Growing attention has been directed to the use of satellite imagery and open geospatial data to understand large-scale sustainable development outcomes.Health and education are critical domains of the Unites Nations’...Growing attention has been directed to the use of satellite imagery and open geospatial data to understand large-scale sustainable development outcomes.Health and education are critical domains of the Unites Nations’Sus-tainable Development Goals(SDGs),yet existing research on the accessibility of corresponding services focused mainly on detailed but small-scale studies.This means that such studies lack accessibility metrics for large-scale quantitative evaluations.To address this deficiency,we evaluated the accessibility of health and education ser-vices in China's Mainland in 2021 using point-of-interest data,OpenStreetMap road data,land cover data,and WorldPop spatial demographic data.The accessibility metrics used were the least time costs of reaching hospital and school services and population coverage with a time cost of less than 1 h.On the basis of the road network and land cover information,the overall average time costs of reaching hospital and school were 20 and 22 min,respectively.In terms of population coverage,94.7%and 92.5%of the population in China has a time cost of less than 1 h in obtaining hospital and school services,respectively.Counties with low accessibility to hospitals and schools were highly coupled with poor areas and ecological function regions,with the time cost incurred in these areas being more than twice that experienced in non-poor and non-ecological areas.Furthermore,the cumulative time cost incurred by the bottom 20%of counties(by GDP)from access to hospital and school services reached approximately 80%of the national total.Low-GDP counties were compelled to suffer disproportionately increased time costs to acquire health and education services compared with high-GDP counties.The accessibil-ity metrics proposed in this study are highly related to SDGs 3 and 4,and they can serve as auxiliary data that can be used to enhance the evaluation of SDG outcomes.The analysis of the uneven distribution of health and education services in China can help identify areas with backward public services and may contribute to targeted and efficient policy interventions.展开更多
Experiments are conducted on the evacuation rate of pedestrians through exits with queued evacuation pattern and random evacuation pattern. The experimental results show that the flow rate of pedestrians is larger wit...Experiments are conducted on the evacuation rate of pedestrians through exits with queued evacuation pattern and random evacuation pattern. The experimental results show that the flow rate of pedestrians is larger with the random evacuation pattern than with the queued evacuation pattern. Therefore, the exit width calculated based on the minimum evacuation clear width for every 100 persons, which is on the assumption that the pedestrians pass through the exit in one queue or several queues, is conservative. The number of people crossing the exit simultaneously is greater in the random evacuation experiments than in the queued evacuation experiments, and the time interval between the front row and rear row of people is shortened in large-exit conditions when pedestrians evacuate randomly. The difference between the flow rate with a queued evacuation pattern and the flow rate with a random evacuation pattern is related to the surplus width of the exit, which is greater than the total width of all accommodated people streams. Two dimensionless quantities are defined to explore this relationship. It is found that the difference in flow rate between the two evacuation patterns is stable at a low level when the surplus width of the exit is no more than 45% of the width of a single pedestrian stream. There is a great difference between the flow rate with the queued evacuation pattern and the flow rate with the random evacuation pattern in a scenario with a larger surplus width of the exit. Meanwhile, the pedestrians crowd extraordinarily at the exit in these conditions as well, since the number of pedestrians who want to evacuate through exit simultaneously greatly exceeds the accommodated level. Therefore, the surplus width of exit should be limited especially in the narrow exit condition, and the relationship between the two dimensionless quantities mentioned above could provide the basis to some extent.展开更多
