A theoretical relationship between the wavelet transform and the fast fourier transformation(FFT) methods in broadband wireless signal is proposed for solving the direction of arrivals(DOAs) estimation problem. This l...A theoretical relationship between the wavelet transform and the fast fourier transformation(FFT) methods in broadband wireless signal is proposed for solving the direction of arrivals(DOAs) estimation problem. This leads naturally to the derivation of minimum variance distortionless response(MVDR) algorithm, which combines the benefits of subspace methods with those of wavelet, and spatially smoothed versions are utilized which exhibits good performance against correlated signals. We test the method's performance by simulating and comparing the performance of proposed algorithm, FFT MVDR and MVDR with correlated signals, and an improved performance is obtained.展开更多
Under the background of economic globalization and information globalization, China’s higher education has also reformed correspondingly, namely, the internationalization of higher education. In this process, the tea...Under the background of economic globalization and information globalization, China’s higher education has also reformed correspondingly, namely, the internationalization of higher education. In this process, the teaching of professional courses in English (ie, professional English teaching) as many universities of international teaching methods. However, the research on the implementation of English teaching has not yet been fully carried out. In order to fill this vacancy, this article mainly takes the students who participated in the English course of Jiangsu University as the research object, through the questionnaire survey and individual interview way reveals the problems, difficulties and challenges in professional English teaching, and tries to propose the corresponding solution Teaching methods, so as to provide constructive suggestions for teaching management departments, teachers and students to implement professional English teaching and improve the efficiency of English teaching. In this case.展开更多
The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cy...The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text.展开更多
An evolution model of KAD Dynamic Model Network(KDMN) is proposed to study the reason of hot node and simulate the process of network evolution based on node behavior from a holistic perspective.First,some symbols and...An evolution model of KAD Dynamic Model Network(KDMN) is proposed to study the reason of hot node and simulate the process of network evolution based on node behavior from a holistic perspective.First,some symbols and meanings are introduced to describe nodes relationship and network states at a time step.Second,some evolution rules for network are formulated when node behaviors of join,exit,routing table update,data retrieval and content index distribution happen with different contextual scene in KAD network.In addition,a lightweight simulator is designed to implement the KDMN model.Moreover,an example of how to use the simulator to simulate the network changes in order to observe the result is described in detail.Finally,the KDMN is applied to analyze the reason for the formation of hot nodes in the BT and eMule network in the experiment.The different evolution principles of local priority,global priority and hybrid random are adopted based on the provision of network protocol of BT and eMule.The result of this experiment demonstrates that there are some hot nodes exist in the KAD network.However,the principle of hybrid random can effectively alleviate the phenomenon that a node is widely linked with others compared with global and local priority.展开更多
Taking B2C E-commerce enterprises as the center, it can be divided into a set of logistics activities upstream supply chain logistics producer to B2C e-commerce enterprises, and the B2C e-commerce enterprise logistics...Taking B2C E-commerce enterprises as the center, it can be divided into a set of logistics activities upstream supply chain logistics producer to B2C e-commerce enterprises, and the B2C e-commerce enterprise logistics to client consumer, and the paper focuses on the study of self-supporting logistics for the E-commerce enterprise. According to the development status of current B2C electronic commerce enterprise in our country and logistics, the paper study B2C electric business enterprise how to correctly choose the logistics mode and how to promote the business logistics operation level.展开更多
Washback refers to the influence of testing on teaching and learning. The College English Test (CET) is an educational, standardized, criterion-related norm-referenced test. Since 2005, CET has undergone tremendous ...Washback refers to the influence of testing on teaching and learning. The College English Test (CET) is an educational, standardized, criterion-related norm-referenced test. Since 2005, CET has undergone tremendous innovations and the test innovation has been implemented nationwide since 2007. The present study attempts to investigate the longitudinal CET washback from teachers’ perspective, aiming to address: Does CET washback change over time? Questionnaire surveys were employed as the main research instrument in the present study, complemented by classroom observations and interviews. The research findings show that CET exerts more positive washback than negative one on CE teaching.展开更多
In China, Warring States Period was imbued with chaos of wars and the whole society was in a state of ferment. The disordered phase in ideological area, as the most direct reflection of the change, was characterized b...In China, Warring States Period was imbued with chaos of wars and the whole society was in a state of ferment. The disordered phase in ideological area, as the most direct reflection of the change, was characterized by that all the old ethical standard had been badly weaken, even failed to explain the moral facts. In terms of common people, they were confused and puzzled by the questions as "what is language?" and "what is the standard of speaking and behavior?" Some ancient scholars pinned these problems upon the reversal of "ming" (名) and "shi" (实). As a result, to rectify names and to clarify the name of ethics became a must for reconstructing the old proprieties and system. Among those scholars and thinkers, Xun Zi firstly proposed Zhengming to state the relationship between a name and the thing it represents in a systematical way. This essay only sheds light upon the reason of rectifying names: to distinguish the rank and differentiate the similarities and differences("明贵贱,辨同异")which is the must of "rectifying names".展开更多
Due to extremely effective advantages of the quantum cascade laser spectroscopy and technology for trace gas detection, this paper presents spectroscopy scanning, the characteristics of temperature tuning, system reso...Due to extremely effective advantages of the quantum cascade laser spectroscopy and technology for trace gas detection, this paper presents spectroscopy scanning, the characteristics of temperature tuning, system resolution, sensitivity, and system stability with the application of the presented gas sensor. Experimental results showed that the sensor resolution was 〈0.01cm-1 (equivalent to 0.06nm), and the sensor sensitivity was at the level of 194 ppb with the application of HzCO measurement.展开更多
基金supported by the Chinese Natural Science Foundation 61401075Central University Business Fee ZYGX2015J106
文摘A theoretical relationship between the wavelet transform and the fast fourier transformation(FFT) methods in broadband wireless signal is proposed for solving the direction of arrivals(DOAs) estimation problem. This leads naturally to the derivation of minimum variance distortionless response(MVDR) algorithm, which combines the benefits of subspace methods with those of wavelet, and spatially smoothed versions are utilized which exhibits good performance against correlated signals. We test the method's performance by simulating and comparing the performance of proposed algorithm, FFT MVDR and MVDR with correlated signals, and an improved performance is obtained.
