In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices...In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
Good information is the basis for good decisions.For many invaluable salmon species,chemical information is necessary to guide and fine-tune their migrations to and from freshwater mating grounds.A problem is that sal...Good information is the basis for good decisions.For many invaluable salmon species,chemical information is necessary to guide and fine-tune their migrations to and from freshwater mating grounds.A problem is that salmon of the current world are running a gauntlet of toxic chemicals arising from diverse anthropogenic inputs and these chemicals are known to disrupt information.There is sufficient evidence that effluents from cities,mines,agriculture and industry contain chemicals that can rapidly,and sometimes irreversibly,impair the olfactory sense that salmon use to gather information.Some toxic inputs may not only be strong enough to impair migration,but be strong enough to redirect salmon away from their routes.There is also evidence that some synthetic chemicals may serve as the basis for ‘new’ information and be useful in making correct migratory decisions.On the plus side,there are examples of new regulations that limit the input of chemicals of known olfactory toxicity,but on the minus side,increased urbanization and global climate change will likely increase the number and/or severity of some neurotoxic inputs.Here we identify the specific avenues of chemical risks to information disruption and in so doing prioritize and rank the risks to migrating salmon.The data collected here can be used to lay the foundation for modelling the effects of anthropogenic inputs on information disruption in diverse salmonid species from around the world and therefore help secure their longevity in a changing chemical environment.展开更多
AIM: To elucidate the potential biological role of mi R-30 b in gastric cancer and investigate the underlying molecular mechanisms of mi R-30 b to inhibit metastasis of gastric cancer cells.METHODS: The expression of ...AIM: To elucidate the potential biological role of mi R-30 b in gastric cancer and investigate the underlying molecular mechanisms of mi R-30 b to inhibit metastasis of gastric cancer cells.METHODS: The expression of mi R-30 b was detected in gastric cancer cell lines and samples by reverse transcription-polymerase chain reaction. CCK-8 assays were conducted to explore the impact of mi R-30 b overexpression on the proliferation of gastric cancer cells. Flow cytometry was used to examine the effect of mi R-30 b on the apoptosis. Transwell test was used for the migration and invasion assays. Luciferase reporter assays and Western blot were employed to validate regulation of putative target of mi R-30 b.RESULTS: The results showed that mi R-30 b was downregulated in gastric cancer tissues and cancer cell lines and functioned as a tumor suppressor. Overexpression of mi R-30 b promoted cell apoptosis,and suppressed proliferation,migration and invasion of the gastric cancer cell lines AGS and MGC803. Bioinformatic analysis identified the 3'-untranslated region of eukaryotic translation initiation factor 5A2(EIF5A2) as a putative binding site of mi R-30 b. Luciferase reporter assays and Western blot analysis confirmed the EIF5A2 gene as a target of mi R-30 b. Moreover,expression levels of theEIF5A2 targets E-cadherin and Vimentin were altered following transfection of mi R-30 b mimics.CONCLUSION: Our findings describe a link between mi R-30 b and EIF5A2,which plays an important role in mediating epithelial-mesenchymal transition.展开更多
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi...Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures.展开更多
The improvements of anti-jamming performance of modem radar seeker are great threats to military targets. To protect the target from detection and estimation, the novel signal-to-interference-plus-noise ratio (SINR)...The improvements of anti-jamming performance of modem radar seeker are great threats to military targets. To protect the target from detection and estimation, the novel signal-to-interference-plus-noise ratio (SINR)-based and mutual information (Ml)-based jamming design techniques were proposed. To interfere with the target detection, the jamming was designed to minimize the S1NR of the radar seeker. To impair the estimation performance, the mutual information between the radar echo and the random target impulse response was used as the criterion. The spectral of optimal jamming under the two criteria were achieved with the power constraints. Simulation results show the effectiveness of the jamming techniques. SINR and MI of the SINR-based jamming, the MI-based jamming as well as the predefined jamming under the same power constraints were compared. Furthermore, the probability of detection and minimum mean-square error (MMSE) were also utilized to validate the jamming performance. Under the jamming power constraint of I W, the relative decrease of the probability of detection using S1NR-based optimal jamming is about 47%, and the relative increase of MMSE using Ml-based optimal jamming is about 8%. Besides, two useful jamming design principles are concluded which can be used in limited jamming power situations.展开更多
