期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
昆虫多样性三十年研究进展 被引量:24
1
作者 王明强 罗阿蓉 +30 位作者 周青松 陈婧婷 谢婷婷 李逸 DouglasChesters 石晓宇 肖晖 刘桓吉 丁强 周璇 罗一平 路园园 佟一杰 赵政宇 白明 郭鹏飞 陈思翀 中村彰宏 彭艳琼 赵延会 魏淑花 林晓龙 陈华燕 罗世孝 陆宴辉 鲁亮 余建平 周欣 邹怡 路浩 朱朝东 《生物多样性》 CAS CSCD 北大核心 2022年第10期117-145,共29页
当前,全球昆虫数量和多样性均处于下降趋势,而导致这一趋势的原因主要包括人为干扰及气候变化。本文基于森林、草地、农业、水生和土壤生态系统,以植食性、访花、捕食性、寄生性、食果以及食腐昆虫为重点功能昆虫群,综述了近三十年来国... 当前,全球昆虫数量和多样性均处于下降趋势,而导致这一趋势的原因主要包括人为干扰及气候变化。本文基于森林、草地、农业、水生和土壤生态系统,以植食性、访花、捕食性、寄生性、食果以及食腐昆虫为重点功能昆虫群,综述了近三十年来国内外昆虫多样性研究领域的主要进展,并分析了发展趋势。近年来,昆虫多样性的研究维度不断拓展,形态多样性研究不断深入,系统发生多样性、功能多样性和遗传多样性等研究也显著加强。此外,昆虫多样性研究的空间尺度也逐步扩大,大尺度区域性研究甚至全球范围的调查持续增长。昆虫进化历史也被引入多样性格局研究中,并随着系统发生信息学方法的普及而被整合到生态系统建成和生物多样性形成机制研究中。未来需要加强关键昆虫类群整合分类学研究、功能性状多样性、林冠昆虫多样性、互作网络结构等方向的研究。 展开更多
关键词 功能昆虫群 多维度多样性 生态系统 昆虫多样性丧失
原文传递
中国亚热带森林筑巢独栖蜂类群及其寄生者多样性 被引量:2
2
作者 郭士琨 王明强 +6 位作者 郭鹏飞 陈婧婷 牛泽清 罗阿蓉 杨娟娟 周青松 朱朝东 《生物多样性》 CAS CSCD 北大核心 2023年第2期109-125,共17页
筑巢独栖蜂包括捕食者和传粉者,在生态系统中具有重要的生态功能。巢管法用于研究筑巢蜂的生物学、生活史、多样性和生态学特性,但此前较少用于研究亚热带森林中的独栖蜂。经过在生物多样性-生态系统功能实验(BEF-China)新岗山样地5年... 筑巢独栖蜂包括捕食者和传粉者,在生态系统中具有重要的生态功能。巢管法用于研究筑巢蜂的生物学、生活史、多样性和生态学特性,但此前较少用于研究亚热带森林中的独栖蜂。经过在生物多样性-生态系统功能实验(BEF-China)新岗山样地5年的长期定点监测和实验样本积累,我们发现了独栖蜂的主要类群和发生规律。巢管法共获得128个物种,隶属于3目25科。其中传粉者占全部独栖蜂的26.6%,共2科12种,主要为分舌蜂和切叶蜂;捕食者约占全部独栖蜂的73.4%,有4科44种,以蜾蠃、蛛蜂、泥蜂和方头泥蜂为主;独栖蜂寄生者有19科72种,主要类群是麻蝇、蜂虻、青蜂、钩腹蜂和姬小蜂。独栖蜂物种组成中传粉者多样性显著低于捕食者。同时独栖蜂中普遍存在着雌雄羽化异律现象,即雄性先羽化,并在越冬个体中更明显。切叶蜂科和方头泥蜂科的发生时间比蜾蠃亚科和蛛蜂科的发生时间更集中。此外,通过构建独栖蜂及其寄生者的互作网络,我们发现寄生者多度和多样性受较低营养级寄主的上行控制效应调节。上述结果揭示了对中国亚热带森林地区独栖蜂及其寄生者多样性,有利于更好地保护野生独栖蜂资源,发挥其生态服务功能。 展开更多
关键词 BEF-China 生物多样性 独栖蜂 寄生者 生物学特性
原文传递
A supplemental description of the genus Lista Walker from China(Lepidoptera: Pyralidae), with two new and a newly record species 被引量:2
3
作者 mingqiang wang Fuqiang Chen +1 位作者 Chaodong Zhu Chunsheng Wu 《Zoological Systematics》 CSCD 2019年第1期84-88,共5页
Three species of the genus Lista Walker are recognized from China, as a supplement of the former work. Among them, two species are described as new to science, namely L. furcillatusa Wang, Chen & Wu sp. nov. and L... Three species of the genus Lista Walker are recognized from China, as a supplement of the former work. Among them, two species are described as new to science, namely L. furcillatusa Wang, Chen & Wu sp. nov. and L. menglaensis Wang, Chen & Wu sp. nov. One species, L. monticola Yamanaka, 2000, is reported from China for the first time. Adults and genitalia of the three species are illustrated. Moreover, a key to the Chinese species and an updated checklist of the genus are provided. 展开更多
关键词 PYRALOIDEA Epipaschiinae snout MOTH taxonomy China
原文传递
Generation expansion planning considering efficient linear EENS formulation 被引量:2
4
作者 Donglei Sun Zhijie Zheng +3 位作者 Shuai Liu mingqiang wang Yi Sun Dong Liu 《Global Energy Interconnection》 EI CAS CSCD 2021年第3期273-284,共12页
Power system equipment outages are one of the most important factors affecting the reliability and economy of power systems.It is crucial to consider the reliability of the planning problems.In this paper,a generation... Power system equipment outages are one of the most important factors affecting the reliability and economy of power systems.It is crucial to consider the reliability of the planning problems.In this paper,a generation expansion planning(GEP)model is proposed,in which the candidate generating units and energy storage systems(ESSs)are simultaneously planned by minimizing the cost incurred on investment,operation,reserve,and reliability.The reliability cost is computed by multiplying the value of lost load(VOLL)with the expected energy not supplied(EENS),and this model makes a compromise between economy and reliability.Because the computation of EENS makes the major computation impediment of the entire model,a new efficient linear EENS formulation is proposed and applied in a multi-step GEP model.By doing so,the computation efficiency is significantly improved,and the solution accuracy is still desirable.The proposed GEP model is illustrated using the IEEE-RTS system to validate the effectiveness and superiority of the new model. 展开更多
