The world could be analyzed in many dimensions,like rich and poor,peace and warfare,equal and oppressive,but one of the most important dimensions may be the difference between different societies of individualist and ...The world could be analyzed in many dimensions,like rich and poor,peace and warfare,equal and oppressive,but one of the most important dimensions may be the difference between different societies of individualist and collectivist.This article is trying to discuss is the difference between individualism and collectivism in the western and eastern cultures,and also will explain and discuss it in some aspects,such as their viewpoint,their attitude on self-enhancement and self-criticism,and the goal setting and motivation,and take some cases which some researches and psychologists did and some cases found for example to describe it.Also it presents that social orientation and environment,and culture background will take important role to impact people’s mind and choice on individualism and collectivism.No matter individual or collective,it all have advantage and disadvantage for each,it needs comprehensive evaluation for differential environment which can obtain relative reasonable conclusion.展开更多
Visual analysis of social networks is usually based on graph drawing algorithms and tools. However, social networks are a special kind of graph in the sense that interpretation of displayed relationships is heavily de...Visual analysis of social networks is usually based on graph drawing algorithms and tools. However, social networks are a special kind of graph in the sense that interpretation of displayed relationships is heavily dependent on context. Context, in its turn, is given by attributes associated with graph elements, such as individual nodes, edges, and groups of edges, as well as by the nature of the connections between individuals. In most systems, attributes of individuals and communities are not taken into consideration during graph layout, except to derive weights for force-based placement strategies. This paper proposes a set of novel tools for displaying and exploring social networks based on attribute and connectivity mappings. These properties are employed to layout nodes on the plane via multidimensional projection techniques. For the attribute mapping, we show that node proximity in the layout corresponds to similarity in atgribute, leading to easiness in locating similar groups of nodes. The projection based on connectivity yields an initial placement that forgoes force-based or graph analysis algorithm, reaching a meaningful layout in one pass. When a force algorithm is then applied to this initial mapping, the final layout presents better properties than conventional force-based approaches. Numerical evaluations show a number of advantages of pre-mapping points via projections. User evaluation demonstrates that these tools promote ease of manipulation as well as fast identification of concepts and associations which cannot be easily expressed by conventional graph visualization alone. In order to allow better space usage for complex networks, a graph mapping on the surface of a sphere is also implemented.展开更多
Security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-inde...Security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-independent time-proven security knowledge and expertise. How are they useful for developing secure IoT-based smart systems? Are there architectures that support IoT security? We aim to systematically review the research work published on patterns and architectures for IoT security (and privacy). Then, we want to provide an analysis on that research landscape to answer our research questions. We follow the well-known guidelines for conducting systematic literature reviews. From thousands of candidate papers initially found in our search process, we have systematically distinguished and analyzed thirty-six (36) papers that have been peer-reviewed and published around patterns and architectures for IoT security and privacy in the last decade (January 2010–December 2020). Our analysis shows that there is a rise in the number of publications tending to patterns and architectures for IoT security in the last three years. We have not seen any approach of applying systematically architectures and patterns together that can address security (and privacy) concerns not only at the architectural level, but also at the network or IoT devices level. We also explored how the research contributions in the primary studies handle the different issues from the OWASP Internet of Things (IoT) top ten vulnerabilities list. Finally, we discuss the current gaps in this research area and how to fill in the gaps for promoting the utilization of patterns for IoT security and privacy by design.展开更多
The dissociation chemistry of primary fragment ions from the protonated proline-containing tripeptides glycylprolylglycine,prolylglycylglycine,and prolylprolylglycine was investigated by electrospray ionization multi-...The dissociation chemistry of primary fragment ions from the protonated proline-containing tripeptides glycylprolylglycine,prolylglycylglycine,and prolylprolylglycine was investigated by electrospray ionization multi-stage mass spectrometry.Calcula-tions showed the a 2 ions generated from b 2 ions were cyclic,which is energetically more favorable than the linear form.The prolyl residue in the structure affected the energy hypersurface of the dissociation reaction from the b 2 ion to the a 2 ion.In the fragmen-tation of a 2 ions,the iminium-imine complex corresponding to loss of CO from the a 2 ion was suggested to be an ion-neutral com-plex (INC).The a 1 ion was generated from direct separation of this INC,and the internal iminium ion,which was absent in PGG,was generated from another INC that was formed from the first INC via proton-bridged complex-mediated intramolecular proton transfer.Although these intermediates are unstable,their existence is supported by experiments and density functional theory calculations.展开更多
文摘The world could be analyzed in many dimensions,like rich and poor,peace and warfare,equal and oppressive,but one of the most important dimensions may be the difference between different societies of individualist and collectivist.This article is trying to discuss is the difference between individualism and collectivism in the western and eastern cultures,and also will explain and discuss it in some aspects,such as their viewpoint,their attitude on self-enhancement and self-criticism,and the goal setting and motivation,and take some cases which some researches and psychologists did and some cases found for example to describe it.Also it presents that social orientation and environment,and culture background will take important role to impact people’s mind and choice on individualism and collectivism.No matter individual or collective,it all have advantage and disadvantage for each,it needs comprehensive evaluation for differential environment which can obtain relative reasonable conclusion.
