Particulate photocatalytic systems using nanoscale photocatalysts have been developed as an attractive promising route for solar energy utilization to achieve resource sustainability and environmental harmony.Dynamic ...Particulate photocatalytic systems using nanoscale photocatalysts have been developed as an attractive promising route for solar energy utilization to achieve resource sustainability and environmental harmony.Dynamic obstacles are considered as the dominant inhibition for attaining satisfactory energy-conversion efficiency.The complexity in light absorption and carrier transfer behaviors has remained to be further clearly illuminated.It is challenging to trace the fast evolution of charge carriers involved in transfer migration and interfacial reactions within a micro–nano-single-particle photocatalyst,which requires spatiotemporal high resolution.In this review,comprehensive dynamic descriptions including irradiation field,carrier separation and transfer,and interfacial reaction processes have been elucidated and discussed.The corresponding mechanisms for revealing dynamic behaviors have been explained.In addition,numerical simulation and modeling methods have been illustrated for the description of the irradiation field.Experimental measurements and spatiotemporal characterizations have been clarified for the reflection of carrier behavior and probing detection of interfacial reactions.The representative applications have been introduced according to the reported advanced research works,and the relationships between mechanistic conclusions from variable spatiotemporal measurements and photocatalytic performance results in the specific photocatalytic reactions have been concluded.This review provides a collective perspective for the full understanding and thorough evaluation of the primary dynamic processes,which would be inspired for the improvement in designing solar-driven energy-conversion systems based on nanoscale particulate photocatalysts.展开更多
The subfamily Oxyporinae is easily distinguished from the other subfamilies of the family Staphylinidae by its large,colourful body,elongate mandibles and large crescent-shaped terminal labial palpi.It was once compri...The subfamily Oxyporinae is easily distinguished from the other subfamilies of the family Staphylinidae by its large,colourful body,elongate mandibles and large crescent-shaped terminal labial palpi.It was once comprised only one genus,Oxyporus Fabricius,1775,then a new genus was separated from the nominated genus (Nakane&Sawade,1956),namely Pseudoxyporus.Although the taxonomic validity of Pseudoxyporus was controversial and was treated as a subgenus of Oxyporus (Campbell,1969;Hanley&Goodrich,1995;Herman,2001;Zheng&Song,2010;Tokareva et al.,2021),rencent catalogues and online checklist usually treated it as a valid genus (Shibata,1997;Ito,1999;Schülke&Smetana,2015;Kim et al.,2016;Newton,2022).Based on the structural differences in parameres of aedeagus,and the more cylindrical antennomeres,here we followed the 2-genera-system.展开更多
In wireless communication,the problem of authenticating the transmitter’s identity is challeng-ing,especially for those terminal devices in which the security schemes based on cryptography are approxi-mately unfeasib...In wireless communication,the problem of authenticating the transmitter’s identity is challeng-ing,especially for those terminal devices in which the security schemes based on cryptography are approxi-mately unfeasible owing to limited resources.In this paper,a physical layer authentication scheme is pro-posed to detect whether there is anomalous access by the attackers disguised as legitimate users.Explicitly,channel state information(CSI)is used as a form of fingerprint to exploit spatial discrimination among de-vices in the wireless network and machine learning(ML)technology is employed to promote the improve-ment of authentication accuracy.Considering that the falsified messages are not accessible for authenticator during the training phase,deep support vector data de-scription(Deep SVDD)is selected to solve the one-class classification(OCC)problem.Simulation results show that Deep SVDD based scheme can tackle the challenges of physical layer authentication in wireless communication environments.展开更多
