This paper is to explore and analyze the representations of women in Hollywood action films-Kill Bill and Charlie's Angels.In the former Hollywood action films such as 007,women are often depicted as a foil or ass...This paper is to explore and analyze the representations of women in Hollywood action films-Kill Bill and Charlie's Angels.In the former Hollywood action films such as 007,women are often depicted as a foil or assistant to the leading actors.What have been emphasized is their appearance and body;they depend on men and they need to be protected by men.However,in Kill Bill and Charlie's Angels,women appear to be the leading roles.They become physically strong and they are able to defeat men.However,the women images in these films are still designed to meet the men's standard,to satisfy their sexual desire towards women,and to reflect their male domination.Part I is a brief introduction of the women images in former action films and offers the thesis statement.Part II concentrates on the marginalized and specialized women images,which provide pleasant sensation to male audiences.Part III is about the male domination reflected in these mentioned films.Part IV focuses on the cinematic ways of shooting used in these films and how the women bodies are exposed in front of the audiences by using these means of shooting.Part V is the conclusion of this paper.展开更多
Objective: To study multi-directional derivation of cord blood mononuclear cells to CD3AK, LAK and CIK cells as well as changes of killing activity to gastric cancer cell strain in vitro. Methods: CD3mAb and IL-2 we...Objective: To study multi-directional derivation of cord blood mononuclear cells to CD3AK, LAK and CIK cells as well as changes of killing activity to gastric cancer cell strain in vitro. Methods: CD3mAb and IL-2 were used to induce CD3AK cells, and IL-2 was used to induce LAK cells; IFN-γ was used in the beginning, then IL-1, CD3mAb and IL-2 were used to induce CIK cells after 24 h for observing amplification and analyzing their relationship. The phenotypes of the cultured CIK cells were analyzed by flow cytometry. Subsequently, by using MGC-803 gastric cancer cell strain as target cells, the killing activity of CD3AK, LAK and CIK cells was evaluated by using MTT method. Results: The amplification activity of CD3AK and CIK cells was all far higher than LAK cells (P〈0.05). The amplification activity had no obvious difference between CIK cells and CD3AK cells at prophase, but that was far higher in CIK cells than CD3AK cells at about 20^th day (P〈0.05). The flow cytometry revealed that the amount of CD3^+ CD56^+ cells, major effector cells after CIK cells being cultured was significantly increased (P〈0.05), moreover, the amount of CD8^+ cells was significantly increased as well (P〈0.05). The killing activities of CD3AK and CIK cells to the MGC-803 gastric cancer cell strain were all significantly higher than LAK cells, while the killing activity of CIK cells was stronger than CD3AK cells (P〈0.05). Conclusion: CIK cells have stronger amplification activity and killing activity, and can be taken as more effective killing cells applied to the tumor adoptive immunotherapy.展开更多
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v...Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</su...When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages.展开更多
文摘This paper is to explore and analyze the representations of women in Hollywood action films-Kill Bill and Charlie's Angels.In the former Hollywood action films such as 007,women are often depicted as a foil or assistant to the leading actors.What have been emphasized is their appearance and body;they depend on men and they need to be protected by men.However,in Kill Bill and Charlie's Angels,women appear to be the leading roles.They become physically strong and they are able to defeat men.However,the women images in these films are still designed to meet the men's standard,to satisfy their sexual desire towards women,and to reflect their male domination.Part I is a brief introduction of the women images in former action films and offers the thesis statement.Part II concentrates on the marginalized and specialized women images,which provide pleasant sensation to male audiences.Part III is about the male domination reflected in these mentioned films.Part IV focuses on the cinematic ways of shooting used in these films and how the women bodies are exposed in front of the audiences by using these means of shooting.Part V is the conclusion of this paper.
文摘Objective: To study multi-directional derivation of cord blood mononuclear cells to CD3AK, LAK and CIK cells as well as changes of killing activity to gastric cancer cell strain in vitro. Methods: CD3mAb and IL-2 were used to induce CD3AK cells, and IL-2 was used to induce LAK cells; IFN-γ was used in the beginning, then IL-1, CD3mAb and IL-2 were used to induce CIK cells after 24 h for observing amplification and analyzing their relationship. The phenotypes of the cultured CIK cells were analyzed by flow cytometry. Subsequently, by using MGC-803 gastric cancer cell strain as target cells, the killing activity of CD3AK, LAK and CIK cells was evaluated by using MTT method. Results: The amplification activity of CD3AK and CIK cells was all far higher than LAK cells (P〈0.05). The amplification activity had no obvious difference between CIK cells and CD3AK cells at prophase, but that was far higher in CIK cells than CD3AK cells at about 20^th day (P〈0.05). The flow cytometry revealed that the amount of CD3^+ CD56^+ cells, major effector cells after CIK cells being cultured was significantly increased (P〈0.05), moreover, the amount of CD8^+ cells was significantly increased as well (P〈0.05). The killing activities of CD3AK and CIK cells to the MGC-803 gastric cancer cell strain were all significantly higher than LAK cells, while the killing activity of CIK cells was stronger than CD3AK cells (P〈0.05). Conclusion: CIK cells have stronger amplification activity and killing activity, and can be taken as more effective killing cells applied to the tumor adoptive immunotherapy.
基金National Natural Science Foundation of China(Grant Nos.62005276,62175234)the Scientific and Technological Development Program of Jilin,China(Grant No.20230508111RC)to provide fund for this research。
文摘Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages.