首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
An electrochemical sensor incorporating a signal enhancement for the determination of lead (II) ions (Pb2+) was designed on the basis of the thrombin-binding aptamer (TBA) as a molecular recog- nition ...  相似文献   

2.
Introduction  Sincethecorrosionofoiltubesinbrinesolutionscontainingcarbondioxide (CO2 )andhydrogensulfide(H2 S)gasesisasevereprobleminengineering ,itisveryurgenttobuildapredictivemodelofthecorrosionrate(rcorr)foroiltubesinCO2 /H2 Scoexistentenvironment …  相似文献   

3.
In recent years, reading comprehension is taking up a larger and larger part in almost every international test or domestic examination. Knowing the basic knowledge and grasping the test - taking tactics are key factors of good reading comprehension. In this thesis, I will dwell on nine commonly used tactics for reading comprehension. This will help you to deal with the problems with reading comprehension efficiently.  相似文献   

4.
Channel state information of OFDM-STC system is required for maximum likelihood decoding.A subspace-based semi-blind method was proposed for estimating the channels of OFDM-STC systems.The channels are first estimated blindly up to an ambiguity parameter utilizing the nature structure of STC,irrespective of the underlying signal constellations.Furthermore,a method was proposed to resolve the ambiguity by using a few pilot symbols.The simulation results show the proposed semi-blind estimator can achieve higher spectral efficiency and provide improved estimation performance compared to the non-blind estimator.  相似文献   

5.
Introduction In the process of part or product design, re-verse engineering is a method for constructing aCAD model from the physical part that already ex-ists[1-4]. The whole process starts from digitizingthe part, i.e., the measuring of coordinates of t…  相似文献   

6.
IntroductionResearches on autonomous decentralized system(ADS)[14]have been carried on for decades.Withthe typical features such as online property,ADShave found many applications in autonomous transpor-tation operation system(ATOS)[58].ATOS,has theabilit…  相似文献   

7.
Fuzzy Model for Trust Evaluation   总被引:4,自引:0,他引:4  
Introduction Inthenetworkworld,trustmodelisthebasisof networkinformationsecurity.Amongtheexisting securitytechnologies,securityprotocolsornetwork securitymodelsandpoliciesareallcorrelatedimplicit lywithtrust.Theymayassumeacertainpremiseof trustinadvance,o…  相似文献   

8.
Ontology is the conceptual backbone that provides meaning to data on the semantic web. However, ontology is not a static resource and may evolve over time, which often leaves the meaning of data in an undefined or inconsistent state. It is thus very important to have a method to preserve the data and its meaning when ontology changes. This paper proposed a general method that solves the problem using data migration. It analyzed some of the issues in the method including separation of ontology and data, migration specification, migration result and migration algorithm. The paper also instantiates the general mothod in RDF(S) as an example. The RDF(S) example itself is a simple but complete method for migrating RDF data when RDFS ontology changes.  相似文献   

9.
In the two-step vitamin C fermentation process, its precursor 2-keto-L-gulonic acid was synthesized from L-sorbose by mixed culture of Gluconobacter oxydans and Bacillus megaterium. The interaction between Gluconobacter oxydans and Bacillus megaterium remains unclear and it is a challenge to mathematically model the mixed growth of these two strains. The Monod-type equations were previously proposed to describe the coupled growth of Gluconobacter oxydans and Bacillus megaterium. However, in this study, we modeled the interaction of these two strains in a macroscopic view by introducing the population theory. Taking account of the fact that the density or concentration of Gluconobacter oxydans or Bacillus megaterium was hardly to measure accurately in the mixed culture broth, the data of concentrations of the substrate and product were used to indirectly investigate the relation between these two strains. Three batch experiments were used to validate our model. And according to the values of identified parameters, the type of interaction between Gluconobacter oxydans and Bacillus megaterium was concluded to be predation, where Gluconobacter oxydans was predator, and Bacillus megaterium was prey.  相似文献   

