Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the uns...Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM).展开更多
TOP leaders vowed to build a "beautiful China" in late 2012 at the 18th National Congress of the country's ruling party. But Beijing's air quality in early 2013 has shown that China still has a long way to go befo...TOP leaders vowed to build a "beautiful China" in late 2012 at the 18th National Congress of the country's ruling party. But Beijing's air quality in early 2013 has shown that China still has a long way to go before realizing that goal. "If you have any respiratory diseases, please consult your doctor before you travel to China." suggests the Canadian Foreign Ministry on its website, This seemed to be good advice as Beijing hospitals saw a 30-percent increase in the number of patients with respiratory problems in the first month of 2013 as soaring pollution levels got national and international attention.展开更多
LANDING in Hong Kong aftera three-hour flight from Beijing last November Liu Ran rushed over to the Dr. Vio & Partners Hospital. This was her third visit in the past six months to this Hong Kong hospital. Sitting in ...LANDING in Hong Kong aftera three-hour flight from Beijing last November Liu Ran rushed over to the Dr. Vio & Partners Hospital. This was her third visit in the past six months to this Hong Kong hospital. Sitting in the waiting room, a travel weary Liu, along with several of her friends also from the Chinese mainland, waited to receive their next vaccine shot against human papillomavi rus (HPV). The virus has been found to be the main cause of cervical cancer.展开更多
Chinese telecom carriers aim to carve up a bigger slice of the growing 3G pie one year after China kicked off its third-generation (3G) wireless services,
The Communist Party of China intensifies anti-corruption efforts In recent years,a two-digit number of provincial-and ministerial-level officials in China have been investigated and punished on corruption charges。
China’s labor pool is not running dry, but migrant workers are expecting more from cities For most of China’s 240 million farmers who leave their hometowns for manualobs in cities, the only opportunity for family re...China’s labor pool is not running dry, but migrant workers are expecting more from cities For most of China’s 240 million farmers who leave their hometowns for manualobs in cities, the only opportunity for family reunion is the Spring Festival,or Lunar展开更多
WHEN Professor Li Huanying visitedNanxing Village—one of the "lepers’villages" in Xishuangbanna DaiAutonomous Prefecture of Yunnan Province, sherefused to put on protective clothing, unlike manyprevious vi...WHEN Professor Li Huanying visitedNanxing Village—one of the "lepers’villages" in Xishuangbanna DaiAutonomous Prefecture of Yunnan Province, sherefused to put on protective clothing, unlike manyprevious visiting doctors there. No rubber boots andgloves, no gauze mask or special clothing that isburned when out of the village. She examined thepatients’ wounds, then shook their hands. That was in 1979, when leprosy was stillconsidered an incurable disease and people tried tokeep away from those afflicted as much as possible.展开更多
Damage assessment of the wing under blast wave is essential to the vulnerability reduction design of aircraft. This paper introduces a critical relative distance prediction method of aircraft wing damage based on the ...Damage assessment of the wing under blast wave is essential to the vulnerability reduction design of aircraft. This paper introduces a critical relative distance prediction method of aircraft wing damage based on the back-propagation artificial neural network(BP-ANN), which is trained by finite element simulation results. Moreover, the finite element method(FEM) for wing blast damage simulation has been validated by ground explosion tests and further used for damage mode determination and damage characteristics analysis. The analysis results indicate that the wing is more likely to be damaged when the root is struck from vertical directions than others for a small charge. With the increase of TNT equivalent charge, the main damage mode of the wing gradually changes from the local skin tearing to overall structural deformation and the overpressure threshold of wing damage decreases rapidly. Compared to the FEM-based damage assessment, the BP-ANN-based method can predict the wing damage under a random blast wave with an average relative error of 4.78%. The proposed method and conclusions can be used as a reference for damage assessment under blast wave and low-vulnerability design of aircraft structures.展开更多