To enable representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web, a new fuzzy extension of description logics called the fuzzy description logics with comparison expressi...To enable representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web, a new fuzzy extension of description logics called the fuzzy description logics with comparison expressions (FCDLs) is presented. The syntax and semantics of FCDLs are formally defined, and the forms of axioms and assertions in FCDLs knowledge bases are specified. FCDLs combine both fuzzy concepts from the fuzzy description logics (FDLs) and cut concepts from the extended fuzzy description logics (EFDLs) in the same theory. Furthermore, cut concepts are extended into comparison cut concepts in FCDLs to represent comparison expressions between fuzzy membership degrees, which are often used in practice but not supported by the other fuzzy extensions of description logics. FCDLs have more expressive power than FDLs and EFDLs, and are able to represent expressive fuzzy knowledge and to perform reasoning tasks based on them. Therefore, FCDLs can enable representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web.展开更多
In order to mine production and security information from security supervising data and to ensure security and safety involved in production and decision-making,a clustering analysis algorithm for security supervising...In order to mine production and security information from security supervising data and to ensure security and safety involved in production and decision-making,a clustering analysis algorithm for security supervising data based on a semantic description in coal mines is studied.First,the semantic and numerical-based hybrid description method of security supervising data in coal mines is described.Secondly,the similarity measurement method of semantic and numerical data are separately given and a weight-based hybrid similarity measurement method for the security supervising data based on a semantic description in coal mines is presented.Thirdly,taking the hybrid similarity measurement method as the distance criteria and using a grid methodology for reference,an improved CURE clustering algorithm based on the grid is presented.Finally,the simulation results of a security supervising data set in coal mines validate the efficiency of the algorithm.展开更多
The last-stage larval external morphologies of Pleuroptya rulalis (Scopoli), Pleuroptya harutai (Inoue) and Botyodes diniasalis (Walker) of Pyraustinae are described and illustrated. All specimens are deposited ...The last-stage larval external morphologies of Pleuroptya rulalis (Scopoli), Pleuroptya harutai (Inoue) and Botyodes diniasalis (Walker) of Pyraustinae are described and illustrated. All specimens are deposited in the Insect Collection of Department of Forest Resources Protection, Kangwon National University, Korea.展开更多
The investigation result of grassland predators Carabidae in southwest of Guizhou was reported. Taxonomic status, morphological characteristics of 5 genera and 13 species of insect predators were described, their livi...The investigation result of grassland predators Carabidae in southwest of Guizhou was reported. Taxonomic status, morphological characteristics of 5 genera and 13 species of insect predators were described, their living habits and incidence were outlined.展开更多
To enable the representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web, a new fuzzy extension of description logics called vague ALC which is based on vague sets is present...To enable the representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web, a new fuzzy extension of description logics called vague ALC which is based on vague sets is presented. The definition of vague set is introduced and then the syntax and semantics of vague ALC are formally defined. The forms of axioms and assertions in the vague ALC knowledge bases are specified. Finally, the tableau algorithm is developed for the reasoning in the vague ALC. The vague ALC based on vague set uses two degrees of membership instead of a single membership degree in the fuzzy sets and is more accurate in representing the imprecision in the degrees of membership. The vague ALC has more expressive power than ALC and can represent fuzzy knowledge and perform reasoning tasks based on them. Therefore, the vague ALC can enable the representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web.展开更多
