Mobile Ad Hoc Network(MANET)is a group of node that would interrelate among each other through onemulti-hop wireless link,wherein the nodes were able to move in response to sudden modifications.The objective of MANET ...Mobile Ad Hoc Network(MANET)is a group of node that would interrelate among each other through onemulti-hop wireless link,wherein the nodes were able to move in response to sudden modifications.The objective of MANET routing protocol is to quantify the route and compute the best path,but there exists a major decrease in energy efficiency,difficulty in hop selection,cost estimation,and efficient load-balancing.In this paper,a novel least common multipath-based routing has been proposed.Multipath routing is used to find a multipath route from source and destination.Load balancing is of primary importance in the mobile ad-hoc networks,due to limited bandwidth among the nodes and the initiator of the load routing discovery phase in the multipath routing protocol.Fuzzy logic for load balancing multipath routing in MANETs is proposed,which ensures the data packets are sent through a path with the variance of binary sets to predict the original transformation of the data to be received in the system.The main objective of the proposed system is to reduce the routing time of data packets and avoid the traffic based on multipath source and destination.The experimental results have to verify 96.7%efficiency in balancing the load.展开更多
We thank Tan Mingxuan et al. (2017) for their comments stimulated by our short paper in the recent Acta Geologica Sinica (English edition). We are grateful for the opportunity to expand on the model of the supercr...We thank Tan Mingxuan et al. (2017) for their comments stimulated by our short paper in the recent Acta Geologica Sinica (English edition). We are grateful for the opportunity to expand on the model of the supercritical hyperpycnal flow deposits in the Beilaishi section on the Lingshan Island, and to explain why the model proposed by Tan Mingxuan et al. (2017) cannot explain the bulk of the deposits in the Beilaishi section. We do not dispute that the recognition of supercritical flow deposits remains ambiguous (Ono and Plink-Bjorklund, 2017). To some extent, the morphology of deep-water supercritical flow deposits is similar to hummocky and swaley cross- stratification (Ono and Plink-Bjorklund, 2017). Besides, distinguishing the deposits laid down by gravity flows in deep-water systems from those produced by storm-related combined flows in continental shelf systems is not an easy task (Ono and Plink-Bjorklund, 2017). However, a correct interpretation is crucial for understanding the paleogeographic and depositional model.展开更多
By extending the concept of asymptotic weakly Pareto-Nash equilibrium point to vector-valued case, Tikhonov well-posedness and Hadamard well-posedness results of the multiobjective generalized games are established in...By extending the concept of asymptotic weakly Pareto-Nash equilibrium point to vector-valued case, Tikhonov well-posedness and Hadamard well-posedness results of the multiobjective generalized games are established in this paper.展开更多
With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or ...With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its services. Recently, Operating Systems (OS) are increasingly deploying embedded DDoS prevention schemes to prevent computing exhaustion caused by such attacks. In this paper, we compare the effectiveness of two popular operating systems, namely the Apple’s Lion and Microsoft’s Windows 7, against DDoS attacks. We compare the computing performance of these operating systems under two ICMP based DDoS attacks. Since the role of the OS is to manage the computer or servers resources as efficiently as possible, in this paper we investigate which OS manages its computing resources more efficiently. In this paper, we evaluate and compare the built-in security of these two operating systems by using an iMac computer which is capable of running both Windows 7 and Lion. The DDoS attacks that are simulated for this paper are the ICMP Ping and Land Attack. For this experiment, we measure the exhaustion of the processors and the number of Echo Request and Echo Reply messages that were generated under varying attack loads for both the Ping and Land Attack. From our experiments, we found that both operating systems were able to survive the attacks however they reacted a bit differently under attack. The Operating System Lion was handling both the Ping and Land attack in the exactly the same way, whereas Windows 7 handled the two attacks a bit differently, resulting in different processor consumptions by two different operating systems.展开更多
There are many implied metaphors in the poetry of Tang dynasty. In this paper, the poem Reply of a Chaste Wife and its English version are analyzed through the image schema theory to explore the explanatory power of i...There are many implied metaphors in the poetry of Tang dynasty. In this paper, the poem Reply of a Chaste Wife and its English version are analyzed through the image schema theory to explore the explanatory power of image schema to the poems of Tang dynasty.At the same time, a new perspective to the appreciation of the metaphors in the poems of Tang dynasty is provided.展开更多