This paper tries to identify the characters that might affect interprovincial migrants' decisions and examine how and why the influence of these characters changed over time individually and synthetically in China...This paper tries to identify the characters that might affect interprovincial migrants' decisions and examine how and why the influence of these characters changed over time individually and synthetically in China during 1985-2005.We have investigated six types of factors,namely,distance,population density,income,employment structure,house price,and migration stock.In addition,we apply the identified factors with a multiple stepwise regression model to a longitudinal dataset,which consists of interprovincial migration flows over the last two decades in China.It is found that different factors have disparate impacts on migration in China,and they can be decomposed into push force in origin area and pull force in destination area.Factors shaping China's interprovincial migration have shifted from traditional factors such as distance to economic factors such as income and employment structure.This paper suggests that more attention should be paid to obtain detailed migration data with spatial ihfonnation and develop applicable models for migration processes.Our analysis provides references for development planners and policymakers to develop sound population policies to achieve regional sustainable development in China.展开更多
The purpose of this essay is to discuss the "Lusophone''l media system, inside the "Lusophone" migration system, from the perspective of data collected in an empirical work. For this purpose, we discuss the conce...The purpose of this essay is to discuss the "Lusophone''l media system, inside the "Lusophone" migration system, from the perspective of data collected in an empirical work. For this purpose, we discuss the concept of "Lusophone" and "Lusophone" migration system, and we present the context of immigration in Portugal. The empirical work involved 14 in-depth interviews2 and started by presenting, in broad strokes, some important aspects relating to the history of "Lusophone". The analysis of the interviews was sustained in the theories of economic and political "world-system" developed by Braudel (1949) and Wallerstein (2004) and extended to the concept of migration systems of Kritz and Zlotnik (1992). Their proposals were further developed by the Portuguese sociologist Baganha (2009) who defended the particularity of a "Lusophone" migration system. Based on those concepts, we describe the theoretical and empirical research and methodological procedures, stressing the trajectories of migration, social mobility and consumption of media and Information Communication Technologies (ICT). We analyze the interviews, highlighting the similarities and differences, regarding the uses and consumptions of media and ICTs, between Brazilians and Finally based on the results, we discuss the characteristics the citizens from Portuguese-speaking African Countries of this "Lusophone" media system.展开更多
文摘In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
文摘Good information is the basis for good decisions.For many invaluable salmon species,chemical information is necessary to guide and fine-tune their migrations to and from freshwater mating grounds.A problem is that salmon of the current world are running a gauntlet of toxic chemicals arising from diverse anthropogenic inputs and these chemicals are known to disrupt information.There is sufficient evidence that effluents from cities,mines,agriculture and industry contain chemicals that can rapidly,and sometimes irreversibly,impair the olfactory sense that salmon use to gather information.Some toxic inputs may not only be strong enough to impair migration,but be strong enough to redirect salmon away from their routes.There is also evidence that some synthetic chemicals may serve as the basis for ‘new’ information and be useful in making correct migratory decisions.On the plus side,there are examples of new regulations that limit the input of chemicals of known olfactory toxicity,but on the minus side,increased urbanization and global climate change will likely increase the number and/or severity of some neurotoxic inputs.Here we identify the specific avenues of chemical risks to information disruption and in so doing prioritize and rank the risks to migrating salmon.The data collected here can be used to lay the foundation for modelling the effects of anthropogenic inputs on information disruption in diverse salmonid species from around the world and therefore help secure their longevity in a changing chemical environment.
基金Supported by Beijing Municipal Natural Science Foundation of China,No.7132209The Capital Health Research and Development of Special,No.2014-3-4014
文摘AIM: To elucidate the potential biological role of mi R-30 b in gastric cancer and investigate the underlying molecular mechanisms of mi R-30 b to inhibit metastasis of gastric cancer cells.METHODS: The expression of mi R-30 b was detected in gastric cancer cell lines and samples by reverse transcription-polymerase chain reaction. CCK-8 assays were conducted to explore the impact of mi R-30 b overexpression on the proliferation of gastric cancer cells. Flow cytometry was used to examine the effect of mi R-30 b on the apoptosis. Transwell test was used for the migration and invasion assays. Luciferase reporter assays and Western blot were employed to validate regulation of putative target of mi R-30 b.RESULTS: The results showed that mi R-30 b was downregulated in gastric cancer tissues and cancer cell lines and functioned as a tumor suppressor. Overexpression of mi R-30 b promoted cell apoptosis,and suppressed proliferation,migration and invasion of the gastric cancer cell lines AGS and MGC803. Bioinformatic analysis identified the 3'-untranslated region of eukaryotic translation initiation factor 5A2(EIF5A2) as a putative binding site of mi R-30 b. Luciferase reporter assays and Western blot analysis confirmed the EIF5A2 gene as a target of mi R-30 b. Moreover,expression levels of theEIF5A2 targets E-cadherin and Vimentin were altered following transfection of mi R-30 b mimics.CONCLUSION: Our findings describe a link between mi R-30 b and EIF5A2,which plays an important role in mediating epithelial-mesenchymal transition.
