The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cogni...The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.展开更多
It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials&...It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials' to analyze four journalistic reports from the network media and draws the conclusion that cohesion between two topic units is usually weaker than that within a specific topic fragment.展开更多
The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional ...The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional cubic pore-network model based on invasion percolation is developed to study the effect of hydrate particle formation and growth habit on the permeability.The variation of permeability in porous media with different hydrate saturation is studied by solving the network problem.The simulation results are well consistent with the experimental data.The proposed model predicts that the permeability will reduce exponentially with the increase of hydrate saturation,which is crucial in developing a deeper understanding of the mechanism of hydrate formation and dissociation in porous media.展开更多
To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spr...To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc.展开更多
With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, ...With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, even subverted the national sovereignty .This paper analyzes the characters of the followers of the social media in the Ira, Tunisia, Egypt and Libya's turmoil, concludes constructive suggestions how to ensure national stability and harmonious development, has some positive effect to our national security.展开更多
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons...This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.展开更多
In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on env...In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput.展开更多
Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and h...Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure.展开更多
The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element meth...The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element method. The dynamic displacement responses obtainedfrom direct analysis for prescribed material parameters constitute the sample sets training neuralnetwork. By virtue of the effective L-M training algorithm and the Tikhonov regularization method aswell as the GCV method for an appropriate selection of regu-larization parameter, the inversemapping from dynamic displacement responses to material constants is performed. Numerical examplesdemonstrate the validity of the neural network method.展开更多
采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行...采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行功能测试.结果显示,该系统具有良好的实时性和稳定性,不仅增强了网络教学过程中的交互性与实时性,同时也为网络公开课程的进一步发展提供了技术思路与方案借鉴.展开更多
The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid ...The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid flow and coupled flow-deformation problems encountered in these engineering applications,both empirical and theoretical models had been proposed in the past few decades. Some of them are simple but still work in certain circumstances; others are complex but also need some modifications to be applicable. Thus, the understanding of state-of-the-art permeability evolution model would help researchers and engineers solve engineering problems through an appropriate approach. This paper summarizes permeability evolution models proposed by earlier and recent researchers with emphasis on their characteristics and limitations.展开更多
The present work deals with the development of an Ontology-Based Knowledge Network of soil/water physicochemical & biological properties (soil/water concepts), derived from ASTM Standard Methods (ASTMi,n) and rele...The present work deals with the development of an Ontology-Based Knowledge Network of soil/water physicochemical & biological properties (soil/water concepts), derived from ASTM Standard Methods (ASTMi,n) and relevant scientific/applicable references (published papers—PPi,n) to fill up/bridge the gap of the information science between cited Standards and infiltration discipline conceptual vocabulary providing accordingly a dedicated/internal Knowledge Base (KB). This attempt constitutes an innovative approach, since it is based on externalizing domain knowledge in the form of Ontology-Based Knowledge Networks, incorporating standardized methodology in soil engineering. The ontology soil/water concepts (semantics) of the developed network correspond to soil/water physicochemical & biological properties, classified in seven different generations that are distinguished/located in infiltration/percolation process of contaminated water through soil porous media. The interconnections with arcs between corresponding concepts/properties among the consecutive generations are defined by the relationship of dependent and independent variables. All these interconnections are documented according to the below three ways: 1) dependent and independent variables interconnected by using the logical operator “<em>depends on</em>” quoting existent explicit functions and equations;2) dependent and independent variables interconnected by using the logical operator “<em>depends on</em>” quoting produced implicit functions, according to Rayleigh’s method of indices;3) dependent and independent variables interconnected by using the logical operator “<em>related to</em>” based on a logical dependence among the examined nodes-concepts-variables. The aforementioned approach provides significant advantages to semantic web developers and web users by means of prompt knowledge navigation, tracking, retrieval and usage.展开更多
Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control(MAC) designed for this application works well only in very light-...Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control(MAC) designed for this application works well only in very light-load scenarios; as a consequence, the performances of system throughput and channel utilization are degraded. For this problem, a feedback-retransmission based asynchronous FRequency hopping Media Access(FRMA) control protocol is proposed. Burst communication, asynchronous Frequency Hopping(FH), channel coding, and feedback retransmission are utilized in FRMA. With the mechanism of asynchronous FH, immediate packet transmission and multi-packet reception can be realized, and thus the timeliness is improved.Furthermore, reliability can be achieved via channel coding and feedback retransmission. With theories of queuing theory, Markov model, packets collision model, and discrete Laplace transformation, the formulas of packet success probability, system throughput, average packet end-to-end delay, and delay distribution are obtained. The approximation accuracy of theoretical derivation is verified by experimental results. Within a light-load network, the proposed FRMA has the ability of millisecond delay and 99% reliability as well as outperforms the non-feedback-retransmission based asynchronous frequency hopping media access control protocol.展开更多
文摘The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.
