Adsorption kinetic for oil in the oilfield produced water (OPW) onto modified porous ceramics filtration media (MPCFM) in fixed bed column was studied. Porous filtration media was modified with containing hydrogen sil...
详细信息
Transformation-competent artificial chromosome system is able to clone and transfer genes efficiently in *** order to clone genes highly tolerant to barley yellow dwarf virus(BYDV),Aphids,drought and salt from Leymus ...
详细信息
Transformation-competent artificial chromosome system is able to clone and transfer genes efficiently in *** order to clone genes highly tolerant to barley yellow dwarf virus(BYDV),Aphids,drought and salt from Leymus multicaulis,the two TAC genomic libraries I and II were constructed in vector pYLTAC17 and pYLTAC747H/sacB,which contain about 165000 and 236000 recombinant clones *** genome coverage of the two libraries was totally estimated to be about 3―5 haploid genome equivalents,as size selection of genomic DNA fragments was approximately from 9 to 300 *** of the genomic libraries were collected as bulked pools each containing 500 clones or so,stored in twelve 96-deep-well plates and then were gridding in triplicate onto a high-density colony hybridization filter with a 3×3 pattern using a GeneTAC?G3 arraying robot after being transferred manually into three 384-well *** 2501 and 2890 clones of Library in pYLTAC17 and in pYLTAC747H/sacB were stored individually in fourteen 384-well plates and then were automatically gridding in duplicate onto a high-density colony hybridization filter with a 6×6 pattern after a replication of *** positive clones were detected by using the probe glutahione reductase gene of *** libraries constructed here can be used to isolate genomic clones containing target genes,and to carry out genome walking for positional *** the target TAC clones were isolated,they could be immediately transferred into plant genomes with the Agrobacterium system.
In recent years, a lot of research is focused on wireless sensor network applications, which is focused on field of performance, security, and energy. This paper addressed the difficulties and challenges facing the wi...
详细信息
ISBN:
(纸本)9789639799189
In recent years, a lot of research is focused on wireless sensor network applications, which is focused on field of performance, security, and energy. This paper addressed the difficulties and challenges facing the wireless sensor networks on the battlefield. Which is often vulnerable to attacker's networks either in the data or corrupting control devices and attempt to consume a lot of energy by sending a large quantity of useless packets, which contributes to excessive consumption of energy and leads to exit nodes from work. Since technology has become widespread on battlefields at the present time, then the sensor nodes are vulnerable to attackers from both sides. This research discussed many challenges and gave appropriate solutions. The simulations showed that these solutions can help secure data and saved 40% of energy consumed.
The advent of Identity based encryption has enabled a wide range of new cryptographic solutions for wireless sensor network. In this paper, a scheme named KDBSP is given to distribute symmetry key in wireless sensor n...
详细信息
The advent of Identity based encryption has enabled a wide range of new cryptographic solutions for wireless sensor network. In this paper, a scheme named KDBSP is given to distribute symmetry key in wireless sensor network KDBSP comes from Smart protocol based on pairing. After some analyzing, KDBSP has some advantage on storage, computation and communication by comparing with the other scheme for establishing share key in wireless sensor network.
Embedding watermark based on the attacks' characteristic was brought up, and it brought forward the region division algorithm and the double steps embedding method, put forward the characteristic and its represent...
详细信息
The producers and customers have difficulties in organizing, finding, retrieving and accessing 'right' media info, reasons for this problem stem from a lack of interoperability and semantic metadata share betw...
详细信息
A new AC-DC-AC matrix converter topology based on Sepic is proposed. The basic configuration of the new topology and its fundamental principle are firstly introduced, the analytic expression on the function of voltage...
详细信息
A new AC-DC-AC matrix converter topology based on Sepic is proposed. The basic configuration of the new topology and its fundamental principle are firstly introduced, the analytic expression on the function of voltage transfer ratio and duty cycle is analyzed, and the rationale of double-loop control strategy is clarified. Finally the validity and feasibility of the new topology are tested by means of computer simulation and prototype experiment. The results indicate that the regulation of the voltage transfer ratio and output frequency can be realized by the new converter, furthermore the system can be started well and the harmonic distortion of waveform is lower. So the inherent drawback of low voltage transfer ratio of traditional matrix converter is effectively settled. This study may provide inspiration for further engineering application.
The stability of an ideal intense relativistic sheet electron beam (IRSEB) propagating in planar periodic magnetic field structures has been investigated, and the conditions of the stability have been derived. The dis...
详细信息
Internet gives small and medium-sized enterprises and individuals an easy way to set up web sites to provide Web services throughout the world. But good Web services vendors are always intermingled with bad ones. When...
详细信息
Internet gives small and medium-sized enterprises and individuals an easy way to set up web sites to provide Web services throughout the world. But good Web services vendors are always intermingled with bad ones. When we seek an unknown Web service provider in an unfamiliar field, we must quantify trust before transaction and select the best vendor to assure that everything works as we expected. In this paper, we suggest an evaluation model of trust. We extract five maiden trust metrics from the vendors' web sites and use a determinant matrix to appraise the trust. Finally, we show how to filter the best vendor by using fuzzy logic.
By incorporating modified genetic algorithm with the neural network, a novel hybrid genetic neural network method for predicting chaotic time series based on the theory of phase-space reconstruction was presented. The...
详细信息
By incorporating modified genetic algorithm with the neural network, a novel hybrid genetic neural network method for predicting chaotic time series based on the theory of phase-space reconstruction was presented. The chaotic time series was reconstructed by using multiple correlation and Cao's methods, and the modified genetic algorithm was used to optimize the structure, the initial weights and thresholds of neural network, then neural network was trained to search for the optimal solution. The availability of this algorithm was proved by predicting chaotic time series, and the precision of this algorithm compared with those of BP and RBF algorithms. The computer simulations have shown that the nonlinear fitting and precision of this algorithm are better than those of BP and RBF algorithms.
暂无评论