In clustering algorithms,the selection of neighbors significantly affects the quality of the final clustering results.While various neighbor relationships exist,such as K-nearest neighbors,natural neighbors,and shared...In clustering algorithms,the selection of neighbors significantly affects the quality of the final clustering results.While various neighbor relationships exist,such as K-nearest neighbors,natural neighbors,and shared neighbors,most neighbor relationships can only handle single structural relationships,and the identification accuracy is low for datasets with multiple structures.In life,people’s first instinct for complex things is to divide them into multiple parts to complete.Partitioning the dataset into more sub-graphs is a good idea approach to identifying complex structures.Taking inspiration from this,we propose a novel neighbor method:Shared Natural Neighbors(SNaN).To demonstrate the superiority of this neighbor method,we propose a shared natural neighbors-based hierarchical clustering algorithm for discovering arbitrary-shaped clusters(HC-SNaN).Our algorithm excels in identifying both spherical clusters and manifold clusters.Tested on synthetic datasets and real-world datasets,HC-SNaN demonstrates significant advantages over existing clustering algorithms,particularly when dealing with datasets containing arbitrary shapes.展开更多
This paper proposes an active learning accelerated Monte-Carlo simulation method based on the modified K-nearest neighbors algorithm.The core idea of the proposed method is to judge whether or not the output of a rand...This paper proposes an active learning accelerated Monte-Carlo simulation method based on the modified K-nearest neighbors algorithm.The core idea of the proposed method is to judge whether or not the output of a random input point can be postulated through a classifier implemented through the modified K-nearest neighbors algorithm.Compared to other active learning methods resorting to experimental designs,the proposed method is characterized by employing Monte-Carlo simulation for sampling inputs and saving a large portion of the actual evaluations of outputs through an accurate classification,which is applicable for most structural reliability estimation problems.Moreover,the validity,efficiency,and accuracy of the proposed method are demonstrated numerically.In addition,the optimal value of K that maximizes the computational efficiency is studied.Finally,the proposed method is applied to the reliability estimation of the carbon fiber reinforced silicon carbide composite specimens subjected to random displacements,which further validates its practicability.展开更多
In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work invo...In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work involves maintaining multiple tokens across the network.To prevent mutual interference among multi-token holders,we introduce the time and space non-interference theorems.Furthermore,we propose a master-slave strategy between tokens.When the master token holder(MTH)performs the neighbor discovery,it decides which 1-hop neighbor is the next MTH and which 2-hop neighbors can be the new slave token holders(STHs).Using this approach,the MTH and multiple STHs can simultaneously discover their neighbors without causing interference with each other.Building on this foundation,we provide a comprehensive procedure for the M-SAND protocol.We also conduct theoretical analyses on the maximum number of STHs and the lower bound of multi-token generation probability.Finally,simulation results demonstrate the time efficiency of the M-SAND protocol.When compared to the QSAND protocol,which uses only one token,the total neighbor discovery time is reduced by 28% when 6beams and 112 nodes are employed.展开更多
Against the backdrop of the international political and economic configuration featuring that“the East is rising and the West is declining”,relations between China and its neighboring countries enjoy steady developm...Against the backdrop of the international political and economic configuration featuring that“the East is rising and the West is declining”,relations between China and its neighboring countries enjoy steady development in general.However,the return of the Cold War mentality,rampant protectionism and prominent security governance issues have seriously threatened peace and stability in China’s neighboring region.展开更多
In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communicati...In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms.展开更多
In order to reveal the complex network characteristics and evolution principle of China aviation network,the probability distribution and evolution trace of arithmetic average of edge vertices nearest neighbor average...In order to reveal the complex network characteristics and evolution principle of China aviation network,the probability distribution and evolution trace of arithmetic average of edge vertices nearest neighbor average degree values of China aviation network were studied based on the statistics data of China civil aviation network in 1988,1994,2001,2008 and 2015.According to the theory and method of complex network,the network system was constructed with the city where the airport was located as the network node and the route between cities as the edge of the network.Based on the statistical data,the arithmetic averages of edge vertices nearest neighbor average degree values of China aviation network in 1988,1994,2001,2008 and 2015 were calculated.Using the probability statistical analysis method,it was found that the arithmetic average of edge vertices nearest neighbor average degree values had the probability distribution of normal function and the position parameters and scale parameters of the probability distribution had linear evolution trace.展开更多
As the most productive and prestigious writer in contemporary Australian literature,Tim Winton is noted not only for his novels but also for his short stories.Neighbors is a case in point.The short story describes the...As the most productive and prestigious writer in contemporary Australian literature,Tim Winton is noted not only for his novels but also for his short stories.Neighbors is a case in point.The short story describes the daily trivial incidents in the multi-cultural background according to the line of a newly-weds moving to a new neighborhood.The young couple gradually understood and communicated with their neighbors and eventually achieved cultural adaptation.展开更多
