In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement.Billions of dollars are lost annually because of this illegal act. The...In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement.Billions of dollars are lost annually because of this illegal act. The currentmost effective trend to tackle this problem is believed to be blocking thosewebsites, particularly through affiliated government bodies. To do so, aneffective detection mechanism is a necessary first step. Some researchers haveused various approaches to analyze the possible common features of suspectedpiracy websites. For instance, most of these websites serve online advertisement, which is considered as their main source of revenue. In addition, theseadvertisements have some common attributes that make them unique ascompared to advertisements posted on normal or legitimate websites. Theyusually encompass keywords such as click-words (words that redirect to installmalicious software) and frequently used words in illegal gambling, illegal sexual acts, and so on. This makes them ideal to be used as one of the key featuresin the process of successfully detecting websites involved in the act of copyrightinfringement. Research has been conducted to identify advertisements servedon suspected piracy websites. However, these studies use a static approachthat relies mainly on manual scanning for the aforementioned keywords. Thisbrings with it some limitations, particularly in coping with the dynamic andever-changing behavior of advertisements posted on these websites. Therefore,we propose a technique that can continuously fine-tune itself and is intelligentenough to effectively identify advertisement (Ad) banners extracted fromsuspected piracy websites. We have done this by leveraging the power ofmachine learning algorithms, particularly the support vector machine with theword2vec word-embedding model. After applying the proposed technique to1015 Ad banners collected from 98 suspected piracy websites and 90 normal orlegitimate websites, we were able to successfully identify Ad banners extractedfrom suspected piracy websites with an accuracy of 97%. We present thistechnique with the hope that it will be a useful tool for various effective piracywebsite detection approaches. To our knowledge, this is the first approachthat uses machine learning to identify Ad banners served on suspected piracywebsites.展开更多
The study was conducted to ascertain the views on piracy among marine engineering students and marine officers who had encountered piracy on international waters thereby suggesting threats to international peace. The ...The study was conducted to ascertain the views on piracy among marine engineering students and marine officers who had encountered piracy on international waters thereby suggesting threats to international peace. The respondents of the study were 50, specifically distributed to thirty (30) onboard marine engineering students enrolled for the current school year 2014-2015 and twenty (20) marine officers who had experienced piracy at Somalia and other places. The researchers employed quantitative-qualitative research method design. The questionnaire on "Piracy at Sea" was validated by experts in research, statistics, qualitative research, and maritime international conventions. To test the reliability, this same instrument was pilot-tested among marine officers and students who had been on board international ships. Qualitative data were captured through interviews by using open-ended questions. Frequency count, percentage, and rank were used in this study for descriptive-quantitative statistics. The data were analyzed using appropriate statistics through computer-processed software (SPSS). Qualitative analysis was employed to determine the views of the respondents on piracy so that mitigation measures were elicited for protection of life at sea leading towards international peace among identified HRAs (high-risk areas). Results revealed that seafarers were familiar of piracy. They were aware that piracy usually happens in areas like Somalia water sand other threatening territories. To combat piracy, the participants have pointed out the role of the international community in their concerted effort to help seafarers safeguard their lives specifically during these hard times. Somalia also needs to effectively check their organization by whether or not strict implementation of the Anti Piracy Law was being observed. Full knowledge of piracy, techniques for avoiding it, and surviving pirate attacks are necessary among seafarers. Satellite system called shiplock allows shipping companies to monitor location of ships particularly useful during pirate attacks, hijacks, or ship theft. They also install non-lethal electrical fences around a ship's perimeter to protect them during these times. IMO regulations require ships to send distress signals and warnings covertly in case of pirate attacks.展开更多
National Copyright Administration of China carried out a special operation to crack down on behaviors involving network infringement and piracy from September to December in 2005 ,according to the speech of Yan Xi... National Copyright Administration of China carried out a special operation to crack down on behaviors involving network infringement and piracy from September to December in 2005 ,according to the speech of Yan Xiaohong,Deputy Commissioner of National Copyright Administration on the Press Conference of the State Council.Now the relevant conditions are as follows:……展开更多
