This study mainly focuses on the triangle bounded L⁃algebras and triangle ideals.Firstly,the definition of triangle bounded L⁃algebras is presented,and several examples with different conditions are outlined along wit...This study mainly focuses on the triangle bounded L⁃algebras and triangle ideals.Firstly,the definition of triangle bounded L⁃algebras is presented,and several examples with different conditions are outlined along with an exploration of their properties.Moreover,we investigate the structure of triangle bounded L⁃algebra with a special condition.Secondly,we define the concept of triangle ideals of triangle bounded L⁃algebra and explore the connection between the triangle ideals of triangle bounded L⁃algebra L and the ideals of bounded L⁃algebra E(L).In addition,we classified and studied various classes of triangle ideals,including Stonean triangle ideals,extended Stonean triangle ideals,and lattice ideals,and by introducing the notion of Stonean triangle bounded L algebras,we examine the relationship between Stonean triangle bounded L⁃algebras and Stonean triangle ideals.Finally,we investigate the interrelationships among these various types of triangle ideals.展开更多
A tablet matrix system was developed for ibuprofen and the influence of the polymer blend and concentration on the release rate of the drug was evaluated.Tablets containing different concentrations of calcium silicate...A tablet matrix system was developed for ibuprofen and the influence of the polymer blend and concentration on the release rate of the drug was evaluated.Tablets containing different concentrations of calcium silicate and PVP(polyvinyl pyrrolidone)were prepared using direct compression and the weight uniformity,crushing strength,friability,drug content uniformity,dissolution profile,and in vitro release kinetics were examined.Formulated tablets were found to be within the official acceptable limits of physical and chemical parameters except for the thickness test that was below the conformation of extended-release tablets.The crushing strength of the tablets was in the range of 2.5 to 5.6 kg/f,the weight variations of the tablets of all the formulation was less than±5%.The friability of all the formulations was in the range of 0.6%to 1.83%.Tablet thickness and diameter was in range of 3.18 mm to 4.48 mm and 12.53 mm to 12.64 mm respectively.Absolute drug contents of all the formulations were found to be in range of 83.50%to 98%.The release kinetic of F3 containing 20 mg of calcium silicate,40 mg of PVP as matrix formers showed the best linearity(r^2=0.6975)with%drug release of 96 showing that combination of the two polymers(20 mg calcium silicate and 40 mg PVP)for use as a matrix former is best for extended-release formulation of ibuprofen.展开更多
介绍了一种面向电信增值业务领域的流程描述语言XPL(extended-calling process language)以及支持该语言的业务生成系统.XPL拥有较强的语音类业务描述能力和数据类业务描述能力,具有抽象层次高,使用灵活、简单,开发业务速度快的特点.该...介绍了一种面向电信增值业务领域的流程描述语言XPL(extended-calling process language)以及支持该语言的业务生成系统.XPL拥有较强的语音类业务描述能力和数据类业务描述能力,具有抽象层次高,使用灵活、简单,开发业务速度快的特点.该业务生成系统基于面向服务的构架(services-oriented architecture,简称SOA),适用于网络融合条件下的业务生成.展开更多
制造业的生产物流方式处于不断变革中,对其建模仿真可为制造系统规划设计、分析及改造提供决策支持。依“人-机-物-环-法”分类给出了智能车间制造系统中实体元素的描述,结合EFSM(extended finite state machine)和组件化建模思想,建立...制造业的生产物流方式处于不断变革中,对其建模仿真可为制造系统规划设计、分析及改造提供决策支持。依“人-机-物-环-法”分类给出了智能车间制造系统中实体元素的描述,结合EFSM(extended finite state machine)和组件化建模思想,建立了生产和物流组件化EFSM模型;阐述了智能车间多作业生产的建模过程以及组件模型实例化方法;通过EFSM-DEVS(discrete event system specification)模型自动转换及DEVS引擎完成了仿真运行。仿真结果表明:该方法所建立的模型更符合车间实际状况,适用性更广;组件化建模思想能构造更具扩展性的软件;建模及仿真运行的3D可视化使软件直观性更好,其仿真结果与AnyLogic保持一致。展开更多
图像2LSB(Two Least Significant Bits,最低两位比特)替换隐写在各个位平面上的信息隐写可以是相互独立的,其隐写比率可以不同。文章基于带权隐秘图像检测方法的原理,给出了最低两位平面含隐写信息的带权隐秘图像模型,依据该模型构建了2...图像2LSB(Two Least Significant Bits,最低两位比特)替换隐写在各个位平面上的信息隐写可以是相互独立的,其隐写比率可以不同。文章基于带权隐秘图像检测方法的原理,给出了最低两位平面含隐写信息的带权隐秘图像模型,依据该模型构建了2LSB替换隐写比率估计方法。该方法首先运用现有LSB检测方法对次低位隐写比率做出了估计,然后依据文章建立的最低两位平面带权隐秘图像的模型,给出最低位隐写比率的估计。实验结果表明,本方法能较精确地估算出图像最低两位平面上各个位平面的隐写比率。展开更多
电子废物具有产生量大、资源价值高和环境风险高的特点,其资源化利用和无害化处置是国际上研究的热点。过去十年间,我国建立了基于生产者责任延伸原则的电子废物环境管理制度,取得了较好的成效,促进了电子废物处理产业的快速发展。鉴于...电子废物具有产生量大、资源价值高和环境风险高的特点,其资源化利用和无害化处置是国际上研究的热点。过去十年间,我国建立了基于生产者责任延伸原则的电子废物环境管理制度,取得了较好的成效,促进了电子废物处理产业的快速发展。鉴于德国电子废物环境管理起步早、建立了完善的环境管理制度,本研究通过在生产者责任延伸视角下对比研究中德电子废物环境管理制度,发现我国在电子废物管理制度、各相关方责任、回收渠道、废弃电子电气设备(Waste of Electric and Electronic Equipment,WEEE)物质流数据统计等方面尚需持续完善。本文结合我国实际,提出了进一步完善我国电子废物环境管理制度的相关建议,期望可为我国电子废物环境管理部门完善相关政策提供参考。展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
基金Sponsored by Foreign Expert Program of China(Grant No.DL2023041002L)Yulin City Industry University Research Project(Grant No.CXY-2022-59).
文摘This study mainly focuses on the triangle bounded L⁃algebras and triangle ideals.Firstly,the definition of triangle bounded L⁃algebras is presented,and several examples with different conditions are outlined along with an exploration of their properties.Moreover,we investigate the structure of triangle bounded L⁃algebra with a special condition.Secondly,we define the concept of triangle ideals of triangle bounded L⁃algebra and explore the connection between the triangle ideals of triangle bounded L⁃algebra L and the ideals of bounded L⁃algebra E(L).In addition,we classified and studied various classes of triangle ideals,including Stonean triangle ideals,extended Stonean triangle ideals,and lattice ideals,and by introducing the notion of Stonean triangle bounded L algebras,we examine the relationship between Stonean triangle bounded L⁃algebras and Stonean triangle ideals.Finally,we investigate the interrelationships among these various types of triangle ideals.
文摘A tablet matrix system was developed for ibuprofen and the influence of the polymer blend and concentration on the release rate of the drug was evaluated.Tablets containing different concentrations of calcium silicate and PVP(polyvinyl pyrrolidone)were prepared using direct compression and the weight uniformity,crushing strength,friability,drug content uniformity,dissolution profile,and in vitro release kinetics were examined.Formulated tablets were found to be within the official acceptable limits of physical and chemical parameters except for the thickness test that was below the conformation of extended-release tablets.The crushing strength of the tablets was in the range of 2.5 to 5.6 kg/f,the weight variations of the tablets of all the formulation was less than±5%.The friability of all the formulations was in the range of 0.6%to 1.83%.Tablet thickness and diameter was in range of 3.18 mm to 4.48 mm and 12.53 mm to 12.64 mm respectively.Absolute drug contents of all the formulations were found to be in range of 83.50%to 98%.The release kinetic of F3 containing 20 mg of calcium silicate,40 mg of PVP as matrix formers showed the best linearity(r^2=0.6975)with%drug release of 96 showing that combination of the two polymers(20 mg calcium silicate and 40 mg PVP)for use as a matrix former is best for extended-release formulation of ibuprofen.
文摘介绍了一种面向电信增值业务领域的流程描述语言XPL(extended-calling process language)以及支持该语言的业务生成系统.XPL拥有较强的语音类业务描述能力和数据类业务描述能力,具有抽象层次高,使用灵活、简单,开发业务速度快的特点.该业务生成系统基于面向服务的构架(services-oriented architecture,简称SOA),适用于网络融合条件下的业务生成.
文摘制造业的生产物流方式处于不断变革中,对其建模仿真可为制造系统规划设计、分析及改造提供决策支持。依“人-机-物-环-法”分类给出了智能车间制造系统中实体元素的描述,结合EFSM(extended finite state machine)和组件化建模思想,建立了生产和物流组件化EFSM模型;阐述了智能车间多作业生产的建模过程以及组件模型实例化方法;通过EFSM-DEVS(discrete event system specification)模型自动转换及DEVS引擎完成了仿真运行。仿真结果表明:该方法所建立的模型更符合车间实际状况,适用性更广;组件化建模思想能构造更具扩展性的软件;建模及仿真运行的3D可视化使软件直观性更好,其仿真结果与AnyLogic保持一致。
文摘图像2LSB(Two Least Significant Bits,最低两位比特)替换隐写在各个位平面上的信息隐写可以是相互独立的,其隐写比率可以不同。文章基于带权隐秘图像检测方法的原理,给出了最低两位平面含隐写信息的带权隐秘图像模型,依据该模型构建了2LSB替换隐写比率估计方法。该方法首先运用现有LSB检测方法对次低位隐写比率做出了估计,然后依据文章建立的最低两位平面带权隐秘图像的模型,给出最低位隐写比率的估计。实验结果表明,本方法能较精确地估算出图像最低两位平面上各个位平面的隐写比率。
文摘电子废物具有产生量大、资源价值高和环境风险高的特点,其资源化利用和无害化处置是国际上研究的热点。过去十年间,我国建立了基于生产者责任延伸原则的电子废物环境管理制度,取得了较好的成效,促进了电子废物处理产业的快速发展。鉴于德国电子废物环境管理起步早、建立了完善的环境管理制度,本研究通过在生产者责任延伸视角下对比研究中德电子废物环境管理制度,发现我国在电子废物管理制度、各相关方责任、回收渠道、废弃电子电气设备(Waste of Electric and Electronic Equipment,WEEE)物质流数据统计等方面尚需持续完善。本文结合我国实际,提出了进一步完善我国电子废物环境管理制度的相关建议,期望可为我国电子废物环境管理部门完善相关政策提供参考。
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.