This paper mainly replies to the discussion by Li et al (2009) on the calculation of the detachment depths in the Kuqa Depression. We think that viscous material flowing into or out of the cross section can affect t...This paper mainly replies to the discussion by Li et al (2009) on the calculation of the detachment depths in the Kuqa Depression. We think that viscous material flowing into or out of the cross section can affect the validity of the calculation method, yet the number of detachment levels does not bring any drawbacks to the calculation. In the Kuqa Depression, the salt flow influenced the structural deformation to some extent, and affected slightly the accuracy of the calculated depths of the true detachment levels. However, it does not mean that the calculation method loses effectiveness in the study area. Therefore, the calculation results are still relatively believable.展开更多
We are very grateful for the letter written by Dr Lange,and indeed apologize for the mistakes noted in the word-ing of our text regarding statistical analysis.This wasdue to changes carried out while revising the manu...We are very grateful for the letter written by Dr Lange,and indeed apologize for the mistakes noted in the word-ing of our text regarding statistical analysis.This wasdue to changes carried out while revising the manuscriptat the request of reviewers,whom we thank for,point-ing out several issues that were actually similar to thosenoted by Dr.Lange.Unfortunately,we were unable todescribe and discuss our findings properly in the context展开更多
The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points whic...The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper,due展开更多
General:Jaiswal and Shrivastva(2012)proposed the mathematical formulations,i.e.the J–S criterion for converting generalized H-B failure criterion into 3D smooth convex failure criterion at deviatoric plane.The J–S s...General:Jaiswal and Shrivastva(2012)proposed the mathematical formulations,i.e.the J–S criterion for converting generalized H-B failure criterion into 3D smooth convex failure criterion at deviatoric plane.The J–S strength criterion is in two versions:uniform and variable extension ratio.It has been observed from the analysis that at uniform extension ratio,the required strength parameters are only UCS and m(other parameters such as Ls,a,b and c are related with m).In the case of variable extension ratio,extra parameter f is required along with UCS and m.Thus,it has minimal strength parameters compared to You strength criterion.Furthermore,You strength criterion does not obey the smooth convex condition at deviatoric plane.展开更多
The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they deci...The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the retrofit展开更多
The Editor welcomes submissions for possible publication in the Letters to the Editor section that consist of commentary on an article published in the Journal or other relevant issues.
Wireless sensor networks (WSN) are one of the most evolving technologies applicable in various fields where sensitive information is required. However, the constraints of limited resources and requirements for environ...Wireless sensor networks (WSN) are one of the most evolving technologies applicable in various fields where sensitive information is required. However, the constraints of limited resources and requirements for environment-dependent connectivity and life cycle have urged designers to seek more efficient WSN infrastructures. In this paper, we have discussed and compared the results of various single path protocols i.e. LEACH, PAGASIS and VGA. Performance analysis of energy efficient multipath routing protocols incorporating wireless interference has also been performed.展开更多
We thank the authors for their commentary on our paper. Pancreaticoduodenectomy can be performed safely in selected elderly patients. Advanced age alone should not be a contraindication to do pancreaticoduodenectomy. ...We thank the authors for their commentary on our paper. Pancreaticoduodenectomy can be performed safely in selected elderly patients. Advanced age alone should not be a contraindication to do pancreaticoduodenectomy. Careful patient selection is the cornerstone to improve the outcome of pancreaticoduodenectomy in elderly.展开更多
We thank Dr.Uradomo et al for their interest in our recent publication on biliary interventions during pregnancy and value their views on one of the latest innovation for biliary interventions without radiation exposu...We thank Dr.Uradomo et al for their interest in our recent publication on biliary interventions during pregnancy and value their views on one of the latest innovation for biliary interventions without radiation exposure. [1] We fully agree with their comments that such technologies should be evaluated and adopted into clinical practice.However,in any interventions including those carried out during pregnancy,several principles should be adhered to.展开更多
【正】Dear Editor,We thank Dr.Karabas and his colleagues for their interest in our article regarding Bilateral same-session intravitreal injections of anti-vascular endothelial growth factors[1],and we are grateful fo...【正】Dear Editor,We thank Dr.Karabas and his colleagues for their interest in our article regarding Bilateral same-session intravitreal injections of anti-vascular endothelial growth factors[1],and we are grateful for their thoughtful remarks.In展开更多