Music has often changed, from a social point of view, and also the relationship between music and the city. This paper attempts to describe how music changes under the impact of Internet. The milieu of musicians and t...Music has often changed, from a social point of view, and also the relationship between music and the city. This paper attempts to describe how music changes under the impact of Internet. The milieu of musicians and the audiences are concerned. The economic model of music has not burst into pieces, but it has deeply changed. There is a trend to pure consumerism thanks to internet (probably the sales of downloaded music will become more and more important). Also, independent artists can use Internet and have a livelihood (fat tail phenomenon). Therefore the diversity of music can be preserved. Concerts (music in the city) allow escaping from the losses of money because of piracy. There are several experiences for listeners, which are possible, some of them involving going to concerts and festivals.展开更多
Humans rely on the sea for food and mineral resources;hence it is vital to their economic survival.Nations all throughout the world rely on the water for trade and commerce.This article looks at the present condition ...Humans rely on the sea for food and mineral resources;hence it is vital to their economic survival.Nations all throughout the world rely on the water for trade and commerce.This article looks at the present condition of marine security in the Gulf of Guinea.The Gulf of Guinea has a total shoreline of about 5,000 nautical miles and several natural harbours with dangerous weather.It has a significant crude oil reservoir,as well as fish and other natural resources.These traits provide huge prospects for marine trade and transportation,but the Gulf of Guinea is also riddled with maritime crimes of all types,including piracy and smuggling.Maritime piracy has presented a threat to coastal states’stability and economic viability all across the world,not only in Africa.The study examines sea piracy in general,the Geographic Information System,and the impact of maritime piracy on the world socioeconomic development using secondary data.It then goes on to provide a number of recommendations aimed at addressing the problems caused by maritime piracy in the Gulf of Guinea in order to improve maritime security.展开更多
WHEN new films are released, Li Heng, a col- lege student in Beijing, usually goes to a ped- dler to buy DVDs at the gate of his college. And usually, he can get the film DVDs at the prices he expected, at about 10 yu...WHEN new films are released, Li Heng, a col- lege student in Beijing, usually goes to a ped- dler to buy DVDs at the gate of his college. And usually, he can get the film DVDs at the prices he expected, at about 10 yuan ($1.59) apiece.展开更多
The Arun and Tista Rivers,which flow across the Himalayas,are commonly known as antecedent valleys that overcame the rapid uplift of the Higher Himalayan ranges.To clarify whether the idea of antecedent rivers is acce...The Arun and Tista Rivers,which flow across the Himalayas,are commonly known as antecedent valleys that overcame the rapid uplift of the Higher Himalayan ranges.To clarify whether the idea of antecedent rivers is acceptable,we investigated the geomorphology of the Himalayas between eastern Nepal and Bhutan Himalayas.The southern part of Tibetan Plateau,extending across the Himalayas as tectonically un-deformed glaciated terrain named as'Tibetan Corridor,'does not suggest the regional uplift of the Higher Himalayas.The 8,000-m class mountains of Everest,Makalu,and Kanchenjunga are isolated residual peaks on the glaciated terrain composed of mountain peaks of 4,000–6,000 m high.The Tibetan glaciers commonly beheaded by Himalayan glaciers along the great watershed of the Himalayas suggest the expansion of Himalayan river drainage by glaciation.For the narrow upstream regions of the Arun and Tista Rivers with less precipitation behind the range,it is hard to collect enough water for the power of down-cutting their channels against the uplifting Himalayas.The fission track ages of the Higher Himalayan Crystalline Nappe suggest that the Himalayas attained their present altitude by 11–10 Ma,and the Arun and Tista Rivers formed deep gorges across the Himalayas by headward erosion.展开更多
The Yellow River, the birthplace of China’s culture, is well known over the world forits huge sediment yield and unruly temper. The origin of the river was considered bymany foreign and domestic scholars through long...The Yellow River, the birthplace of China’s culture, is well known over the world forits huge sediment yield and unruly temper. The origin of the river was considered bymany foreign and domestic scholars through long-term studies as: the Yellow River turnedgradually to the present features through the way that the river was eroded headwards展开更多
This paper examines the impact of piracy on access pricing strategy of an operating system platform.We study the behavior of users and developers due to an increase in software protection when positive network externa...This paper examines the impact of piracy on access pricing strategy of an operating system platform.We study the behavior of users and developers due to an increase in software protection when positive network externalities matter.We show that when piracy cost increases,access demands to the platform vary in the same direction and the magnitude of this variation depends on both the marginal network benefit that a developer derives and a certain threshold of piracy cost.Taking into account the behavior of these two sides when piracy matters,the monopoly platform changes its pricing strategy.We show that,it tends to reduce or to increase access fees.Finally,we show that under certain conditions,the divide-and-conquer pricing strategy can be reversed.展开更多
Strategies differ widely in dealing with Somali pirates Hijacking,detaining hostages and ransom are the core of Somali pirates’ "business model." Up until recently, it has largely been unchallenged,as most ...Strategies differ widely in dealing with Somali pirates Hijacking,detaining hostages and ransom are the core of Somali pirates’ "business model." Up until recently, it has largely been unchallenged,as most countries have paid ransom to secure the release of hostages.展开更多