10.
介绍了一种新的实现Web交互式页面,即用IBM VisualAge for Java为开发平台,利用它的可视化编程特征,快速地开发Java Applet(Java小应用程序)。同时,以IBM UDB DB2 V5.0作为数据库服务器,通过它的DB2 JDBC驱动器可使应用程序与数据库进行数据交换。在浏览器中运行嵌入了这种Applet的HTML程序,可以直接访问数据库,从而在Web页面下实现交互式面  相似文献   

11.
GeneticsofOtitisMedia (OM ) :OMisaffectedbymultiplefactorsincludingeustachiantube (ET )structureandfunction ,immunestatus ,innatemucosaldefense ,geneticsusceptibility ,andpathogens .Infec tiousdiseasecanbeviewedasabattlebetweenhostsandpathogens,inwhichthecommandsareencodedinthegenomesoftherespectiveorganismsandarethenexecutedbygeneproductsincludingcomponentsoftheimmuneresponseofthehostanddrug resistancemech anismsofbacteria .Whilecliniciansmaynotgetusedtothinkingofgeneticsasafactorinthedeve…  相似文献   

12.
A new method for multi-protocol label switching is presented in this study, whose core idea is to construct model for simulating process of accommodating network online loads and then adopt genetic algorithm to optimize the model. Due to the heuristic property of evolutional method, the new method is efficient and effective, which is verified by the experiments.  相似文献   

13.
Introduction Withthetendencyoflightnessandflexibilityin thedesignoflarge spanbridges,moreandmore cable stayedbridgeshavebeenconstructedallover theworld.TheRunyangYangtseRiverBridge,whichhasjustcomeintoserviceandlinksthetwocit iesofZhenjiangandYangzhouinChina,isasuper hugecable supportedbridgecomposedofasuspen sionbridgeandacable stayedbridge.Thecable stayedbridgeonthenorthbranch,withamainspanof40600cmandtwosidespansof17540cmonboth sides,consistsoftwovase shapedconcretetowers,double planefan…  相似文献   

14.
IntroductionThe uncertainty in venture capital market and in-formation asymmetry during venture capital investingprocess make syndication in the second and later sta-ges a hot issue.The syndication is important for re-ducing the risk effectively,increasin…  相似文献   

15.
Introduction The essence of multidisciplinary design pro-cess is how to coordinate all the constraints dis-tributed in various disciplines to maintain the con-sistency between product specifications and designvariables. The functions of coordination are to findpotential conflicts, and to provide valid solutions.Young et al[1,2]studied constraint network formodeling and developed several applicable con-straint systems[3-5]. Kannapan et al[6]introduced adesign diagram to represent parametric des…  相似文献   

16.
17.
Grey-Markov Model for Road Accidents Forecasting   总被引:1,自引:0,他引:1  
IntroductionRoadaccidentsforecastingishelpfulforustofindoutthelawofroadaccidents ,andtoanalyzethetendencyofroadaccidentsunderexistingroadtrafficconditionsandtocontroltrafficsafety .Itisthebasisoftheevaluation ,planninganddecision makingofroadtrafficsafety…  相似文献   

18.
Introduction Job shopschedulingproblem(JSP)isoneofthe well knownhardestcombinatorialoptimizationprob lems,andmanysolutionsbasedongeneticalgorithms(GAs)havebeenproposedbymanyresearchersso far[13].SincethedemonstrationofapplicationofGA toschedulingproblemsb…  相似文献   

19.
Introduction Structural evaluation of pavements provides awealth of information that concerns the expected be-havior of pavements[1]. Different asphalt pavementdesign and evaluation methods are described inRefs.[2-9]. Refs.[2-5,9,10] use two design meth-o…  相似文献   

20.
Fragile watermarking is a method to verify the integrity and authenticity of multimedia data. A new fragile watermark for image was proposed, which can be used in image verification applications. The paper first described the above two techniques, some of which will be used in the method. Then it described the embedding and authentication process and also analyzed the method to show how it can survive some attacks. The experimental results show that the proposed method doesn‘t need the watermark or original image on authentication side. It provides more security against attack, and can localize where the temoerinlz has occurred.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号