Lake is an important part of the natural ecosystem, and its morphological characteristics reflect the capacity of lake regulation and storage, the strength of material migration, and the characteristics of shoreline d...Lake is an important part of the natural ecosystem, and its morphological characteristics reflect the capacity of lake regulation and storage, the strength of material migration, and the characteristics of shoreline development. In most existing studies, remote sensing images are used to quantify the morphological characteristics of lakes. However, the extraction accuracy of lake water is greatly affected by cloud cover and vegetation cover, and the inversion accuracy of lake elevation data is poor, which cannot accurately describe the response relationship of lake landscape morphology with water level change. Therefore, this paper takes Tonle Sap Lake as the research object, which is the largest natural freshwater lake in Southeast Asia. DEM is constructed based on high-resolution measured topographic data, and morphological indicators such as lake area, lake shoreline length, perimeter area ratio, longest axis length, maximum width, shoreline development index, lake shape complexity, compactness ratio and form ratio are adopted to researching the evolution law of high water overflows and low water outbursts quantitatively, and clarifying the variation characteristics of landscape morphology with water level gradient in Tonle Sap Lake. The research results have important theoretical significance for the scientific utilization of Tonle Sap Lake water resources and the protection of the lake ecosystem.展开更多
Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers ...Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers inside or adjacent to the base station.The endto-end latency perceived by the mobile user is therefore reduced with the MEC platform.The context-aware services are able to be served by the application developers by leveraging the real time radio access network information from MEC.The MEC additionally enables the compute intensive applications execution in the resource constraint devices with the collaborative computing involving the cloud servers.This paper presents the architectural description of the MEC platform as well as the key functionalities enabling the above features.The relevant state-of-the-art research efforts are then surveyed.The paper finally discusses and identifies the open research challenges of MEC.展开更多
In this paper the macroscopic damping model for dynamical behavior of the structures with random polycrystalline configurations at micro–nano scales is established.First, the global motion equation of a crystal is de...In this paper the macroscopic damping model for dynamical behavior of the structures with random polycrystalline configurations at micro–nano scales is established.First, the global motion equation of a crystal is decomposed into a set of motion equations with independent single degree of freedom(SDOF) along normal discrete modes, and then damping behavior is introduced into each SDOF motion.Through the interpolation of discrete modes, the continuous representation of damping effects for the crystal is obtained.Second, from energy conservation law the expression of the damping coefficient is derived, and the approximate formula of damping coefficient is given. Next, the continuous damping coefficient for polycrystalline cluster is expressed,the continuous dynamical equation with damping term is obtained, and then the concrete damping coefficients for a polycrystalline Cu sample are shown. Finally, by using statistical two-scale homogenization method, the macroscopic homogenized dynamical equation containing damping term for the structures with random polycrystalline configurations at micro–nano scales is set up.展开更多
Determination of the grouting anchor pullout force is a key step during the design of anchor-pull retaining wall, but it is mostly determined relied on empirical formula at present, and the rationality and the safety ...Determination of the grouting anchor pullout force is a key step during the design of anchor-pull retaining wall, but it is mostly determined relied on empirical formula at present, and the rationality and the safety cannot be effectively guaranteed. Based on the engineering case of the gravity retaining wall of Qinglin Freeway, the model test was designed, and combined with the results of the ABAQUS finite element numerical analysis, it was analyzed that how the anchor axial pulling force distributes. The results showed that the force of the anchor near the wall bolt was large and which far from the wall was small and the ultimate pullout force was proportional to the length, diameter and shear strength. When the end tension of the anchor was small, the top load played a leading role on the anchor tension. This conclusion confirmed the calculation formula of ultimate pullout force was and provided a theoretical basis for anchor-pull retaining wall design and calculation.展开更多