关键词 Expected energy not supplied Generation expansion planning Linearization methods
在线阅读 下载PDF
Robust transmission expansion planning model considering multiple uncertainties and active load 被引量:1
5
作者 Wensheng Li Long Zhao +5 位作者 Yin Bo Weilun wang mingqiang wang Shuai Liu Rui Liu Xian wang 《Global Energy Interconnection》 EI CAS CSCD 2021年第5期476-484,共9页
Uncertainty must be well addressed in transmission expansion planning(TEP)problem,and it significantly affects the reliability and cost-effectiveness of power systems.Owing to the complex operating environment of powe... Uncertainty must be well addressed in transmission expansion planning(TEP)problem,and it significantly affects the reliability and cost-effectiveness of power systems.Owing to the complex operating environment of power systems,it is crucial to consider different types of uncertainties during the planning stage.In this paper,a robust TEP model is proposed by considering multiple uncertainties and active load.Specifically,in this model,the uncertainties of wind power output and contingency probability are considered simultaneously.The uncertainties are described by scenario and interval,and the Benders decomposition technique is applied to solve the model.The feasibility and effectiveness of the proposed model are illustrated using the IEEE RTS and IEEE 118-node systems. 展开更多
关键词 Benders decomposition Transmission expansion planning Robust optimization UNCERTAINTY
在线阅读 下载PDF
Three new species and a new combination of Stericta Lederer from China(Lepidoptera:Pyralidae:Epipaschiinae) 被引量:1
6
作者 mingqiang wang Fuqiang Chen Chunsheng Wu 《Zoological Systematics》 CSCD 2018年第2期190-195,共6页
Three species of the genus Stericta are described as new to science, S. melasiversusa sp. nov., S. penicilasa sp. nov. and S. hampsoni sp. nov. And a new combination, Stericta melanobasis(Hampson, 1906) comb. nov., ... Three species of the genus Stericta are described as new to science, S. melasiversusa sp. nov., S. penicilasa sp. nov. and S. hampsoni sp. nov. And a new combination, Stericta melanobasis(Hampson, 1906) comb. nov., was transferred from the genus Lepidogma. All adults and their genital structures are illustrated. The differences between the genus Stericta and it allied genera are discussed. 展开更多
关键词 Pyraloidea Lepidogma Jocara Titanoceros China
原文传递
Facile Preparation of TiO_2 Nanoclusters on Graphene Templates for Photodegradation of Organic Compounds
7
作者 Zaixing Jiang mingqiang wang +7 位作者 Hao Cheng Jun Li Aslan Husnu Haibao Lv Yongtao Yao Lu Shao Yudong Huang Mingdong Dong 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2015年第8期840-844,共5页
Graphene is the most attractive carbon-based material at present and attracting increasing attention as promising candidates for applications in numerous areas, because of its extraordinary chemical, thermal and mecha... Graphene is the most attractive carbon-based material at present and attracting increasing attention as promising candidates for applications in numerous areas, because of its extraordinary chemical, thermal and mechanical properties. In this paper, we discussed an innovative and simple method to synthesize titanium dioxide (TiO2) nanoclusters, using graphene as a mid-step template not as a component of final product. Using this method, the graphene was firstly fully coated with TiO2 nanoparticles by the thermal decomposition of titanium (IV) isopropoxide in a supercritical carbon dioxide (SC-CO2) at 200 ℃; the developed TiO2/graphene composites then were heated in an oxygen atmosphere. Eventually the TiO2 nanoclusters were obtained. The prepared TiO2 nanoclusters showed irregular features with high surface coverage, providing promises in a wide range of applications, especially for photo-degradation of organic compounds in aqueous solution under the radiation of UV-light. 展开更多
关键词 Titanium dioxide GRAPHENE Supercritical CO2 NANOCLUSTER
原文传递
Checklist of Epipaschiinae in China(Lepidoptera:Pyralidae)
8