Currently,distributed routing protocols are constrained by offering a single path between any pair of nodes,thereby limiting the potential throughput and overall network performance.This approach not only restricts th...Currently,distributed routing protocols are constrained by offering a single path between any pair of nodes,thereby limiting the potential throughput and overall network performance.This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted.In contrast,routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution.Multipath routing,as a fundamental concept,surpasses the limitations of traditional shortest path first protocols.It not only redirects traffic to unused resources,effectively mitigating network congestion,but also ensures load balancing across the network.This optimization significantly improves network utilization and boosts the overall performance,making it a widely recognized efficient method for enhancing network reliability.To further strengthen network resilience against failures,we introduce a routing scheme known as Multiple Nodes with at least Two Choices(MNTC).This innovative approach aims to significantly enhance network availability by providing each node with at least two routing choices.By doing so,it not only reduces the dependency on a single path but also creates redundant paths that can be utilized in case of failures,thereby enhancing the overall resilience of the network.To ensure the optimal placement of nodes,we propose three incremental deployment algorithms.These algorithms carefully select the most suitable set of nodes for deployment,taking into account various factors such as node connectivity,traffic patterns,and network topology.By deployingMNTCon a carefully chosen set of nodes,we can significantly enhance network reliability without the need for a complete overhaul of the existing infrastructure.We have conducted extensive evaluations of MNTC in diverse topological spaces,demonstrating its effectiveness in maintaining high network availability with minimal path stretch.The results are impressive,showing that even when implemented on just 60%of nodes,our incremental deployment method significantly boosts network availability.This underscores the potential of MNTC in enhancing network resilience and performance,making it a viable solution for modern networks facing increasing demands and complexities.The algorithms OSPF,TBFH,DC and LFC perform fast rerouting based on strict conditions,while MNTC is not restricted by these conditions.In five real network topologies,the average network availability ofMNTCis improved by 14.68%,6.28%,4.76%and 2.84%,respectively,compared with OSPF,TBFH,DC and LFC.展开更多
Based on 3D modelling of typical tunnels in mines, the airflow distribution in a three-center arch-section tunnel is investigated and the influence of air velocity and cross section on airflow distribution in tunnels ...Based on 3D modelling of typical tunnels in mines, the airflow distribution in a three-center arch-section tunnel is investigated and the influence of air velocity and cross section on airflow distribution in tunnels is studied. The average velocity points were analyzed quantitatively. The results show that the airflow pattern is similar for the three-center arch section under different ventilation velocities and cross sectional areas. The shape of the tunnel cross section and wall are the critical factors influencing the airflow pattern. The average velocity points are mainly close to the tunnel wall. Characteristic equations are developed to describe the average velocity distribution, and provide a theoretical basis for accurately measuring the average velocity in mine tunnels.展开更多
This study analyzes how the meaning of yi(夷,barbarian)was constructed in different historical contexts at the end of the Qing dynasty,which is important for us to reconsider xenophobia and Sino-centrism both in the p...This study analyzes how the meaning of yi(夷,barbarian)was constructed in different historical contexts at the end of the Qing dynasty,which is important for us to reconsider xenophobia and Sino-centrism both in the past and present.Our study combines contextual with intertextual reading methods.It places different materials,including missionaries’works,newspapers,and official documents,in their specific historical contexts and links them to obtain a full picture of this transformation.We argue that yi was invented.Various agents and actors created the connotation of yi to suit their interests.It was transformed by the Qing court from“barbarians”to those who follow Confucianism to justify their rule.Then it was first translated as“foreigners”and later as“barbarians”when Europeans came to China.Our study situates the meaning of yi to help us rethink some of the labels and misconceptions attached to yi and the early missionaries in China.展开更多
Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the foc...Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the focus of many initiatives. Effectively analyzing massive network security data with high dimensions for suspicious flow diagnosis is a huge challenge. In addition, the uneven distribution of network traffic does not fully reflect the differences of class sample features, resulting in the low accuracy of attack detection. To solve these problems, a novel approach called the fuzzy entropy weighted natural nearest neighbor(FEW-NNN) method is proposed to enhance the accuracy and efficiency of flowbased network traffic attack detection. First, the FEW-NNN method uses the Fisher score and deep graph feature learning algorithm to remove unimportant features and reduce the data dimension. Then, according to the proposed natural nearest neighbor searching algorithm(NNN_Searching), the density of data points, each class center and the smallest enclosing sphere radius are determined correspondingly. Finally, a fuzzy entropy weighted KNN classification method based on affinity is proposed, which