文摘Under the background of economic globalization and information globalization, China’s higher education has also reformed correspondingly, namely, the internationalization of higher education. In this process, the teaching of professional courses in English (ie, professional English teaching) as many universities of international teaching methods. However, the research on the implementation of English teaching has not yet been fully carried out. In order to fill this vacancy, this article mainly takes the students who participated in the English course of Jiangsu University as the research object, through the questionnaire survey and individual interview way reveals the problems, difficulties and challenges in professional English teaching, and tries to propose the corresponding solution Teaching methods, so as to provide constructive suggestions for teaching management departments, teachers and students to implement professional English teaching and improve the efficiency of English teaching. In this case.
基金supported by China’s National Key R&D Program,No.2019QY1404the National Natural Science Foundation of China,Grant No.U20A20161,U1836103the Basic Strengthening Program Project,No.2019-JCJQ-ZD-113.
文摘The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats(APT).Extracting attack behaviors,i.e.,Tactics,Techniques,Procedures(TTP)from Cyber Threat Intelligence(CTI)can facilitate APT actors’profiling for an immediate response.However,it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature.Based on the Adversarial Tactics,Techniques and Common Knowledge(ATT&CK)of threat behavior description,this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network(HTN)and Graph Convolutional Network(GCN)to solve this issue.It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence.With the help of the Bidirectional EncoderRepresentation fromTransformers(BERT)pretraining model to analyze the contextual semantics of cyber threat intelligence,the task of threat behavior identification is transformed into a text classification task,which automatically extracts attack behavior in CTI,then identifies the malware and advanced threat actors.The experimental results show that F1 achieve 94.86%and 92.15%for the multi-label classification tasks of tactics and techniques.Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks.The F1 for malware and advanced threat actors identification task reached 98.45%and 99.48%,which are better than the benchmark model in the experiment and achieve state of the art.The model can effectivelymodel threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text.
文摘An evolution model of KAD Dynamic Model Network(KDMN) is proposed to study the reason of hot node and simulate the process of network evolution based on node behavior from a holistic perspective.First,some symbols and meanings are introduced to describe nodes relationship and network states at a time step.Second,some evolution rules for network are formulated when node behaviors of join,exit,routing table update,data retrieval and content index distribution happen with different contextual scene in KAD network.In addition,a lightweight simulator is designed to implement the KDMN model.Moreover,an example of how to use the simulator to simulate the network changes in order to observe the result is described in detail.Finally,the KDMN is applied to analyze the reason for the formation of hot nodes in the BT and eMule network in the experiment.The different evolution principles of local priority,global priority and hybrid random are adopted based on the provision of network protocol of BT and eMule.The result of this experiment demonstrates that there are some hot nodes exist in the KAD network.However,the principle of hybrid random can effectively alleviate the phenomenon that a node is widely linked with others compared with global and local priority.
文摘Taking B2C E-commerce enterprises as the center, it can be divided into a set of logistics activities upstream supply chain logistics producer to B2C e-commerce enterprises, and the B2C e-commerce enterprise logistics to client consumer, and the paper focuses on the study of self-supporting logistics for the E-commerce enterprise. According to the development status of current B2C electronic commerce enterprise in our country and logistics, the paper study B2C electric business enterprise how to correctly choose the logistics mode and how to promote the business logistics operation level.
文摘Washback refers to the influence of testing on teaching and learning. The College English Test (CET) is an educational, standardized, criterion-related norm-referenced test. Since 2005, CET has undergone tremendous innovations and the test innovation has been implemented nationwide since 2007. The present study attempts to investigate the longitudinal CET washback from teachers’ perspective, aiming to address: Does CET washback change over time? Questionnaire surveys were employed as the main research instrument in the present study, complemented by classroom observations and interviews. The research findings show that CET exerts more positive washback than negative one on CE teaching.
文摘In China, Warring States Period was imbued with chaos of wars and the whole society was in a state of ferment. The disordered phase in ideological area, as the most direct reflection of the change, was characterized by that all the old ethical standard had been badly weaken, even failed to explain the moral facts. In terms of common people, they were confused and puzzled by the questions as "what is language?" and "what is the standard of speaking and behavior?" Some ancient scholars pinned these problems upon the reversal of "ming" (名) and "shi" (实). As a result, to rectify names and to clarify the name of ethics became a must for reconstructing the old proprieties and system. Among those scholars and thinkers, Xun Zi firstly proposed Zhengming to state the relationship between a name and the thing it represents in a systematical way. This essay only sheds light upon the reason of rectifying names: to distinguish the rank and differentiate the similarities and differences("明贵贱,辨同异")which is the must of "rectifying names".
基金The authors wish to thank the financial support from the National Natural Science Foundation of China (61505020) and the Fundamental Research Funds for the Central Universities (ZYGX2013J007).
文摘Due to extremely effective advantages of the quantum cascade laser spectroscopy and technology for trace gas detection, this paper presents spectroscopy scanning, the characteristics of temperature tuning, system resolution, sensitivity, and system stability with the application of the presented gas sensor. Experimental results showed that the sensor resolution was 〈0.01cm-1 (equivalent to 0.06nm), and the sensor sensitivity was at the level of 194 ppb with the application of HzCO measurement.