作者 mingqiang wang Fuqiang Chen +1 位作者 Chaodong Zhu Chunsheng Wu 《Zoological Systematics》 CSCD 2021年第4期328-341,共14页
Epipaschiinae,a subfamily of Pyralidae,has characteristic features distinct from other groups of Pyralidae,such as the thick scales and labial palpi usually upturned.This subfamily is a relative smaller group in Pyral... Epipaschiinae,a subfamily of Pyralidae,has characteristic features distinct from other groups of Pyralidae,such as the thick scales and labial palpi usually upturned.This subfamily is a relative smaller group in Pyralidae,and currently reports over 700 species worldwide(Solis,1992,1994;Nuss et al.,2021).Solis(1992)listed 287 known epipaschiine species all over the world,including 273 species from Old World.In China,the first checklist of Epipaschiinae was systematically summarized by Lu and Guan(1953),including 8 genera and 53 species. 展开更多
关键词 SPECIES LISTED summarized
原文传递
Cryptic diversity begets challenges and opportunities in biodiversity research
9
作者 Rui CHENG Arong LUO +17 位作者 Michael ORR Deyan GE Zhong’e HOU Yanhua QU Baocheng GUO Feng ZHANG Zhongli SHA Zhe ZHAO mingqiang wang Xiaoyu SHI Hongxiang HAN Qingsong ZHOU Yuanning LI Xingyue LIU Chen SHAO Aibing ZHANG Xin ZHOU Chaodong ZHU 《Integrative Zoology》 2025年第1期33-49,共17页
How many species of life are there on Earth?This is a question that we want to know but cannot yet answer.Some scholars speculate that the number of species may reach 2.2 billion when considering cryptic diversity and... How many species of life are there on Earth?This is a question that we want to know but cannot yet answer.Some scholars speculate that the number of species may reach 2.2 billion when considering cryptic diversity and that each morphology-based insect species may contain an average of 3.1 cryptic species.With nearly two million described species,such high estimates of cryptic diversity would suggest that cryptic species are widespread.The development of molecular species delimitation has led to the discovery of a large number of cryptic species,and cryptic biodiversity has gradually entered ourfield of vision and attracted more attention.This paper introduces the concept of cryptic species,how they evolve,and methods by which they may be discovered and confirmed,and provides theoretical and methodological guidance for the study of hidden species.A workflow of how to confirm cryptic species is provided.In addition,the importance and reliability of multi-evidence-based integrated taxonomy are reaffirmed as a way to better standardize decision-making processes.Special focus on cryptic diversity and increased funding for taxonomy is needed to ensure that cryptic species in hyperdiverse groups are discoverable and described.An increased focus on cryptic species in the future will naturally arise as more difficult groups are studied,and thereby,we mayfinally better understand the rules governing the evolution and maintenance of cryptic biodiversity. 展开更多
关键词 DNA barcoding GENOME integrative taxonomy MORPHOLOGY workflow
原文传递
Frequency aware robust economic dispatch 被引量:4
10
作者 Donglei SUN Xueshan HAN +2 位作者 Bo ZHANG mingqiang wang Tianyu DING 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2016年第2期200-210,共11页
This paper proposes a novel frequency aware robust economic dispatch (FARED) approach to exploit the synergistic capability of accommodating uncertain loads and renewable generation by accounting for both the frequenc... This paper proposes a novel frequency aware robust economic dispatch (FARED) approach to exploit the synergistic capability of accommodating uncertain loads and renewable generation by accounting for both the frequency regulation effect and optimal participation mechanism of secondary regulation reserves for conventional units in response to uncertainties in the robust optimization counterpart of security constrained economic dispatch.The FARED is formulated as a robust optimization problem.In this formulation the allowable frequency deviation and the possible load or renewable generation curtailments are expressed in terms of variable uncertainty sets.The variables in the formulation are described as interval variables and treated in affine form.In order to improve the computational tractability,the dominant constraints which canbe the candidates of tight transmission constraints are determined by complementarity constraints.Then the robust optimization problem is simplified to a bilinear programming problem based on duality theory.Finally,the effectiveness and efficiency of the proposed method are illustrated based on several study cases. 