm is exploited for optimal fine-tuning of the hyperparameters related to the FBRBM model.This scenario establishes the novelty of current study.The performance of the proposed BROFDL-AASC model was validated and the outcomes demonstrate the supremacy of BROFDL-AASC model over other existing models.
文摘“If you know both the enemy and yourself well, you need not to fear for the results of a hundred battles,” wrote Sun Tzu, a Chinese philosopher, in his famous the Art of War about 2,500 years ago. This is particularly true in the ever-lasting war against human viruses. Recently, a vital piece of information has been acquired concerning enteroviruses, which could cause many severe brain infections and even death in children. A recent study published in Cell unravels how these viruses sneak into cells with the help of accomplices from the host, opening a new window on developing drugs to specifically fight against them.
基金This research was funded by National Natural Science Foundation of China(grant number 61473311,70901075)Natural Science Foundation of Beijing Municipality(grant number 9142017)military projects funded by the Chinese Army.
文摘Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the simulation system could be how to reasonably determine simulation model input and build a bridge to link battle damage model and battle damage laws knowledge.In this paper,we propose a novel knowledge-oriented modeling method for influencing factors of battle damage in military industrial logistics,integrating conceptual analysis,conceptual modeling,quantitative modeling and simulation implementation.We conceptualize influencing factors of battle damage by using the principle of hierarchical decomposition,thus classifying the related battle damage knowledge logically.Then,we construct the conceptual model of influencing factors of battle damage by using Entity-Relations hip approach,thus describing their interactions reasonably.Subsequently,we extract the important influencing factors by using social network analysis,thus evaluating their importance quantitatively and further clarifying the elements of simulation.Finally,we develop an agent-based military industry logistics simulation system by taking the modeling results on influencing factors of battle damage as simulation model input,and obtain simulation model output,i.e.,new battle damage laws knowledge,thus verifying feasibility and effectiveness of the proposed method.The results show that this method can be used to support human decision-making and action.
文摘Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interventional medicine(IM)", or simply Intervention by our team,and "Interventional Radiology" is used no more. It has even been given the name "Third clinical Medicine" by us. Chinese intervention has established an independent association for interventional doctors, as well as independent interventional societies in many provinces. The national interventional society will likely be set up at some point in time. Chinese interve ntion has set up their own clinical wards, with much attention paid to a clinical, professional, and normalized direction for development, and established special nursing units. According to us, turf battle is meaningless. "The Third clinical Medicine" belongs to all human beings. It could also be predicted that interventional history will follow the same evolutionary rule as other disciplines, i.e., "long divided, must unite; long united, must divide".
文摘Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM).
文摘After the founding of the People’s Republic of China, the Chinese people have been struggling against poverty amid national development under the leadership of the Communist Party of China(CPC). Since reform and opening up, in particular, China has planned for and organized development-oriented poverty reduction practices on a broad scale with remarkable achievements and blazed a new path of development-oriented poverty reduction with Chinese characteristics. This path is both an essential component of Chinese socialism and a result of the CPC’s ideological improvement on poverty reduction. Since the 18 th CPC National Congress in 2012, the whole Party, country, and society have been called upon to fight the battle against poverty on a full-scale under the guidance of General Secretary Xi Jinping’s important statements on poverty reduction, unveiling a new stage for China’s development-oriented poverty reduction in the new era. China’s unprecedented poverty reduction achievements have enriched the path of poverty reduction with Chinese characteristics. Xi Jinping’s insightful and coherent statements on poverty reduction represent the latest results of Marxist anti-poverty theories and comprise an essential part of Xi Jinping Thought on Socialism with Chinese Characteristics for the New Era. His guidelines are the basis for the brilliant achievements of China’s poverty reduction endeavors, and will contribute Chinese experience and wisdom to global poverty governance.