To solve the extended fuzzy description logic with qualifying number restriction (EFALCQ) reasoning problems, EFALCQ is discretely simulated by description logic with qualifying number restriction (ALCQ), and ALCQ...To solve the extended fuzzy description logic with qualifying number restriction (EFALCQ) reasoning problems, EFALCQ is discretely simulated by description logic with qualifying number restriction (ALCQ), and ALCQ reasoning results are reused to prove the complexity of EFALCQ reasoning problems. The ALCQ simulation method for the consistency of EFALCQ is proposed. This method reduces EFALCQ satisfiability into EFALCQ consistency, and uses EFALCQ satisfiability to discretely simulate EFALCQ satdomain. It is proved that the reasoning complexity for EFALCQ satisfiability, consistency and sat-domain is PSPACE-complete.展开更多
By determining the state variables of a fuze safety system,some mathematical models——the system of ordinary differential and functional differential equations about the system's arming process are founded in a s...By determining the state variables of a fuze safety system,some mathematical models——the system of ordinary differential and functional differential equations about the system's arming process are founded in a state space.Also,the arming states and restricted relations of the safety factors are described and some demonstrations are presented.展开更多
Bamboo,is very important for its value and rapid growth,is mostly cultivated in China.Pyraustinae are severely injurious to bamboo.The external morphology of the last-instar larvae of Algedonis coclesalis(Walker),Cr...Bamboo,is very important for its value and rapid growth,is mostly cultivated in China.Pyraustinae are severely injurious to bamboo.The external morphology of the last-instar larvae of Algedonis coclesalis(Walker),Crocidophora evenoralis Walker and Demoboly pervulglis Hampson(all Pyraustini injurious to bamboo) are described and illustrated.Biological information for these larvae is provided.展开更多
A dynamic hierarchical description method for workflow is presented. The method provides a dynamic hierarchical way to define a workflow with non-determinate or dynamic factors. With this method, the main process defi...A dynamic hierarchical description method for workflow is presented. The method provides a dynamic hierarchical way to define a workflow with non-determinate or dynamic factors. With this method, the main process defined at build-time can be reified and extended by the principle of the sub-organizations at either the build-time or the run-time. To ensure the consistency and integrity of the description, a series of constraint rules are also discussed to realize seamless integration between a decomposed process and its original one. This approach supports the description of unpredictable uncertainties, the dynamic hierarchy of business process, and the dynamic modification of enterprise organizations, and all of these improve the flexibility and extendability of workflow management systems dramatically.展开更多
For the novel Jane Eyre, people appreciate it with different reasons. The author employs stylistic approaches to illustrate her own reasons why she enjoys it by analyzing its unique, realistic yet emotional and symbol...For the novel Jane Eyre, people appreciate it with different reasons. The author employs stylistic approaches to illustrate her own reasons why she enjoys it by analyzing its unique, realistic yet emotional and symbolic description of nature alone.展开更多
背景:骨代谢紊乱会引起骨相关疾病的发生,而叉头框转录因子O3可以通过调节氧化应激、自噬水平等来影响骨组织细胞增殖、分化与凋亡,调控骨代谢过程。目的:系统性分析叉头框转录因子O3调控骨代谢及其在骨科疾病中作用机制的相关研究文献...背景:骨代谢紊乱会引起骨相关疾病的发生,而叉头框转录因子O3可以通过调节氧化应激、自噬水平等来影响骨组织细胞增殖、分化与凋亡,调控骨代谢过程。目的:系统性分析叉头框转录因子O3调控骨代谢及其在骨科疾病中作用机制的相关研究文献,为后续以叉头框转录因子O3为靶点治疗骨疾病的研究提供参考。方法:以“(SU=FoxO3a OR SU=Foxo3 OR SU=Forkhead box O3 OR SU=叉头框转录因子O3)AND SU=骨”为检索句在中国知网进行检索,以“主题:(“FoxO3a”)OR主题:(“Foxo3”)OR主题:(“Forkhead box O3”)OR主题:(“叉头框转录因子O3”)AND主题:(“骨”)”为检索句在万方医学数据库进行检索;以“((FoxO3a)OR(Foxo3)OR(Forkhead box O3))AND((bone)OR(Skeleton))”为检索句在PubMed数据库进行检索,排除陈旧、重复、质量较差以及不相关的文献,最终纳入56篇文献进行综述分析。结果与结论:①叉头框转录因子O3与骨髓间充质干细胞:叉头框转录因子O3能够促进成骨谱系的形成,还可通过激活自噬促进早期成骨分化。同时,叉头框转录因子O3在骨髓间充质干细胞中体现抗氧化特性,保护细胞免受氧化应激诱导的衰老。②叉头框转录因子O3与成骨细胞:叉头框转录因子O3在成骨细胞中能通过干扰Wnt/β-连环蛋白通路抑制成骨,同时能激活抗氧化酶保护成熟成骨细胞。叉头框转录因子O3能促进成骨祖细胞的增殖,并通过激活自噬促进成骨分化。③叉头框转录因子O3与破骨细胞:叉头框转录因子O3表达可抵抗氧化应激和激活自噬抑制破骨细胞生成。④叉头框转录因子O3与骨细胞:叉头框转录因子O3可通过抗氧化作用保护骨细胞,还可通过抑制p16和p53信号通路和抑制衰老相关分泌表型来减少骨流失。⑤叉头框转录因子O3与软骨细胞:叉头框转录因子O3在骨关节炎中对软骨细胞起到保护作用,抑制软骨细胞分解或凋亡,促进软骨细胞外基质合成,可抑制软骨细胞肥大;然而,叉头框转录因子O3与Runt相关转录因子1在软骨细胞中高度共表达却会促进软骨祖细胞的早期软骨形成和终末肥大。⑥叉头框转录因子O3通过参与氧化应激抵抗与调控自噬等过程影响骨代谢,参与多类骨相关疾病的病理进程。展开更多