The Troyan horse served here as a sufficiently vivid picture to enter into the history conflicts of an archetypal symbol of treachery and robbery, a metaphor for domination, a monad of violence and its justification...The Troyan horse served here as a sufficiently vivid picture to enter into the history conflicts of an archetypal symbol of treachery and robbery, a metaphor for domination, a monad of violence and its justification. The body of terrorism rests not on ideology/beliefs/religions-it is purely a practical idea, behind which there is only one thing: terra nova-the habitat. It is necessary to look for other reasons for the massacres and public executions of modern times, because no religion calls for open murder-only dogmatists armed with faith, craved crusaders hikes, and therefore cannot be recognized and accepted as responsible for the murder. This is the search for the guilty, but only the person is guilty-the fault is his area of responsibility. The Utopians of Thomas More, who revered Mithra, acted like him: like Greek gods, they interfered in human wars, descending from heaven, and restored justice by waging war beyond their state borders, as if protecting the inviolability of their territory and their laws, whose rejection, like, and encroachment on them, led to armed conflicts, the purpose of allowing them was the introduction of forced disciplina (established order), sanctioned by Mithra himself. It is this identity that allows us to consider Utopia as an extended invective for the entire social order, regardless of time and place, and in particular the state as a paramilitary mechanism for the improvement of the human hostel, based on regulations that allow and, more often, provoke its violation, since destabilization is the driving force of existence. This polar involvement of Mithra in the war lies hidden in the very aporia of the world-war, which turns the god of treaties into the chthonic deity of destruction and murder.展开更多
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of...“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability―theoretical reasonableness of deception,which destroys the system of contracts as a condition of the world order,leaped as a report at the University of London(Birkbeck)on Feb.9,2018,which the relevance of its problems beat real events in because the state of modern“utopianism”―the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence―“occupy”(seizure of the“alien”)―has never changed.As in the case of Marks’s“capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:The norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society―such are the“difficulties to the stars”:Without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence.展开更多
The history of the Yangtze River is constituted by numerous river piracies that enabled the river to extend its drainage system. Two river captures are well recognized: the piracy of the Jinsha River (Jinshajiang) for...The history of the Yangtze River is constituted by numerous river piracies that enabled the river to extend its drainage system. Two river captures are well recognized: the piracy of the Jinsha River (Jinshajiang) formerly tributary of the Red River at Shigu in Yunnan Province and the Three Gorges area that linked the upper and the middle Yangtze river reaches in Hubei province. The first one is well documented, while the second, because of difficulties to retrieve datable materials and the complexity of the area geomorphology, is still quite unknown. Numerous conflicting hypotheses have been formulated to explain the pattern of river piracy, no agreement exists on the location of the drainage divide and of the point of capture;chronologies extending from the Eocene to the late Quaternary are given. Geomorphic indices can be used to examine the geomorphological and tectonic processes responsible for the development of the drainage basins. In this paper, we analyzed drainage pattern, basin shape, basin asymmetry, stream junction angle to infer the drainage of the paleorivers that were pirated, and to propose a model of the pattern of river capture based on the importance of structure, tectonic and lithological controls in the area. We showed that the Three Gorges area has been very important to the history of the Yangtze river as the piracy of the upper and middle reaches enabled the river to reach its current extend.展开更多
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of...“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability-theoretical reasonableness of Deception,which destroys the system of contracts as a condition of the world order.My report at the University of London(Birkbeck)on Feb.9,2018,which was read in English,still not the latest direct evidence of the use of this scandalous method of“Trojan terrorism”—the defamation of the whole country(Russia),plus violation of territorial integrity,including and military attack,another country that lies on the other side of the ocean(Syria),and which is accused of not living by the rules(the“Absolute”method by Caesar),the relevance of its problems beat real events in because the state of modern“utopianism”-the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence-“occupy”(seizure of the“alien”)-has never changed,and the March-April events in international politics are just another notch on this dead python,which is called“democratic values”.As in the case of Marks’s“Capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:the norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society-such are the“difficulties to the stars”:without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence.展开更多
This paper deals with intellectual property protection problems in the information society, when it is so easy to access unauthorised content (to pirate). Society does not care much about the damages of right owners...This paper deals with intellectual property protection problems in the information society, when it is so easy to access unauthorised content (to pirate). Society does not care much about the damages of right owners. Internet is often considered as a "public place", and works on Internet are considered as "displayed in public places" from which a lawful restriction of rights is permitted. It promotes unfair competition and hinders the development of sustainable business. Lawful use of protected copyright content is a tool for ensuring equal and sustainable competition level among entrepreneurs. On Internet, there are many copyright-protected works available. Many members of society wish to get an access to these works, which means that a solution should be found. For private and non-commercial use, there should be reasonable limitations. Combating piracy on Intemet using enforcement tools alone does not yield results. Piracy should be placed in a frame accepted by a civilized society, and the society and authors should get the maximum benefits from it.展开更多
This proposal expresses a standpoint concerning a discussion for the phenomenon of a poor sense of copyright in Chinese youth netizens and the suggestion.The phenomenon of a poor sense of copyright in Chinese youth ne...This proposal expresses a standpoint concerning a discussion for the phenomenon of a poor sense of copyright in Chinese youth netizens and the suggestion.The phenomenon of a poor sense of copyright in Chinese youth netizens has disadvantages.By analyzing it,a clear status of Chinese youth netizens'problems on the poor sense of copyright will be shown.At the same time,when we consider a discussion for the phenomenon of a poor sense of copyright in Chinese youth netizens and the suggestion,we must address several main reasons that contribute to problem.These include cultural tradition restriction,incomprehensive market system,inappropriate price incentive,imperfective legal institutions and indifference education system.It is valuable for the originators feel free to create better works.Meanwhile,those factors are essential for Chinese youth netizens to consider the way to be cultivated the right spending habits.Only by analyzing all these factors together and then using these results to apply to intensity notional cultural competitiveness and form an innovative market.This paper is organized as follows:The first part will outline the poor sense of copyright in Chinese youth netizens'case studies and analyze.The second part is an introduction of the problems of the phenomenon of a poor sense of copyright in Chinese youth netizens.The reasons causing the problems are analyzed in part three.Some proposals to overcome copyright problem will be advocated in last part.This study found that enhancing copyright awareness is a very complex task for Chinese youth netizens.Cultural tradition restriction,incomprehensive market system,inappropriate price incentive,imperfective legal institutions and indifference education system are all factors which bring difficulties to promote copyright awareness in Chinese youth netizens.Combined those factors with four problems of the phenomenon in China,I offer appropriate suggestions to overcome problems and help youth netizens acquire the knowledge of copyright.展开更多
This study investigates the current enviromnent of the Chinese record industry, and focuses on particular problems with business in China. Specifically, I will look at the reasons that led to the Chinese record indus...This study investigates the current enviromnent of the Chinese record industry, and focuses on particular problems with business in China. Specifically, I will look at the reasons that led to the Chinese record industry' s gradual depression in the past thirty years. Additionally, I will show the important reasons why piracy is on a rampage in China, and explain why China has not been able to solve this problem. To do this, I will examine the data of CD sales and revenue of Chinese Records Company in recent years, to see what has changed.展开更多
Previous researches had emphasized tectonic impacts on the fluvial system at the tectonically active areas,while the effects of lithology and local base level change have received relatively rare attention.Here we inv...Previous researches had emphasized tectonic impacts on the fluvial system at the tectonically active areas,while the effects of lithology and local base level change have received relatively rare attention.Here we investigated fluvial landforms at different spatial scales,focusing on knickpoints and channel network reorganization from an area affected by the Haiyuan Fault in the northeastern Tibetan Plateau.The geomorphic indices,i.e.,drainage pattern andχanomalies,were calculated and investigated.The results show that two regional radial drainages formed around the Laohu and Hasi Mountains.Within the interior of the radial drainage,tributaries from the southeast side of the Laohu Mountain experienced near 180°direction change.We interpret this as the gradual drainage capture originating from the height difference(~190 m)of the local base level between the two catchments.Some tributaries from the Hasi Mountain show alternating gorges and broad valleys controlled by lithology.Besides,tectonic uplift and the lowering of base level(from the incision of the Yellow River)triggered an autogenic positivefeedback transition from parallel to dendritic drainage patterns.These observations suggest that base level change and lithology play a crucial role in landscape evolution,even in a tectonically active region.展开更多
基金This research project was supported by the Ministry of Culture,Sports,and Tourism(MCST)and the Korea Copyright Commission in 2021(2019-PF-9500).