mainly includes the following three steps: 1、 the feature weights of samples are calculated based on fuzzy entropy values, 2、 the fuzzy memberships of samples are determined based on affinity among samples, and 3、 K-neighbors are selected according to the class-conditional weighted Euclidean distance, the fuzzy membership value of the testing sample is calculated based on the membership of k-neighbors, and then all testing samples are classified according to the fuzzy membership value of the samples belonging to each class;that is, the attack type is determined. The method has been applied to the problem of attack detection and validated based on the famous KDD99 and CICIDS-2017 datasets. From the experimental results shown in this paper, it is observed that the FEW-NNN method improves the accuracy and efficiency of flow-based network traffic attack detection.展开更多
As far as second language acquisition concerned,there are various factors in relation to individual differences that may af?fect language development.All the effects of those factors are considerable for teachers to d...As far as second language acquisition concerned,there are various factors in relation to individual differences that may af?fect language development.All the effects of those factors are considerable for teachers to design appropriate and efficient class?room strategies and activities to cater for learners’differences.In this essay,the influence of age factor is initially explored before strategies and activities are systematically designed.展开更多
China contributes to poverty reduction in devceloping countrics along the Belt and Road(B&R)by the way of aid and investment,taking infrastructure construction as a break through and state-owned capital as the mai...China contributes to poverty reduction in devceloping countrics along the Belt and Road(B&R)by the way of aid and investment,taking infrastructure construction as a break through and state-owned capital as the main force.The empirical study of the B&R countries'panel data of 2000-2017 shows that Chinese aid and investment help to reduce poverty rate,and there is a threshold effect between investment and poverty rate reduction.When the per capita GDP level is below the threshold value,the poverty reduction effect of Chinese investment is more significant.Different types of aid and investment generate different poverty reduction effects:construction project investment and green land investment have more significant effects,and poverty reduction mechanism based on infrastructure construction has better poverty reduction effect than transfer payment aid.The correlation between state-owned enterprise investment and poverty rate reduction is significant,and state owned capital plays an important role in poverty reduction in the B&R developing countries.The research also finds that poverty reduction effct of Chinese aid and investment is realized mainly by capital formation and job creation in these countries.展开更多
基金This work was supported by the National Natural Science Foundation for Distinguished Young Scholars of China(Grant No.41725006).
文摘Growing attention has been directed to the use of satellite imagery and open geospatial data to understand large-scale sustainable development outcomes.Health and education are critical domains of the Unites Nations’Sus-tainable Development Goals(SDGs),yet existing research on the accessibility of corresponding services focused mainly on detailed but small-scale studies.This means that such studies lack accessibility metrics for large-scale quantitative evaluations.To address this deficiency,we evaluated the accessibility of health and education ser-vices in China's Mainland in 2021 using point-of-interest data,OpenStreetMap road data,land cover data,and WorldPop spatial demographic data.The accessibility metrics used were the least time costs of reaching hospital and school services and population coverage with a time cost of less than 1 h.On the basis of the road network and land cover information,the overall average time costs of reaching hospital and school were 20 and 22 min,respectively.In terms of population coverage,94.7%and 92.5%of the population in China has a time cost of less than 1 h in obtaining hospital and school services,respectively.Counties with low accessibility to hospitals and schools were highly coupled with poor areas and ecological function regions,with the time cost incurred in these areas being more than twice that experienced in non-poor and non-ecological areas.Furthermore,the cumulative time cost incurred by the bottom 20%of counties(by GDP)from access to hospital and school services reached approximately 80%of the national total.Low-GDP counties were compelled to suffer disproportionately increased time costs to acquire health and education services compared with high-GDP counties.The accessibil-ity metrics proposed in this study are highly related to SDGs 3 and 4,and they can serve as auxiliary data that can be used to enhance the evaluation of SDG outcomes.The analysis of the uneven distribution of health and education services in China can help identify areas with backward public services and may contribute to targeted and efficient policy interventions.