展开更多
关键词 Economic dispatch Frequency regulation effect Interval uncertainty Robust optimization Affine policy Complementarity constraints
原文传递
Construction of three-dimensional carbon framework-loaded silicon nanoparticles anchored by carbon film for highperformance lithium-ion battery anode materials 被引量:3
11
作者 Fan Wu Zhichao He +2 位作者 mingqiang wang Yudong Huang Fei wang 《Nano Research》 SCIE EI CSCD 2022年第7期6168-6175,共8页
Si materials are widely considered to be the next-generation anode to replace the current commercial graphite-based anode due to its high energy density.However,the large volume variation of silicon during(de)lithiati... Si materials are widely considered to be the next-generation anode to replace the current commercial graphite-based anode due to its high energy density.However,the large volume variation of silicon during(de)lithiation process leads to rapid capacity decay,hindering its commercial application.Although the various hollow structure designs of Si nanomaterials have improved their cycling stability in the laboratory,the high-pressure calendering process in the current industrial electrode preparation process might collapse the hollow structure and weaken the structural advantages of hollow silicon anode materials.In this work,a silicon carbon composite material(Si@3DC)in which Si nanoparticles were anchored on a three-dimensional carbon framework through carbon films was prepared by a simple proton exchange method.The three-dimensional carbon framework with multiple hierarchical pores of Si@3DC was compatible with the high-pressure calendering process,but also could provide expansion space for Si nanoparticles during the lithiation process,and ensure good electronic and ionic conductivity.The carbon film on the surface of Si nanoparticles promoted the formation of stable solid electrolyte interphase(SEI)films,ensuring the good cycle stability of Si@3DC. 展开更多
关键词 three-dimensional carbon framework silicon silicon-carbon anode lithium-ion battery
原文传递
Integrated generation–consumption dispatch based on compensation mechanism considering demand response behavior 被引量:5
12
作者 Yumin ZHANG Xueshan HAN +3 位作者 Li ZHANG Bo XU mingqiang wang Ming YANG 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2018年第5期1025-1041,共17页
Demand response(DR) is important to account for behaviors of the demand side to yield an optimal dispatch result. However, it is difficult for energy suppliers to collect customers' private information unless ther... Demand response(DR) is important to account for behaviors of the demand side to yield an optimal dispatch result. However, it is difficult for energy suppliers to collect customers' private information unless there is an incentive mechanism for customers to do so. Therefore,this paper proposes a new integrated generation–consumption dispatch based on compensation mechanism considering DR behavior. Firstly, in light of the dayahead load forecast data, we deduce the utility function model of different customers. By subtracting generating units' operation cost from consumers' total utility, the dispatch model has a decentralized demand participant structure based on this utility function. The utility function is used to describe consumers' preferences and energy consumption behaviors. Secondly, an effective compensation mechanism is designed to ensure customers to select the level of compensation appropriate to their willingness to curtail load. Finally, a new dispatch model is proposed that incorporates the DR compensation mechanism into the generation–consumption dispatch model. The new model can improve the interaction of generation and consumption,and benefit both the energy supplier and its customers. The proposed model is piecewise linearized and solved by a mixed-integer linear programming method. It is tested on a six-bus system and the IEEE 118-bus system. Simulation results show that the proposed model can realize both maximum social welfare and Pareto optimal results. 展开更多