Summary What is already known about this topic?Brucellosis,mainly caused by Brucella melitensis(B.melitensis),is regarded as a significant zoonotic disease in China.In Weihai,located at the eastern end of the Shandong...Summary What is already known about this topic?Brucellosis,mainly caused by Brucella melitensis(B.melitensis),is regarded as a significant zoonotic disease in China.In Weihai,located at the eastern end of the Shandong Peninsula,brucellosis has been in a low epidemic phase for the past five years.展开更多
Adjuvants are indispensable components of vaccines.Despite being widely used in vaccines,their action mechanisms are not yet clear.With a greater understanding of the mechanisms by which the innate immune response con...Adjuvants are indispensable components of vaccines.Despite being widely used in vaccines,their action mechanisms are not yet clear.With a greater understanding of the mechanisms by which the innate immune response controls the antigen-specific response,the adjuvants’action mechanisms are beginning to be elucidated.Adjuvants can be categorized as immunostimulants and delivery systems.Immunostimulants are danger signal molecules that lead to the maturation and activation of antigenpresenting cells(APCs)by targeting Toll-like receptors(TLRs)and other pattern recognition receptors(PRRs)to promote the production of antigen signals and co-stimulatory signals,which in turn enhance the adaptive immune responses.On the other hand,delivery systems are carrier materials that facilitate antigen presentation by prolonging the bioavailability of the loaded antigens,as well as targeting antigens to lymph nodes or APCs.The adjuvants’action mechanisms are systematically summarized at the beginning of this review.This is followed by an introduction of the mechanisms,properties,and progress of classical vaccine adjuvants.Furthermore,since some of the adjuvants under investigation exhibit greater immune activation potency than classical adjuvants,which could compensate for the deficiencies of classical adjuvants,a summary of the adjuvant platforms under investigation is subsequently presented.Notably,we highlight the different action mechanisms and immunological properties of these adjuvant platforms,which will provide a wide range of options for the rational design of different vaccines.On this basis,this review points out the development prospects of vaccine adjuvants and the problems that should be paid attention to in the future.展开更多
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves stora...The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics.展开更多
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Inter...With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage.展开更多
文摘Lake is an important part of the natural ecosystem, and its morphological characteristics reflect the capacity of lake regulation and storage, the strength of material migration, and the characteristics of shoreline development. In most existing studies, remote sensing images are used to quantify the morphological characteristics of lakes. However, the extraction accuracy of lake water is greatly affected by cloud cover and vegetation cover, and the inversion accuracy of lake elevation data is poor, which cannot accurately describe the response relationship of lake landscape morphology with water level change. Therefore, this paper takes Tonle Sap Lake as the research object, which is the largest natural freshwater lake in Southeast Asia. DEM is constructed based on high-resolution measured topographic data, and morphological indicators such as lake area, lake shoreline length, perimeter area ratio, longest axis length, maximum width, shoreline development index, lake shape complexity, compactness ratio and form ratio are adopted to researching the evolution law of high water overflows and low water outbursts quantitatively, and clarifying the variation characteristics of landscape morphology with water level gradient in Tonle Sap Lake. The research results have important theoretical significance for the scientific utilization of Tonle Sap Lake water resources and the protection of the lake ecosystem.
文摘Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers inside or adjacent to the base station.The endto-end latency perceived by the mobile user is therefore reduced with the MEC platform.The context-aware services are able to be served by the application developers by leveraging the real time radio access network information from MEC.The MEC additionally enables the compute intensive applications execution in the resource constraint devices with the collaborative computing involving the cloud servers.This paper presents the architectural description of the MEC platform as well as the key functionalities enabling the above features.The relevant state-of-the-art research efforts are then surveyed.The paper finally discusses and identifies the open research challenges of MEC.