Intrusion detection aims to detect intrusion behavior and serves as a complement to firewalls.It can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic fire...Intrusion detection aims to detect intrusion behavior and serves as a complement to firewalls.It can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic firewalls.Many intrusion detection methods are processed through machine learning.Previous literature has shown that the performance of an intrusion detection method based on hybrid learning or integration approach is superior to that of single learning technology.However,almost no studies focus on how additional representative and concise features can be extracted to process effective intrusion detection among massive and complicated data.In this paper,a new hybrid learning method is proposed on the basis of features such as density,cluster centers,and nearest neighbors(DCNN).In this algorithm,data is represented by the local density of each sample point and the sum of distances from each sample point to cluster centers and to its nearest neighbor.k-NN classifier is adopted to classify the new feature vectors.Our experiment shows that DCNN,which combines K-means,clustering-based density,and k-NN classifier,is effective in intrusion detection.展开更多
Cultural assimilation consists of three stages:frustration and unease,acceptance mixed with interval uncertainty,assimilation.As a prestigious Western Australian,Tim Winton is famous for his novels and short stories.B...Cultural assimilation consists of three stages:frustration and unease,acceptance mixed with interval uncertainty,assimilation.As a prestigious Western Australian,Tim Winton is famous for his novels and short stories.Based on one of his popular short stories Neighbors,this essay aims to point out that a willingness to change and the powerful influence of the surroundings are both critical when one tries to get merged into a new culture.展开更多
It is well known that the nonparametric estimation of the regression function is highly sensitive to the presence of even a small proportion of outliers in the data.To solve the problem of typical observations when th...It is well known that the nonparametric estimation of the regression function is highly sensitive to the presence of even a small proportion of outliers in the data.To solve the problem of typical observations when the covariates of the nonparametric component are functional,the robust estimates for the regression parameter and regression operator are introduced.The main propose of the paper is to consider data-driven methods of selecting the number of neighbors in order to make the proposed processes fully automatic.We use thek Nearest Neighbors procedure(kNN)to construct the kernel estimator of the proposed robust model.Under some regularity conditions,we state consistency results for kNN functional estimators,which are uniform in the number of neighbors(UINN).Furthermore,a simulation study and an empirical application to a real data analysis of octane gasoline predictions are carried out to illustrate the higher predictive performances and the usefulness of the kNN approach.展开更多
After the September 11 events, America timely took the opportunity of antiterrorism to spread its offensive to Central Asia. In so doing, its intention to push for its policy of "managing " Eurasia has becom...After the September 11 events, America timely took the opportunity of antiterrorism to spread its offensive to Central Asia. In so doing, its intention to push for its policy of "managing " Eurasia has become prominent. Undoubtedly, America’s series of measures ignited changes of the situation in China’s surrounding regions, bringing many negative展开更多
In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between p...In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between points is necessary. Therefore, a nearest neighbors search scheme, considering the local complexity of the processing point, is used to determinate the neighbors for each point in a point geometry. With the constructed virtual connectivity, the secret message can be embedded successfully after the vertex decimation and data embedding processes. The experimental results show that the proposed algorithm can preserve the advantages of previous work, including higher estimation accuracy, high embedding capacity, acceptable model distortion, and robustness against similarity transformation attacks. Most importantly, this work is the first 3D steganographic algorithm for point geometry with adaptation.展开更多
Strategic competition between China and the United States has gradually intensified while the relationship between China and neighboring countries has stabilized.The implementation of an " America First"poli...Strategic competition between China and the United States has gradually intensified while the relationship between China and neighboring countries has stabilized.The implementation of an " America First"policy along with a decline in US strategic credibility is prompting China's neighbors to adopt a more cooperative stance toward China.China's positive response to those gestures and its continued strategic reassurance improve China's strategic credibility.Allaying their security concerns lays a foundation for continuous improvement of China's neighboring security environment.It is imperative for China to grasp this opportunity to resolve disputes with its neighbors to ease its rise dilemma.展开更多
The draft of the Foreign Investment Law was a hot topic of this year’s Two Sessions held in March.The newly-adopted law is an innovation in the legal system on foreign investment and serves as the basic law on foreig...The draft of the Foreign Investment Law was a hot topic of this year’s Two Sessions held in March.The newly-adopted law is an innovation in the legal system on foreign investment and serves as the basic law on foreign investment as China continues to open up in the new era.Thai enterprises were among the first foreign companies to enter China after the introduction of the reform and opening-up policy.On the sidelines of the Two Sessions,China Report ASEAN conducted an exclusive interview with Vithit Powattanasuk,Consul-General of Royal Thai Consulate-General in Chengdu.展开更多