基金Project supported by the Special Funds for Basic Operating Expenses of the Centre University of China (Grant No.23ZYJS006)。
文摘Experiments are conducted on the evacuation rate of pedestrians through exits with queued evacuation pattern and random evacuation pattern. The experimental results show that the flow rate of pedestrians is larger with the random evacuation pattern than with the queued evacuation pattern. Therefore, the exit width calculated based on the minimum evacuation clear width for every 100 persons, which is on the assumption that the pedestrians pass through the exit in one queue or several queues, is conservative. The number of people crossing the exit simultaneously is greater in the random evacuation experiments than in the queued evacuation experiments, and the time interval between the front row and rear row of people is shortened in large-exit conditions when pedestrians evacuate randomly. The difference between the flow rate with a queued evacuation pattern and the flow rate with a random evacuation pattern is related to the surplus width of the exit, which is greater than the total width of all accommodated people streams. Two dimensionless quantities are defined to explore this relationship. It is found that the difference in flow rate between the two evacuation patterns is stable at a low level when the surplus width of the exit is no more than 45% of the width of a single pedestrian stream. There is a great difference between the flow rate with the queued evacuation pattern and the flow rate with the random evacuation pattern in a scenario with a larger surplus width of the exit. Meanwhile, the pedestrians crowd extraordinarily at the exit in these conditions as well, since the number of pedestrians who want to evacuate through exit simultaneously greatly exceeds the accommodated level. Therefore, the surplus width of exit should be limited especially in the narrow exit condition, and the relationship between the two dimensionless quantities mentioned above could provide the basis to some extent.
基金supported by Fundamental Research Program of Shanxi Province(No.20210302123444)the Research Project at the College Level of China Institute of Labor Relations(No.23XYJS018)+2 种基金the ICH Digitalization and Multi-Source Information Fusion Fujian Provincial University Engineering Research Center 2022 Open Fund Project(G3-KF2207)the China University Industry University Research Innovation Fund(No.2021FNA02009)the Key R&D Program(International Science and Technology Cooperation Project)of Shanxi Province China(No.201903D421003).
文摘Currently,distributed routing protocols are constrained by offering a single path between any pair of nodes,thereby limiting the potential throughput and overall network performance.This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted.In contrast,routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution.Multipath routing,as a fundamental concept,surpasses the limitations of traditional shortest path first protocols.It not only redirects traffic to unused resources,effectively mitigating network congestion,but also ensures load balancing across the network.This optimization significantly improves network utilization and boosts the overall performance,making it a widely recognized efficient method for enhancing network reliability.To further strengthen network resilience against failures,we introduce a routing scheme known as Multiple Nodes with at least Two Choices(MNTC).This innovative approach aims to significantly enhance network availability by providing each node with at least two routing choices.By doing so,it not only reduces the dependency on a single path but also creates redundant paths that can be utilized in case of failures,thereby enhancing the overall resilience of the network.To ensure the optimal placement of nodes,we propose three incremental deployment algorithms.These algorithms carefully select the most suitable set of nodes for deployment,taking into account various factors such as node connectivity,traffic patterns,and network topology.By deployingMNTCon a carefully chosen set of nodes,we can significantly enhance network reliability without the need for a complete overhaul of the existing infrastructure.We have conducted extensive evaluations of MNTC in diverse topological spaces,demonstrating its effectiveness in maintaining high network availability with minimal path stretch.The results are impressive,showing that even when implemented on just 60%of nodes,our incremental deployment method significantly boosts network availability.This underscores the potential of MNTC in enhancing network resilience and performance,making it a viable solution for modern networks facing increasing demands and complexities.The algorithms OSPF,TBFH,DC and LFC perform fast rerouting based on strict conditions,while MNTC is not restricted by these conditions.In five real network topologies,the average network availability ofMNTCis improved by 14.68%,6.28%,4.76%and 2.84%,respectively,compared with OSPF,TBFH,DC and LFC.
基金supported by the Fundamental Research Funds for the Central Universities of China (No.17ZY001)
文摘Based on 3D modelling of typical tunnels in mines, the airflow distribution in a three-center arch-section tunnel is investigated and the influence of air velocity and cross section on airflow distribution in tunnels is studied. The average velocity points were analyzed quantitatively. The results show that the airflow pattern is similar for the three-center arch section under different ventilation velocities and cross sectional areas. The shape of the tunnel cross section and wall are the critical factors influencing the airflow pattern. The average velocity points are mainly close to the tunnel wall. Characteristic equations are developed to describe the average velocity distribution, and provide a theoretical basis for accurately measuring the average velocity in mine tunnels.