The Author Reply:We thank Dr. Sucameli et al. for the interest toward our article[1] and for the opportunity for further discussing on this issue,providing a case report of single metastastic fore sites in the livera...The Author Reply:We thank Dr. Sucameli et al. for the interest toward our article[1] and for the opportunity for further discussing on this issue,providing a case report of single metastastic fore sites in the liverand lung both treated in a minimal access fashion. However, giventhe interest of the authors insight, it appears misleading when related to that discussed in our report which was clearly referred toother patients' profiles. Indeed, they described a case with a singleperipheral nodule in the right lung and a single liver metastasesin segment 5. This uncommon situation (less than 2% of patientsaccording to the LiverMetSurvey registry [2]), is obviouslya more than reasonable indication for a mini-invasive approach.However, our patients received surgery for complex oncological involvementof the liver: as described, this means large and/or multiplelesions, in contact or invading the hepatic veins at caval confluence.For such conditions we have introduced original surgicalapproaches [3,4]: in such conditions we would select a J-shapedthoracophrenolaparotomy for the liver per se [5]. This incision forsuch complex conditions other than allowing the liver clearance in a single operation rather than in staged approach [6], allows justin case the removal of lung nodules. Therefore, we thank again theauthors for their interest to our report, and furthermore we congratulatefor the original management of the shared clinical case.However, the condition recalled by the authors is related to a scenariooncologically and surgically at the opposite side of that discussedin our paper and for that somehow suggesting a comparisonis misleading.展开更多
文摘Mobile Ad Hoc Network(MANET)is a group of node that would interrelate among each other through onemulti-hop wireless link,wherein the nodes were able to move in response to sudden modifications.The objective of MANET routing protocol is to quantify the route and compute the best path,but there exists a major decrease in energy efficiency,difficulty in hop selection,cost estimation,and efficient load-balancing.In this paper,a novel least common multipath-based routing has been proposed.Multipath routing is used to find a multipath route from source and destination.Load balancing is of primary importance in the mobile ad-hoc networks,due to limited bandwidth among the nodes and the initiator of the load routing discovery phase in the multipath routing protocol.Fuzzy logic for load balancing multipath routing in MANETs is proposed,which ensures the data packets are sent through a path with the variance of binary sets to predict the original transformation of the data to be received in the system.The main objective of the proposed system is to reduce the routing time of data packets and avoid the traffic based on multipath source and destination.The experimental results have to verify 96.7%efficiency in balancing the load.
文摘We thank Tan Mingxuan et al. (2017) for their comments stimulated by our short paper in the recent Acta Geologica Sinica (English edition). We are grateful for the opportunity to expand on the model of the supercritical hyperpycnal flow deposits in the Beilaishi section on the Lingshan Island, and to explain why the model proposed by Tan Mingxuan et al. (2017) cannot explain the bulk of the deposits in the Beilaishi section. We do not dispute that the recognition of supercritical flow deposits remains ambiguous (Ono and Plink-Bjorklund, 2017). To some extent, the morphology of deep-water supercritical flow deposits is similar to hummocky and swaley cross- stratification (Ono and Plink-Bjorklund, 2017). Besides, distinguishing the deposits laid down by gravity flows in deep-water systems from those produced by storm-related combined flows in continental shelf systems is not an easy task (Ono and Plink-Bjorklund, 2017). However, a correct interpretation is crucial for understanding the paleogeographic and depositional model.
基金Supported by Natural Science Foundation of Guizhou Province
文摘By extending the concept of asymptotic weakly Pareto-Nash equilibrium point to vector-valued case, Tikhonov well-posedness and Hadamard well-posedness results of the multiobjective generalized games are established in this paper.
文摘With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its services. Recently, Operating Systems (OS) are increasingly deploying embedded DDoS prevention schemes to prevent computing exhaustion caused by such attacks. In this paper, we compare the effectiveness of two popular operating systems, namely the Apple’s Lion and Microsoft’s Windows 7, against DDoS attacks. We compare the computing performance of these operating systems under two ICMP based DDoS attacks. Since the role of the OS is to manage the computer or servers resources as efficiently as possible, in this paper we investigate which OS manages its computing resources more efficiently. In this paper, we evaluate and compare the built-in security of these two operating systems by using an iMac computer which is capable of running both Windows 7 and Lion. The DDoS attacks that are simulated for this paper are the ICMP Ping and Land Attack. For this experiment, we measure the exhaustion of the processors and the number of Echo Request and Echo Reply messages that were generated under varying attack loads for both the Ping and Land Attack. From our experiments, we found that both operating systems were able to survive the attacks however they reacted a bit differently under attack. The Operating System Lion was handling both the Ping and Land attack in the exactly the same way, whereas Windows 7 handled the two attacks a bit differently, resulting in different processor consumptions by two different operating systems.