China has a large number of neighboring countries, and its relations with them together with the situation of the neighborhood mean special and important interests for China. Given that, China has put its relations wi...China has a large number of neighboring countries, and its relations with them together with the situation of the neighborhood mean special and important interests for China. Given that, China has put its relations with neighboring countries in the first place in its foreign relations, and has put forward the basic concepts of developing relations with the neighboring countries, such as good neighborliness.展开更多
Jiro Ninomiya name to the United States ,from Japan .at the tum of the century and bought a few acres of land just northeast,of SanFrrincisco. There,next to a palm tree,
Starting from the eight vertex types in the Penrose tiling, we investigate the configurations beyond the nearest neighbors. The detailed structure of configurations and their concentrations in the whole pattern are ob...Starting from the eight vertex types in the Penrose tiling, we investigate the configurations beyond the nearest neighbors. The detailed structure of configurations and their concentrations in the whole pattern are obtained. It is found that the number of configuration types increases greatly when the observed clusters are becoming larger, which indicates that it is difficult to generate a perfect Penrose tiling according to the local matching rules.展开更多
Singer is a Polish — born Jewish author in Yiddish, awarded the Nobel Prize in Literature in 1978. Although Singer is exposed to the English culture of United States for more than 50 years, he always insists on the m...Singer is a Polish — born Jewish author in Yiddish, awarded the Nobel Prize in Literature in 1978. Although Singer is exposed to the English culture of United States for more than 50 years, he always insists on the mother tongue Yiddish creation.The way in which he writes with the dying language fully expresses his"outsiders"identity in the exotic culture. This thesis aims to analyze the"outsiders"identity revealed in Neighbors from the perspective of Singer's strict adherence to Yiddish and Jews as victims of the history.展开更多
Recently, a circular has been is- sued by the Ministry of Com merce to notify the domestictextile exporters not to be engaged in il- legal transit trade. If those practices are founded, there will be severe punishment.
Since the 18th National Congress of the Communist Party of China,China has proposed and actively acted on the important vision of building a community with a shared future for mankind.In October 2013,President Xi Jinp...Since the 18th National Congress of the Communist Party of China,China has proposed and actively acted on the important vision of building a community with a shared future for mankind.In October 2013,President Xi Jinping put forward that“the building of a community with a shared future should be advanced in China’s neighboring countries”.展开更多
基金This work was supported by Science and Technology Research Program of Chongqing Municipal Education Commission(KJZD-M202300502,KJQN201800539).
文摘In clustering algorithms,the selection of neighbors significantly affects the quality of the final clustering results.While various neighbor relationships exist,such as K-nearest neighbors,natural neighbors,and shared neighbors,most neighbor relationships can only handle single structural relationships,and the identification accuracy is low for datasets with multiple structures.In life,people’s first instinct for complex things is to divide them into multiple parts to complete.Partitioning the dataset into more sub-graphs is a good idea approach to identifying complex structures.Taking inspiration from this,we propose a novel neighbor method:Shared Natural Neighbors(SNaN).To demonstrate the superiority of this neighbor method,we propose a shared natural neighbors-based hierarchical clustering algorithm for discovering arbitrary-shaped clusters(HC-SNaN).Our algorithm excels in identifying both spherical clusters and manifold clusters.Tested on synthetic datasets and real-world datasets,HC-SNaN demonstrates significant advantages over existing clustering algorithms,particularly when dealing with datasets containing arbitrary shapes.
基金supported by the National Natural Science Foundation of China(Grant No.12002246 and No.52178301)Knowledge Innovation Program of Wuhan(Grant No.2022010801020357)+2 种基金the Science Research Foundation of Wuhan Institute of Technology(Grant No.K2021030)2020 annual Open Fund of Failure Mechanics&Engineering Disaster Prevention and Mitigation,Key Laboratory of Sichuan Province(Sichuan University)(Grant No.2020JDS0022)Open Research Fund Program of Hubei Provincial Key Laboratory of Chemical Equipment Intensification and Intrinsic Safety(Grant No.2019KA03)。
文摘This paper proposes an active learning accelerated Monte-Carlo simulation method based on the modified K-nearest neighbors algorithm.The core idea of the proposed method is to judge whether or not the output of a random input point can be postulated through a classifier implemented through the modified K-nearest neighbors algorithm.Compared to other active learning methods resorting to experimental designs,the proposed method is characterized by employing Monte-Carlo simulation for sampling inputs and saving a large portion of the actual evaluations of outputs through an accurate classification,which is applicable for most structural reliability estimation problems.Moreover,the validity,efficiency,and accuracy of the proposed method are demonstrated numerically.In addition,the optimal value of K that maximizes the computational efficiency is studied.Finally,the proposed method is applied to the reliability estimation of the carbon fiber reinforced silicon carbide composite specimens subjected to random displacements,which further validates its practicability.