文摘In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement.Billions of dollars are lost annually because of this illegal act. The currentmost effective trend to tackle this problem is believed to be blocking thosewebsites, particularly through affiliated government bodies. To do so, aneffective detection mechanism is a necessary first step. Some researchers haveused various approaches to analyze the possible common features of suspectedpiracy websites. For instance, most of these websites serve online advertisement, which is considered as their main source of revenue. In addition, theseadvertisements have some common attributes that make them unique ascompared to advertisements posted on normal or legitimate websites. Theyusually encompass keywords such as click-words (words that redirect to installmalicious software) and frequently used words in illegal gambling, illegal sexual acts, and so on. This makes them ideal to be used as one of the key featuresin the process of successfully detecting websites involved in the act of copyrightinfringement. Research has been conducted to identify advertisements servedon suspected piracy websites. However, these studies use a static approachthat relies mainly on manual scanning for the aforementioned keywords. Thisbrings with it some limitations, particularly in coping with the dynamic andever-changing behavior of advertisements posted on these websites. Therefore,we propose a technique that can continuously fine-tune itself and is intelligentenough to effectively identify advertisement (Ad) banners extracted fromsuspected piracy websites. We have done this by leveraging the power ofmachine learning algorithms, particularly the support vector machine with theword2vec word-embedding model. After applying the proposed technique to1015 Ad banners collected from 98 suspected piracy websites and 90 normal orlegitimate websites, we were able to successfully identify Ad banners extractedfrom suspected piracy websites with an accuracy of 97%. We present thistechnique with the hope that it will be a useful tool for various effective piracywebsite detection approaches. To our knowledge, this is the first approachthat uses machine learning to identify Ad banners served on suspected piracywebsites.
文摘The study was conducted to ascertain the views on piracy among marine engineering students and marine officers who had encountered piracy on international waters thereby suggesting threats to international peace. The respondents of the study were 50, specifically distributed to thirty (30) onboard marine engineering students enrolled for the current school year 2014-2015 and twenty (20) marine officers who had experienced piracy at Somalia and other places. The researchers employed quantitative-qualitative research method design. The questionnaire on "Piracy at Sea" was validated by experts in research, statistics, qualitative research, and maritime international conventions. To test the reliability, this same instrument was pilot-tested among marine officers and students who had been on board international ships. Qualitative data were captured through interviews by using open-ended questions. Frequency count, percentage, and rank were used in this study for descriptive-quantitative statistics. The data were analyzed using appropriate statistics through computer-processed software (SPSS). Qualitative analysis was employed to determine the views of the respondents on piracy so that mitigation measures were elicited for protection of life at sea leading towards international peace among identified HRAs (high-risk areas). Results revealed that seafarers were familiar of piracy. They were aware that piracy usually happens in areas like Somalia water sand other threatening territories. To combat piracy, the participants have pointed out the role of the international community in their concerted effort to help seafarers safeguard their lives specifically during these hard times. Somalia also needs to effectively check their organization by whether or not strict implementation of the Anti Piracy Law was being observed. Full knowledge of piracy, techniques for avoiding it, and surviving pirate attacks are necessary among seafarers. Satellite system called shiplock allows shipping companies to monitor location of ships particularly useful during pirate attacks, hijacks, or ship theft. They also install non-lethal electrical fences around a ship's perimeter to protect them during these times. IMO regulations require ships to send distress signals and warnings covertly in case of pirate attacks.