Cloud computing(CC)is developing as a powerful and flexible computational structure for providing ubiquitous service to users.It receives interrelated software and hardware resources in an integrated manner distinct f...Cloud computing(CC)is developing as a powerful and flexible computational structure for providing ubiquitous service to users.It receives interrelated software and hardware resources in an integrated manner distinct from the classical computational environment.The variation of software and hardware resources were combined and composed as a resource pool.The software no more resided in the single hardware environment,it can be executed on the schedule of resource pools to optimize resource consumption.Optimizing energy consumption in CC environments is the question that allows utilizing several energy conservation approaches for effective resource allocation.This study introduces a Battle Royale Optimization-based Resource Scheduling Scheme for Cloud Computing Environment(BRORSS-CCE)technique.The presented BRORSS-CCE technique majorly schedules the available resources for maximum utilization and effectual makespan.In the BRORSS-CCE technique,the BRO is a population-based algorithm where all the individuals are denoted by a soldier/player who likes to go towards the optimal place and ultimate survival.The BRORSS-CCE technique can be employed to balance the load,distribute resources based on demand and assure services to all requests.The experimental validation of the BRORSS-CCE technique is tested under distinct aspects.The experimental outcomes indicated the enhancements of the BRORSS-CCE technique over other models.展开更多
Aspect-Based Sentiment Analysis(ABSA)on Arabic corpus has become an active research topic in recent days.ABSA refers to a fine-grained Sentiment Analysis(SA)task that focuses on the extraction of the conferred aspects...Aspect-Based Sentiment Analysis(ABSA)on Arabic corpus has become an active research topic in recent days.ABSA refers to a fine-grained Sentiment Analysis(SA)task that focuses on the extraction of the conferred aspects and the identification of respective sentiment polarity from the provided text.Most of the prevailing Arabic ABSA techniques heavily depend upon dreary feature-engineering and pre-processing tasks and utilize external sources such as lexicons.In literature,concerning the Arabic language text analysis,the authors made use of regular Machine Learning(ML)techniques that rely on a group of rare sources and tools.These sources were used for processing and analyzing the Arabic language content like lexicons.However,an important challenge in this domain is the unavailability of sufficient and reliable resources.In this background,the current study introduces a new Battle Royale Optimization with Fuzzy Deep Learning for Arabic Aspect Based Sentiment Classification(BROFDL-AASC)technique.The aim of the presented BROFDL-AASC model is to detect and classify the sentiments in the Arabic language.In the presented BROFDL-AASC model,data pre-processing is performed at first to convert the input data into a useful format.Besides,the BROFDL-AASC model includes Discriminative Fuzzy-based Restricted Boltzmann Machine(DFRBM)model for the identification and categorization of sentiments.Furthermore,the BRO algorithm is exploited for optimal fine-tuning of the hyperparameters related to the FBRBM model.This scenario establishes the novelty of current study.The performance of the proposed BROFDL-AASC model was validated and the outcomes demonstrate the supremacy of BROFDL-AASC model over other existing models.展开更多
Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the s...Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the simulation system could be how to reasonably determine simulation model input and build a bridge to link battle damage model and battle damage laws knowledge.In this paper,we propose a novel knowledge-oriented modeling method for influencing factors of battle damage in military industrial logistics,integrating conceptual analysis,conceptual modeling,quantitative modeling and simulation implementation.We conceptualize influencing factors of battle damage by using the principle of hierarchical decomposition,thus classifying the related battle damage knowledge logically.Then,we construct the conceptual model of influencing factors of battle damage by using Entity-Relations hip approach,thus describing their interactions reasonably.Subsequently,we extract the important influencing factors by using social network analysis,thus evaluating their importance quantitatively and further clarifying the elements of simulation.Finally,we develop an agent-based military industry logistics simulation system by taking the modeling results on influencing factors of battle damage as simulation model input,and obtain simulation model output,i.e.,new battle damage laws knowledge,thus verifying feasibility and effectiveness of the proposed method.The results show that this method can be used to support human decision-making and action.展开更多
Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interve...Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interventional medicine(IM)", or simply Intervention by our team,and "Interventional Radiology" is used no more. It has even been given the name "Third clinical Medicine" by us. Chinese intervention has established an independent association for interventional doctors, as well as independent interventional societies in many provinces. The national interventional society will likely be set up at some point in time. Chinese interve ntion has set up their own clinical wards, with much attention paid to a clinical, professional, and normalized direction for development, and established special nursing units. According to us, turf battle is meaningless. "The Third clinical Medicine" belongs to all human beings. It could also be predicted that interventional history will follow the same evolutionary rule as other disciplines, i.e., "long divided, must unite; long united, must divide".展开更多
Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuse...Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuses on a Self-Election dynamic honeypot framework which aims to bewilder attackers by coordinating and switching roles periodically to form a huge dynamic puzzle.In this paper,we discuss the UDP Spokesman synchronization scheme and the Self-Election coordination method,perform the framework simulation of the dynamic array honeypot with NS2,carry out the prototype implementation by Java,and then validate the effectiveness and feasibility on the simulation and prototype system.The promising results of applying this framework to mitigate the effects of attacks are shown and analyzed.Our work demonstrates that the Self-Election dynamic array honeypot system is feasible and effective for proactive network confrontation.展开更多
To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are cl...To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are classified into three types,which are aircraft,ship and submarine. Then,the attack ability value and defense ability value for each type of armed forces are estimated by using BP neural network,whose training results of sample data are consistent with the estimation results. Next,compared the assessment values through an improved Bradley-Terry model and constructed a Bayesian network to do the global assessment,the winning probabilities of both combat sides are obtained. Finally,the winning probability estimation for a navy battle is given to illustrate the validity of the proposed scheme.展开更多
Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal...Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal emphasis on rural and urban poverty,(iii)preventing people in the deeply poor regions from slipping back to poverty,(iv)combining external assistance with endogenous development,and(v)enhancing social protection and targeted fiscal support for aiding the poor.Following the new trends of poverty reduction,policymakers should update their strategic approach,adopt new poverty reduction standards,target at a broader group of poor groups,promote pro-poor development,and improve poverty governance.Lastly,this paper puts forward the following policy recommendations for reducing poverty in China post-2020:(i)maintaining policy continuity and stability during the transition period;(ii)creating regular poverty relief mechanisms for urban and rural residents;(iii)improving the targeted identification and dynamic adjustment of target groups for poverty reduction;and(iv)reducing poverty through social protection and development.展开更多
Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize...Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize communication cost and overhead due to it in the ad hoc networks, thus efforts are being made to make the communications more energy efficient. The application spectrum and use cases of wireless sensor networks includes many critical applications as environmental monitoring, to resource monitoring, to Industrial measurements, to public safety applications and last but not the least to sensitive applications as military sector applications .The erratic size of such networks and along with its exotic topology pose a magnificent set of challenges to the routing algorithms designed and implemented within such networks. The present work concentrates on the comparative analysis of some of reactive and proactive protocols used in the wireless sensor networks. The parameter for comparative analysis is the energy consumption for different simulation time and for different mobility conditions based scenario.展开更多
From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle o...From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle of the sexes in James Thurber’s literary works.展开更多
Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel ...Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel John Boyd’s theory of OODA loop that deals with information superiority. Building a robust, mobile and capable network that could provide for novel appliances and information superiority is the main challenge which modernizers are facing. Network, suitable for future combat operations, and able to transport a vast amount of information on a battlefield, is expensive to build. Every mistake in design and the need to correct those mistakes could halt development in an army for years. Therefore, system dependability analysis during system design phase is needed. In this report, the concept of a future Battle Network System is described. The Report evaluates operational environment of BNS and possible failure reasons of the service, and illustrates the change in BNS Quality of Service due to probable transport layer errors. This paper describes the method of testing the concept of proposed network systems on the drawing board, and emphasizes design points for a new system. Nevertheless, the proposed method is by no means conclusive. Rather, it describes an engineering approach to define the main problems while creating MANET-based networking systems.展开更多
文摘Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM).