Quantitative description of the high-capacity channels in unconsolidated sandstone reservoirs, into which water was injected to improve oil recovery, is a hot topic in the field of reservoir development. This paper pr...Quantitative description of the high-capacity channels in unconsolidated sandstone reservoirs, into which water was injected to improve oil recovery, is a hot topic in the field of reservoir development. This paper presents a novel approach to describing quantitatively the characteristics of connected macropores in unconsolidated sandstone reservoirs using in situ production data. Based on physical simulation for formation mechanisms of high capacity channels and interwell tracer test data, a mathematical model was established to describe high-capacity channels by grey correlation theory, flow mechanism of fluid in porous media and reservoir engineering, and a program was developed to describe quantitatively the channel characteristics. The predicted results were consistent with field monitoring data (80%), so this model could be economically and effectively used to identify high-capacity channels.展开更多
This article, firstly, categorizes aircraft's presented area in a particular hit aspect into non-vulnerable region, non-overlapping vulnerable region and overlapping vulnerable region. Then, the aircraft's unique ex...This article, firstly, categorizes aircraft's presented area in a particular hit aspect into non-vulnerable region, non-overlapping vulnerable region and overlapping vulnerable region. Then, the aircraft's unique existing states are divided into kill states, intermediate states and no kill states. The parameters pertinent to aircraft's existing states in the above-mentioned regions are analyzed by using the shot line scanning method. Finally, the method provides two kinds of shot line geometric descriptive data: (1) component's vulnerable area and presented area in each region, which can be used to calculate the component's single-hit vulnerability and (2) aircraft's unique existing states and the areas corresponding to each state, which can be used to calculate the aircraft's single-hit and multi-hit vulnerability. Examples show that the proposed method can provide the parameters of the aircraft's or its component's area under threat being hit through tracing the shot line path thereby enabling the vulnerability calculated results to conform with reality to larger extent. In addition, the method solves the generality problem in dealing with overlapping components.展开更多
The Scarlet Letter is the masterpiece of Nathaniel Hawthorne who was a great American novelist. After being , the book brought a variety of dispute. Although many great critics had their authoritative comments on the ...The Scarlet Letter is the masterpiece of Nathaniel Hawthorne who was a great American novelist. After being , the book brought a variety of dispute. Although many great critics had their authoritative comments on the work, the author of this paper focused on the psycho-logical description in The Scarlet Letter.This paper focus on the analysis of the psychological description of the characters in The Scarlet Letter. This paper is divided into two parts-- The first part is " Personality of the main characters", which depicts the different personality of the characters. The second part is" Wonderful Psychological Description ". The psychology description of characters connected with the portrayal of scenes, the development of plot and the foil of nature surroundings to explore the secret in characters'complicated and contradictory interior world. This kind of psychological description didn't only makes the disposition of the characters distinctive but also works a lot in the development of plot and intensification of the theme. Although Hawthorne took good use of psychological description, he had one shortcoming--to make characters seem negative when the author made psychological depiction lifelikely, which, to some extent, destroyed the brilliant images of characters and weaken the ideoligical meanings. Generally speaking, it is a good literature work for people to study old literature and create today's literature.展开更多
基金supported by the Project of National Natural Science Foundation of China(22102095,21773153)the National Key Basic Research and Development Program(2018YFB1502001)financial support from the program of China Scholarships Council(No.202306230242).