文摘 National Copyright Administration of China carried out a special operation to crack down on behaviors involving network infringement and piracy from September to December in 2005 ,according to the speech of Yan Xiaohong,Deputy Commissioner of National Copyright Administration on the Press Conference of the State Council.Now the relevant conditions are as follows:……
文摘Music has often changed, from a social point of view, and also the relationship between music and the city. This paper attempts to describe how music changes under the impact of Internet. The milieu of musicians and the audiences are concerned. The economic model of music has not burst into pieces, but it has deeply changed. There is a trend to pure consumerism thanks to internet (probably the sales of downloaded music will become more and more important). Also, independent artists can use Internet and have a livelihood (fat tail phenomenon). Therefore the diversity of music can be preserved. Concerts (music in the city) allow escaping from the losses of money because of piracy. There are several experiences for listeners, which are possible, some of them involving going to concerts and festivals.
文摘Humans rely on the sea for food and mineral resources;hence it is vital to their economic survival.Nations all throughout the world rely on the water for trade and commerce.This article looks at the present condition of marine security in the Gulf of Guinea.The Gulf of Guinea has a total shoreline of about 5,000 nautical miles and several natural harbours with dangerous weather.It has a significant crude oil reservoir,as well as fish and other natural resources.These traits provide huge prospects for marine trade and transportation,but the Gulf of Guinea is also riddled with maritime crimes of all types,including piracy and smuggling.Maritime piracy has presented a threat to coastal states’stability and economic viability all across the world,not only in Africa.The study examines sea piracy in general,the Geographic Information System,and the impact of maritime piracy on the world socioeconomic development using secondary data.It then goes on to provide a number of recommendations aimed at addressing the problems caused by maritime piracy in the Gulf of Guinea in order to improve maritime security.
文摘WHEN new films are released, Li Heng, a col- lege student in Beijing, usually goes to a ped- dler to buy DVDs at the gate of his college. And usually, he can get the film DVDs at the prices he expected, at about 10 yuan ($1.59) apiece.
基金This work was supported by Grants-in-Aid for Scientific Research of the Japanese Society for the Promotion of Science(JSPS KAKENHI)Grant Number 18H00766(principal investigator:Takashi Nakata)Grant Number 18KK0027(principal investigator:Yasuhiro Kumahara).
文摘The Arun and Tista Rivers,which flow across the Himalayas,are commonly known as antecedent valleys that overcame the rapid uplift of the Higher Himalayan ranges.To clarify whether the idea of antecedent rivers is acceptable,we investigated the geomorphology of the Himalayas between eastern Nepal and Bhutan Himalayas.The southern part of Tibetan Plateau,extending across the Himalayas as tectonically un-deformed glaciated terrain named as'Tibetan Corridor,'does not suggest the regional uplift of the Higher Himalayas.The 8,000-m class mountains of Everest,Makalu,and Kanchenjunga are isolated residual peaks on the glaciated terrain composed of mountain peaks of 4,000–6,000 m high.The Tibetan glaciers commonly beheaded by Himalayan glaciers along the great watershed of the Himalayas suggest the expansion of Himalayan river drainage by glaciation.For the narrow upstream regions of the Arun and Tista Rivers with less precipitation behind the range,it is hard to collect enough water for the power of down-cutting their channels against the uplifting Himalayas.The fission track ages of the Higher Himalayan Crystalline Nappe suggest that the Himalayas attained their present altitude by 11–10 Ma,and the Arun and Tista Rivers formed deep gorges across the Himalayas by headward erosion.
基金Project supported by the National Natural Science Foundation of China.