文摘It, from the perspective of cohesion, extracts three types of topic-shift markers used in this genre, namely 'change of narrators', 'change of objects being talked about', and 'temporal adverbials' to analyze four journalistic reports from the network media and draws the conclusion that cohesion between two topic units is usually weaker than that within a specific topic fragment.
基金supported by the National High Technology Research and Development (863) Program of China (Grant Nos.2006AA09A209-5)the National Natural Science Foundation of China (Grant Nos. 90510003)the Major Research Project of the Ministry of Education (Grant Nos. 306005)
文摘The permeability in the methane hydrate reservoir is one of the key parameters in estimating the gas production performance and the flow behavior of gas and water during dissociation.In this paper,a three-dimensional cubic pore-network model based on invasion percolation is developed to study the effect of hydrate particle formation and growth habit on the permeability.The variation of permeability in porous media with different hydrate saturation is studied by solving the network problem.The simulation results are well consistent with the experimental data.The proposed model predicts that the permeability will reduce exponentially with the increase of hydrate saturation,which is crucial in developing a deeper understanding of the mechanism of hydrate formation and dissociation in porous media.
文摘To discover and identify the influential nodes in any complex network has been an important issue.It is a significant factor in order to control over the network.Through control on a network,any information can be spread and stopped in a short span of time.Both targets can be achieved,since network of information can be extended and as well destroyed.So,information spread and community formation have become one of the most crucial issues in the world of SNA(Social Network Analysis).In this work,the complex network of twitter social network has been formalized and results are analyzed.For this purpose,different network metrics have been utilized.Visualization of the network is provided in its original form and then filter out(different percentages)from the network to eliminate the less impacting nodes and edges for better analysis.This network is analyzed according to different centrality measures,like edge-betweenness,betweenness centrality,closeness centrality and eigenvector centrality.Influential nodes are detected and their impact is observed on the network.The communities are analyzed in terms of network coverage considering theMinimum Spanning Tree,shortest path distribution and network diameter.It is found that these are the very effective ways to find influential and central nodes from such big social networks like Facebook,Instagram,Twitter,LinkedIn,etc.
基金This paper is supported by the National Social Science Foundation Project--Research on Network Association and the Stability and Development of Ethnic Minority Area in China's Borderland--Take Yunnan Area as an example (No. 09CZZ011 ), and the Key Project of Educational Department of Yunnan Province--Research on the policemen working mode guided by intelligence (No. 2010Z089).
文摘With the social media networks development quickly, the followers of the social media network' s behaviors have taken a lot of damagers and threats to national security, and made the nation into unstable situations, even subverted the national sovereignty .This paper analyzes the characters of the followers of the social media in the Ira, Tunisia, Egypt and Libya's turmoil, concludes constructive suggestions how to ensure national stability and harmonious development, has some positive effect to our national security.
文摘This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.
基金Supported by the National Natural Science Foundation of China (No. 60972038)the Jiangsu Province Universities Natural Science Research Key Grant Project (07KJA-51006)+1 种基金the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (N200911)Jiangsu Province Graduate In-novative Research Plan (CX09B_149Z)
文摘In this paper, we propose an aware-based adaptive opportunistic retransmission control scheme for wireless multimedia Mesh networks. The proposed scheme provides maximum retransmis-sion count optimization based on environment-aware to improve packet relay probability. The scheme discriminates the types of packet loss in wireless link by means of environment information and selects the retransmission count by taking the IEEE 802.11 wireless channel characteristics into consideration. Furthermore, the maximum retransmission count of MAC is adjusted adaptively. Extensive simulations demonstrate that the proposed scheme significantly reduces packet collision probability and packet loss rate, and thus improves network throughput.
基金Project (Nos. 60502014 and 60432030) supported by the National Natural Science Foundation of China
文摘Peer-to-peer (P2P) systems are now very popular. Current P2P systems are broadly of two kinds, structured and unstructured. The tree structured P2P systems used technologies such as distributed hash tables (DHT) and hierarchical clustering can search the required target quickly, however, in a tree, the internal node has a higher load and its leave or crash often causes a large population of its offspring's problems, so that in the highly dynamic Internet environment the tree structure may still suffer frequent breaks. On the other hand, most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. So, we consider both of the above systems' advantages and disadvantages and realize that in the P2P systems one node may fail easily, but that when a number of nodes organized as a set, which we call "super node", the set is robust. Super nodes can be created and updated aware of topology-aware, and used with simple protocol such as flooding or "servers" to exchange information. Furthermore the entire robust super node can be organized into exquisite tree structure. By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure. The simulation results demonstrated that our architecture greatly reduces the alteration time of the structure while decreasing the average delay time, compared to the common tree structure.
