A comprehensive view of the Middle East: The civil strife in the US-controlled areas of Syria continues, and it is difficult to stop American allies from "killing each other" with military aid and med

The US military in Syria has been in trouble recently. In the US-controlled area of dayr az zawr in northern Syria, the fighting between Arab tribes and Kurdish armed forces, both allies of the US military, has lasted for more than 20 days, resulting in more than 190 deaths. Although the U.S. military urged the two sides to cease fire and asked them to go to a U.S. military base called Al-Omer for negotiations, the fighting did not stop because of the intervention of the U.S. military. At present, the military conflict has spread to Aleppo, another province in northern Syria. The fierce fighting has seriously affected the food supply of people in the region, and some people even fled to Iraq to escape the fighting.

The differentiated military assistance of the US military has buried hidden dangers of conflict.

The conflict between Arab tribes and Kurdish armed forces in dayr az zawr has a long history. Although they jointly oppose the Syrian government and support the US military occupation of the area east of the Euphrates River in dayr az zawr, the differentiated military assistance of the US military has laid a hidden danger of conflict.

In 2015, the United States joined hands with Kurdish armed forces to control the northeast of Syria. However, after the failure to overthrow the Syrian government, the United States turned to seek to split Syria, and favored the Kurds’ demands for independence. The Kurds in dayr az zawr gradually became the most loyal regional agents of the US military. The U.S. military provided them with heavy weapons, assisted in the establishment of military schools, and carried out technical training such as special forces and field assault, which finally enabled the Kurds to organize a relatively formal military force.

In contrast, although the Arab tribes in this area have the same goal as the United States in overthrowing the Syrian government, they do not pursue independence, and the US military has therefore implemented "limited military assistance" to them. Arab tribes can only get light weapons, and lack formal military training, and have never established formal armed forces.

With such military assistance, there are more than 10,000 Kurdish armed men in dayr az zawr, while the Arab tribes are "only" about 1,100. Paradoxically, the population of Arab tribes in dayr az zawr is as high as 95%, and the rise of Kurdish armed forces makes Arab tribes constantly complain that their territorial security is threatened.

Long-term accumulation of powder kegs is inevitable. The fuse of the latest round of conflict is that Kurdish armed forces detained a leader of the Arab tribe. In late August, the Kurdish armed forces invited Ahmed Khabir, the leader of the Arab tribe "Arab Committee", to the area controlled by the former, but Khabir was arrested by the Kurdish armed forces on charges of "treason" and "liaising with the Syrian government" as soon as he arrived. This move aroused the anger of all Arab tribes in dayr az zawr. They demanded that the Kurdish armed forces release Khabir within 12 hours, or they would launch an attack, which was flatly rejected by the Kurdish armed forces, and the conflict broke out.

The US military’s slow mediation is called mediation, but it is actually biased.

The fighting between Kurdish armed forces and Arab tribes is extremely fierce. The conflict on September 2 alone caused more than 50 casualties. As a common ally of the two countries, the US military chose to watch the fire from the other side of the bank, and said that the US military would stop patrolling the area because of the deteriorating security situation. In this regard, the article published by the Syrian independent newspaper "Motherland" on the same day hit the nail on the head. "The US military will intervene after waiting for the warring parties to be exhausted, so as to consolidate its important position in this region." The article stated that the US military tried to weaken the strength of both sides of the conflict by maintaining apparent neutrality. On the one hand, it supported the military actions of Kurdish armed forces, and on the other hand, it announced its support for Arab tribes to regain the rights deprived by Kurdish armed forces.

△ US troops stationed in Syria (Source: local media)

After many days, the US military finally launched "mediation" on September 5, inviting both sides of the conflict to negotiate in the American military base in Omer, Aleppo. The Kurds immediately responded positively, but the Arab tribes only sent a low-level representative and expressed concern that they would be ambushed or arrested again. The negotiations between the two sides soon broke down. Syrian political expert Mahin commented that this is a "doomed failure" negotiation. He pointed out that the US military did not openly exert any pressure on the Kurdish armed forces in releasing the arrested Arab tribal leaders, and the US military should ask the Kurdish armed forces to release the Arab tribal leaders first, and then hold talks.

The US military continues to steal oil in Syria, and the uneven distribution of spoils promotes the continuation of the conflict.

Dayr az zawr, known as the oil and gas basket of Syria, has about 80% oil reserves in Syria. After the US military seized the area east of the Euphrates River from the Syrian government, it meant occupying almost all the oil fields in the province. They set up bases around oil fields to ensure the "smooth" stealing of Syrian oil resources, and most of the oil proceeds flow to the US military to pay for its high military expenditure costs in Syria, while the other part flows to Kurdish armed forces. However, as an ally of the US military, the Arab tribes, like all Syrians in government-controlled areas, watch the oil being transported abroad, but they have to bear the high gasoline and diesel costs caused by the US economic sanctions policy in their lives.

An article published in "Motherland" commented, "The Arab tribes in Deir ez-Zor account for the majority of the local population, but only have very few in the region.smallPart of the wealth. Under the threat of Kurdish armed forces, the leaders of Arab tribes can’t even enjoy a decent position. It is for this reason that Arab tribal leader Ibrahim Afler recently called for the continuation of actions against Kurdish armed forces. Yusuf Lifar, a Syrian military expert, pointed out that tribal fighters are usually good at ambushes and covert operations, and now they choose to attack Kurdish armed forces head-on, showing the determination of Arab tribes. The presence of the US military has aggravated the unprecedented internal turmoil in dayr az zawr and plunged itself into a conflict that may not end soon.

From overthrowing the legitimate government to splitting the territory, the US military has done everything in Syria, and it seems that such means have not stopped. According to a recent report in Syria’s Fuxing Daily, the US military is in contact with the Druze people in Suweida province, Syria, trying to incite them to rebel against the government’s rule and finally seek independence. The root of Deir ez-Zor’s bloody turmoil is that the United States wantonly tramples on other countries’ sovereignty and interferes in other countries’ internal affairs, and such acts will eventually make it suffer the consequences.

Producer Mu Muli

Producer Zhang Yuchen?

Reporter Wang Weiwei

The exposure notice of the new national wind animation "finless porpoise dancing in the wind" reveals the fate of the aquarium


1905 movie network news On January 10th, Guofeng animated film released a "fatalistic version" preview, which was different from the previous preview rhythm. This preview content began with the awakening of the dusty memory of the fairy Jiangling, and slowly unveiled the mystery of a thousand-year cause and effect. The seemingly calm and wave-free river surface is actually undercurrent. Are the irreconcilable races really incompatible? How will Jiangling Fairy prevent the tragedy of 600 years ago from happening again? Maybe fate is hard to break, but you can only see the miracle if you don’t accept your fate. The film will be officially released on January 20, and the wind will start, waiting for the finless porpoise to jump.