文摘TOP leaders vowed to build a "beautiful China" in late 2012 at the 18th National Congress of the country's ruling party. But Beijing's air quality in early 2013 has shown that China still has a long way to go before realizing that goal. "If you have any respiratory diseases, please consult your doctor before you travel to China." suggests the Canadian Foreign Ministry on its website, This seemed to be good advice as Beijing hospitals saw a 30-percent increase in the number of patients with respiratory problems in the first month of 2013 as soaring pollution levels got national and international attention.
文摘LANDING in Hong Kong aftera three-hour flight from Beijing last November Liu Ran rushed over to the Dr. Vio & Partners Hospital. This was her third visit in the past six months to this Hong Kong hospital. Sitting in the waiting room, a travel weary Liu, along with several of her friends also from the Chinese mainland, waited to receive their next vaccine shot against human papillomavi rus (HPV). The virus has been found to be the main cause of cervical cancer.
文摘Chinese telecom carriers aim to carve up a bigger slice of the growing 3G pie one year after China kicked off its third-generation (3G) wireless services,
文摘The Communist Party of China intensifies anti-corruption efforts In recent years,a two-digit number of provincial-and ministerial-level officials in China have been investigated and punished on corruption charges。
文摘China’s labor pool is not running dry, but migrant workers are expecting more from cities For most of China’s 240 million farmers who leave their hometowns for manualobs in cities, the only opportunity for family reunion is the Spring Festival,or Lunar
文摘WHEN Professor Li Huanying visitedNanxing Village—one of the "lepers’villages" in Xishuangbanna DaiAutonomous Prefecture of Yunnan Province, sherefused to put on protective clothing, unlike manyprevious visiting doctors there. No rubber boots andgloves, no gauze mask or special clothing that isburned when out of the village. She examined thepatients’ wounds, then shook their hands. That was in 1979, when leprosy was stillconsidered an incurable disease and people tried tokeep away from those afflicted as much as possible.
基金supported by the Natural Science Foundation of Shaanxi Province (Grant No. 2020JQ-122)the Fund support of Science and Technology on Transient Impact Laboratory。
文摘Damage assessment of the wing under blast wave is essential to the vulnerability reduction design of aircraft. This paper introduces a critical relative distance prediction method of aircraft wing damage based on the back-propagation artificial neural network(BP-ANN), which is trained by finite element simulation results. Moreover, the finite element method(FEM) for wing blast damage simulation has been validated by ground explosion tests and further used for damage mode determination and damage characteristics analysis. The analysis results indicate that the wing is more likely to be damaged when the root is struck from vertical directions than others for a small charge. With the increase of TNT equivalent charge, the main damage mode of the wing gradually changes from the local skin tearing to overall structural deformation and the overpressure threshold of wing damage decreases rapidly. Compared to the FEM-based damage assessment, the BP-ANN-based method can predict the wing damage under a random blast wave with an average relative error of 4.78%. The proposed method and conclusions can be used as a reference for damage assessment under blast wave and low-vulnerability design of aircraft structures.