文摘Particulate photocatalytic systems using nanoscale photocatalysts have been developed as an attractive promising route for solar energy utilization to achieve resource sustainability and environmental harmony.Dynamic obstacles are considered as the dominant inhibition for attaining satisfactory energy-conversion efficiency.The complexity in light absorption and carrier transfer behaviors has remained to be further clearly illuminated.It is challenging to trace the fast evolution of charge carriers involved in transfer migration and interfacial reactions within a micro–nano-single-particle photocatalyst,which requires spatiotemporal high resolution.In this review,comprehensive dynamic descriptions including irradiation field,carrier separation and transfer,and interfacial reaction processes have been elucidated and discussed.The corresponding mechanisms for revealing dynamic behaviors have been explained.In addition,numerical simulation and modeling methods have been illustrated for the description of the irradiation field.Experimental measurements and spatiotemporal characterizations have been clarified for the reflection of carrier behavior and probing detection of interfacial reactions.The representative applications have been introduced according to the reported advanced research works,and the relationships between mechanistic conclusions from variable spatiotemporal measurements and photocatalytic performance results in the specific photocatalytic reactions have been concluded.This review provides a collective perspective for the full understanding and thorough evaluation of the primary dynamic processes,which would be inspired for the improvement in designing solar-driven energy-conversion systems based on nanoscale particulate photocatalysts.
基金supported by China West Normal University (17YC352)。
文摘The subfamily Oxyporinae is easily distinguished from the other subfamilies of the family Staphylinidae by its large,colourful body,elongate mandibles and large crescent-shaped terminal labial palpi.It was once comprised only one genus,Oxyporus Fabricius,1775,then a new genus was separated from the nominated genus (Nakane&Sawade,1956),namely Pseudoxyporus.Although the taxonomic validity of Pseudoxyporus was controversial and was treated as a subgenus of Oxyporus (Campbell,1969;Hanley&Goodrich,1995;Herman,2001;Zheng&Song,2010;Tokareva et al.,2021),rencent catalogues and online checklist usually treated it as a valid genus (Shibata,1997;Ito,1999;Schülke&Smetana,2015;Kim et al.,2016;Newton,2022).Based on the structural differences in parameres of aedeagus,and the more cylindrical antennomeres,here we followed the 2-genera-system.
基金partially supported by the National Key Research and Development Project under Grant2020YFB1806805Social Development Projects of Jiangsu Science and Technology Department under Grant No.BE2018704
文摘In wireless communication,the problem of authenticating the transmitter’s identity is challeng-ing,especially for those terminal devices in which the security schemes based on cryptography are approxi-mately unfeasible owing to limited resources.In this paper,a physical layer authentication scheme is pro-posed to detect whether there is anomalous access by the attackers disguised as legitimate users.Explicitly,channel state information(CSI)is used as a form of fingerprint to exploit spatial discrimination among de-vices in the wireless network and machine learning(ML)technology is employed to promote the improve-ment of authentication accuracy.Considering that the falsified messages are not accessible for authenticator during the training phase,deep support vector data de-scription(Deep SVDD)is selected to solve the one-class classification(OCC)problem.Simulation results show that Deep SVDD based scheme can tackle the challenges of physical layer authentication in wireless communication environments.