The theme preview reveals whether the fate of the aquarium is so unsolvable after all


In the "Destiny Edition" preview, the guardian of the aquarium, the fairy Jiang Ling, suddenly emerged as the beginning of the past memory, which opened a new perspective for the audience: What happened to the aquarium six hundred years ago before it was so tit for tat with human beings? Why did the Black Dragon insist on bringing the aquarium into Yunmengze? As an aquarium fairy, why do I have a dusty memory? The past is like dust and smoke, guiding the Lingjiang fairy who is bent on protecting the aquarium, and insisting on going to the human world to find out, not only to save the finless porpoise that has been caught, but also to solve the feud for thousands of years.

"Dust the memory, call the goddess to save the whole life". With the streamer overflowing from the mural, Jiang Ling’s memory wakes up, which also means that the fate of the goddess is about to open. The life and death of the aquarium and the feud with human beings will not allow her to hesitate any more. "shouldering the heavy responsibility, time can’t escape fate", as the black dragon said, moving the family to Yunmengze is their last retreat, but Jiang Ling doesn’t want the water dragon to rob again and let human beings die; "Ninghua dust, but also carry forward with heavy burdens", the harmonious coexistence of the two worlds has become Jiang Ling’s last obsession, is it doomed to sacrifice to get rid of this insurmountable fate?

The only new national style animation in the same period injected courage into the new year.


The film has attracted much attention since its inception. Many netizens are full of expectations for this animated film belonging to the Chinese people, and there are also some expectations for the film: "I hope the protagonist can be strong and have our own demeanor", "I want to see something more energetic in the new year" and so on. It is understood that the story of this film is the setting of "Fate can’t escape, but don’t accept fate", just as young people nowadays can always surpass themselves when facing difficulties, and generate shows vigorous vitality.

The film "finless porpoise dancing in the wind" will be officially released on January 20th. It is the only animated film with new national style in the same period, but it is not limited to the stunning national style and exquisite animation. What the film wants to convey is not only the thinking about the needs of the ecological environment, but also the attitude of the leading group of "desperate" to every audience, so that people who come to watch movies can feel this power. In real life, when facing the difficulties of life, work and emotion, they can have both the courage to move forward and the courage to start all over again, as shown in the film.


The epidemic situation is repeated, please accept this online course strategy!

The epidemic resumed, and many places turned to the online class mode. In the face of unfamiliar and familiar online classes, today I have compiled a practical online learning strategy for children who study online at home.

Student article

a workman must first sharpen his tools if he is to do his work well

A tidy desk

A tidy desk can effectively avoid distractions in class, and clean up things unrelated to study on the desk to other places, leaving only the electronic equipment needed for online classes.

Place the water cup.

Don’t forget to replenish water during the online class. Choose a favorite water cup, fill it with water and put it at the corner of the table, which can also increase the number of drinks invisibly.

Timed alarm clock

Equipping yourself with an electronic clock during your study can better plan and manage your time.

Quiet environment

Quiet environment is also very important. Headphones are a good choice, which can not only reduce external interference, but also prevent interference with others.

Comfortable seating

For the sedentary students’ party, a soft seat cushion with Q-bomb can relieve the waist pain due to lack of exercise.

The correct way to open online courses

Prepare in advance

Contact the teacher in advance about the platform and mode of class to ensure the smooth development of online learning.

correct attitude

Online class is also a class, so you can get twice the result with half the effort by observing PPT with your eyes and listening to the teacher, carefully remembering your hands and correcting your learning attitude.

Record carefully.

Make every note carefully. Taking notes in class is the most beneficial method to concentrate, and at the same time, taking notes is also an important weapon for final review.

Ask positive questions

Online class is both a challenge and an opportunity. We can listen to the questions we don’t understand again and again. If we still don’t understand, we can also ask the teacher for help online.

Scientific and healthy online learning

protect eyes

Choose electronic products scientifically. Try to choose electronic products with large screens, and suggest the priority order: projector > computer > tablet > mobile phone. Choose electronic products with high resolution to reduce eye discomfort and fatigue.

Avoid staring at electronic products for a long time. The shorter the continuous use of electronic products, the better. It is recommended to look up at the distance for more than 20 seconds after watching the screen for 20 minutes.

Maintain correct viewing posture and reading and writing posture. When watching the computer, the distance between the eyes and the computer screen should be not less than 50cm, and the eyes should look down slightly. When reading and writing, keep the "three ones". Keep your hands one inch away from the pen tip, your eyes one foot away from the book and your chest one punch away from the desk.

Insist on eye exercises

Adhere to eye exercises twice a day, once in the morning and once in the afternoon. It is best to do eye exercises seriously after continuous use of eyes, so that eyes can get sufficient rest, and wash hands before doing eye exercises.

Appropriate exercise

Children and teenagers’ home exercise program, parents can also practice together!

Sensitive coordination, cardio-pulmonary endurance exercises

1. Run around two o’clock

Put two mineral water bottles, and the distance between the two water bottles can be controlled according to the situation. Let the child use the sideslip step to move quickly between the two water bottles. 10-20 times.

2. Run in the same place

Hands and feet are supported on the ground, and legs are pushed back and forth quickly. The frequency of action is based on your own situation. The faster the frequency, the greater the intensity. Continue for 30 seconds.

Step 3 run in small steps

Run fast in small steps in the same place, swing your arms and pace as fast as possible, and continue for 30 seconds.

Balance exercise

Step 1 catch the ball with one foot

Stand on the ground with one foot, keep your body balanced, and catch the ball (tennis, etc.) thrown by your parents with your hands.

2. Jump one-legged station

Take off with both legs and stand firm with one leg on the ground. After landing, the knee joint is slightly bent. Alternately on both sides, 5 times on each leg.

Step 3 turn and jump on one leg

Stand on one leg, take off and turn 90 degrees in the air, then land on one leg and stand firm. Bilateral legs alternately, 5 times on each side.

Strength exercise

1. Two-legged back bridge

Lie on your back on the ground, bend your knees 90 degrees, and lift your lower back off the ground with lower limbs for 10-15 times.

Step 2 crouch against the wall

Back against the wall, bend your hips and knees, and keep your knees at 90 degrees. At the same time, pay attention to the fact that your knees can’t exceed your toes. According to your own situation, you can reduce the difficulty by adjusting the angle of your knees. Lasts 30-60 seconds.

Step 3 lunge and squat

Stand your legs forward and backward in a lunge, with the front leg crouched to 90 degrees and the back leg flexed, but don’t touch the ground. Bilateral alternating, 5-10 times on each side.

