Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v...Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.展开更多
When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</su...When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
Background: We previously showed that treatment with Mycobacterium bovis BCG killed by extended freeze-drying (EFD BCG) modulates inflammation through regulatory T cells (Tregs) in an acute asthma model. In this study...Background: We previously showed that treatment with Mycobacterium bovis BCG killed by extended freeze-drying (EFD BCG) modulates inflammation through regulatory T cells (Tregs) in an acute asthma model. In this study, we investigated the kinetics of Treg induction as well as their long-term homing in spleen and lungs correlating with reduced airway hyperresponsiveness (AHR) in a murine model of acute allergic asthma. We then evaluated the therapeutic implication of EFD BCG in a chronic asthma model. Methods: Tregs expressing Foxp3 were analyzed in various organs shortly and long-term after EFD BCG, live- and Heat Killed-(HK-) BCG treatments in an acute model of asthma. We further studied EFD BCG treatment on airway inflammation using a chronic model of asthma in mice. Results: Foxp3 expression peaked in the inguinal draining lymph-nodes (iDLNs) 2-4 days after EFD BCG treatment whereas it was long-term observed in spleen (days 7 to 90). This increase in Foxp3 expression was also found in lungs upon intranasal ovalbumin (OVA) challenge in OVA-sensitized mice. The loss of protection 4 months after EFD BCG treatment was correlated with the end of this phenomenon. Moreover, major lung inflammation hallmarks of severe asthma after multiple allergen challenges promoting chronic airway inflammation in OVA sensitized mice were reduced by EFD BCG treatment: AHR, eosinophils and neutrophils in bronchoalveolar lavage (BAL), mucus metaplasia, Th2 as well as Th17 cytokine levels in BAL and sera. EFD BCG treatment also enhances PPAR-γ expression and regulates NF-κBp65 translocation in lung extracts in this model of chronic asthma. Conclusions: EFD BCG treatment induced long-term protective effect associated to Foxp3 Tregs in the spleen and lungs in an acute model of asthma and inhibits AHR in a chronic model of asthma. EFD BCG could be a new and promising immuno-modulatory alternative treatment to corticoids in severe human asthma.展开更多
Oscar Wilde is mainly famous for being the representative figure of Aesthetic Movement and the steadfast advocate of"art for art's sake". Although being influenced by the traditional dichotomy of women, ...Oscar Wilde is mainly famous for being the representative figure of Aesthetic Movement and the steadfast advocate of"art for art's sake". Although being influenced by the traditional dichotomy of women, Wilde does try to add some personal elements during this process. In one of his social comedies, An Ideal Husband, this wildean characteristic is more obvious. This essay attempts to reveal those hidden images which are employed by Wilde to represent his female characters and tries to show the Wilde's improvement of the traditional dichotomy.展开更多
To Kill A Mockingbird is a novel written by Harper Lee. In the novel, Lee reveals the situation happened in Maycomb city and depicts Arthur(Boo) Radley, a mysterious hermit who is recognized as a madman by citizens. M...To Kill A Mockingbird is a novel written by Harper Lee. In the novel, Lee reveals the situation happened in Maycomb city and depicts Arthur(Boo) Radley, a mysterious hermit who is recognized as a madman by citizens. My paper is going to argue for Boo that he is not a madman, being locked out by his father; instead, he chooses to be a hermit due to the awfulness of the city:its prevalent gossip, its racial inequality and its lawless policies.展开更多
In this paper we classify spatially homogeneous rotating space-times according to their teleparallel Killing vector fields using direct integration technique.It turns out that the dimension of the teleparallel Killing...In this paper we classify spatially homogeneous rotating space-times according to their teleparallel Killing vector fields using direct integration technique.It turns out that the dimension of the teleparallel Killing vector fields is 5 or 10.In the case of 10 teleparallel Killing vector fields the space-time becomes Minkowski and all the torsion components are zero.Teleparallel Killing vector fields in this case are exactly the same as in general relativity.In the cases of 5 teleparallel Killing vector fields we get two more conservation laws in the teleparallel theory of gravitation.Here we also discuss some well-known examples of spatially homogeneous rotating space-times according to their teleparallel Killing vector fields.展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
基金National Natural Science Foundation of China(Grant Nos.62005276,62175234)the Scientific and Technological Development Program of Jilin,China(Grant No.20230508111RC)to provide fund for this research。
文摘Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.