基金The National Natural Science Foundation of China(No.60373066,60425206,90412003),the National Basic Research Pro-gram of China (973Program)(No.2002CB312000),the Innovation Plan for Jiangsu High School Graduate Student, the High TechnologyResearch Project of Jiangsu Province (No.BG2005032), and the Weap-onry Equipment Foundation of PLA Equipment Ministry ( No.51406020105JB8103).
文摘To enable representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web, a new fuzzy extension of description logics called the fuzzy description logics with comparison expressions (FCDLs) is presented. The syntax and semantics of FCDLs are formally defined, and the forms of axioms and assertions in FCDLs knowledge bases are specified. FCDLs combine both fuzzy concepts from the fuzzy description logics (FDLs) and cut concepts from the extended fuzzy description logics (EFDLs) in the same theory. Furthermore, cut concepts are extended into comparison cut concepts in FCDLs to represent comparison expressions between fuzzy membership degrees, which are often used in practice but not supported by the other fuzzy extensions of description logics. FCDLs have more expressive power than FDLs and EFDLs, and are able to represent expressive fuzzy knowledge and to perform reasoning tasks based on them. Therefore, FCDLs can enable representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web.
基金The National Natural Science Foundation of China(No.50674086)Specialized Research Fund for the Doctoral Program of Higher Education(No.20060290508)the Postdoctoral Scientific Program of Jiangsu Province(No.0701045B)
文摘In order to mine production and security information from security supervising data and to ensure security and safety involved in production and decision-making,a clustering analysis algorithm for security supervising data based on a semantic description in coal mines is studied.First,the semantic and numerical-based hybrid description method of security supervising data in coal mines is described.Secondly,the similarity measurement method of semantic and numerical data are separately given and a weight-based hybrid similarity measurement method for the security supervising data based on a semantic description in coal mines is presented.Thirdly,taking the hybrid similarity measurement method as the distance criteria and using a grid methodology for reference,an improved CURE clustering algorithm based on the grid is presented.Finally,the simulation results of a security supervising data set in coal mines validate the efficiency of the algorithm.
文摘The last-stage larval external morphologies of Pleuroptya rulalis (Scopoli), Pleuroptya harutai (Inoue) and Botyodes diniasalis (Walker) of Pyraustinae are described and illustrated. All specimens are deposited in the Insect Collection of Department of Forest Resources Protection, Kangwon National University, Korea.
基金supported by the Fund of the National Natural Science Foundation of China (30570196)the International Cooperation Project of Hubei Provincial Department of Education (G200612001)
文摘The female of Sinodorcadion punctulatum is reported for the first time, and the photographs of adult are presented.
基金Supported by Science and Technology Department of Guizhou Province(LKS[2009]No.2085)GSW Technology Project(Agriculture2009-20)~~
文摘The investigation result of grassland predators Carabidae in southwest of Guizhou was reported. Taxonomic status, morphological characteristics of 5 genera and 13 species of insect predators were described, their living habits and incidence were outlined.
基金Program for New Century Excellent Talents in Uni-versity (NoNCET-05-0288)
文摘To enable the representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web, a new fuzzy extension of description logics called vague ALC which is based on vague sets is presented. The definition of vague set is introduced and then the syntax and semantics of vague ALC are formally defined. The forms of axioms and assertions in the vague ALC knowledge bases are specified. Finally, the tableau algorithm is developed for the reasoning in the vague ALC. The vague ALC based on vague set uses two degrees of membership instead of a single membership degree in the fuzzy sets and is more accurate in representing the imprecision in the degrees of membership. The vague ALC has more expressive power than ALC and can represent fuzzy knowledge and perform reasoning tasks based on them. Therefore, the vague ALC can enable the representation and reasoning for fuzzy ontologies with expressive fuzzy knowledge on the semantic web.