Step 4 walk forward and backward.

Bend your hips and knees, keep your back straight, and walk back and forth while keeping the flexion angle of your hips and knees unchanged. Continue for 60 seconds.

Step 5 standard squat

Keep your hands shoulder width apart, bend your hips and knees and squat down to the knee joint at 90 degrees. Pay attention to the center of gravity between your legs, and the knee joint should not exceed your toes and waist and back. 10-15 times.

Flexibility exercise

Step 1 walk with your hands and feet

Stand, lean forward, walk with your hands on the ground in a small range, and keep your body straight until you reach the maximum range. Then, the forefoot hits the ground, and walks forward quickly in small steps, reaching the maximum range while keeping the knee joint straight. 6-8 times.

2. hamstring muscle drafting

Sit with one leg straight and the other leg flexed near the knee joint. Keep your back straight and your knee joint straight, and use your abdomen to touch the knee joint forward. Lasting for 30-60 seconds, and alternating for 2-3 times.

3. Shoulder flexibility

Stand, with one hand from the top of your head and the other hand downward, and try your best to touch each other enough. Be careful not to use too much force in the process of touching enough to prevent your body from being distorted. Bilateral alternating, 6-8 times.

Adequate sleep and nutrition

Ensure more than 8 hours of sleep every day, and it is best to arrange more than half an hour of sleep in the afternoon. Don’t stay up late.

Secondly, we should have a reasonable diet, balanced nutrition, pay attention to ensuring three meals a day, especially breakfast, mix meat and vegetables, avoid overeating, and be careful not to change the usual diet structure too much.

Of course, in the process of online learning, most students will encounter similar problems: poor self-control, improper time management, no goal and no motivation, etc., which will all lead to low learning efficiency and be in a stalemate of learning badly and playing badly, thus bringing us some psychological anxiety or anxiety, which will affect our daily life and study for a long time.

At this time, parents should remember to help their children adjust their mood in various ways.

Parental articles

Care about accompanying children

Good parent-child relationship is the lubricant and foundation for solving problems. Parents should be "bosom friends" of their children, tolerate, appreciate and encourage their children, and carry out more meaningful parent-child activities, such as parent-child reading, parent-child knowledge contest, parent-child games, paying attention to current political programs, watching inspirational movies and TV programs together, etc., which can not only enhance feelings, adjust the mood of homebody, let them feel the warmth of family and the happiness of companionship, but also understand the responsibility.

Escort children

The first is to create a learning atmosphere. Try to arrange for children to complete online learning in a quiet venue; Check the learning hardware facilities in advance, set the computer system to child safety mode, try to use a system that can intercept advertisements, uninstall programs and software that may have adverse effects, and control the time of using electronic products.

The second is to enhance learning awareness. Download and print the online learning schedule in advance, set the alarm clock 15 minutes in advance to help children prepare school supplies; Dress neatly and enter the online learning venue; Use the alarm clock to prompt "class" and "class is over".

Guide children to learn to learn.

Parents should urge their children to make a good plan, print and post schedules and classes, and intuitively remind them to enter the learning state on time as planned. Guide children to develop good habits of online learning, such as previewing, taking notes, consolidating and reviewing after class, etc. Guide children to learn to use resources, such as mastering and consolidating knowledge points by replaying courses; Communicate with the teacher in time through "online Q&A" and give feedback.

Original title: "The epidemic is repeated, please accept this online class guide! 》

Read the original text

The domestic box office "The First Time" won the championship for two weeks, and the new film power rose.


Film aesthetic stills


The director told a play for the rock youth in the play.

    The youth pure love film with exclusive online copyright purchased by [Movie Network] was released on June 8, and won the top spot in the box office of domestic films released in the same period in the first week. By the 17th, the box office had reached 28 million, still ranking first in the box office of domestic films, and won the top spot in the box office of domestic films for two consecutive weeks. Many people in the industry say that "the small film has a big surprise" to get rid of the downturn of domestic films since April. In addition, the good reputation of the film continues to heat up, and "The First Time" will play a "protracted war". In the face of the current achievements, director Han Yan said that he was very happy and expressed confidence that he would have better achievements in the future.

"The First Time" won the championship for two weeks and created a big surprise.

    The film "The First Time" was directed by the cutting-edge director Han Yan, with Jiang Zhiqiang, a famous Asian filmmaker, as the producer, and popular actors and leading actors in the film industry, Zhao Shuhai, Cindy,,,, Xiaoliang Wu, Fan Lin, etc. With the theme of first love, which is an inevitable experience in life, the film tells the romantic and beautiful first love story between Song Qiaoqiao, a terminally ill girl played by Angelababy, and Gong Ning, a rock youth played by Mark Chao.

    Since its release on June 8th, The First Time has won the top spot at the box office of domestic films in the same period in the first week. In the second week, although it encountered Hollywood blockbusters, the hall was still firm, which was comparable to that when it was released on the 8th. By the 17th, the box office of The First Time had reached nearly 28 million, making it the box office champion of domestic films for two consecutive weeks. This achievement has surprised many people in the industry, and director Han Yan also said that he is very happy. "I am very happy to see the movie get such a box office, but I am confident that there will be better results in the future."

Word of mouth pulls the protracted war "First Time" out of the dilemma of domestic films

    The good reputation of movies is a major factor in boosting the box office. In the film, the romantic love between Angelababy and Mark Chao, the deep mother-daughter relationship between Jiang Shan and Angelababy, and the tangled father-son relationship between Zhao Shuhai and Mark Chao deeply moved many viewers. As early as before the film was released, good news had been reported in various places, and many viewers called it "moved" and "crying", which made fans look forward to it. After the film was released, many viewers expressed their feelings on Weibo, driving friends around them to watch the film, which triggered the secondary spread of good word-of-mouth in Weibo and formed the effect of word of mouth. Until the tenth day of the release, some theaters were still full, and I believe this good reputation will continue to promote the box office in the future.

    Since April, domestic films have been in the dilemma of both box office and word of mouth, including,,, and so on. In the current downturn of domestic films, the film "First Time" got rid of the dilemma with good reputation and became a rare domestic film with both box office reputation recently.

Next page: the rise of the new power of Chinese film industry is quite powerful.

The debut of FAW Pentium T90/A00 pure tram Pentium pony is expected to be listed in the middle of the year.