基金FAPESP, CNPq and CAPES for their financial support
文摘Visual analysis of social networks is usually based on graph drawing algorithms and tools. However, social networks are a special kind of graph in the sense that interpretation of displayed relationships is heavily dependent on context. Context, in its turn, is given by attributes associated with graph elements, such as individual nodes, edges, and groups of edges, as well as by the nature of the connections between individuals. In most systems, attributes of individuals and communities are not taken into consideration during graph layout, except to derive weights for force-based placement strategies. This paper proposes a set of novel tools for displaying and exploring social networks based on attribute and connectivity mappings. These properties are employed to layout nodes on the plane via multidimensional projection techniques. For the attribute mapping, we show that node proximity in the layout corresponds to similarity in atgribute, leading to easiness in locating similar groups of nodes. The projection based on connectivity yields an initial placement that forgoes force-based or graph analysis algorithm, reaching a meaningful layout in one pass. When a force algorithm is then applied to this initial mapping, the final layout presents better properties than conventional force-based approaches. Numerical evaluations show a number of advantages of pre-mapping points via projections. User evaluation demonstrates that these tools promote ease of manipulation as well as fast identification of concepts and associations which cannot be easily expressed by conventional graph visualization alone. In order to allow better space usage for complex networks, a graph mapping on the surface of a sphere is also implemented.
基金The research leading to these results has partially received funding from the European Commission's H2020 Programme under the grant agreement numbers 958363(Dat4.ZERO)958357(InterQ).
文摘Security of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-independent time-proven security knowledge and expertise. How are they useful for developing secure IoT-based smart systems? Are there architectures that support IoT security? We aim to systematically review the research work published on patterns and architectures for IoT security (and privacy). Then, we want to provide an analysis on that research landscape to answer our research questions. We follow the well-known guidelines for conducting systematic literature reviews. From thousands of candidate papers initially found in our search process, we have systematically distinguished and analyzed thirty-six (36) papers that have been peer-reviewed and published around patterns and architectures for IoT security and privacy in the last decade (January 2010–December 2020). Our analysis shows that there is a rise in the number of publications tending to patterns and architectures for IoT security in the last three years. We have not seen any approach of applying systematically architectures and patterns together that can address security (and privacy) concerns not only at the architectural level, but also at the network or IoT devices level. We also explored how the research contributions in the primary studies handle the different issues from the OWASP Internet of Things (IoT) top ten vulnerabilities list. Finally, we discuss the current gaps in this research area and how to fill in the gaps for promoting the utilization of patterns for IoT security and privacy by design.
基金supported by China National Funds for Distinguished Young scientists(21025207)the National Natural Science Foundation of China(20975092)the Zhejiang Provincial Natural Science Foundation of China(Y4100020)
文摘The dissociation chemistry of primary fragment ions from the protonated proline-containing tripeptides glycylprolylglycine,prolylglycylglycine,and prolylprolylglycine was investigated by electrospray ionization multi-stage mass spectrometry.Calcula-tions showed the a 2 ions generated from b 2 ions were cyclic,which is energetically more favorable than the linear form.The prolyl residue in the structure affected the energy hypersurface of the dissociation reaction from the b 2 ion to the a 2 ion.In the fragmen-tation of a 2 ions,the iminium-imine complex corresponding to loss of CO from the a 2 ion was suggested to be an ion-neutral com-plex (INC).The a 1 ion was generated from direct separation of this INC,and the internal iminium ion,which was absent in PGG,was generated from another INC that was formed from the first INC via proton-bridged complex-mediated intramolecular proton transfer.Although these intermediates are unstable,their existence is supported by experiments and density functional theory calculations.