文摘This study analyzes how the meaning of yi(夷,barbarian)was constructed in different historical contexts at the end of the Qing dynasty,which is important for us to reconsider xenophobia and Sino-centrism both in the past and present.Our study combines contextual with intertextual reading methods.It places different materials,including missionaries’works,newspapers,and official documents,in their specific historical contexts and links them to obtain a full picture of this transformation.We argue that yi was invented.Various agents and actors created the connotation of yi to suit their interests.It was transformed by the Qing court from“barbarians”to those who follow Confucianism to justify their rule.Then it was first translated as“foreigners”and later as“barbarians”when Europeans came to China.Our study situates the meaning of yi to help us rethink some of the labels and misconceptions attached to yi and the early missionaries in China.
基金the Natural Science Foundation of China (No. 61802404, 61602470)the Strategic Priority Research Program (C) of the Chinese Academy of Sciences (No. XDC02040100)+3 种基金the Fundamental Research Funds for the Central Universities of the China University of Labor Relations (No. 20ZYJS017, 20XYJS003)the Key Research Program of the Beijing Municipal Science & Technology Commission (No. D181100000618003)partially the Key Laboratory of Network Assessment Technology,the Chinese Academy of Sciencesthe Beijing Key Laboratory of Network Security and Protection Technology
文摘Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the focus of many initiatives. Effectively analyzing massive network security data with high dimensions for suspicious flow diagnosis is a huge challenge. In addition, the uneven distribution of network traffic does not fully reflect the differences of class sample features, resulting in the low accuracy of attack detection. To solve these problems, a novel approach called the fuzzy entropy weighted natural nearest neighbor(FEW-NNN) method is proposed to enhance the accuracy and efficiency of flowbased network traffic attack detection. First, the FEW-NNN method uses the Fisher score and deep graph feature learning algorithm to remove unimportant features and reduce the data dimension. Then, according to the proposed natural nearest neighbor searching algorithm(NNN_Searching), the density of data points, each class center and the smallest enclosing sphere radius are determined correspondingly. Finally, a fuzzy entropy weighted KNN classification method based on affinity is proposed, which mainly includes the following three steps: 1、 the feature weights of samples are calculated based on fuzzy entropy values, 2、 the fuzzy memberships of samples are determined based on affinity among samples, and 3、 K-neighbors are selected according to the class-conditional weighted Euclidean distance, the fuzzy membership value of the testing sample is calculated based on the membership of k-neighbors, and then all testing samples are classified according to the fuzzy membership value of the samples belonging to each class;that is, the attack type is determined. The method has been applied to the problem of attack detection and validated based on the famous KDD99 and CICIDS-2017 datasets. From the experimental results shown in this paper, it is observed that the FEW-NNN method improves the accuracy and efficiency of flow-based network traffic attack detection.
文摘As far as second language acquisition concerned,there are various factors in relation to individual differences that may af?fect language development.All the effects of those factors are considerable for teachers to design appropriate and efficient class?room strategies and activities to cater for learners’differences.In this essay,the influence of age factor is initially explored before strategies and activities are systematically designed.
基金National Social Science Fund"Research on Liquidity Risk and Optimum Classified Management Model of China's Foreign Exchange Reserve"(17BJY 199)National Social Science Fund "The Challenges and Paths of China-US Communist Party in Promoting the Reform of Global Economic Govermance System"(16BGJ007).
文摘China contributes to poverty reduction in devceloping countrics along the Belt and Road(B&R)by the way of aid and investment,taking infrastructure construction as a break through and state-owned capital as the main force.The empirical study of the B&R countries'panel data of 2000-2017 shows that Chinese aid and investment help to reduce poverty rate,and there is a threshold effect between investment and poverty rate reduction.When the per capita GDP level is below the threshold value,the poverty reduction effect of Chinese investment is more significant.Different types of aid and investment generate different poverty reduction effects:construction project investment and green land investment have more significant effects,and poverty reduction mechanism based on infrastructure construction has better poverty reduction effect than transfer payment aid.The correlation between state-owned enterprise investment and poverty rate reduction is significant,and state owned capital plays an important role in poverty reduction in the B&R developing countries.The research also finds that poverty reduction effct of Chinese aid and investment is realized mainly by capital formation and job creation in these countries.