基金The National Natural Science Foundation of China(No60403016)the Weaponry Equipment Foundation of PLA Equip-ment Ministry (No51406020105JB8103)
文摘To solve the extended fuzzy description logic with qualifying number restriction (EFALCQ) reasoning problems, EFALCQ is discretely simulated by description logic with qualifying number restriction (ALCQ), and ALCQ reasoning results are reused to prove the complexity of EFALCQ reasoning problems. The ALCQ simulation method for the consistency of EFALCQ is proposed. This method reduces EFALCQ satisfiability into EFALCQ consistency, and uses EFALCQ satisfiability to discretely simulate EFALCQ satdomain. It is proved that the reasoning complexity for EFALCQ satisfiability, consistency and sat-domain is PSPACE-complete.
文摘By determining the state variables of a fuze safety system,some mathematical models——the system of ordinary differential and functional differential equations about the system's arming process are founded in a state space.Also,the arming states and restricted relations of the safety factors are described and some demonstrations are presented.
基金supported by the Zhejiang Natural Science Foundation (Y3080105)
文摘Bamboo,is very important for its value and rapid growth,is mostly cultivated in China.Pyraustinae are severely injurious to bamboo.The external morphology of the last-instar larvae of Algedonis coclesalis(Walker),Crocidophora evenoralis Walker and Demoboly pervulglis Hampson(all Pyraustini injurious to bamboo) are described and illustrated.Biological information for these larvae is provided.
文摘A dynamic hierarchical description method for workflow is presented. The method provides a dynamic hierarchical way to define a workflow with non-determinate or dynamic factors. With this method, the main process defined at build-time can be reified and extended by the principle of the sub-organizations at either the build-time or the run-time. To ensure the consistency and integrity of the description, a series of constraint rules are also discussed to realize seamless integration between a decomposed process and its original one. This approach supports the description of unpredictable uncertainties, the dynamic hierarchy of business process, and the dynamic modification of enterprise organizations, and all of these improve the flexibility and extendability of workflow management systems dramatically.
文摘For the novel Jane Eyre, people appreciate it with different reasons. The author employs stylistic approaches to illustrate her own reasons why she enjoys it by analyzing its unique, realistic yet emotional and symbolic description of nature alone.
文摘背景:骨代谢紊乱会引起骨相关疾病的发生,而叉头框转录因子O3可以通过调节氧化应激、自噬水平等来影响骨组织细胞增殖、分化与凋亡,调控骨代谢过程。目的:系统性分析叉头框转录因子O3调控骨代谢及其在骨科疾病中作用机制的相关研究文献,为后续以叉头框转录因子O3为靶点治疗骨疾病的研究提供参考。方法:以“(SU=FoxO3a OR SU=Foxo3 OR SU=Forkhead box O3 OR SU=叉头框转录因子O3)AND SU=骨”为检索句在中国知网进行检索,以“主题:(“FoxO3a”)OR主题:(“Foxo3”)OR主题:(“Forkhead box O3”)OR主题:(“叉头框转录因子O3”)AND主题:(“骨”)”为检索句在万方医学数据库进行检索;以“((FoxO3a)OR(Foxo3)OR(Forkhead box O3))AND((bone)OR(Skeleton))”为检索句在PubMed数据库进行检索,排除陈旧、重复、质量较差以及不相关的文献,最终纳入56篇文献进行综述分析。结果与结论:①叉头框转录因子O3与骨髓间充质干细胞:叉头框转录因子O3能够促进成骨谱系的形成,还可通过激活自噬促进早期成骨分化。同时,叉头框转录因子O3在骨髓间充质干细胞中体现抗氧化特性,保护细胞免受氧化应激诱导的衰老。②叉头框转录因子O3与成骨细胞:叉头框转录因子O3在成骨细胞中能通过干扰Wnt/β-连环蛋白通路抑制成骨,同时能激活抗氧化酶保护成熟成骨细胞。叉头框转录因子O3能促进成骨祖细胞的增殖,并通过激活自噬促进成骨分化。③叉头框转录因子O3与破骨细胞:叉头框转录因子O3表达可抵抗氧化应激和激活自噬抑制破骨细胞生成。④叉头框转录因子O3与骨细胞:叉头框转录因子O3可通过抗氧化作用保护骨细胞,还可通过抑制p16和p53信号通路和抑制衰老相关分泌表型来减少骨流失。⑤叉头框转录因子O3与软骨细胞:叉头框转录因子O3在骨关节炎中对软骨细胞起到保护作用,抑制软骨细胞分解或凋亡,促进软骨细胞外基质合成,可抑制软骨细胞肥大;然而,叉头框转录因子O3与Runt相关转录因子1在软骨细胞中高度共表达却会促进软骨祖细胞的早期软骨形成和终末肥大。⑥叉头框转录因子O3通过参与氧化应激抵抗与调控自噬等过程影响骨代谢,参与多类骨相关疾病的病理进程。