文摘The Yellow River, the birthplace of China’s culture, is well known over the world forits huge sediment yield and unruly temper. The origin of the river was considered bymany foreign and domestic scholars through long-term studies as: the Yellow River turnedgradually to the present features through the way that the river was eroded headwards
文摘This paper examines the impact of piracy on access pricing strategy of an operating system platform.We study the behavior of users and developers due to an increase in software protection when positive network externalities matter.We show that when piracy cost increases,access demands to the platform vary in the same direction and the magnitude of this variation depends on both the marginal network benefit that a developer derives and a certain threshold of piracy cost.Taking into account the behavior of these two sides when piracy matters,the monopoly platform changes its pricing strategy.We show that,it tends to reduce or to increase access fees.Finally,we show that under certain conditions,the divide-and-conquer pricing strategy can be reversed.
文摘Strategies differ widely in dealing with Somali pirates Hijacking,detaining hostages and ransom are the core of Somali pirates’ "business model." Up until recently, it has largely been unchallenged,as most countries have paid ransom to secure the release of hostages.
文摘The Troyan horse served here as a sufficiently vivid picture to enter into the history conflicts of an archetypal symbol of treachery and robbery, a metaphor for domination, a monad of violence and its justification. The body of terrorism rests not on ideology/beliefs/religions-it is purely a practical idea, behind which there is only one thing: terra nova-the habitat. It is necessary to look for other reasons for the massacres and public executions of modern times, because no religion calls for open murder-only dogmatists armed with faith, craved crusaders hikes, and therefore cannot be recognized and accepted as responsible for the murder. This is the search for the guilty, but only the person is guilty-the fault is his area of responsibility. The Utopians of Thomas More, who revered Mithra, acted like him: like Greek gods, they interfered in human wars, descending from heaven, and restored justice by waging war beyond their state borders, as if protecting the inviolability of their territory and their laws, whose rejection, like, and encroachment on them, led to armed conflicts, the purpose of allowing them was the introduction of forced disciplina (established order), sanctioned by Mithra himself. It is this identity that allows us to consider Utopia as an extended invective for the entire social order, regardless of time and place, and in particular the state as a paramilitary mechanism for the improvement of the human hostel, based on regulations that allow and, more often, provoke its violation, since destabilization is the driving force of existence. This polar involvement of Mithra in the war lies hidden in the very aporia of the world-war, which turns the god of treaties into the chthonic deity of destruction and murder.
文摘“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability―theoretical reasonableness of deception,which destroys the system of contracts as a condition of the world order,leaped as a report at the University of London(Birkbeck)on Feb.9,2018,which the relevance of its problems beat real events in because the state of modern“utopianism”―the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence―“occupy”(seizure of the“alien”)―has never changed.As in the case of Marks’s“capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:The norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society―such are the“difficulties to the stars”:Without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence.
文摘The history of the Yangtze River is constituted by numerous river piracies that enabled the river to extend its drainage system. Two river captures are well recognized: the piracy of the Jinsha River (Jinshajiang) formerly tributary of the Red River at Shigu in Yunnan Province and the Three Gorges area that linked the upper and the middle Yangtze river reaches in Hubei province. The first one is well documented, while the second, because of difficulties to retrieve datable materials and the complexity of the area geomorphology, is still quite unknown. Numerous conflicting hypotheses have been formulated to explain the pattern of river piracy, no agreement exists on the location of the drainage divide and of the point of capture;chronologies extending from the Eocene to the late Quaternary are given. Geomorphic indices can be used to examine the geomorphological and tectonic processes responsible for the development of the drainage basins. In this paper, we analyzed drainage pattern, basin shape, basin asymmetry, stream junction angle to infer the drainage of the paleorivers that were pirated, and to propose a model of the pattern of river capture based on the importance of structure, tectonic and lithological controls in the area. We showed that the Three Gorges area has been very important to the history of the Yangtze river as the piracy of the upper and middle reaches enabled the river to reach its current extend.
文摘“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability-theoretical reasonableness of Deception,which destroys the system of contracts as a condition of the world order.My report at the University of London(Birkbeck)on Feb.9,2018,which was read in English,still not the latest direct evidence of the use of this scandalous method of“Trojan terrorism”—the defamation of the whole country(Russia),plus violation of territorial integrity,including and military attack,another country that lies on the other side of the ocean(Syria),and which is accused of not living by the rules(the“Absolute”method by Caesar),the relevance of its problems beat real events in because the state of modern“utopianism”-the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence-“occupy”(seizure of the“alien”)-has never changed,and the March-April events in international politics are just another notch on this dead python,which is called“democratic values”.As in the case of Marks’s“Capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:the norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society-such are the“difficulties to the stars”:without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence.