基金supported in part by the National Natural Science Foundations of CHINA(Grant No.61771392,No.61771390,No.61871322 and No.61501373)Science and Technology on Avionics Integration Laboratory and the Aeronautical Science Foundation of China(Grant No.201955053002 and No.20185553035)。
文摘In this paper,we propose a Multi-token Sector Antenna Neighbor Discovery(M-SAND)protocol to enhance the efficiency of neighbor discovery in asynchronous directional ad hoc networks.The central concept of our work involves maintaining multiple tokens across the network.To prevent mutual interference among multi-token holders,we introduce the time and space non-interference theorems.Furthermore,we propose a master-slave strategy between tokens.When the master token holder(MTH)performs the neighbor discovery,it decides which 1-hop neighbor is the next MTH and which 2-hop neighbors can be the new slave token holders(STHs).Using this approach,the MTH and multiple STHs can simultaneously discover their neighbors without causing interference with each other.Building on this foundation,we provide a comprehensive procedure for the M-SAND protocol.We also conduct theoretical analyses on the maximum number of STHs and the lower bound of multi-token generation probability.Finally,simulation results demonstrate the time efficiency of the M-SAND protocol.When compared to the QSAND protocol,which uses only one token,the total neighbor discovery time is reduced by 28% when 6beams and 112 nodes are employed.
文摘Against the backdrop of the international political and economic configuration featuring that“the East is rising and the West is declining”,relations between China and its neighboring countries enjoy steady development in general.However,the return of the Cold War mentality,rampant protectionism and prominent security governance issues have seriously threatened peace and stability in China’s neighboring region.
基金supported in part by the Fundamental Research Funds for the Central Universities under Grant No.2024ZCJH01in part by the National Natural Science Foundation of China(NSFC)under Grant No.62271081in part by the National Key Research and Development Program of China under Grant No.2020YFA0711302.
文摘In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms.
文摘In order to reveal the complex network characteristics and evolution principle of China aviation network,the probability distribution and evolution trace of arithmetic average of edge vertices nearest neighbor average degree values of China aviation network were studied based on the statistics data of China civil aviation network in 1988,1994,2001,2008 and 2015.According to the theory and method of complex network,the network system was constructed with the city where the airport was located as the network node and the route between cities as the edge of the network.Based on the statistical data,the arithmetic averages of edge vertices nearest neighbor average degree values of China aviation network in 1988,1994,2001,2008 and 2015 were calculated.Using the probability statistical analysis method,it was found that the arithmetic average of edge vertices nearest neighbor average degree values had the probability distribution of normal function and the position parameters and scale parameters of the probability distribution had linear evolution trace.
文摘As the most productive and prestigious writer in contemporary Australian literature,Tim Winton is noted not only for his novels but also for his short stories.Neighbors is a case in point.The short story describes the daily trivial incidents in the multi-cultural background according to the line of a newly-weds moving to a new neighborhood.The young couple gradually understood and communicated with their neighbors and eventually achieved cultural adaptation.
文摘Intrusion detection aims to detect intrusion behavior and serves as a complement to firewalls.It can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic firewalls.Many intrusion detection methods are processed through machine learning.Previous literature has shown that the performance of an intrusion detection method based on hybrid learning or integration approach is superior to that of single learning technology.However,almost no studies focus on how additional representative and concise features can be extracted to process effective intrusion detection among massive and complicated data.In this paper,a new hybrid learning method is proposed on the basis of features such as density,cluster centers,and nearest neighbors(DCNN).In this algorithm,data is represented by the local density of each sample point and the sum of distances from each sample point to cluster centers and to its nearest neighbor.k-NN classifier is adopted to classify the new feature vectors.Our experiment shows that DCNN,which combines K-means,clustering-based density,and k-NN classifier,is effective in intrusion detection.