文摘Cloud computing(CC)is developing as a powerful and flexible computational structure for providing ubiquitous service to users.It receives interrelated software and hardware resources in an integrated manner distinct from the classical computational environment.The variation of software and hardware resources were combined and composed as a resource pool.The software no more resided in the single hardware environment,it can be executed on the schedule of resource pools to optimize resource consumption.Optimizing energy consumption in CC environments is the question that allows utilizing several energy conservation approaches for effective resource allocation.This study introduces a Battle Royale Optimization-based Resource Scheduling Scheme for Cloud Computing Environment(BRORSS-CCE)technique.The presented BRORSS-CCE technique majorly schedules the available resources for maximum utilization and effectual makespan.In the BRORSS-CCE technique,the BRO is a population-based algorithm where all the individuals are denoted by a soldier/player who likes to go towards the optimal place and ultimate survival.The BRORSS-CCE technique can be employed to balance the load,distribute resources based on demand and assure services to all requests.The experimental validation of the BRORSS-CCE technique is tested under distinct aspects.The experimental outcomes indicated the enhancements of the BRORSS-CCE technique over other models.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R281)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4340237DSR52。
文摘Aspect-Based Sentiment Analysis(ABSA)on Arabic corpus has become an active research topic in recent days.ABSA refers to a fine-grained Sentiment Analysis(SA)task that focuses on the extraction of the conferred aspects and the identification of respective sentiment polarity from the provided text.Most of the prevailing Arabic ABSA techniques heavily depend upon dreary feature-engineering and pre-processing tasks and utilize external sources such as lexicons.In literature,concerning the Arabic language text analysis,the authors made use of regular Machine Learning(ML)techniques that rely on a group of rare sources and tools.These sources were used for processing and analyzing the Arabic language content like lexicons.However,an important challenge in this domain is the unavailability of sufficient and reliable resources.In this background,the current study introduces a new Battle Royale Optimization with Fuzzy Deep Learning for Arabic Aspect Based Sentiment Classification(BROFDL-AASC)technique.The aim of the presented BROFDL-AASC model is to detect and classify the sentiments in the Arabic language.In the presented BROFDL-AASC model,data pre-processing is performed at first to convert the input data into a useful format.Besides,the BROFDL-AASC model includes Discriminative Fuzzy-based Restricted Boltzmann Machine(DFRBM)model for the identification and categorization of sentiments.Furthermore,the BRO algorithm is exploited for optimal fine-tuning of the hyperparameters related to the FBRBM model.This scenario establishes the novelty of current study.The performance of the proposed BROFDL-AASC model was validated and the outcomes demonstrate the supremacy of BROFDL-AASC model over other existing models.
基金This research was funded by National Natural Science Foundation of China(grant number 61473311,70901075)Natural Science Foundation of Beijing Municipality(grant number 9142017)military projects funded by the Chinese Army.
文摘Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the simulation system could be how to reasonably determine simulation model input and build a bridge to link battle damage model and battle damage laws knowledge.In this paper,we propose a novel knowledge-oriented modeling method for influencing factors of battle damage in military industrial logistics,integrating conceptual analysis,conceptual modeling,quantitative modeling and simulation implementation.We conceptualize influencing factors of battle damage by using the principle of hierarchical decomposition,thus classifying the related battle damage knowledge logically.Then,we construct the conceptual model of influencing factors of battle damage by using Entity-Relations hip approach,thus describing their interactions reasonably.Subsequently,we extract the important influencing factors by using social network analysis,thus evaluating their importance quantitatively and further clarifying the elements of simulation.Finally,we develop an agent-based military industry logistics simulation system by taking the modeling results on influencing factors of battle damage as simulation model input,and obtain simulation model output,i.e.,new battle damage laws knowledge,thus verifying feasibility and effectiveness of the proposed method.The results show that this method can be used to support human decision-making and action.
文摘Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interventional medicine(IM)", or simply Intervention by our team,and "Interventional Radiology" is used no more. It has even been given the name "Third clinical Medicine" by us. Chinese intervention has established an independent association for interventional doctors, as well as independent interventional societies in many provinces. The national interventional society will likely be set up at some point in time. Chinese interve ntion has set up their own clinical wards, with much attention paid to a clinical, professional, and normalized direction for development, and established special nursing units. According to us, turf battle is meaningless. "The Third clinical Medicine" belongs to all human beings. It could also be predicted that interventional history will follow the same evolutionary rule as other disciplines, i.e., "long divided, must unite; long united, must divide".