关键词 Compensation mechanism DEMAND response DEMAND UTILITY function INTEGRATED generation– CONSUMPTION DISPATCH
原文传递
ABDKS:attribute-based encryption with dynamic keyword search in fog computing 被引量:2
13
作者 Fei MENG Leixiao CHENG mingqiang wang 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第5期187-195,共9页
Attribute-based encryption with keyword search(ABKS)achieves both fine-grained access control and keyword search.However,in the previous ABKS schemes,the search algorithm requires that each keyword to be identical bet... Attribute-based encryption with keyword search(ABKS)achieves both fine-grained access control and keyword search.However,in the previous ABKS schemes,the search algorithm requires that each keyword to be identical between the target keyword set and the ciphertext keyword set,otherwise the algorithm does not output any search result,which is not conducive to use.Moreover,the previous ABKS schemes are vulnerable to what we call a peer-decryption attack,that is,the ciphertext may be eavesdropped and decrypted by an adversary who has sufficient authorities but no information about the ciphertext keywords.In this paper,we provide a new system in fog computing,the ciphertext-policy attribute-based encryption with dynamic keyword search(ABDKS).In ABDKS,the search algorithm requires only one keyword to be identical between the two keyword sets and outputs the corresponding correlation which reflects the number of the same keywords in those two sets.In addition,our ABDKS is resistant to peer-decryption attack,since the decryption requires not only sufficient authority but also at least one keyword of the ciphertext.Beyond that,the ABDKS shifts most computational overheads from resource constrained users to fog nodes.The security analysis shows that the ABDKS can resist Chosen-Plaintext Attack(CPA)and Chosen-Keyword Attack(CKA). 展开更多
关键词 access control attribute-based encryption keyword search fog computing OUTSOURCING
原文传递
Distributionally Robust Transmission Expansion Planning Considering Uncertainty of Contingency Probability 被引量:2
14
作者 Weilun wang mingqiang wang +3 位作者 Xueshan Han Ming Yang Qiuwei Wu Ran Li 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第4期894-901,共8页
The outage of power system equipment is one of the most important factors that affect the reliability and economy of power system.It is crucial to consider the influence of contingencies elaborately in planning proble... The outage of power system equipment is one of the most important factors that affect the reliability and economy of power system.It is crucial to consider the influence of contingencies elaborately in planning problem.In this paper,a distributionally robust transmission expansion planning model is proposed in which the uncertainty of contingency probability is considered.The uncertainty of contingency probability is described by uncertainty interval based on the outage rate of single equipment.An epigraph reformulation and Benders decomposition are applied to solve the proposed model.Finally,the feasibility and effectiveness of the proposed model are illustrated on the IEEE RTS system and the IEEE 118-bus system. 展开更多
关键词 Benders decomposition distributionally robust equipment outage rate transmission expansion planning
原文传递
A Hybrid of Theorems of Goldbach and Piatetski-Shapiro 被引量:1
15
作者 Xianmeng MENG mingqiang wang 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 2006年第3期341-352,共12页
