A Smart Phone Identification Method Based on Gesture

Total Page:16

File Type:pdf, Size:1020Kb

A Smart Phone Identification Method Based on Gesture 3rd Annual International Conference on Information Technology and Applications (ITA 2016) ITM Web of Conferences Volume 7 (2016) Hangzhou, China 29 - 31 July 2016 Editors: Tao Gong Ting Yang Juan Xu ISBN: 978-1-5108-3280-0 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 Some format issues inherent in the e-media version may also appear in this print version. This work is licensed under a Creative Commons Attribution license: http://creativecommons.org/licenses/by/2.0/ You are free to: Share – copy and redistribute the material in any medium or format. Adapt – remix, transform, and build upon the material for any purpose, even commercial. The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. The copyright is retained by the corresponding authors. Printed by Curran Associates, Inc. (2017) For additional information, please contact EDP Sciences – Web of Conferences at the address below. EDP Sciences – Web of Conferences 17, Avenue du Hoggar Parc d'Activité de Courtabœuf BP 112 F-91944 Les Ulis Cedex A France Phone: +33 (0) 1 69 18 75 75 Fax: +33 (0) 1 69 28 84 91 [email protected] Additional copies of this publication are available from: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2633 Email: [email protected] Web: www.proceedings.com TABLE OF CONTENTS A SMART PHONE IDENTIFICATION METHOD BASED ON GESTURE .................................................................1 Xu Di, Zhang Quan A NOVEL LOGIC FOR ANALYZING ELECTRONIC PAYMENT PROTOCOLS ....................................................9 Liu Yi, Liu Xing-Tong, Tang Chao-Jing RESEARCH OF THE COMMUNICATION MIDDLEWARE OF THE YACHT SUPERVISION MANAGEMENT SYSTEM BASED ON DDS.................................................................................................................. 14 Wang Yan-Ru, Zhang Yi-Kun, Gu Song-Yuan, Xu Wei-Feng DESIGN AND DEVELOPMENT OF FIRE GRIDDING PLATFORM BASED ON INTERNET OF THINGS ............................................................................................................................................................................... 20 Wei San-Xi, Xiao Jin-Chao, Liu Ji-Hai RESEARCH ON THE EXTRACTION TECHNOLOGY OF HOT-WORDS IN TIBETAN WEBPAGES ........................................................................................................................................................................ 25 Wang Chang-Zhi, Xu Gui-Xian, Wang Hui AN EMPIRICAL STUDY FOR THE MOBILE FOOD TRACE ABILITY: PRIVATE TRACE ABILITY SYSTEM FOR THE WHITE GOURD IN TIANJIN, CHINA ...................................................................... 29 Liu Yu-Chuan, Gao Hong-Mei DESIGN AND IMPLEMENTATION OF HENAN HUINONG CLIENT SYSTEM BASED ON IOS ....................... 34 Li Yan-Ling, Zhang Li, Guo Yu-Feng, Xi Lei, Sun Chang-Xia A METHOD ABOUT THE PROPAGATION OF FAULTS IN NETWORK................................................................ 39 Li Yao-Nan, Wang Shi-Hai DPDK-BASED IMPROVEMENT OF PACKET FORWARDING ................................................................................ 43 Bi Hao, Wang Zhao-Hun A NEW METHOD OF AMBIGUITY RESOLUTION FOR TRIPLE-FREQUENCY GPS PPP................................ 48 Lu Xiao-Feng, Zhang Sheng-Li, Bao Ya-Chuan VULNERABILITY OF COMPLEX NETWORKS UNDER APPROXIMATE LONGEST CHAIN ATTACK STRATEGIES.................................................................................................................................................... 