基金National Natural Science Foundation of China under Grant No.60973141the Foundation of Excellent Young Scientist of Shandong Province under Grant No. BS2009DX019the Fundamental Research Funds for the Central Universities under Grant No. 27R0907018A
文摘Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuses on a Self-Election dynamic honeypot framework which aims to bewilder attackers by coordinating and switching roles periodically to form a huge dynamic puzzle.In this paper,we discuss the UDP Spokesman synchronization scheme and the Self-Election coordination method,perform the framework simulation of the dynamic array honeypot with NS2,carry out the prototype implementation by Java,and then validate the effectiveness and feasibility on the simulation and prototype system.The promising results of applying this framework to mitigate the effects of attacks are shown and analyzed.Our work demonstrates that the Self-Election dynamic array honeypot system is feasible and effective for proactive network confrontation.
基金Sponsored by the National Natural Science Foundation of China(Grant No.61374212)the Aeronautical Science Foundation of China(Grant No.20135152047)the Fundamental Research Funds for the Central Universities(Grant No.NJ20160022)
文摘To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are classified into three types,which are aircraft,ship and submarine. Then,the attack ability value and defense ability value for each type of armed forces are estimated by using BP neural network,whose training results of sample data are consistent with the estimation results. Next,compared the assessment values through an improved Bradley-Terry model and constructed a Bayesian network to do the global assessment,the winning probabilities of both combat sides are obtained. Finally,the winning probability estimation for a navy battle is given to illustrate the validity of the proposed scheme.
基金Key Research Project of the Academy of Macroeconomic Research,the National Development and Reform Commission(NDRC)“Study on the Spatial Optimization of New Urbanization”(Grant No.:A2019051005).
文摘Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal emphasis on rural and urban poverty,(iii)preventing people in the deeply poor regions from slipping back to poverty,(iv)combining external assistance with endogenous development,and(v)enhancing social protection and targeted fiscal support for aiding the poor.Following the new trends of poverty reduction,policymakers should update their strategic approach,adopt new poverty reduction standards,target at a broader group of poor groups,promote pro-poor development,and improve poverty governance.Lastly,this paper puts forward the following policy recommendations for reducing poverty in China post-2020:(i)maintaining policy continuity and stability during the transition period;(ii)creating regular poverty relief mechanisms for urban and rural residents;(iii)improving the targeted identification and dynamic adjustment of target groups for poverty reduction;and(iv)reducing poverty through social protection and development.
文摘Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize communication cost and overhead due to it in the ad hoc networks, thus efforts are being made to make the communications more energy efficient. The application spectrum and use cases of wireless sensor networks includes many critical applications as environmental monitoring, to resource monitoring, to Industrial measurements, to public safety applications and last but not the least to sensitive applications as military sector applications .The erratic size of such networks and along with its exotic topology pose a magnificent set of challenges to the routing algorithms designed and implemented within such networks. The present work concentrates on the comparative analysis of some of reactive and proactive protocols used in the wireless sensor networks. The parameter for comparative analysis is the energy consumption for different simulation time and for different mobility conditions based scenario.
文摘From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle of the sexes in James Thurber’s literary works.
文摘Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel John Boyd’s theory of OODA loop that deals with information superiority. Building a robust, mobile and capable network that could provide for novel appliances and information superiority is the main challenge which modernizers are facing. Network, suitable for future combat operations, and able to transport a vast amount of information on a battlefield, is expensive to build. Every mistake in design and the need to correct those mistakes could halt development in an army for years. Therefore, system dependability analysis during system design phase is needed. In this report, the concept of a future Battle Network System is described. The Report evaluates operational environment of BNS and possible failure reasons of the service, and illustrates the change in BNS Quality of Service due to probable transport layer errors. This paper describes the method of testing the concept of proposed network systems on the drawing board, and emphasizes design points for a new system. Nevertheless, the proposed method is by no means conclusive. Rather, it describes an engineering approach to define the main problems while creating MANET-based networking systems.