文摘This paper deals with intellectual property protection problems in the information society, when it is so easy to access unauthorised content (to pirate). Society does not care much about the damages of right owners. Internet is often considered as a "public place", and works on Internet are considered as "displayed in public places" from which a lawful restriction of rights is permitted. It promotes unfair competition and hinders the development of sustainable business. Lawful use of protected copyright content is a tool for ensuring equal and sustainable competition level among entrepreneurs. On Internet, there are many copyright-protected works available. Many members of society wish to get an access to these works, which means that a solution should be found. For private and non-commercial use, there should be reasonable limitations. Combating piracy on Intemet using enforcement tools alone does not yield results. Piracy should be placed in a frame accepted by a civilized society, and the society and authors should get the maximum benefits from it.
文摘This proposal expresses a standpoint concerning a discussion for the phenomenon of a poor sense of copyright in Chinese youth netizens and the suggestion.The phenomenon of a poor sense of copyright in Chinese youth netizens has disadvantages.By analyzing it,a clear status of Chinese youth netizens'problems on the poor sense of copyright will be shown.At the same time,when we consider a discussion for the phenomenon of a poor sense of copyright in Chinese youth netizens and the suggestion,we must address several main reasons that contribute to problem.These include cultural tradition restriction,incomprehensive market system,inappropriate price incentive,imperfective legal institutions and indifference education system.It is valuable for the originators feel free to create better works.Meanwhile,those factors are essential for Chinese youth netizens to consider the way to be cultivated the right spending habits.Only by analyzing all these factors together and then using these results to apply to intensity notional cultural competitiveness and form an innovative market.This paper is organized as follows:The first part will outline the poor sense of copyright in Chinese youth netizens'case studies and analyze.The second part is an introduction of the problems of the phenomenon of a poor sense of copyright in Chinese youth netizens.The reasons causing the problems are analyzed in part three.Some proposals to overcome copyright problem will be advocated in last part.This study found that enhancing copyright awareness is a very complex task for Chinese youth netizens.Cultural tradition restriction,incomprehensive market system,inappropriate price incentive,imperfective legal institutions and indifference education system are all factors which bring difficulties to promote copyright awareness in Chinese youth netizens.Combined those factors with four problems of the phenomenon in China,I offer appropriate suggestions to overcome problems and help youth netizens acquire the knowledge of copyright.
文摘This study investigates the current enviromnent of the Chinese record industry, and focuses on particular problems with business in China. Specifically, I will look at the reasons that led to the Chinese record industry' s gradual depression in the past thirty years. Additionally, I will show the important reasons why piracy is on a rampage in China, and explain why China has not been able to solve this problem. To do this, I will examine the data of CD sales and revenue of Chinese Records Company in recent years, to see what has changed.
基金supported by the National Natural Science Foundation of China(Grant Nos.41971005,41522101)the Second Tibetan Plateau Scientific Expedition Program(Grant No.2019QZKK0205)the National Key Research and Development Program(Grant No.2016YFA0600500)。
文摘Previous researches had emphasized tectonic impacts on the fluvial system at the tectonically active areas,while the effects of lithology and local base level change have received relatively rare attention.Here we investigated fluvial landforms at different spatial scales,focusing on knickpoints and channel network reorganization from an area affected by the Haiyuan Fault in the northeastern Tibetan Plateau.The geomorphic indices,i.e.,drainage pattern andχanomalies,were calculated and investigated.The results show that two regional radial drainages formed around the Laohu and Hasi Mountains.Within the interior of the radial drainage,tributaries from the southeast side of the Laohu Mountain experienced near 180°direction change.We interpret this as the gradual drainage capture originating from the height difference(~190 m)of the local base level between the two catchments.Some tributaries from the Hasi Mountain show alternating gorges and broad valleys controlled by lithology.Besides,tectonic uplift and the lowering of base level(from the incision of the Yellow River)triggered an autogenic positivefeedback transition from parallel to dendritic drainage patterns.These observations suggest that base level change and lithology play a crucial role in landscape evolution,even in a tectonically active region.