文摘Cultural assimilation consists of three stages:frustration and unease,acceptance mixed with interval uncertainty,assimilation.As a prestigious Western Australian,Tim Winton is famous for his novels and short stories.Based on one of his popular short stories Neighbors,this essay aims to point out that a willingness to change and the powerful influence of the surroundings are both critical when one tries to get merged into a new culture.
文摘It is well known that the nonparametric estimation of the regression function is highly sensitive to the presence of even a small proportion of outliers in the data.To solve the problem of typical observations when the covariates of the nonparametric component are functional,the robust estimates for the regression parameter and regression operator are introduced.The main propose of the paper is to consider data-driven methods of selecting the number of neighbors in order to make the proposed processes fully automatic.We use thek Nearest Neighbors procedure(kNN)to construct the kernel estimator of the proposed robust model.Under some regularity conditions,we state consistency results for kNN functional estimators,which are uniform in the number of neighbors(UINN).Furthermore,a simulation study and an empirical application to a real data analysis of octane gasoline predictions are carried out to illustrate the higher predictive performances and the usefulness of the kNN approach.
文摘After the September 11 events, America timely took the opportunity of antiterrorism to spread its offensive to Central Asia. In so doing, its intention to push for its policy of "managing " Eurasia has become prominent. Undoubtedly, America’s series of measures ignited changes of the situation in China’s surrounding regions, bringing many negative
基金supported by the National Science Council under Grant No. NSC98-2221-E-468-017 and NSC 100-2221-E-468-023the Research Project of Asia University under Grant No. 100-A-04
文摘In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between points is necessary. Therefore, a nearest neighbors search scheme, considering the local complexity of the processing point, is used to determinate the neighbors for each point in a point geometry. With the constructed virtual connectivity, the secret message can be embedded successfully after the vertex decimation and data embedding processes. The experimental results show that the proposed algorithm can preserve the advantages of previous work, including higher estimation accuracy, high embedding capacity, acceptable model distortion, and robustness against similarity transformation attacks. Most importantly, this work is the first 3D steganographic algorithm for point geometry with adaptation.
文摘Strategic competition between China and the United States has gradually intensified while the relationship between China and neighboring countries has stabilized.The implementation of an " America First"policy along with a decline in US strategic credibility is prompting China's neighbors to adopt a more cooperative stance toward China.China's positive response to those gestures and its continued strategic reassurance improve China's strategic credibility.Allaying their security concerns lays a foundation for continuous improvement of China's neighboring security environment.It is imperative for China to grasp this opportunity to resolve disputes with its neighbors to ease its rise dilemma.
文摘The draft of the Foreign Investment Law was a hot topic of this year’s Two Sessions held in March.The newly-adopted law is an innovation in the legal system on foreign investment and serves as the basic law on foreign investment as China continues to open up in the new era.Thai enterprises were among the first foreign companies to enter China after the introduction of the reform and opening-up policy.On the sidelines of the Two Sessions,China Report ASEAN conducted an exclusive interview with Vithit Powattanasuk,Consul-General of Royal Thai Consulate-General in Chengdu.
文摘China has a large number of neighboring countries, and its relations with them together with the situation of the neighborhood mean special and important interests for China. Given that, China has put its relations with neighboring countries in the first place in its foreign relations, and has put forward the basic concepts of developing relations with the neighboring countries, such as good neighborliness.
文摘Jiro Ninomiya name to the United States ,from Japan .at the tum of the century and bought a few acres of land just northeast,of SanFrrincisco. There,next to a palm tree,
文摘Starting from the eight vertex types in the Penrose tiling, we investigate the configurations beyond the nearest neighbors. The detailed structure of configurations and their concentrations in the whole pattern are obtained. It is found that the number of configuration types increases greatly when the observed clusters are becoming larger, which indicates that it is difficult to generate a perfect Penrose tiling according to the local matching rules.
文摘Singer is a Polish — born Jewish author in Yiddish, awarded the Nobel Prize in Literature in 1978. Although Singer is exposed to the English culture of United States for more than 50 years, he always insists on the mother tongue Yiddish creation.The way in which he writes with the dying language fully expresses his"outsiders"identity in the exotic culture. This thesis aims to analyze the"outsiders"identity revealed in Neighbors from the perspective of Singer's strict adherence to Yiddish and Jews as victims of the history.
文摘Recently, a circular has been is- sued by the Ministry of Com merce to notify the domestictextile exporters not to be engaged in il- legal transit trade. If those practices are founded, there will be severe punishment.
文摘Since the 18th National Congress of the Communist Party of China,China has proposed and actively acted on the important vision of building a community with a shared future for mankind.In October 2013,President Xi Jinping put forward that“the building of a community with a shared future should be advanced in China’s neighboring countries”.