基金supported by the National Key Research and Development Program of China (2018YFB0804004)the Foundation of the National Natural Science Foundation of China (61602509)+1 种基金the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61521003)the Key Technologies Research and Development Program of Henan Province of China (172102210615)
文摘Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures.
基金Project(61171133)supported by the National Natural Science Foundation of ChinaProject(11JJ1010)supported by the Natural Science Fund for Distinguished Young Scholars of Hunan Province,China
文摘The improvements of anti-jamming performance of modem radar seeker are great threats to military targets. To protect the target from detection and estimation, the novel signal-to-interference-plus-noise ratio (SINR)-based and mutual information (Ml)-based jamming design techniques were proposed. To interfere with the target detection, the jamming was designed to minimize the S1NR of the radar seeker. To impair the estimation performance, the mutual information between the radar echo and the random target impulse response was used as the criterion. The spectral of optimal jamming under the two criteria were achieved with the power constraints. Simulation results show the effectiveness of the jamming techniques. SINR and MI of the SINR-based jamming, the MI-based jamming as well as the predefined jamming under the same power constraints were compared. Furthermore, the probability of detection and minimum mean-square error (MMSE) were also utilized to validate the jamming performance. Under the jamming power constraint of I W, the relative decrease of the probability of detection using S1NR-based optimal jamming is about 47%, and the relative increase of MMSE using Ml-based optimal jamming is about 8%. Besides, two useful jamming design principles are concluded which can be used in limited jamming power situations.
基金the auspices of Key Deployment Project of Chinese Academy of Sciences[grant number KZZD-EW-06-04]the Natural Science Foundation of China[grant number 41301121]National Key Technology R&D Program of the Ministry of Science and Technology[grant number 2012BAJ15B02]
文摘This paper tries to identify the characters that might affect interprovincial migrants' decisions and examine how and why the influence of these characters changed over time individually and synthetically in China during 1985-2005.We have investigated six types of factors,namely,distance,population density,income,employment structure,house price,and migration stock.In addition,we apply the identified factors with a multiple stepwise regression model to a longitudinal dataset,which consists of interprovincial migration flows over the last two decades in China.It is found that different factors have disparate impacts on migration in China,and they can be decomposed into push force in origin area and pull force in destination area.Factors shaping China's interprovincial migration have shifted from traditional factors such as distance to economic factors such as income and employment structure.This paper suggests that more attention should be paid to obtain detailed migration data with spatial ihfonnation and develop applicable models for migration processes.Our analysis provides references for development planners and policymakers to develop sound population policies to achieve regional sustainable development in China.
文摘The purpose of this essay is to discuss the "Lusophone''l media system, inside the "Lusophone" migration system, from the perspective of data collected in an empirical work. For this purpose, we discuss the concept of "Lusophone" and "Lusophone" migration system, and we present the context of immigration in Portugal. The empirical work involved 14 in-depth interviews2 and started by presenting, in broad strokes, some important aspects relating to the history of "Lusophone". The analysis of the interviews was sustained in the theories of economic and political "world-system" developed by Braudel (1949) and Wallerstein (2004) and extended to the concept of migration systems of Kritz and Zlotnik (1992). Their proposals were further developed by the Portuguese sociologist Baganha (2009) who defended the particularity of a "Lusophone" migration system. Based on those concepts, we describe the theoretical and empirical research and methodological procedures, stressing the trajectories of migration, social mobility and consumption of media and Information Communication Technologies (ICT). We analyze the interviews, highlighting the similarities and differences, regarding the uses and consumptions of media and ICTs, between Brazilians and Finally based on the results, we discuss the characteristics the citizens from Portuguese-speaking African Countries of this "Lusophone" media system.