We thank Tan Mingxuan et al.(2017)for their comments stimulated by our short paper in the recent Acta Geologica Sinica(English edition).We are grateful for the opportunity to expand on the model of the supercritical h...We thank Tan Mingxuan et al.(2017)for their comments stimulated by our short paper in the recent Acta Geologica Sinica(English edition).We are grateful for the opportunity to expand on the model of the supercritical hyperpycnal flow deposits in the Beilaishi section on the Lingshan Island,and to explain why the model proposed by Tan Mingxuan et al.(2017)cannot explain the bulk展开更多
正The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points wh...正The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper。展开更多
正The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they de...正The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the展开更多
The Editor welcomes submissions for possible publication in the Letters to the Editor section that consist of commentary on an article published in the Journal or other relevant issues.
We thank the authors for their commentary on our paper.^([1]) Pancreaticoduodenectomy can be performed safely in selected elderly patients.Advanced age alone should not be a contraindication to do pancreaticoduodenect...We thank the authors for their commentary on our paper.^([1]) Pancreaticoduodenectomy can be performed safely in selected elderly patients.Advanced age alone should not be a contraindication to do pancreaticoduodenectomy.Careful patient selection is the cornerstone to improve the outcome of展开更多
We thank Dr.Uradomo et al for their interest in our recent publication on biliary interventions during pregnancy and value their views on one of the latest innovation for biliary interventions without radiation exposu...We thank Dr.Uradomo et al for their interest in our recent publication on biliary interventions during pregnancy and value their views on one of the latest innovation for biliary interventions without radiation exposure. [1] We fully agree with their comments that such technologies should be evaluated and adopted into clinical practice.However,in any interventions including those carried out during pregnancy,several principles should be adhered to.展开更多
Dear Editor,We thank the author for making meaningful comments on our recent article[1].The SNP 772G>A(rs602662)in exon 2 of the gene encoding fucosyl transferase(FUT2)has been found to be related with the alterati...Dear Editor,We thank the author for making meaningful comments on our recent article[1].The SNP 772G>A(rs602662)in exon 2 of the gene encoding fucosyl transferase(FUT2)has been found to be related with the alterations in plasma vitamin B_(12) levels.展开更多
To the Editor:We read with great interest the letterfrom Drs.Finsterer and Stllberger,on our casereport.We are grateful to their comments.It is not uncommon that the adult patients with theecho-characteristics of left...To the Editor:We read with great interest the letterfrom Drs.Finsterer and Stllberger,on our casereport.We are grateful to their comments.It is not uncommon that the adult patients with theecho-characteristics of left ventricular noncompactionmet in our practice the criteria proposed by Oechslin andhis colleagues.The left ventricular dilation and展开更多
With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or ...With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its services. Recently, Operating Systems (OS) are increasingly deploying embedded DDoS prevention schemes to prevent computing exhaustion caused by such attacks. In this paper, we compare the effectiveness of two popular operating systems, namely the Apple’s Lion and Microsoft’s Windows 7, against DDoS attacks. We compare the computing performance of these operating systems under two ICMP based DDoS attacks. Since the role of the OS is to manage the computer or servers resources as efficiently as possible, in this paper we investigate which OS manages its computing resources more efficiently. In this paper, we evaluate and compare the built-in security of these two operating systems by using an iMac computer which is capable of running both Windows 7 and Lion. The DDoS attacks that are simulated for this paper are the ICMP Ping and Land Attack. For this experiment, we measure the exhaustion of the processors and the number of Echo Request and Echo Reply messages that were generated under varying attack loads for both the Ping and Land Attack. From our experiments, we found that both operating systems were able to survive the attacks however they reacted a bit differently under attack. The Operating System Lion was handling both the Ping and Land attack in the exactly the same way, whereas Windows 7 handled the two attacks a bit differently, resulting in different processor consumptions by two different operating systems.展开更多
There are many implied metaphors in the poetry of Tang dynasty. In this paper, the poem Reply of a Chaste Wife and its English version are analyzed through the image schema theory to explore the explanatory power of i...There are many implied metaphors in the poetry of Tang dynasty. In this paper, the poem Reply of a Chaste Wife and its English version are analyzed through the image schema theory to explore the explanatory power of image schema to the poems of Tang dynasty.At the same time, a new perspective to the appreciation of the metaphors in the poems of Tang dynasty is provided.展开更多
Wireless sensor networks (WSN) are one of the most evolving technologies applicable in various fields where sensitive information is required. However, the constraints of limited resources and requirements for environ...Wireless sensor networks (WSN) are one of the most evolving technologies applicable in various fields where sensitive information is required. However, the constraints of limited resources and requirements for environment-dependent connectivity and life cycle have urged designers to seek more efficient WSN infrastructures. In this paper, we have discussed and compared the results of various single path protocols i.e. LEACH, PAGASIS and VGA. Performance analysis of energy efficient multipath routing protocols incorporating wireless interference has also been performed.展开更多
Mobile Ad Hoc Network(MANET)is a group of node that would interrelate among each other through onemulti-hop wireless link,wherein the nodes were able to move in response to sudden modifications.The objective of MANET ...Mobile Ad Hoc Network(MANET)is a group of node that would interrelate among each other through onemulti-hop wireless link,wherein the nodes were able to move in response to sudden modifications.The objective of MANET routing protocol is to quantify the route and compute the best path,but there exists a major decrease in energy efficiency,difficulty in hop selection,cost estimation,and efficient load-balancing.In this paper,a novel least common multipath-based routing has been proposed.Multipath routing is used to find a multipath route from source and destination.Load balancing is of primary importance in the mobile ad-hoc networks,due to limited bandwidth among the nodes and the initiator of the load routing discovery phase in the multipath routing protocol.Fuzzy logic for load balancing multipath routing in MANETs is proposed,which ensures the data packets are sent through a path with the variance of binary sets to predict the original transformation of the data to be received in the system.The main objective of the proposed system is to reduce the routing time of data packets and avoid the traffic based on multipath source and destination.The experimental results have to verify 96.7%efficiency in balancing the load.展开更多
文摘We thank Tan Mingxuan et al.(2017)for their comments stimulated by our short paper in the recent Acta Geologica Sinica(English edition).We are grateful for the opportunity to expand on the model of the supercritical hyperpycnal flow deposits in the Beilaishi section on the Lingshan Island,and to explain why the model proposed by Tan Mingxuan et al.(2017)cannot explain the bulk
文摘正The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper。
文摘正The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the
文摘The Editor welcomes submissions for possible publication in the Letters to the Editor section that consist of commentary on an article published in the Journal or other relevant issues.