文摘Quantitative description of the high-capacity channels in unconsolidated sandstone reservoirs, into which water was injected to improve oil recovery, is a hot topic in the field of reservoir development. This paper presents a novel approach to describing quantitatively the characteristics of connected macropores in unconsolidated sandstone reservoirs using in situ production data. Based on physical simulation for formation mechanisms of high capacity channels and interwell tracer test data, a mathematical model was established to describe high-capacity channels by grey correlation theory, flow mechanism of fluid in porous media and reservoir engineering, and a program was developed to describe quantitatively the channel characteristics. The predicted results were consistent with field monitoring data (80%), so this model could be economically and effectively used to identify high-capacity channels.
基金Foundation items: Ph.D. Programs Foundation of Ministry of Education of China (200806991002) Natural Science Foundation of Shaanxi Province (SJ08A 11)+1 种基金 NPU Foundation for Fundamental Research (NPU-FFR JC200804) NPU Young Teacher Foundation (W016208)
文摘This article, firstly, categorizes aircraft's presented area in a particular hit aspect into non-vulnerable region, non-overlapping vulnerable region and overlapping vulnerable region. Then, the aircraft's unique existing states are divided into kill states, intermediate states and no kill states. The parameters pertinent to aircraft's existing states in the above-mentioned regions are analyzed by using the shot line scanning method. Finally, the method provides two kinds of shot line geometric descriptive data: (1) component's vulnerable area and presented area in each region, which can be used to calculate the component's single-hit vulnerability and (2) aircraft's unique existing states and the areas corresponding to each state, which can be used to calculate the aircraft's single-hit and multi-hit vulnerability. Examples show that the proposed method can provide the parameters of the aircraft's or its component's area under threat being hit through tracing the shot line path thereby enabling the vulnerability calculated results to conform with reality to larger extent. In addition, the method solves the generality problem in dealing with overlapping components.
文摘The Scarlet Letter is the masterpiece of Nathaniel Hawthorne who was a great American novelist. After being , the book brought a variety of dispute. Although many great critics had their authoritative comments on the work, the author of this paper focused on the psycho-logical description in The Scarlet Letter.This paper focus on the analysis of the psychological description of the characters in The Scarlet Letter. This paper is divided into two parts-- The first part is " Personality of the main characters", which depicts the different personality of the characters. The second part is" Wonderful Psychological Description ". The psychology description of characters connected with the portrayal of scenes, the development of plot and the foil of nature surroundings to explore the secret in characters'complicated and contradictory interior world. This kind of psychological description didn't only makes the disposition of the characters distinctive but also works a lot in the development of plot and intensification of the theme. Although Hawthorne took good use of psychological description, he had one shortcoming--to make characters seem negative when the author made psychological depiction lifelikely, which, to some extent, destroyed the brilliant images of characters and weaken the ideoligical meanings. Generally speaking, it is a good literature work for people to study old literature and create today's literature.