基金the National Natural Science Foundation of China (Nos.19872002 and 10272003)Climbing Foundation of Northern Jiaotong University
文摘The multi- layers feedforward neural network is used for inversion ofmaterial constants of fluid-saturated porous media. The direct analysis of fluid-saturated porousmedia is carried out with the boundary element method. The dynamic displacement responses obtainedfrom direct analysis for prescribed material parameters constitute the sample sets training neuralnetwork. By virtue of the effective L-M training algorithm and the Tikhonov regularization method aswell as the GCV method for an appropriate selection of regu-larization parameter, the inversemapping from dynamic displacement responses to material constants is performed. Numerical examplesdemonstrate the validity of the neural network method.
文摘采用Flash Media Server流媒体服务器技术,基于TCP/IP和RTMP协议,设计开发了远程视频教学系统,介绍了该系统在线视频教学功能、电子白板教学功能、视频录制与点播功能和在线答疑教学功能的设计与实现方法,最后采用Fiddler软件对其进行功能测试.结果显示,该系统具有良好的实时性和稳定性,不仅增强了网络教学过程中的交互性与实时性,同时也为网络公开课程的进一步发展提供了技术思路与方案借鉴.
基金supported by the National Nature Science Foundation of China(No.51278383,No.51238009 and No.51025827)Key Scientific and Technological Innovation Team of Zhejiang Province(No.2011R50020)Key Scientific and Technological Innovation Team of Wenzhou(No.C20120006)
文摘The ability to capture permeability of fractured porous media plays a significant role in several engineering applications, including reservoir, mining, petroleum and geotechnical engineering. In order to solve fluid flow and coupled flow-deformation problems encountered in these engineering applications,both empirical and theoretical models had been proposed in the past few decades. Some of them are simple but still work in certain circumstances; others are complex but also need some modifications to be applicable. Thus, the understanding of state-of-the-art permeability evolution model would help researchers and engineers solve engineering problems through an appropriate approach. This paper summarizes permeability evolution models proposed by earlier and recent researchers with emphasis on their characteristics and limitations.
文摘The present work deals with the development of an Ontology-Based Knowledge Network of soil/water physicochemical & biological properties (soil/water concepts), derived from ASTM Standard Methods (ASTMi,n) and relevant scientific/applicable references (published papers—PPi,n) to fill up/bridge the gap of the information science between cited Standards and infiltration discipline conceptual vocabulary providing accordingly a dedicated/internal Knowledge Base (KB). This attempt constitutes an innovative approach, since it is based on externalizing domain knowledge in the form of Ontology-Based Knowledge Networks, incorporating standardized methodology in soil engineering. The ontology soil/water concepts (semantics) of the developed network correspond to soil/water physicochemical & biological properties, classified in seven different generations that are distinguished/located in infiltration/percolation process of contaminated water through soil porous media. The interconnections with arcs between corresponding concepts/properties among the consecutive generations are defined by the relationship of dependent and independent variables. All these interconnections are documented according to the below three ways: 1) dependent and independent variables interconnected by using the logical operator “<em>depends on</em>” quoting existent explicit functions and equations;2) dependent and independent variables interconnected by using the logical operator “<em>depends on</em>” quoting produced implicit functions, according to Rayleigh’s method of indices;3) dependent and independent variables interconnected by using the logical operator “<em>related to</em>” based on a logical dependence among the examined nodes-concepts-variables. The aforementioned approach provides significant advantages to semantic web developers and web users by means of prompt knowledge navigation, tracking, retrieval and usage.
基金supported by the National Natural Science Foundation of China(No.61501496)
文摘Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control(MAC) designed for this application works well only in very light-load scenarios; as a consequence, the performances of system throughput and channel utilization are degraded. For this problem, a feedback-retransmission based asynchronous FRequency hopping Media Access(FRMA) control protocol is proposed. Burst communication, asynchronous Frequency Hopping(FH), channel coding, and feedback retransmission are utilized in FRMA. With the mechanism of asynchronous FH, immediate packet transmission and multi-packet reception can be realized, and thus the timeliness is improved.Furthermore, reliability can be achieved via channel coding and feedback retransmission. With theories of queuing theory, Markov model, packets collision model, and discrete Laplace transformation, the formulas of packet success probability, system throughput, average packet end-to-end delay, and delay distribution are obtained. The approximation accuracy of theoretical derivation is verified by experimental results. Within a light-load network, the proposed FRMA has the ability of millisecond delay and 99% reliability as well as outperforms the non-feedback-retransmission based asynchronous frequency hopping media access control protocol.