It is proved that for almost all sufficiently large even integers n,the prime variable equation n=p1+p2,p1∈Pγis solvable,with 13/15〈γ≤1,where Pγ={p|p=[m^1/γ],for integer m and prime p}is the set of the Piatetsk... It is proved that for almost all sufficiently large even integers n,the prime variable equation n=p1+p2,p1∈Pγis solvable,with 13/15〈γ≤1,where Pγ={p|p=[m^1/γ],for integer m and prime p}is the set of the Piatetski-Shapiro primes. 展开更多
关键词 Circle method Sieve method Goldbach problem
原文传递
Data-driven Anomaly Detection Method Based on Similarities of Multiple Wind Turbines
16
作者 Xiangjun Zeng Ming Yang +2 位作者 Chen Feng mingqiang wang Lingqin Xia 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第3期803-818,共16页
The operating conditions of wind turbines(WTs)in the same wind farm(WF)may share similarities due to their shared manufacturing process,control strategy,and operating environment.However,the similarities of WTs are se... The operating conditions of wind turbines(WTs)in the same wind farm(WF)may share similarities due to their shared manufacturing process,control strategy,and operating environment.However,the similarities of WTs are seldom considered in WT anomaly detection,resulting in the disregard of useful information.This paper proposes a method to improve the reliability and accuracy of WT anomaly detection using the supervisory control and data acquisition(SCADA)data of multiple WTs in the same WF.First,a similarity assessment method based on a comparison of different observation time series is proposed,which objectively quantifies the similarities of WT operating conditions.Then,the SCADA data of the target WT and selected WTs that are similar are used to establish several estimation models through a long short-term memory(LSTM)algorithm.LSTM models that exhibit good estimation performance are used to construct a combined estimation model that estimates the variations in the monitored variables of the target WT.Finally,an anomaly detection method that jointly compares the effective value and information entropy of the residuals is proposed to identify anomalies.The effectiveness and accuracy of the proposed method are verified using the data of two actual WFs. 展开更多
关键词 Anomaly detection information entropy long short-term memory similarity assessment wind farm wind turbines
原文传递
On the hardness of NTRU problems
17
作者 Yang wang mingqiang wang 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第6期135-144,共10页
The hardness of NTRU problem affects heavily on the securities of the cryptosystems based on it.However,we could only estimate the hardness of the specific parameterized NTRU problems from the perspective of actual at... The hardness of NTRU problem affects heavily on the securities of the cryptosystems based on it.However,we could only estimate the hardness of the specific parameterized NTRU problems from the perspective of actual attacks,and whether there are worst-case to average-case reductions for NTRU problems like other lattice-based problems(e.g.,the Ring-LWE problem)is still an open problem.In this paper,we show that for any algebraic number field K,the NTRU problem with suitable parameters defined over the ring of integers R is at least as hard as the corresponding Ring-LWE problem.Hence,combining known reductions of the Ring-LWE problem,we could reduce worst-case basic ideal lattice problems,e.g.,SIVPγproblem,to average-case NTRU problems.Our results also mean that solving a kind of average-case SVPγproblem over highly structured NTRU lattice is at least as hard as worst-case basic ideal lattice problems in K.As an important corollary,we could prove that for modulus q=Õ(n^(5.5)),average-case NTRU problem over arbitrary cyclotomic field K with[K:Q]=n is at least as hard as worst-case SIVP_(γ)problems over K with γ=Õ(n^(6)). 展开更多
关键词 lattice-based cryptography algebraic nmber fields NTRU Problems Ring-LWE computational compleity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部