On April 18th, the new generation of all-around Pentium M9 was heavily listed, with the official price of exclusive and supreme models of 229,800 yuan and 249,800 yuan, and it brought a medium-sized and large MPV experience with a quadruple car purchase gift. The brand-new A-class intelligent Pentium T90 and China’s first A00-class pure electric vehicle, Pony, made their first public appearance. At present, Pentium M9 has arrived at the store, and Pentium T90 and Pentium Pony are also expected to be listed in the middle of the year.

image.png

As the first MPV under the new concept of FAW Pentium, the wheelbase of Pentium M9 is as long as 3200mm and the length and width are as high as 5280*2005*1945mm, and the body size is still in the leading position among medium-sized large MPVs. This time, there are two models on the market, offering five classic appearance colors: Alpine White, Gentian Purple, Quantum Silver Grey, Charming Night Black II and Platinum Light Gold. The beige and brown interiors create a warm atmosphere and are equipped with a number of leapfrog configurations, showing the characteristics of IKEA.

With a starting price of 229,800 yuan, the Pentium M9 ranks among the all-round MPVs that are rare in the price range of 200,000 yuan, integrating face value, space, comfort, motivation and practicality, and becomes a representative model of independent brands attacking the MPV market with high cost performance and breaking the price barrier of joint venture brands, which will bring new MPV travel experience to the "quality life pragmatism" who pursues efficient travel and balances career and life.

While exploring upward with the new generation of all-around MPV, the horizontal expansion of Pentium product matrix continues to increase. The birth of A-class intelligent SUV Pentium T90 and A00 pure electric vehicle Pentium pony is the best example.

image.png

The Pentium T90, which made its public debut for the first time, is the transformation work of FAW Pentium’s first fuel+plug-in dual-power layout. It inherits the high-quality genes of Pentium T series. The new car fully applies the fourth generation design language "strength, purity and perfection" for the first time, and is equipped with the leading "intelligent engine power" in full speed range. With the super-long wheelbase of 2772mm and the strongest hot-formed steel of 2000MPa in the industry, it has realized a comprehensive innovation in design, comfort, power and safety.

image.png

As a brand-new strategic model, Pentium T90 will also be equipped with Qualcomm 8155 top-class car chip, achieving millisecond-level quick response. L2.5 intelligent driving assistance can realize full-automatic parking and high-speed intelligent lane changing, as well as "black technology" such as 9.6-inch W-HUD head-up display, 12.6-inch suspended vertical screen and intelligent lighting interaction, making it the leading "intelligent ceiling" at the same level.

image.png

image.png

At the same time, the much-anticipated Pentium Pony, the first miniature pure electric vehicle of FAW Pentium, was officially named, unveiling the mystery, and highlighting the vitality and agility of the "trendy and cute pet". As a trendy item that transcends the attributes of tools, Pentium Pony broke the industry routine, took the lead in presenting three modified models, shared the fun of trendy cute pets with consumers, and joined hands with QQ’s trend IP PUPU ALIENS to bring the trendy amusement park, successfully creating the most cute booth at this auto show, fully demonstrating the "four-can" characteristics of cuteness, changeability, playability and reliability.

The Central Network Information Office and the Ministry of Education: Start the special rectification of the online class platform for minors

  Cctv newsIn order to effectively solve the outstanding problems of online class platforms involving minors, safeguard the legitimate rights and interests of minors, and promote the standardized and orderly development of online class platforms, the Central Network Information Office and the Ministry of Education decided to start a two-month special rectification of online class platforms involving minors from now on.

  At present, the online "cloud classroom" has become the main channel for students to learn during the epidemic period. However, some website platforms ignore social responsibilities, repeatedly use online classes to promote online games and make friends, and even spread pornographic, violent and fraudulent information, which endangers the physical and mental health of students, especially minors, and has a very bad social impact.

  It is understood that this special rectification will require all kinds of website platforms that offer online courses for minors to effectively assume the main responsibility of information content management; It is necessary to strictly review and check the courses to ensure the correct orientation; To set up the interactive function of comments, it is necessary to establish the system of "reviewing before sending" information content; It is necessary to strengthen the ecological management around the online course page, and there must be no content that harms the physical and mental health of minors; Do not use pop-ups to induce clicking on pages that are not suitable for minors; Do not push advertising information unrelated to learning; Do not use online courses of public welfare nature to seek commercial interests.

  The relevant person in charge said that during the special rectification period, local network information departments and education administrative departments will further increase the law enforcement penalties for violations of laws and regulations involving online class platforms for minors, and create an active and healthy online learning environment for minors.

Ten deaths caused by a tornado in Jiangsu Expert: It is a rare tornado event.

  There were tornadoes in Suqian and Yancheng, Jiangsu Province on September 19th, which killed 10 people.

  According to the official reports of the two places, at about 17: 20 on September 19th, strong tornadoes occurred in Daxing Town, suyu district, Suqian City, and Nancai Township, Suqian Economic Development Zone, with the grade of EF2, causing casualties and property losses in some areas. The tornado disaster mainly occurred in towns and villages, with dense personnel and complex building structure. The occurrence time coincided with the off-duty time. Due to the sudden attack of the tornado, five people were killed and four were seriously injured.

  At 20: 30 on September 19th, Funing County, Yancheng City was affected by an EF3 tornado, and an extreme weather disaster occurred. The two towns were seriously affected. Up to now, five people were seriously injured, died after being rescued, and four people were slightly injured.

  Why did these two tornadoes form? According to the news of "Jiangsu Meteorology" on WeChat WeChat official account on September 20th, meteorologists said that due to the influence of Jianghuai cyclone, a large-scale heavy rainfall and windy weather process was ushered in from northwest to southeast in Jiangsu Province from the afternoon of September 19th, which was accompanied by strong tornado and strong convective weather. There was a large-scale heavy precipitation in Yanhuai and Huaibei areas of Jiangsu Province, with the maximum rainfall reaching 236 mm, in Goudun Town, Funing. In addition to precipitation, a wide range of strong convective weather, including thunderstorms and tornadoes, also appeared on September 19th.

  On September 19th, Jiangsu was affected by two tornadoes. The first tornado occurred in Suqian, from 17: 00 to 18: 00 on the 19th, and an EF2 tornado occurred in Suqian Economic and Technological Development Zone and Daxing Town. Another tornado occurred in Funing, Yancheng, from 20: 16 to 35: 00 on the 19th. The influence of a tornado occurred from west to east, and its strength reached the level of strong tornado, which was EF3. On the 19th, the biggest wind force was also detected in Tongying Village, Lupu Town, Funing, Yancheng. At 20: 23, a gust of 41.8 meters per second was detected, and the wind reached level 14, but the biggest wind force in the tornado center may be stronger than this.

  The meteorologist said that usually, in the middle and late September, it is not easy for Jiangsu to have tornadoes, but recently, due to the high temperature and the influence of the Jianghuai cyclone, it has brought relatively strong dynamic conditions. In this context, a rare tornado event occurred in Jiangsu on September 19th.