52 Hao Yao-Hui, Song Jia-Liang, Lin Yi, Han Ji-Hong A METHOD FOR DETECTING THE REAL LOCATION OF AGENCY WEBSITE BASED ON SEARCH ENGINE.............................................................................................................................................................. 58 Chou Xiao-Hui, Gan Liang, Li Ai-Ping, He Zhong-He, Yang Feng-Yu THE IRREGULARITY PROPAGATION CHARACTERISTICS OF RADIO SIGNALS FOR WIRELESS SENSOR NETWORK IN FARMLAND...................................................................................................... 62 Zhu Hua-Ji, Wu Hua-Rui, Zhang Li-Hong, Miao Yi-Sheng AN EFFICIENT LATTICE-BASED DISTRIBUTED IBE ............................................................................................. 67 Yin Lu, Zhang Quan, Li Rui-Lin FACE RECOGNITION UNDER VARYING ILLUMINATION USING GREEN’S FUNCTIONBASED BIDIMENSIONAL EMPIRICAL MODE DECOMPOSITION AND GRADIENTFACES............................................................................................................................................................. 74 Yang Zhi-Jun, He Xue, Xiong Wen-Yi, Nie Xiang-Fei RESEARCH ON THE SOLUTION SPACE OF 2-SAT AND MAX-2-SAT .................................................................. 79 Li Bai-Feng, Wei Wei, Liu Chao-Qun MALWARE CLASSIFICATION BASED ON THE BEHAVIOR ANALYSIS AND BACK PROPAGATION NEURAL NETWORK.......................................................................................................................... 84 Pan Zhi-Peng, Feng Chao, Tang Chao-Jing FRACTAL SIGNATURE FEATURE ANALYSIS OF MODIS NDVI TIME SERIES DATA.................................... 89 Dong Shi-Wei, Li Hong, Zhang Wei-Wei TWO DIMENSIONAL HARMONICS RETRIEVAL IN ZERO-MEAN INDEPENDENT MULTIPLICATIVE AND ADDITIVE NOISES.............................................................................................................. 94 Zhang Zheng-Wei, Chen Zhong, Wang Li-Hui ROBUST FACE RECOGNITION VIA GABOR FEATURE AND SPARSE REPRESENTATION .......................... 99 Hao Yu-Juan, Zhang Li-Quan A SIGNAL SELECTION METHOD FOR HETEROGENEOUS POSITIONING SOURCES................................. 108 Yin Lu, Deng Zhong-Liang, Zhu Di, Hu En-Wen COMPARISON RESEARCH ON IOT ORIENTED IMAGE CLASSIFICATION ALGORITHMS....................... 113 Du Ke, Cai Kai-Yu A HYPER SPECTRAL IMAGES CLASSIFICATION METHOD BASED ON MAXIMUM SCATTER DISCRIMINANT ANALYSIS...................................................................................................................... 118 Li Huo-Yuan, Qi Yong-Feng SHIP TARGETS DISCRIMINATION ALGORITHM IN SAR IMAGES BASED ON HU MOMENT FEATURE AND TEXTURE FEATURE......................................................................................................................... 121 Liu Lei, Zhang Yang, Zhang Hai-Bo, Feng Qi, Li Ting-Jun ON THE LASH BAR COUNT ALGORITHM BASED ON IMAGE RECOGNITION ............................................. 125 Chen Pan-Pan, Zhang Wei-Dang, Li Zhong-Rui DOUBLE HEVC COMPRESSION DETECTION WITH THE SAME QPS BASED ON THE PU NUMBERS ......................................................................................................................................................................... 130 Jia Rui-Shi, Li Zhao-Hong, Zhang Zhen-Zhen, Li Dong-Dong WIRELESS NETWORK PENETRATION TESTING AND SECURITY AUDITING.............................................. 134 Wang Shao-Long, Wang Jian, Feng Chao, Pan Zhi-Peng ON STRATEGIES OF PERSONAL INFORMATION PROTECTION IN THE PERSONALIZED INFORMATION SERVICE IN BIG DATA TIMES ..................................................................................................... 139 Zhang Li-ping STATICLY DETECT STACK OVERFLOW VULNERABILITIES WITH TAINT ANALYSIS............................ 144 Xing Zhang, Bin Zhang, Chao Feng, Quan Zhang MEMORY VULNERABILITY DIAGNOSIS FOR BINARY PROGRAM................................................................. 149 Tang Feng-Yi, Feng Chao, Tang Chao-Jing DESIGN ON SECURITY ALARMING SYSTEM OF VEHICLE TERMINAL EQUIPMENT ............................... 152 Fan Tong-Liang, Ye Wen HARDWARE-ASSISTED SYSTEM FOR PROGRAM EXECUTION SECURITY OF SOC .................................. 156 Wang Xiang, Pang Shu-Song, Wang Wei-Ke, Zhao Zong-Min, Zhou Cheng, He Zhan-Hong, Wang Xiao-Cui, Xu Yang RESEARCH ON IMPROVED DV-HOP ALGORITHM AGAINST WORMHOLE ATTACKS IN WSN.................................................................................................................................................................................... 162 Wang Xue-Wen, Hu Feng, Zhai Chun-Xue, Zhang Yuan, Su Xing-Xing, Li Yan, Wu Zhao-Ke, Li Ting-Ting, Deng Zhou-Hu SECMAS: SECURITY ENHANCED MONITORING AND ANALYSIS SYSTEMS FOR WIRELESS SENSOR NETWORKS..................................................................................................................................................... 168 Ding Chao, Yang Li-Jun, Wu Meng ESTIMATING ADS’ CLICK THROUGH RATE WITH RECURRENT NEURAL NETWORK............................ 174 Chen Qiao-Hong, Yu Shi-Min, Guo Zi-Xuan, Jia Yu-Bo TRAFFIC DISTRIBUTION OF IM SERVICES............................................................................................................ 180 Li Rui-Bing, Sun Fang-Fang PARAMETERS IDENTIFICATION OF PHOTOVOLTAIC CELLS BASED ON DIFFERENTIAL EVOLUTION ALGORITHM .......................................................................................................................................... 183 Liao Hui, Qiao Dongkai, Huang Chonglin, Li Shidong DEVS MODELS OF PALLETIZED GROUND STACKING IN STOREYED GRAIN WAREHOUSE ................. 188 Hou Shu-Yi, Liu Yu-Kun, Zhou Xiao-Guang DESIGN OF TROPICAL FLOWERS ENVIRONMENTAL PARAMETERS WIRELESS
Recommended publications
  • Recent Articles from the China Journal of System Engineering Prepared
    Recent Articles from the China Journal of System Engineering Prepared by the University of Washington Quantum System Engineering (QSE) Group.1 Bibliography [1] Mu A-Hua, Zhou Shao-Lei, and Yu Xiao-Li. Research on fast self-adaptive genetic algorithm and its simulation. Journal of System Simulation, 16(1):122 – 5, 2004. [2] Guan Ai-Jie, Yu Da-Tai, Wang Yun-Ji, An Yue-Sheng, and Lan Rong-Qin. Simulation of recon-sat reconing process and evaluation of reconing effect. Journal of System Simulation, 16(10):2261 – 3, 2004. [3] Hao Ai-Min, Pang Guo-Feng, and Ji Yu-Chun. Study and implementation for fidelity of air roaming system above the virtual mount qomolangma. Journal of System Simulation, 12(4):356 – 9, 2000. [4] Sui Ai-Na, Wu Wei, and Zhao Qin-Ping. The analysis of the theory and technology on virtual assembly and virtual prototype. Journal of System Simulation, 12(4):386 – 8, 2000. [5] Xu An, Fan Xiu-Min, Hong Xin, Cheng Jian, and Huang Wei-Dong. Research and development on interactive simulation system for astronauts walking in the outer space. Journal of System Simulation, 16(9):1953 – 6, Sept. 2004. [6] Zhang An and Zhang Yao-Zhong. Study on effectiveness top analysis of group air-to-ground aviation weapon system. Journal of System Simulation, 14(9):1225 – 8, Sept. 2002. [7] Zhang An, He Sheng-Qiang, and Lv Ming-Qiang. Modeling simulation of group air-to-ground attack-defense confrontation system. Journal of System Simulation, 16(6):1245 – 8, 2004. [8] Wu An-Bo, Wang Jian-Hua, Geng Ying-San, and Wang Xiao-Feng.
    [Show full text]
  • Library Trends V.55, No.3 Winter 2007
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Illinois Digital Environment for Access to Learning and... Badly Wanted, but Not for Reading: The Unending Odyssey of The Complete Library of Four Treasures of the Wensu Library Chengzhi Wang Abstract The Chinese book project Siku Quanshu (The Complete Library of Four Treasures) was conducted at the Emperor Qianlong’s command start- ing in 1772. Thirteen thousand two hundred fifty-four books were collected nationwide and thousands of scholars were involved; 3,462 books were selected to make up the Siku Quanshu proper. Over 4 million pages were transcribed by thousands of copyists. Out of the seven copies made, only three copies survived the dramatic histori- cal changes of the nineteenth and twentieth centuries almost intact. This article traces the odyssey of the Wenshu Ge copy, particularly in the rapidly changing sociopolitical and economic contexts of the twentieth century. The emphasis of the article is placed on the de- scription and analysis of its relocation in the early 1920s soon after China was transformed into a republic; in the 1960s at the height of the Cold War when China split from and confronted the USSR; and in particular, in the new era of reform and opening up for economic development since the late 1970s. After the turn of the century, the two-decade competition between Liaoning Province and Gansu Province for physically keeping the copy has become increasingly intense at the national, provincial, and local levels, and the competi- tion has created significant impacts on library building and cultural development in the two provinces and beyond.
    [Show full text]
  • Marketing Chinese Women Writers in the 1990S, Or the Politics of Self-Fashioning
    Journal of Contemporary China ISSN: 1067-0564 (Print) 1469-9400 (Online) Journal homepage: http://www.tandfonline.com/loi/cjcc20 Marketing Chinese women writers in the 1990s, or the politics of self-fashioning Megan M. Ferry To cite this article: Megan M. Ferry (2003) Marketing Chinese women writers in the 1990s, or the politics of self-fashioning, Journal of Contemporary China, 12:37, 655-675, DOI: 10.1080/1067056032000117696 To link to this article: http://dx.doi.org/10.1080/1067056032000117696 Published online: 03 Jun 2010. Submit your article to this journal Article views: 142 View related articles Citing articles: 5 View citing articles Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=cjcc20 Download by: [Nationwide Childrens Hospital] Date: 24 October 2016, At: 09:49 Journal of Contemporary China (2003), 12(37), November, 655–675 Marketing Chinese Women Writers in the 1990s, or the Politics of Self-Fashioning MEGAN M. FERRY* This article examines the sensation a young group of woman writers are causing in 1990s China. Variously named the ‘New, New Generation’, or Glam Lit writers, these women have received critical attention from the literary field and the market. While critics debate the seriousness of their literature, publishing houses are producing their literature at a rapid pace. A governmental ban on the works of two authors, Zhou Weihui and Mian Mian, has fueled readership of black market copies and spurred commentary on the Internet. I argue that the unbridled female sexuality that fuels the sensation of these writers is driven by the publishing market and cultural production, with the complicity of women authors themselves.
    [Show full text]
  • Outlaws-022 Lure
    Welcome to the Water Margin Podcast. This is episode 22. Last time, Chao Gai and Liu Tang were planning to hijack the convoy of birthday presents meant for the premier. They brought this idea to the brains of the operation, a local scholar named Wu Yong. Wu Yong suggested that they needed seven or eight bodies to pull this off, but not just any bodies. To that end, he went to recruit three fisherman brothers in Stone Tablet Village: Ruan Xiao’er, Ruan Xiaowu, and Ruan Xiaoqi. As we rejoin the narrative, Wu Yong was spending the night with the three Ruan brothers, and they were drinking and feasting over dinner at the home of one of the brothers. After a few cups, Wu Yong once again broached the pretext of his visit -- that he was there to secure a bunch of big fat juicy fish for a wealthy patron. But the Ruan brothers told him that such big fish were no longer available in these waters. “But you have such a large fishing ground here,” Wu Yong asked, “How come you can’t find big fish?” “To tell you the truth, professor,” said Ruan Xiao’er, the eldest brother, “such big fish can only be found in the waters around Liangshan. The lake around this village is too small for fish that big.” “Well, the marsh around Liangshan is not far from here, and the two bodies of water are connected,” Wu Yong said. “So why don’t you go there to get some fish?” “[Sigh] Don’t even ask,” Ruan Xiao’er sighed.
    [Show full text]
  • The Outlaws of the Marsh
    The Outlaws of the Marsh Shi Nai'an and Luo Guanzhong The Outlaws of the Marsh Shi Nai'an and Luo Guanzhong • Chapter 1 Zhang the Divine Teacher Prays to Dispel a Plague Marshal Hong Releases Demons by Mistake • Chapter 2 Arms Instructor Wang Goes Secretly to Yanan Prefecture Nine Dragons Shi Jin Wreaks Havoc in Shi Family Village • Chapter 3 Master Shi Leaves Huayin County at Night Major Lu Pummels the Lord of the West • Chapter 4 Sagacious Lu Puts Mount Wutai in an Uproar Squire Zhao Repairs Wenshu Monastery • Chapter 5 Drunk, the Little King Raises the Gold−Spangled Bed Curtains Lu the Tattooed Monk Throws Peach Blossom Village into Confusion • Chapter 6 Nine Dragons Shi Jin Robs in Red Pine Forest Sagacious Lu Burns Down Waguan Monastery • Chapter 7 The Tattooed Monk Uproots a Willow Tree Lin Chong Enters White Tiger Inner Sanctum by Mistake • Chapter 8 Arms Instructor Lin Is Tattooed and Exiled to Cangzhou Sagacious Lu Makes a Shambles of Wild Boar Forest • Chapter 9 Chai Jin Keeps Open House for All Bold Men Lin Chong Defeats Instructor Hong in a Bout with Staves • Chapter 10 Lin Chong Shelters from the Snowstorm in the Mountain Spirit Temple Captain Lu Qian Sets Fire to the Fodder Depot • Chapter 11 Zhu Gui Shoots a Signal Arrow from the Lakeside Pavilion Lin Chong Climbs Mount Liangshan in the Snowy Night • Chapter 12 Lin Chong Joins the Bandits in Liangshan Marsh Yang Zhi Sells His Sword in the Eastern Capital • Chapter 13 The Blue−Faced Beast Battles in the Northern Capital Urgent Vanguard Vies for Honors on the Training Field
    [Show full text]
  • The Outlaws of the Marsh
    The Outlaws of the Marsh Shi Nai'an and Luo Guanzhong The Outlaws of the Marsh Table of Contents The Outlaws of the Marsh..................................................................................................................................1 Shi Nai'an and Luo Guanzhong...............................................................................................................1 Chapter 1 Zhang the Divine Teacher Prays to Dispel a Plague Marshal Hong Releases Demons by Mistake....................................................................................................................................................7 Chapter 2 Arms Instructor Wang Goes Secretly to Yanan Prefecture Nine Dragons Shi Jin Wreaks Havoc in Shi Family Village...................................................................................................15 Chapter 3 Master Shi Leaves Huayin County at Night Major Lu Pummels the Lord of the West.......32 Chapter 4 Sagacious Lu Puts Mount Wutai in an Uproar Squire Zhao Repairs Wenshu Monastery....42 Chapter 5 Drunk, the Little King Raises the Gold−Spangled Bed Curtains Lu the Tattooed Monk Throws Peach Blossom Village into Confusion...................................................................................57 Chapter 6 Nine Dragons Shi Jin Robs in Red Pine Forest Sagacious Lu Burns Down Waguan Monastery.............................................................................................................................................67 Chapter 7 The Tattooed Monk Uproots a Willow
    [Show full text]
  • Ideophones in Middle Chinese
    KU LEUVEN FACULTY OF ARTS BLIJDE INKOMSTSTRAAT 21 BOX 3301 3000 LEUVEN, BELGIË ! Ideophones in Middle Chinese: A Typological Study of a Tang Dynasty Poetic Corpus Thomas'Van'Hoey' ' Presented(in(fulfilment(of(the(requirements(for(the(degree(of(( Master(of(Arts(in(Linguistics( ( Supervisor:(prof.(dr.(Jean=Christophe(Verstraete((promotor)( ( ( Academic(year(2014=2015 149(431(characters Abstract (English) Ideophones in Middle Chinese: A Typological Study of a Tang Dynasty Poetic Corpus Thomas Van Hoey This M.A. thesis investigates ideophones in Tang dynasty (618-907 AD) Middle Chinese (Sinitic, Sino- Tibetan) from a typological perspective. Ideophones are defined as a set of words that are phonologically and morphologically marked and depict some form of sensory image (Dingemanse 2011b). Middle Chinese has a large body of ideophones, whose domains range from the depiction of sound, movement, visual and other external senses to the depiction of internal senses (cf. Dingemanse 2012a). There is some work on modern variants of Sinitic languages (cf. Mok 2001; Bodomo 2006; de Sousa 2008; de Sousa 2011; Meng 2012; Wu 2014), but so far, there is no encompassing study of ideophones of a stage in the historical development of Sinitic languages. The purpose of this study is to develop a descriptive model for ideophones in Middle Chinese, which is compatible with what we know about them cross-linguistically. The main research question of this study is “what are the phonological, morphological, semantic and syntactic features of ideophones in Middle Chinese?” This question is studied in terms of three parameters, viz. the parameters of form, of meaning and of use.
    [Show full text]
  • PHM-Qingdao 2019)
    2019 Prognostics and System Health Management Conference (PHM-Qingdao 2019) Qingdao, China 25 – 27 October 2019 Pages 1-719 IEEE Catalog Number: CFP19T22-POD ISBN: 978-1-7281-0862-9 1/2 Copyright © 2019 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP19T22-POD ISBN (Print-On-Demand): 978-1-7281-0862-9 ISBN (Online): 978-1-7281-0861-2 Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com TABLE OF CONTENTS FAULT DIAGNOSIS ANALYSIS OF WIND TURBINE GEAR BASED ON TRANSFER FUNCTION MODEL............................................................................................................................................................1 Xin Wang ; Wenyi Liu ; Mengchen Shan INVESTIGATION OF FEATURE EFFECTIVENESS IN POLYMER ELECTROLYTE MEMBRANE FUEL CELL FAULT DIAGNOSIS ............................................................................................................6 Weitao Pan ; Yousif Yahia Ahmed Abuker ; Lei Mao THE SCHEME DESIGN OF SMART OFFSHORE WIND FARM..............................................................................
    [Show full text]
  • The Transition of Inner Asian Groups in the Central Plain During the Sixteen Kingdoms Period and Northern Dynasties
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2018 Remaking Chineseness: The Transition Of Inner Asian Groups In The Central Plain During The Sixteen Kingdoms Period And Northern Dynasties Fangyi Cheng University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian History Commons, and the Asian Studies Commons Recommended Citation Cheng, Fangyi, "Remaking Chineseness: The Transition Of Inner Asian Groups In The Central Plain During The Sixteen Kingdoms Period And Northern Dynasties" (2018). Publicly Accessible Penn Dissertations. 2781. https://repository.upenn.edu/edissertations/2781 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/2781 For more information, please contact [email protected]. Remaking Chineseness: The Transition Of Inner Asian Groups In The Central Plain During The Sixteen Kingdoms Period And Northern Dynasties Abstract This dissertation aims to examine the institutional transitions of the Inner Asian groups in the Central Plain during the Sixteen Kingdoms period and Northern Dynasties. Starting with an examination on the origin and development of Sinicization theory in the West and China, the first major chapter of this dissertation argues the Sinicization theory evolves in the intellectual history of modern times. This chapter, in one hand, offers a different explanation on the origin of the Sinicization theory in both China and the West, and their relationships. In the other hand, it incorporates Sinicization theory into the construction of the historical narrative of Chinese Nationality, and argues the theorization of Sinicization attempted by several scholars in the second half of 20th Century. The second and third major chapters build two case studies regarding the transition of the central and local institutions of the Inner Asian polities in the Central Plain, which are the succession system and the local administrative system.
    [Show full text]
  • A Spatial Stochastic SIR Model for Transmission Networks with Application to COVID-19 Epidemic in China
    CDES CENTRE FOR DEVELOPMENT ECONOMICS AND SUSTAINABILITY CDES WORKING PAPER SERIES A Spatial Stochastic SIR Model for Transmission Networks with Application to COVID-19 Epidemic in China Tatsushi Oka Wei Wei Dan Zhu CDES Working Paper No. 03/20 SEPTEM BER 2020 A Spatial Stochastic SIR Model for Transmission Networks with Application to COVID-19 Epidemic in China⇤ § Tatsushi Oka† Wei Wei‡ Dan Zhu August 17, 2020 Abstract Governments around the world have implemented preventive measures against the spread of the coronavirus disease (COVID-19). In this study, we consider a multivariate discrete-time Markov model to analyze the propagation of COVID-19 across 33 provincial regions in China. This approach enables us to evaluate the effect of mobility restriction policies on the spread of the disease. We use data on daily human mobility across regions and apply the Bayesian framework to estimate the proposed model. The results show that the spread of the disease in China was predominately driven by community transmission within regions and the lockdown policy introduced by local governments curbed the spread of the pandemic. Further, we document that Hubei was only the epicenter of the early epidemic stage. Secondary epicenters, such as Beijing and Guangdong, had already become established by late January 2020, and the disease spread out to connected regions. The transmission from these epicenters substantially declined following the introduction of human mobility restrictions across regions. Keywords: COVID-19, Infection, Heterogeneity, Spatial Model, Bayesian Analysis JEL code: C11, C33, C54 ⇤We would like to acknowledge the financial support from the Centre for Development Economics and Sustain- ability (CDES) at Monash University.
    [Show full text]
  • Editorial Report
    Editorial Report 1. This issue of the Bulletin of the Department of Chinese Literature, National Chengchi University (“the Bulletin”) received 21 submissions (15 from Taiwan, six from overseas). Two submissions were rejected and returned during the preliminary editorial committee review. Of the remaining 18 submissions (excluding the feature article submission), six submissions were selected through double-blind reviews by two extramural experts for each submission. Excluding the feature article submission, six submissions out of 20 were selected, resulting in an acceptance rate of 30 percent, and a rejection rate of 70 percent. This issue publishes eight formal academic articles, with three articles by full-time teachers of the Department of Chinese Literature, National Chengchi University, the rate for internal release is 37.5 percent. The Bulletin aims to enhance academic standards and expand research horizons, we sincerely invite submissions from all scholars of Chinese studies. 2. In this issue, we feature “Writing on Landmarks: From Yellow Crane Tower to Phoenix Terrace” by Professor Shang Wei, Du Family Professor of Chinese Culture, Columbia University. This feature article begins with a close reading of Li Bai’s “Ascending Phoenix Terrace in Jinling” to explore his varied responses to Cui Hao’s “Yellow Crane Tower.” Tracing a series of poems related to the same subject, it examines the poetic practice of writing about scenic spots or landmark sites during the Tang dynasty, with reference to the literary discourse on this practice and other pertinent topics. By tracing a series of poems related to the same subject, Professor Shang tells the story of how poets during the Tang dynasty imitate and compete through writing about scenic spots or landmark sites, paying attention to the subtly complicated relationship between literary text and critical discourse, questioning the ideal mode of extempore verse and its premise, at the same time exploring what classical poetry can and cannot do, its potential and boundary.
    [Show full text]
  • China, Das Chinesische Meer Und Nordostasien China, the East Asian Seas, and Northeast Asia
    China, das Chinesische Meer und Nordostasien China, the East Asian Seas, and Northeast Asia Horses of the Xianbei, 300–600 AD: A Brief Survey Shing MÜLLER1 iNTRODUCTION The Chinese cavalry, though gaining great weight in warfare since Qin and Han times, remained lightly armed until the fourth century. The deployment of heavy armours of iron or leather for mounted warriors, especially for horses, seems to have been an innovation of the steppe peoples on the northern Chinese border since the third century, as indicated in literary sources and by archaeological excavations. Cavalry had become a major striking force of the steppe nomads since the fall of the Han dynasty in 220 AD, thus leading to the warfare being speedy and fierce. Ever since then, horses occupied a crucial role in war and in peace for all steppe riders on the northern borders of China. The horses were selectively bred, well fed, and drilled for war; horses of good breed symbolized high social status and prestige of their owners. Besides, horses had already been the most desired commodities of the Chinese. With superior cavalries, the steppe people intruded into North China from 300 AD onwards,2 and built one after another ephemeral non-Chinese kingdoms in this vast territory. In this age of disunity, known pain- fully by the Chinese as the age of Sixteen States (316–349 AD) and the age of Southern and Northern Dynas- ties (349–581 AD), many Chinese abandoned their homelands in the CentraL Plain and took flight to south of the Huai River, barricaded behind numerous rivers, lakes and hilly landscapes unfavourable for cavalries, until the North and the South reunited under the flag of the Sui (581–618 AD).3 Although warfare on horseback was practised among all northern steppe tribes, the Xianbei or Särbi, who originated from the southeastern quarters of modern Inner Mongolia and Manchuria, emerged as the major power during this period.
    [Show full text]