基金partially supported by the National Basic Research Program of China (973 Program Grant 2012CB025904)the National Natural Science Foundation of China (Grant 11102221)the State Key Laboratory of Science and Engineering Computing (LSEC)
文摘In this paper the macroscopic damping model for dynamical behavior of the structures with random polycrystalline configurations at micro–nano scales is established.First, the global motion equation of a crystal is decomposed into a set of motion equations with independent single degree of freedom(SDOF) along normal discrete modes, and then damping behavior is introduced into each SDOF motion.Through the interpolation of discrete modes, the continuous representation of damping effects for the crystal is obtained.Second, from energy conservation law the expression of the damping coefficient is derived, and the approximate formula of damping coefficient is given. Next, the continuous damping coefficient for polycrystalline cluster is expressed,the continuous dynamical equation with damping term is obtained, and then the concrete damping coefficients for a polycrystalline Cu sample are shown. Finally, by using statistical two-scale homogenization method, the macroscopic homogenized dynamical equation containing damping term for the structures with random polycrystalline configurations at micro–nano scales is set up.
文摘Determination of the grouting anchor pullout force is a key step during the design of anchor-pull retaining wall, but it is mostly determined relied on empirical formula at present, and the rationality and the safety cannot be effectively guaranteed. Based on the engineering case of the gravity retaining wall of Qinglin Freeway, the model test was designed, and combined with the results of the ABAQUS finite element numerical analysis, it was analyzed that how the anchor axial pulling force distributes. The results showed that the force of the anchor near the wall bolt was large and which far from the wall was small and the ultimate pullout force was proportional to the length, diameter and shear strength. When the end tension of the anchor was small, the top load played a leading role on the anchor tension. This conclusion confirmed the calculation formula of ultimate pullout force was and provided a theoretical basis for anchor-pull retaining wall design and calculation.
基金Supported by Medical and Health Development Plan of Shandong(2015WS0272)TCM science and technology project of Shandong(Q-2022091).
文摘Summary What is already known about this topic?Brucellosis,mainly caused by Brucella melitensis(B.melitensis),is regarded as a significant zoonotic disease in China.In Weihai,located at the eastern end of the Shandong Peninsula,brucellosis has been in a low epidemic phase for the past five years.
基金This work was supported by the National Natural Science Foundation Regional Innovation and Development(No.U19A2003).
文摘Adjuvants are indispensable components of vaccines.Despite being widely used in vaccines,their action mechanisms are not yet clear.With a greater understanding of the mechanisms by which the innate immune response controls the antigen-specific response,the adjuvants’action mechanisms are beginning to be elucidated.Adjuvants can be categorized as immunostimulants and delivery systems.Immunostimulants are danger signal molecules that lead to the maturation and activation of antigenpresenting cells(APCs)by targeting Toll-like receptors(TLRs)and other pattern recognition receptors(PRRs)to promote the production of antigen signals and co-stimulatory signals,which in turn enhance the adaptive immune responses.On the other hand,delivery systems are carrier materials that facilitate antigen presentation by prolonging the bioavailability of the loaded antigens,as well as targeting antigens to lymph nodes or APCs.The adjuvants’action mechanisms are systematically summarized at the beginning of this review.This is followed by an introduction of the mechanisms,properties,and progress of classical vaccine adjuvants.Furthermore,since some of the adjuvants under investigation exhibit greater immune activation potency than classical adjuvants,which could compensate for the deficiencies of classical adjuvants,a summary of the adjuvant platforms under investigation is subsequently presented.Notably,we highlight the different action mechanisms and immunological properties of these adjuvant platforms,which will provide a wide range of options for the rational design of different vaccines.On this basis,this review points out the development prospects of vaccine adjuvants and the problems that should be paid attention to in the future.
基金the National Key Basic Research and Development (973) Program of China (Nos. 2012CB315801 and 2011CB302805)the National Natural Science Foundation of China A3 Program (No. 61161140320) and the National Natural Science Foundation of China (No. 61233016)Intel Research Councils UPO program with title of security Vulnerability Analysis based on Cloud Platform with Intel IA Architecture
文摘The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics.
基金the National Key Basic Research and Development (973) Program of China (Nos. 2012CB315801 and 2011CB302805)the National Natural Science Foundation of China (Nos. 61161140320 and 61233016)Intel Research Council with the title of Security Vulnerability Analysis based on Cloud Platform with Intel IA Architecture
文摘With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage.