期刊文献+
共找到54篇文章
< 1 2 3 >
每页显示 20 50 100
多类型集装箱装船模型及优化
1
作者 刘彦斌 张重毅 +2 位作者 周春光 曹荣增 李峰 《小型微型计算机系统》 CSCD 北大核心 2007年第11期1988-1991,共4页
针对集装箱装船问题提出了一个整数规划模型.该模型能够解决多类型、多目的地集装箱的装船问题.在实现了最小化倒箱次数、最大化运输船空间利用率的同时还保证了船只在不同负载分布下的稳定性,并能保证结果是全局最优解.实验中使用COIN-... 针对集装箱装船问题提出了一个整数规划模型.该模型能够解决多类型、多目的地集装箱的装船问题.在实现了最小化倒箱次数、最大化运输船空间利用率的同时还保证了船只在不同负载分布下的稳定性,并能保证结果是全局最优解.实验中使用COIN-OR(Common Optimization Interface for Operations Research)对建立的模型进行求解.结果表明其有效性,从而为合理进行船只配载提供了一个有效的途径. 展开更多
关键词 集装箱装船问题 倒箱 优化问题 COIN
在线阅读 下载PDF
临床实践指南结构化和知识化处理研究综述 被引量:3
2
作者 张迎萍 范玉玲 +2 位作者 胡青 梅婧 顾进广 《情报工程》 2018年第2期4-25,共22页
临床实践指南是系统开发的多组临床指导意见,用于帮助医生和病人针对特定的临床问题做出恰当的处理、选择,决策适宜的卫生保健服务。目前,临床实践指南大多都是纸质文件,而国内外对于计算机化临床实践指南有两个关键问题:其一是如何将... 临床实践指南是系统开发的多组临床指导意见,用于帮助医生和病人针对特定的临床问题做出恰当的处理、选择,决策适宜的卫生保健服务。目前,临床实践指南大多都是纸质文件,而国内外对于计算机化临床实践指南有两个关键问题:其一是如何将基于自然语言的非结构化文本指南转换成基于计算机语言的结构化电子指南(简称:结构化);其二是如何进行知识表示和知识推理,使得计算机能有效和高效地理解并执行结构化的临床实践指南(简称:知识化)。本文介绍了临床实践指南结构化和知识化处理研究现状,其中详细介绍了GEM、DeGel、GMT等将基于自然语言的非结构化文本指南转换成基于计算机语言的结构化电子指南的方法,并对临床实践指南知识化的相关方法如Asbru、GLIF、PROforma、GELLO Engine等做了概述。此外,基于循证医学的方法论,本文探讨了临床实践指南的循证之路,特别是在日新月异的信息时代,临床实践指南当前常用的循证更新方法。最后,本文对临床实践指南存在的问题、发展趋势及研究方向进行了讨论。 展开更多
关键词 临床实践指南 计算机化 知识表达 知识推理
在线阅读 下载PDF
用于金融文本挖掘的多任务学习预训练金融语言模型 被引量:10
3
作者 刘壮 刘畅 +1 位作者 Wayne Lin 赵军 《计算机研究与发展》 EI CSCD 北大核心 2021年第8期1761-1772,共12页
近年来,机器学习,尤其是深度神经网络方法促进了金融文本挖掘研究的发展,在金融科技(Fintech)领域起着越来越重要的作用.如何从金融大数据中提取有价值的信息已经成为学术界和工业界一个非常有挑战的研究.由于深度神经网络需要大量标注... 近年来,机器学习,尤其是深度神经网络方法促进了金融文本挖掘研究的发展,在金融科技(Fintech)领域起着越来越重要的作用.如何从金融大数据中提取有价值的信息已经成为学术界和工业界一个非常有挑战的研究.由于深度神经网络需要大量标注数据,但是金融领域缺乏训练数据,因此,将深度学习应用于金融大数据挖掘并没有取得很好效果.为了更好地解决该问题,利用自监督学习和多任务学习等深度学习领域最新的思想和技术,提出了基于BERT模型架构的开源金融预训练语言模型F-BERT.F-BERT是一种针对特定领域(金融文本数据)的预训练语言模型,它通过在大型金融语料库上进行无监督训练得到.基于BERT架构,F-BERT可以有效地自动将知识从金融大数据中提取出并记忆在模型中,而无需进行特定于金融任务的模型结构修改,从而可以直接将其应用于下游各种金融领域任务,包括股票涨跌预测、金融情绪分类、金融智能客服等.在金融关系提取、金融情绪分类、金融智能问答任务上的大量实验表明了F-BERT模型的有效性和鲁棒性.同时,F-BERT在这3个有代表性的金融文本挖掘任务上均取得了很高的模型准确率,进一步验证了模型的性能. 展开更多
关键词 BERT 金融文本挖掘 多任务学习 预训练 迁移学习 金融科技
在线阅读 下载PDF
A simulation model for estimating train and passenger delays in large-scale rail transit networks 被引量:5
4
作者 江志彬 李锋 +1 位作者 徐瑞华 高鹏 《Journal of Central South University》 SCIE EI CAS 2012年第12期3603-3613,共11页
A simulation model was proposed to investigate the relationship between train delays and passenger delays and to predict the dynamic passenger distribution in a large-scale rail transit network. It was assumed that th... A simulation model was proposed to investigate the relationship between train delays and passenger delays and to predict the dynamic passenger distribution in a large-scale rail transit network. It was assumed that the time varying original-destination demand and passenger path choice probability were given. Passengers were assumed not to change their destinations and travel paths after delay occurs. CapaciW constraints of train and queue rules of alighting and boarding were taken into account. By using the time-driven simulation, the states of passengers, trains and other facilities in the network were updated every time step. The proposed methodology was also tested in a real network, for demonstration. The results reveal that short train delay does not necessarily result in passenger delays, while, on the contrary, some passengers may get benefits from the short delay. However, large initial train delay may result in not only knock-on train and passenger delays along the same line, but also the passenger delays across the entire rail transit network. 展开更多
关键词 delay simulation passenger delay train delay rail transit network TIMETABLE
在线阅读 下载PDF
Study on RFID Authentication Protocol Theory 被引量:3
5
作者 齐勇 姚青松 +1 位作者 陈滢 钟虓 《China Communications》 SCIE CSCD 2011年第1期65-71,共7页
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ... Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future. 展开更多
关键词 RFID security and privacy authentica- tion protocol THEORY
在线阅读 下载PDF
Software Radio: A Review of Design Considerations and Digital Hardware Choices 被引量:1
6
作者 Parul Gupta Pradipta Dey +3 位作者 Shivkumar Kalyanaraman Wang Qing Chen Jianwen Lin YongHua 《China Communications》 SCIE CSCD 2009年第1期64-72,共9页
This paper reviews the requirements for Software Defi ned Radio (SDR) systems for high-speed wireless applications and compares how well the different technology choices available-from ASICs, FPGAs to digital signal p... This paper reviews the requirements for Software Defi ned Radio (SDR) systems for high-speed wireless applications and compares how well the different technology choices available-from ASICs, FPGAs to digital signal processors (DSPs) and general purpose processors (GPPs) - meet them. 展开更多
关键词 ASIC FPGA DSP GPP PROCESSOR software radio SDR wireless networks
在线阅读 下载PDF
High Performance Viterbi Decoder on Cell/B.E. 被引量:2
7
作者 Lai Junjie Tang Jun +1 位作者 Peng Yingning Chen Jianwen 《China Communications》 SCIE CSCD 2009年第2期150-156,共7页
Viterbi decoding is widely used in many radio systems. Because of the large computation complexity, it is usually implemented with ASIC chips, FPGA chips, or optimized hardware accelerators. With the rapid development... Viterbi decoding is widely used in many radio systems. Because of the large computation complexity, it is usually implemented with ASIC chips, FPGA chips, or optimized hardware accelerators. With the rapid development of the multicore technology, multicore platforms become a reasonable choice for software radio (SR) systems. The Cell Broadband Engine processor is a state-of-art multi-core processor designed by Sony, Toshiba, and IBM. In this paper, we present a 64-state soft input Viterbi decoder for WiMAX SR Baseband system based on the Cell processor. With one Synergistic Processor Element (SPE) of a Cell Processor running at 3.2GHz, our Viterbi decoder can achieve the throughput up to 30Mb/s to decode the tail-biting convolutional code. The performance demonstrates that the proposed Viterbi decoding implementation is very efficient. Moreover, the Viterbi decoder can be easily integrated to the SR system and can provide a highly integrated SR solution. The optimization methodology in this module design can be extended to other modules on Cell platform. 展开更多
关键词 viterbi decoding WIMAX tail-biting CELL MULTI-CORE
在线阅读 下载PDF
Reliable Medical Recommendation Based on Privacy-Preserving Collaborative Filtering 被引量:3
8
作者 Mengwei Hou Rong Wei +2 位作者 Tiangang Wang Yu Cheng Buyue Qian 《Computers, Materials & Continua》 SCIE EI 2018年第7期137-149,共13页
Collaborative filtering(CF)methods are widely adopted by existing medical recommendation systems,which can help clinicians perform their work by seeking and recommending appropriate medical advice.However,privacy issu... Collaborative filtering(CF)methods are widely adopted by existing medical recommendation systems,which can help clinicians perform their work by seeking and recommending appropriate medical advice.However,privacy issue arises in this process as sensitive patient private data are collected by the recommendation server.Recently proposed privacy-preserving collaborative filtering methods,using computation-intensive cryptography techniques or data perturbation techniques are not appropriate in medical online service.The aim of this study is to address the privacy issues in the context of neighborhoodbased CF methods by proposing a Privacy Preserving Medical Recommendation(PPMR)algorithm,which can protect patients’treatment information and demographic information during online recommendation process without compromising recommendation accuracy and efficiency.The proposed algorithm includes two privacy preserving operations:Private Neighbor Selection and Neighborhood-based Differential Privacy Recommendation.Private Neighbor Selection is conducted on the basis of the notion of k-anonymity method,meaning that neighbors are privately selected for the target user according to his/her similarities with others.Neighborhood-based Differential Privacy Recommendation and a differential privacy mechanism are introduced in this operation to enhance the performance of recommendation.Our algorithm is evaluated using the real-world hospital EMRs dataset.Experimental results demonstrate that the proposed method achieves stable recommendation accuracy while providing comprehensive privacy for individual patients. 展开更多