  According to public information, tornado is the most violent small-scale vortex in the earth’s atmosphere, and its central wind speed can exceed 100 m/s. Because of its suddenness, short duration and fast moving speed, the strong wind on the ground can cause heavy casualties and property losses in a short time, which is extremely destructive. China is a country with serious tornado influence, and the tornado is mainly concentrated in the densely populated and flat areas such as Jianghuai area, the two lakes plain, South China, Northeast China and Southeast China.

  According to the information released by China Weather Network, spring and summer are tornado-prone seasons in China, and the number of tornadoes accounts for 92% of the whole year from April to August, with July accounting for the highest proportion, accounting for about 30%. There are an average of 38 tornadoes in China every year. There were relatively many tornadoes from the mid-1990s to the beginning of this century. There were relatively few tornadoes in the early 1990s and from 2006 to 2020. From a national perspective, there are more tornadoes in Jiangsu, Guangdong, Hubei, Anhui and other provinces. Among them, Jiangsu ranks first with an annual average of 4.8.

  The Paper noted that on July 20, 2022, many places in Jiangsu Province were hit by tornadoes. According to the Jiangsu Provincial Emergency Management Department, as of 11: 00 on July 21st of the same year, 4,031 people were affected, 1 person was killed and 37 people were injured, resulting in a direct economic loss of 68,968,600 yuan. The tornado incident caused widespread concern at that time.

  Why are tornadoes frequent in Jiangsu? According to the news of Weibo @ China Weather Network on July 21st, 2022, Wang Weiyue, a meteorologist of China Weather Network, said that northern Jiangsu is located in the climate transition zone between subtropical zone and warm temperate zone, and it is easy to accumulate unstable energy, which is helpful for the generation of tornadoes. Topographically, the northern part of Jiangsu is low-lying and flat, with rivers and lakes intertwined with water networks, and there is no mountain barrier, which is conducive to the development of the spiral structure of tornadoes. According to Xinhua Daily in July 2022, Liu Anning, chief forecaster of Jiangsu Meteorological Observatory, explained that tornadoes mainly occurred in the eastern plain and the middle and lower reaches of the Yangtze River. Jiangsu is a plain with dense water networks, and the climate of the north and the south meets, and the intersection of cold and warm air currents is easy to cause strong convective weather, including tornadoes. In Jiangsu, one of the high-incidence places of tornadoes is along the coast, and the other is in gaoyou lake.

  Jiangsu 1956— Distribution map of the number of tornadoes every month in 2015. Wechat WeChat official account "Jiangsu Meteorology" map

  Factors such as flat terrain, dense rivers and lakes, and being located in the transition zone between north and south climate lead to easy tornado in Jiangsu. Wechat WeChat official account "Jiangsu Meteorology" map

  According to the news released on September 20th, 2023 by WeChat WeChat official account "Jiangsu Meteorology", from 1956 to 2015, there were 109 tornadoes in Jiangsu, among which the most tornadoes appeared in June, July, August and September, with 16, 35, 36 and 14 respectively, with an average of 1.5 in summer. In addition, Lixiahe area in Jiangsu province, Nantong, Taizhou Yangzhou and northern Suzhou are the high-incidence areas of tornado. The reason why Jiangsu is prone to tornadoes is that the whole province is flat, with dense rivers and lakes, located in the transitional zone between north and south climate, and the cold and warm air currents frequently meet, which is easy to form strong convective weather including tornadoes.

Stolen vehicles wear legal coats. Police trace the mysterious black hand behind the "black car"

  Why has the new car been transferred because it can’t be licensed?

  Not long ago, Mr. Hu of Sichuan bought a car. The first important thing after buying the car was to go to the vehicle management department to go through the formalities for the vehicle. So, Mr. Hu drove his car to the vehicle management office. However, to Mr. Hu’s surprise, the new car he bought through formal channels could not be sold.

  Mr. Hu:He said that your car, including the frame number and engine, has been registered by others. That is, someone has already used this procedure to transfer the ownership.

  The regular new car couldn’t go to the house. Mr. Hu felt that he had been cheated and reported the case to the public security department. In fact, this strange thing like Mr. Hu’s is not the first time.

  Hao Zhengzheng, Deputy Director of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:Jiangsu Yancheng Hyundai Motor Factory and Guangzhou Huadu Nissan Motor Co., Ltd. all have batches of vehicles that have been squeezed into households, but their real customers can’t buy this car.

  Stealing other vehicles, laundering stolen cars.

  At the same time, in January 2016, a very special dispute occurred in Lingang District, Yibin City, Sichuan Province. Xiao Zhang, the clerk of the automobile sales company, judged from many years of work experience that the person who came to sell the car was wrong, and the car he sold might be a stolen car. So Zhou Chun, who came to sell the car, was sent to the local public security bureau.

  The police carefully checked and found that the car sold by Zhou Chun had less obvious changes in engine number and frame number.

  Li Gai, Investigator of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:Professional technicians decoded the identity of this vehicle, and after their technical treatment, we learned that the real identity of this vehicle was a car stolen in Chengdu.

  Zhou Chun confessed that he bought this car from a local automobile trading company whose boss is Liu Hui. The police took immediate action and seized eight cars from Liu Hui’s company. Five of them were stolen cars, and their frame numbers and engine numbers were carefully tampered with.

  It is the first time that the stolen stolen car has turned into a legal car. Because according to common sense analysis, it is almost impossible to put on a legal coat for stolen vehicles.

  Hao Zhengzheng, Deputy Director of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:Its certificate has 36 items of data, including the brand and model of the vehicle, as well as the frame number and engine number, including the color, track distance, wheelbase, displacement and so on. Before selling this car, the manufacturer must report each car to the Ministry of Industry and Information Technology, and the Ministry of Industry and Information Technology (approval) allows it to be sold. It must be reported for registration before it is allowed to produce and sell.

  How to wash the stolen vehicle white and re-license it?

  The police told reporters that it is not easy to wash a stolen car white. First of all, the original data such as the original frame number and engine number of the vehicle should be polished off, and then the relevant data of another vehicle should be found and replaced. This is not the most important thing. The most important thing is to get a full set of data information of another car and print it out before you can get it to the vehicle management department. For example, a thief stole an Audi car, and if he wants to get the stolen car into the house, he has to go through all the formalities for another Audi car of the same model, which has not been sold or even produced. How is that possible? But it did happen again. What was the problem? Where did the criminals get those who cheated the vehicle formalities of the vehicle management department?

  Hao Zhengzheng, Deputy Director of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:We tracked it down and found that Liu from Lanxi bought the license plate from a person named "Chengdu Data King" in Chengdu.

  Liu Hui, the boss of the automobile trading company, confessed that he and this "data king" didn’t know each other, and they usually contacted each other through the Internet. "Data King" is very famous in the black market of automobiles, because he can buy a complete set of data information of vehicles.

  Li Gai, Investigator of Criminal Investigation Brigade of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:If a car is like this Accord, if he resells it once, his own profit should be around 5,000 yuan. You can earn these thousands of dollars in a short time.

  After mastering a large amount of evidence, the task force went to Chengdu and arrested the "data king". In his computer and mobile phone, he found a lot of vehicle data information and chat records of reselling this information.

  Li Gai, Investigator of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:Generally, he will be responsible for making this procedure for you within three days. After making it, he will send a WeChat. Look at this, for example. He will send you the certificate he made for your confirmation, including the invoice and the name you want.

  After the "Data King" was arrested, the case was only the tip of the iceberg. Where did he get the data information of these unlisted and even factory-not-delivered vehicles that he sold around the Internet?

  Hao Zhengzheng, Deputy Director of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:He said he bought it online from a man named Liu in Anshan, Northeast China.

  The police immediately arrested Liu. Liu confessed that in the process of operating used cars, he often touched stolen cars, so he used his brains. He thinks that if this kind of car is washed white and sold, it may have higher profits. Liu Yu told this idea to Zhang, a friend who is also in the car circle. Zhang said that he could get a full set of vehicle procedures and print them out.

  After getting these clues, the police quickly attacked, and soon, the suspect Zhang was also arrested. Judging from the seized crime tools and paper products, the vehicle procedures made by criminals are very realistic, and it is difficult to see the flaws with the naked eye. With it, you can openly go to the vehicle management department to go to the door.

  Liang Zhongyu, deputy captain of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:This set of certificates can’t be recognized only by the vehicle management department, because the data on this certificate are all the data that can be used in the China Machine Network, which the state has not taken out and issued.

  The police tracked down the hacker behind the scenes and was finally arrested.

  The "China Machine Network" mentioned by the police is a third-party intermediary organization jointly funded by China Automotive Technology Research Center and other departments, and it is the technical support organization managed by the Ministry of Industry and Information Technology’s "Announcement of Vehicle Manufacturers and Products". It was the hacker who invaded this institution that stole these secrets. The police said that "the vehicle data has not been taken out", which means that the vehicles with these data have not yet been listed or even produced. In this way, Zhang is not the end of this huge black chain, because the real data information of those vehicles is not available to Zhang’s ability. In other words, there is a black hand behind Zhang.

  The reason why stolen cars can be washed white is because those data and information are true. And can get this information, it turned out that someone hacked into the China Computer Network and stole these secrets.

  Hao Zhengzheng, Deputy Director of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:Zhang explained to us that his source of this data was obtained from a person named Guo in Henan.

  Police online investigation found that Guo lives in Wuzhi County, Jiaozuo City, Henan Province. He is not a professional hacker, but an employee of a local vehicle production company, specializing in the management of vehicle certificates. The task force secretly rushed to Henan to arrest the core figure Guo.

  Guo is responsible for the data management of vehicles in the factory, and has access to the network system of China Machine Network, and can view the data information of vehicles. Later, I learned from Zhang that this information can be exchanged for money, and he was jealous.

  Li Gai, Investigator of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:Zhang asked him to check whatever he wanted, and then sold the data to him. The total is about 200,000 yuan.

  The police found that although Guo could enter the website to inquire about the data information of the vehicle. However, his authority is very low, and he can only inquire about the vehicle information produced by this factory, but not other manufacturers. But the current situation is that Guo can find the data information of almost all famous cars such as Volkswagen, BMW and Honda. How did he do it?

  Li Gai, Investigator of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:Through Taobao, he found a Liu who opened a shop on Taobao and opened an online shop. This person specializes in cracking and copying encryption dogs. Through remote control, control Guo’s office computer, Liu operates in Chengdu, enters the system step by step, reads out the data, and then tampers with it.

  After countless revisions and tests by Liu, Guo’s query authority has been greatly improved, and he can see the data information of almost all vehicles. In this way, it is easy to wash the stolen cars in black and white. Subsequently, the police took action and behind-the-scenes hacker Liu was finally arrested.

  Li Gai, Investigator of Lingang Economic and Technological Development Branch of Yibin Public Security Bureau:Stealing the data of China Computer Network, in fact, China Computer Network doesn’t know? I don’t know Because of this data, it was originally what they put in their room. They thought their doors and windows were all closed, but others dug a passage underground.

  We generally think that the license plate of a car is the identity card of the car, but the license plate of the car may be changed in the process of subsequent transactions. Compared with the license plate, a car’s frame number, engine number and other data and procedures are the identity signs that follow a car for life. If even these can be stolen and forged, it will be even more difficult to manage the car and detect related crimes.

Small QR code scanning is risky

  Small QR code scanning is risky

  Experts believe that supervision should be strengthened to change the disorderly state of making and publishing QR codes as soon as possible.

  

  Meng Qiang

  Zou yang

  Outpatient questions:

  How to prevent the risks brought by scanning QR codes?

  Outpatient specialist:

  Beijing Institute of Technology

  Associate professor Meng Qiang

  Zou Yang, Procurator of Hanjiang District Procuratorate, Yangzhou City, Jiangsu Province

  Expert opinion:

  ◇ The low illegal cost makes the QR code easy to be used by criminals, which seriously threatens the information security of users.

  ◇ Improve the laws and regulations on mobile Internet security, restrict the status quo of "everyone can make, print and publish QR codes", and clearly stipulate the qualification, certification and filing of QR code enterprises to promote the healthy development of the whole industry.

  Salesmen who used to stand on the roadside and on subway platforms and hand out leaflets and coupons are now mostly equipped with upgrades. They held an "advertising bill" in their hands and mobilized pedestrians coming and going: "Scan a code and pay attention!"

  Scan the QR code on the leaflet, pay attention to the merchant WeChat official account, and regularly receive the preferential information pushed by the merchant. This promotion method is called "scanning the code to push" by the insiders. In order to let more people "sweep", "sweep the code and push" generally gives some small gifts. This seems to be a win-win promotion, but there are many security risks.

  Ms. Wang, the owner of the online shop in Jiaxing, Zhejiang Province, used her mobile phone to scan the QR code, but the mobile phone webpage was never displayed. Ms. Wang, who felt that something was wrong, logged into Alipay and Taobao accounts and found that more than 30,000 yuan of funds in the account were transferred away.

  Ms. Xu of Yangzhou City, Jiangsu Province also lost more than 20,000 yuan because she scanned a QR code. Compared with other victims, she is lucky. After the Hanjiang District Procuratorate of Yangzhou City prosecuted this new type of credit card fraud case, all four defendants were convicted, and the money finally returned to Ms. Xu. Recently, the reporter interviewed Meng Qiang, associate professor of Beijing Institute of Technology and secretary general of China Civil Law Research Association, and Zou Yang, deputy section chief of the Public Prosecution Department of Hanjiang District Procuratorate, who undertook the case.