文摘We thank the authors for their commentary on our paper.^([1]) Pancreaticoduodenectomy can be performed safely in selected elderly patients.Advanced age alone should not be a contraindication to do pancreaticoduodenectomy.Careful patient selection is the cornerstone to improve the outcome of
文摘We thank Dr.Uradomo et al for their interest in our recent publication on biliary interventions during pregnancy and value their views on one of the latest innovation for biliary interventions without radiation exposure. [1] We fully agree with their comments that such technologies should be evaluated and adopted into clinical practice.However,in any interventions including those carried out during pregnancy,several principles should be adhered to.
基金supported by grants from the National Key Research and Development Program(Grant No.2016YFC0905000)National High-tech R&D Program of China(863 Program+2 种基金Grant No.2012AA02A518)National Natural Scientific Foundation of China(Grant Nos.81522048,81573511,81273595)the Innovation-driven Project of Central South University,China(Grant No.2016CX024)
文摘Dear Editor,We thank the author for making meaningful comments on our recent article[1].The SNP 772G>A(rs602662)in exon 2 of the gene encoding fucosyl transferase(FUT2)has been found to be related with the alterations in plasma vitamin B_(12) levels.
文摘To the Editor:We read with great interest the letterfrom Drs.Finsterer and Stllberger,on our casereport.We are grateful to their comments.It is not uncommon that the adult patients with theecho-characteristics of left ventricular noncompactionmet in our practice the criteria proposed by Oechslin andhis colleagues.The left ventricular dilation and
文摘With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its services. Recently, Operating Systems (OS) are increasingly deploying embedded DDoS prevention schemes to prevent computing exhaustion caused by such attacks. In this paper, we compare the effectiveness of two popular operating systems, namely the Apple’s Lion and Microsoft’s Windows 7, against DDoS attacks. We compare the computing performance of these operating systems under two ICMP based DDoS attacks. Since the role of the OS is to manage the computer or servers resources as efficiently as possible, in this paper we investigate which OS manages its computing resources more efficiently. In this paper, we evaluate and compare the built-in security of these two operating systems by using an iMac computer which is capable of running both Windows 7 and Lion. The DDoS attacks that are simulated for this paper are the ICMP Ping and Land Attack. For this experiment, we measure the exhaustion of the processors and the number of Echo Request and Echo Reply messages that were generated under varying attack loads for both the Ping and Land Attack. From our experiments, we found that both operating systems were able to survive the attacks however they reacted a bit differently under attack. The Operating System Lion was handling both the Ping and Land attack in the exactly the same way, whereas Windows 7 handled the two attacks a bit differently, resulting in different processor consumptions by two different operating systems.
文摘There are many implied metaphors in the poetry of Tang dynasty. In this paper, the poem Reply of a Chaste Wife and its English version are analyzed through the image schema theory to explore the explanatory power of image schema to the poems of Tang dynasty.At the same time, a new perspective to the appreciation of the metaphors in the poems of Tang dynasty is provided.
文摘Wireless sensor networks (WSN) are one of the most evolving technologies applicable in various fields where sensitive information is required. However, the constraints of limited resources and requirements for environment-dependent connectivity and life cycle have urged designers to seek more efficient WSN infrastructures. In this paper, we have discussed and compared the results of various single path protocols i.e. LEACH, PAGASIS and VGA. Performance analysis of energy efficient multipath routing protocols incorporating wireless interference has also been performed.
文摘Mobile Ad Hoc Network(MANET)is a group of node that would interrelate among each other through onemulti-hop wireless link,wherein the nodes were able to move in response to sudden modifications.The objective of MANET routing protocol is to quantify the route and compute the best path,but there exists a major decrease in energy efficiency,difficulty in hop selection,cost estimation,and efficient load-balancing.In this paper,a novel least common multipath-based routing has been proposed.Multipath routing is used to find a multipath route from source and destination.Load balancing is of primary importance in the mobile ad-hoc networks,due to limited bandwidth among the nodes and the initiator of the load routing discovery phase in the multipath routing protocol.Fuzzy logic for load balancing multipath routing in MANETs is proposed,which ensures the data packets are sent through a path with the variance of binary sets to predict the original transformation of the data to be received in the system.The main objective of the proposed system is to reduce the routing time of data packets and avoid the traffic based on multipath source and destination.The experimental results have to verify 96.7%efficiency in balancing the load.