Usually,the aniline-based late-transition-metal catalysts often require bulky steric substituents on both sides of the ortho-aryl position to achieve efficient suppression of chain transfer in ethylene *** this contri...
详细信息
Usually,the aniline-based late-transition-metal catalysts often require bulky steric substituents on both sides of the ortho-aryl position to achieve efficient suppression of chain transfer in ethylene *** this contribution,we demonstrated thatα-diimine catalysts based on naphthylamine with only one bulky ortho-aryl substituent also demonstrated excellent capabilities to suppress the chain ***,a class ofα-diimine nickel and palladium complexes with only one o-aryl-dibenzhydryl or o-aryl-dibenzosuberyl substituent were synthesized and ***,the as-prepared naphthylamine-based nickel catalysts demonstrated outstanding activities(up to 13.02×106 g·mol–1·h–1)and yielded lightly branched(16-40/1000C)polyethylenes with very high molecular weights(445.8-854.3 kg/mol)in ethylene *** comparison,the corresponding palladium catalysts showed moderate activities(level of 104-105 g·mol–1·h–1),generating moderately branched(47-78/1000C)polyethylenes with moderate molecular weights(21.6-82.0 kg/mol).Moreover,the palladium catalysts could also copolymerize ethylene and methyl acrylate(MA),albeit in low activities(level of 103 g·mol–1·h–1),providing E-MA copolymers with low to moderate molecular weights(1.4-16.3 kg/mol)and a moderate level of incorporation ratio(2.4-7.4 mol%)and branching density(53-84/1000C).As compared with aniline-based nickel and palladium catalysts,the naphthylamine-based catalysts displayed a superior ability to suppress the chain transfer reactions and could give access to(co)polymers with orders of magnitude higher molecular weight in ethylene(co)polymerization.
In this paper, a control system is designed for the precision two-dimensional positioning platform in small desktop scanning electron microscope. The positioning platform is driven by a stepper motor, and the control ...
详细信息
Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies....
详细信息
The discovery of transcription factor binding sites(TFBSs) is important for modeling potential binding mechanisms and subsequent cellular functions. In recent years, there have been many deep learning methods that hav...
详细信息
Internetization has played a massive role in the rapid development and growth of the financial investment industry. Due to the rapid development, there is a demand for more financial knowledge services to help make we...
详细信息
Bio-inspired computer modelling brings solutions fromthe living phenomena or biological systems to engineering *** overcome the obstruction problem of large-scale wind power consumption in Northwest China,this paper c...
详细信息
Bio-inspired computer modelling brings solutions fromthe living phenomena or biological systems to engineering *** overcome the obstruction problem of large-scale wind power consumption in Northwest China,this paper constructs a bio-inspired computer *** is an optimal wind power consumption dispatching model of multi-time scale demand response that takes into account the involved high-energy ***,the principle of wind power obstruction with the involvement of a high-energy load is examined in this *** this step,highenergy load model with different regulation characteristics is ***,considering the multi-time scale characteristics of high-energy load and other demand-side resources response speed,a multi-time scale model of coordination optimization is *** improved bio-inspired model incorporating particle swarm optimization is applied to minimize system operation and wind curtailment costs,as well as to find the most optimal energy configurationwithin the ***,we take an example of regional power grid in Gansu Province for simulation *** demonstrate that the suggested scheduling strategy can significantly enhance the wind power consumption level and minimize the system’s operational cost.
Reversible data hiding is widely utilized for secure communication and copyright protection. Recently, to improve embedding capacity and visual quality of stego-images, some Partial Reversible Data Hiding (PRDH) schem...
详细信息
The Internet of Things (IoT) has improved our lives through various applications such as home automation, smart city monitoring, environmental monitoring, intelligent farming, and a host of others. IoT is increasingly...
详细信息
Concept drift refers to the probability distribution of data generation changes over time in a data stream environment. In recent years, there has been an increasing interest in drift detection models. However, due to...
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector *** embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data *** social network data not only bring benefit for public health,disaster response,commercial promotion,and many other applications,but also give birth to threats that jeopardize each individual’s privacy and ***,most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social *** be specific,attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network *** this paper,we propose a novel link-privacy preserved graph embedding framework using adversarial learning,which can reduce adversary’s prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph *** experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
暂无评论