  What is the QR code?

  Reporter:What is a QR code? Do I have to go through approval before publishing?

  Meng Qiang:Two-dimensional code has become a key technology for the development of the Internet of Things because of its large amount of information and convenient use. However, recently, the loss incidents of users’ mobile phones after scanning the two-dimensional code have occurred frequently in various places, which should attract the attention of the regulatory authorities on the management loopholes of the two-dimensional code. Two-dimensional code is a black-and-white figure distributed by a certain geometric figure according to a certain law. Because of its characteristics of large amount of stored information, convenient access to information, simple generation and easy operation, two-dimensional code has been widely used in many fields such as commodity traceability, logistics tracking, identity authentication and so on. With the popularity of mobile smart phones, in daily life, you can add friends, download coupons, pay bills, browse the web, download mobile applications and so on with a "sweep" of your mobile phone. From Baidu’s search for "QR code generator", more than 460,000 search results appeared. It can be seen that the generation of QR codes is very simple and convenient, and any institution or organization can make and publish QR codes at will.

  Reporter:Any institution or organization can make and publish QR codes at will, will it bring risks to public safety?

  Meng Qiang:It is the low illegal cost that makes the QR code easy to be used by criminals, so that bad information such as network virus, pornography and reaction can be released and spread at will, which seriously threatens the information security of users. From the user’s point of view, the two-dimensional code can’t directly identify whether the information it contains is legal or not. Criminals usually generate a two-dimensional code from toxic or plug-in websites, and declare coupons, software or videos to induce users to scan, and the beginning of code scanning represents the beginning of risk. There are two main risks brought by QR codes to users: The first is to obtain personal information in the user’s mobile phone by malicious implantation of Trojan virus, forced download and account registration, resulting in personal information leakage. The second is to maliciously deduct fees by inducing the installation of software, information verification, etc., or even steal the user’s savings card and credit card account by Trojan implantation. Although China has not yet promulgated the personal information protection law, Article 5 of the General Principles of the Civil Law stipulates that the legitimate civil rights and interests of citizens and legal persons are protected by law, and no organization or individual may infringe upon them. Article 2 of the Tort Liability Law also stipulates that anyone who infringes upon civil rights and interests shall bear tort liability. Every citizen’s personal information is his own legitimate rights and interests, which should be protected. If he maliciously obtains other people’s information through QR code, the actor should bear the responsibility for the damage caused. At the same time, such behavior also endangers the social economic management order and may be subject to administrative punishment. Moreover, malicious deduction of fees and theft of accounts infringe on the property rights and interests of users.It may constitute theft, fraud and credit card fraud.

  How do ordinary consumers prevent and control code scanning risks?

  Reporter:Two-dimensional code technology provides a lot of convenience for our lives, but also brings risks and security risks. Before "sweeping", how can users be vigilant and reduce information security risks?

  Meng Qiang:There is no free lunch in the world. Users should first raise their awareness of vigilance and choose a QR code from a safe and reliable channel for reading. For QR codes of unknown origin, especially roadside advertisements, advertisements in elevators, advertising leaflets and QR codes of unknown websites, don’t blindly scan them, and if necessary, detect them in advance. According to the relevant tips of China Consumers Association, some mobile phone security software has cooperated with QR code scanning software or independently launched a QR code scanning tool with security detection function. After consumers scan the QR code, these scanning software will automatically detect whether the QR code contains security threats such as malicious websites, mobile phone Trojan viruses or download links of malicious software. Once a threat is detected, the scanning software will remind consumers to download and install it carefully, so as to prevent consumers’ mobile phones from being infected with malicious software and ensure users’ safety. Good use habits are an important means to reduce the threat of information security. At the same time, if the user scans the QR code and finds that it is an illegal link, he should immediately close the link uninstallation software to block the way for criminals to obtain information. Once the personal information has been leaked or the bank card has been stolen, the user should immediately report to the police and keep relevant evidence for the police to investigate.

  Zou Yang:In the case that Ms. Xu was cheated in Yangzhou, after Ms. Xu scanned the QR code sent by a seller with her mobile phone while shopping in Taobao, the bank card was stolen by more than 24,000 yuan. The investigation by the Hanjiang District Public Security Bureau found that a person named "Ye Jinhua" was suspected of committing a major crime, so he followed the trail and arrested four suspects, including Ye Jinhua. Since August 2013, Ye Jinhua, Ye Jialiang’s on-line Chen Mingchun and Dai Zhihao rented a "two-dimensional code Trojan program" through the Internet, and pre-programmed their own mobile phone numbers into the two-dimensional code Trojan program. Later, Chen Mingchun disguised as a Taobao seller to "build a Chinese dream" to sell electrical appliances. As long as a buyer "takes the bait", he sent the QR code containing the Trojan horse through Taobao Want Want, and fabricated various reasons to convince the buyer that scanning the QR code would be cheaper. The mobile phone number preset by Chen Mingchun and Dai Zhihao in the Trojan virus will automatically intercept the victim’s mobile phone message (mainly intercepting the verification code in the fast payment), and then log in to the victim’s Taobao account. Get the bank card information bound by the victim’s Taobao account by logging in to Taobao account, and bind the victim’s bank card to his own Yifubao account, and then use Xu’s credit card to spend or cash out on the shopping platform through fast payment. It can be seen that cyber crime has broken the limitation of crime space and target groups, with low crime cost, wide range of harm and more confusing and deceptive. With the popularization and application of mobile phones and the Internet, all kinds of people have become the targets of criminal gangs. Objectively, this kind of case has high detection cost and is difficult to recover.At present, a comprehensive and effective prevention and strike mechanism has not been formed. Therefore, it is more important for consumers to strengthen self-prevention.

  Reporter:What warning can we get from this criminal chain with mobile phone number as the breakthrough?

  Zou Yang:After the suspect intercepts the mobile phone number, the password of Taobao account can be found through the mobile phone verification code. Knowing the bank card number of the victim who opened the fast payment function, plus controlling his mobile phone, you can use the received payment random verification code to complete the payment. Therefore, it is suggested that consumers, first, the mobile phone number bundled with Taobao account and the mobile phone number bundled with fast payment should not be commonly used; Second, the above two numbers are not the same number. In this way, if there is a Trojan virus in one mobile phone, the other mobile phone has a line of defense.

  How do regulators plug the security loopholes of QR codes?

  Reporter:In the face of the information security threat brought by QR code, how should the regulatory authorities plug the security loopholes?