基金National Natural Science Foundation of China under Grant No.60973141the Foundation of Excellent Young Scientist of Shandong Province under Grant No. BS2009DX019the Fundamental Research Funds for the Central Universities under Grant No. 27R0907018A
文摘Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuses on a Self-Election dynamic honeypot framework which aims to bewilder attackers by coordinating and switching roles periodically to form a huge dynamic puzzle.In this paper,we discuss the UDP Spokesman synchronization scheme and the Self-Election coordination method,perform the framework simulation of the dynamic array honeypot with NS2,carry out the prototype implementation by Java,and then validate the effectiveness and feasibility on the simulation and prototype system.The promising results of applying this framework to mitigate the effects of attacks are shown and analyzed.Our work demonstrates that the Self-Election dynamic array honeypot system is feasible and effective for proactive network confrontation.
基金Sponsored by the National Natural Science Foundation of China(Grant No.61374212)the Aeronautical Science Foundation of China(Grant No.20135152047)the Fundamental Research Funds for the Central Universities(Grant No.NJ20160022)
文摘To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are classified into three types,which are aircraft,ship and submarine. Then,the attack ability value and defense ability value for each type of armed forces are estimated by using BP neural network,whose training results of sample data are consistent with the estimation results. Next,compared the assessment values through an improved Bradley-Terry model and constructed a Bayesian network to do the global assessment,the winning probabilities of both combat sides are obtained. Finally,the winning probability estimation for a navy battle is given to illustrate the validity of the proposed scheme.
文摘This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method.
基金Key Research Project of the Academy of Macroeconomic Research,the National Development and Reform Commission(NDRC)“Study on the Spatial Optimization of New Urbanization”(Grant No.:A2019051005).
文摘Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal emphasis on rural and urban poverty,(iii)preventing people in the deeply poor regions from slipping back to poverty,(iv)combining external assistance with endogenous development,and(v)enhancing social protection and targeted fiscal support for aiding the poor.Following the new trends of poverty reduction,policymakers should update their strategic approach,adopt new poverty reduction standards,target at a broader group of poor groups,promote pro-poor development,and improve poverty governance.Lastly,this paper puts forward the following policy recommendations for reducing poverty in China post-2020:(i)maintaining policy continuity and stability during the transition period;(ii)creating regular poverty relief mechanisms for urban and rural residents;(iii)improving the targeted identification and dynamic adjustment of target groups for poverty reduction;and(iv)reducing poverty through social protection and development.
文摘Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize communication cost and overhead due to it in the ad hoc networks, thus efforts are being made to make the communications more energy efficient. The application spectrum and use cases of wireless sensor networks includes many critical applications as environmental monitoring, to resource monitoring, to Industrial measurements, to public safety applications and last but not the least to sensitive applications as military sector applications .The erratic size of such networks and along with its exotic topology pose a magnificent set of challenges to the routing algorithms designed and implemented within such networks. The present work concentrates on the comparative analysis of some of reactive and proactive protocols used in the wireless sensor networks. The parameter for comparative analysis is the energy consumption for different simulation time and for different mobility conditions based scenario.
文摘From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle of the sexes in James Thurber’s literary works.
文摘Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel John Boyd’s theory of OODA loop that deals with information superiority. Building a robust, mobile and capable network that could provide for novel appliances and information superiority is the main challenge which modernizers are facing. Network, suitable for future combat operations, and able to transport a vast amount of information on a battlefield, is expensive to build. Every mistake in design and the need to correct those mistakes could halt development in an army for years. Therefore, system dependability analysis during system design phase is needed. In this report, the concept of a future Battle Network System is described. The Report evaluates operational environment of BNS and possible failure reasons of the service, and illustrates the change in BNS Quality of Service due to probable transport layer errors. This paper describes the method of testing the concept of proposed network systems on the drawing board, and emphasizes design points for a new system. Nevertheless, the proposed method is by no means conclusive. Rather, it describes an engineering approach to define the main problems while creating MANET-based networking systems.