文摘When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘Background: We previously showed that treatment with Mycobacterium bovis BCG killed by extended freeze-drying (EFD BCG) modulates inflammation through regulatory T cells (Tregs) in an acute asthma model. In this study, we investigated the kinetics of Treg induction as well as their long-term homing in spleen and lungs correlating with reduced airway hyperresponsiveness (AHR) in a murine model of acute allergic asthma. We then evaluated the therapeutic implication of EFD BCG in a chronic asthma model. Methods: Tregs expressing Foxp3 were analyzed in various organs shortly and long-term after EFD BCG, live- and Heat Killed-(HK-) BCG treatments in an acute model of asthma. We further studied EFD BCG treatment on airway inflammation using a chronic model of asthma in mice. Results: Foxp3 expression peaked in the inguinal draining lymph-nodes (iDLNs) 2-4 days after EFD BCG treatment whereas it was long-term observed in spleen (days 7 to 90). This increase in Foxp3 expression was also found in lungs upon intranasal ovalbumin (OVA) challenge in OVA-sensitized mice. The loss of protection 4 months after EFD BCG treatment was correlated with the end of this phenomenon. Moreover, major lung inflammation hallmarks of severe asthma after multiple allergen challenges promoting chronic airway inflammation in OVA sensitized mice were reduced by EFD BCG treatment: AHR, eosinophils and neutrophils in bronchoalveolar lavage (BAL), mucus metaplasia, Th2 as well as Th17 cytokine levels in BAL and sera. EFD BCG treatment also enhances PPAR-γ expression and regulates NF-κBp65 translocation in lung extracts in this model of chronic asthma. Conclusions: EFD BCG treatment induced long-term protective effect associated to Foxp3 Tregs in the spleen and lungs in an acute model of asthma and inhibits AHR in a chronic model of asthma. EFD BCG could be a new and promising immuno-modulatory alternative treatment to corticoids in severe human asthma.
文摘Oscar Wilde is mainly famous for being the representative figure of Aesthetic Movement and the steadfast advocate of"art for art's sake". Although being influenced by the traditional dichotomy of women, Wilde does try to add some personal elements during this process. In one of his social comedies, An Ideal Husband, this wildean characteristic is more obvious. This essay attempts to reveal those hidden images which are employed by Wilde to represent his female characters and tries to show the Wilde's improvement of the traditional dichotomy.
文摘To Kill A Mockingbird is a novel written by Harper Lee. In the novel, Lee reveals the situation happened in Maycomb city and depicts Arthur(Boo) Radley, a mysterious hermit who is recognized as a madman by citizens. My paper is going to argue for Boo that he is not a madman, being locked out by his father; instead, he chooses to be a hermit due to the awfulness of the city:its prevalent gossip, its racial inequality and its lawless policies.
文摘In this paper we classify spatially homogeneous rotating space-times according to their teleparallel Killing vector fields using direct integration technique.It turns out that the dimension of the teleparallel Killing vector fields is 5 or 10.In the case of 10 teleparallel Killing vector fields the space-time becomes Minkowski and all the torsion components are zero.Teleparallel Killing vector fields in this case are exactly the same as in general relativity.In the cases of 5 teleparallel Killing vector fields we get two more conservation laws in the teleparallel theory of gravitation.Here we also discuss some well-known examples of spatially homogeneous rotating space-times according to their teleparallel Killing vector fields.
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.