  Meng Qiang:As a regulatory authority, in order to plug the security loopholes of QR codes, it is imperative to introduce the standards for the use of QR codes, improve the laws and regulations on mobile Internet security, restrict the status quo that QR codes can be produced, printed and published by everyone, and clearly stipulate the qualifications, certification and filing of QR codes. Only in this way can the healthy development of the whole industry be promoted. Some experts also suggested that a "trusted two-dimensional code platform" should be set up by a regulatory agency or company, and combined with digital signature technology, so that users can know which organization generated this two-dimensional code every time they scan it, and can ensure that it has not been tampered with in the middle, and at the same time, the source of malicious two-dimensional code can be traced. This is also a feasible solution to the risk of QR code. At the same time, the regulatory authorities should also guide QR code enterprises to establish a standardized industry self-discipline mechanism. As early as 2002, internet society of china announced the "China Internet Industry Self-discipline Convention", which advocated the Internet industry practitioners to join the Convention, and required members to "consciously safeguard the legitimate rights and interests of consumers and keep user information secret; Do not use the information provided by users to engage in any activities unrelated to the commitments made to users, and do not use technology or other advantages to infringe on the legitimate rights and interests of consumers or users. " As an important means of personal information protection mechanism, industry self-discipline is of great significance to personal information protection. Gradually establishing such a self-discipline mechanism in the QR code industry is also conducive to guiding the healthy development of the whole industry.

  Reporter:Criminals use fast payment as a "money laundering" platform for fraudulent use of other people’s credit cards. Should this new method attract the attention of regulators?

  Zou Yang:The fast payment services launched by third-party payment platforms such as Eppay and Alipay allow users who do not have online banking to pay transactions by binding credit cards or savings cards as a fast payment method. When binding, as long as you know the cardholder’s bank card number, ID number and mobile phone number, you can complete the payment without bank card password verification. Although it is convenient, it also leaves opportunities for scammers. According to the investigators, from the analysis of handling cases in recent years, there is no problem in monitoring the flow of bank funds in the system, but if criminals transfer huge amounts of funds through third-party payment platforms, or directly buy online games and sell them at a discount, they can successfully "launder money", and some even can’t trace the whereabouts of funds. This kind of crime seriously endangers social and economic security and stability, and needs to attract the attention of regulators.

Shanghai Artificial Intelligence Laboratory invites talents from all over the world to apply for the "Overseas Excellent Youth" project.

01

Project introduction

The National Natural Science Fund for Outstanding Young Scholars (Overseas) is a project implemented by the National Natural Science Fund Committee to further improve the talent funding system of the National Natural Science Fund, give full play to the function of introducing and cultivating talents by the National Natural Science Fund, and attract overseas outstanding young talents to return to China.

The purpose of the project is to attract and encourage outstanding overseas young scholars (including non-Chinese foreign talents) who have made good achievements in natural science and engineering technology to return to China (China), choose their own research directions to carry out innovative research, promote the rapid growth of young scientific and technical talents, cultivate a group of outstanding academic backbones who are expected to enter the forefront of world science and technology, and contribute to the construction of a strong country in science and technology.

02

Application condition

The applicant shall meet the following conditions:

(1) Abide by the laws and regulations of People’s Republic of China (PRC), have good scientific ethics, and consciously practice the spirit of scientists in the new era;

(2)Date of birth is after January 1, 1984 (inclusive);

(3) having a doctorate;

(4) The main research directions are as followsNatural science and engineering technologyWait;

(5)After obtaining the doctorate until April 15, 2024Generally, you should obtain formal teaching or research positions in overseas universities, scientific research institutions and enterprise R&D institutions.And have more than 36 months of continuous work experience.; Those who have obtained a doctoral degree overseas and have outstanding performance may appropriately relax the requirements for working years;

(6) Obtaining scientific research or technical achievements recognized by peer experts, and having the development potential of becoming an academic leader or outstanding talent in this field;

(7)The applicant has not returned to China to work full-time, or returned to China to work after January 1, 2023.. Resign from overseas work or have no job overseas after receiving the notice of funding,Full-time return to China (China) for not less than 3 years..

Restriction requirement

Implement the requirements of the relevant departments of the central government on the overall connection of the national science and technology talent plan. The national science and technology talent plan at the same level can only undertake one project, and cannot be applied in reverse.

03

Support policy

The laboratory actively implements the relevant national support policies and provides competitive treatment for laboratory talents.

State funding

The National Natural Science Foundation of China provides 1 million to 3 million yuan for scientific research, and the funding period is 3 years.

Salary and treatment

Provide competitive salary, the comprehensive annual salary can reach more than 1 million yuan, and excellent talents are discussed one by one.

Talent project

Implement the national research funding support and provide sufficient laboratory research funding.

Financial support

According to the needs of scientific research, provide funds for laboratory scientific research and construction.

team building

It is recommended that the selected candidates apply for the qualification of doctoral supervisor in cooperative universities and recruit doctoral students in conjunction with top universities.

Support the selected candidates to form research teams, and recruit young researchers, postdocs, assistant researchers, research engineers, interns, etc.

Scientific research guarantee

Provide computing power and scientific research conditions comparable to top international research institutions.

Talents live in peace.

Arrange talent transition housing, talent apartments, or provide living subsidies.

Children education

Coordinate the basic education resources of high-quality public schools in Shanghai for talented children in many ways.

Other benefits

Enjoy the green channel for Shanghai overseas high-level talents to settle down, commercial medical insurance, occupational annuity and supplementary housing provident fund. Those who meet certain conditions can enjoy a tax concession for high-end talents in short supply outside Shanghai.

04

Recruitment direction

large-scale model

Large language model, multimodal model, generative model, etc.

AI for Science

AI drives interdisciplinary research in material science, life science, earth science, agricultural science, neuroscience and astronomy.

Frontier exploration

Security alignment, causal reasoning, AI interpretability, decision intelligence, reinforcement learning, knowledge computing, deep learning network, etc.

Computing system

Compiling calculation, training reasoning, storage scheduling, data engineering, etc.

application research

Body intelligence, intelligent photoelectricity, automatic driving, intelligent medical treatment, intelligent sensors, intelligent education, etc.

05

Declaration method

Excellent young talents who meet the application conditions are welcome to send an email application before March 1, 2024. After receiving the declaration intention, the laboratory will recommend relevant teams to communicate according to the applicant’s research direction.

Please send your resume and representative results to the following email address with the subject of [name+research direction].

hr@pjlab.org.cn

And ccwangliwei1@pjlab.org.cn

Tips

For outstanding young talents who are not selected but have entered the interview process and have a considerable level, they can be recommended to apply for various talent projects in Shanghai and provide young researcher positions and competitive treatment.