文摘There are many implied metaphors in the poetry of Tang dynasty. In this paper, the poem Reply of a Chaste Wife and its English version are analyzed through the image schema theory to explore the explanatory power of image schema to the poems of Tang dynasty.At the same time, a new perspective to the appreciation of the metaphors in the poems of Tang dynasty is provided.
基金funded by the National Natural Science Foundation of China (Grant No.40802030)
文摘This paper mainly replies to the discussion by Li et al (2009) on the calculation of the detachment depths in the Kuqa Depression. We think that viscous material flowing into or out of the cross section can affect the validity of the calculation method, yet the number of detachment levels does not bring any drawbacks to the calculation. In the Kuqa Depression, the salt flow influenced the structural deformation to some extent, and affected slightly the accuracy of the calculated depths of the true detachment levels. However, it does not mean that the calculation method loses effectiveness in the study area. Therefore, the calculation results are still relatively believable.
文摘We are very grateful for the letter written by Dr Lange,and indeed apologize for the mistakes noted in the word-ing of our text regarding statistical analysis.This wasdue to changes carried out while revising the manuscriptat the request of reviewers,whom we thank for,point-ing out several issues that were actually similar to thosenoted by Dr.Lange.Unfortunately,we were unable todescribe and discuss our findings properly in the context
文摘The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper,due
文摘General:Jaiswal and Shrivastva(2012)proposed the mathematical formulations,i.e.the J–S criterion for converting generalized H-B failure criterion into 3D smooth convex failure criterion at deviatoric plane.The J–S strength criterion is in two versions:uniform and variable extension ratio.It has been observed from the analysis that at uniform extension ratio,the required strength parameters are only UCS and m(other parameters such as Ls,a,b and c are related with m).In the case of variable extension ratio,extra parameter f is required along with UCS and m.Thus,it has minimal strength parameters compared to You strength criterion.Furthermore,You strength criterion does not obey the smooth convex condition at deviatoric plane.
文摘The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the retrofit
文摘The Editor welcomes submissions for possible publication in the Letters to the Editor section that consist of commentary on an article published in the Journal or other relevant issues.
文摘Wireless sensor networks (WSN) are one of the most evolving technologies applicable in various fields where sensitive information is required. However, the constraints of limited resources and requirements for environment-dependent connectivity and life cycle have urged designers to seek more efficient WSN infrastructures. In this paper, we have discussed and compared the results of various single path protocols i.e. LEACH, PAGASIS and VGA. Performance analysis of energy efficient multipath routing protocols incorporating wireless interference has also been performed.
文摘We thank the authors for their commentary on our paper. Pancreaticoduodenectomy can be performed safely in selected elderly patients. Advanced age alone should not be a contraindication to do pancreaticoduodenectomy. Careful patient selection is the cornerstone to improve the outcome of pancreaticoduodenectomy in elderly.
文摘We thank Dr.Uradomo et al for their interest in our recent publication on biliary interventions during pregnancy and value their views on one of the latest innovation for biliary interventions without radiation exposure. [1] We fully agree with their comments that such technologies should be evaluated and adopted into clinical practice.However,in any interventions including those carried out during pregnancy,several principles should be adhered to.
文摘【正】Dear Editor,We thank Dr.Karabas and his colleagues for their interest in our article regarding Bilateral same-session intravitreal injections of anti-vascular endothelial growth factors[1],and we are grateful for their thoughtful remarks.In
文摘The Author Reply:We thank Dr. Sucameli et al. for the interest toward our article[1] and for the opportunity for further discussing on this issue,providing a case report of single metastastic fore sites in the liverand lung both treated in a minimal access fashion. However, giventhe interest of the authors insight, it appears misleading when related to that discussed in our report which was clearly referred toother patients' profiles. Indeed, they described a case with a singleperipheral nodule in the right lung and a single liver metastasesin segment 5. This uncommon situation (less than 2% of patientsaccording to the LiverMetSurvey registry [2]), is obviouslya more than reasonable indication for a mini-invasive approach.However, our patients received surgery for complex oncological involvementof the liver: as described, this means large and/or multiplelesions, in contact or invading the hepatic veins at caval confluence.For such conditions we have introduced original surgicalapproaches [3,4]: in such conditions we would select a J-shapedthoracophrenolaparotomy for the liver per se [5]. This incision forsuch complex conditions other than allowing the liver clearance in a single operation rather than in staged approach [6], allows justin case the removal of lung nodules. Therefore, we thank again theauthors for their interest to our report, and furthermore we congratulatefor the original management of the shared clinical case.However, the condition recalled by the authors is related to a scenariooncologically and surgically at the opposite side of that discussedin our paper and for that somehow suggesting a comparisonis misleading.