关键词 Medical recommendation privacy preserving neighborhood-based collaborative filtering differential privacy
在线阅读 下载PDF
Optimal Iterative Learning Control for Batch Processes Based on Linear Time-varying Perturbation Model 被引量:9
9
作者 熊智华 ZHANG Jie 董进 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2008年第2期235-240,共6页
A batch-to-batch optimal iterative learning control (ILC) strategy for the tracking control of product quality in batch processes is presented. The linear time-varying perturbation (LTVP) model is built for produc... A batch-to-batch optimal iterative learning control (ILC) strategy for the tracking control of product quality in batch processes is presented. The linear time-varying perturbation (LTVP) model is built for product quality around the nominal trajectories. To address problems of model-plant mismatches, model prediction errors in the previous batch run are added to the model predictions for the current batch run. Then tracking error transition models can be built, and the ILC law with direct error feedback is explicitly obtained, A rigorous theorem is proposed, to prove the convergence of tracking error under ILC, The proposed methodology is illustrated on a typical batch reactor and the results show that the performance of trajectory tracking is gradually improved by the ILC. 展开更多
关键词 iterative learning control linear time-varying perturbation model batch process
在线阅读 下载PDF
Bayesian Optimization for Field-Scale Geological Carbon Storage 被引量:1
10
作者 Xueying Lu Kirk E.Jordan +2 位作者 Mary F.Wheeler Edward O.Pyzer-Knapp Matthew Benatan 《Engineering》 SCIE EI CAS 2022年第11期96-104,共9页
We present a framework that couples a high-fidelity compositional reservoir simulator with Bayesian optimization(BO)for injection well scheduling optimization in geological carbon sequestration.This work represents on... We present a framework that couples a high-fidelity compositional reservoir simulator with Bayesian optimization(BO)for injection well scheduling optimization in geological carbon sequestration.This work represents one of the first at tempts to apply BO and high-fidelity physics models to geological carbon storage.The implicit parallel accurate reservoir simulator(IPARS)is utilized to accurately capture the underlying physical processes during CO_(2)sequestration.IPARS provides a framework for several flow and mechanics models and thus supports both stand-alone and coupled simulations.In this work,we use the compositional flow module to simulate the geological carbon storage process.The compositional flow model,which includes a hysteretic three-phase relative permeability model,accounts for three major CO_(2)trapping mechanisms:structural trapping,residual gas trapping,and solubility trapping.Furthermore,IPARS is coupled to the International Business Machines(IBM)Corporation Bayesian Optimization Accelerator(BOA)for parallel optimizations of CO_(2)injection strategies during field-scale CO_(2)sequestration.BO builds a probabilistic surrogate for the objective function using a Bayesian machine learning algorithm-the Gaussian process regression,and then uses an acquisition function that leverages the uncertainty in the surrogate to decide where to sample.The IBM BOA addresses the three weaknesses of standard BO that limits its scalability in that IBM BOA supports parallel(batch)executions,scales better for high-dimensional problems,and is more robust to initializations.We demonstrate these merits by applying the algorithm in the optimization of the CO_(2)injection schedule in the Cranfield site in Mississippi,USA,using field data.The optimized injection schedule achieves 16%more gas storage volume and 56%less water/surfactant usage compared with the baseline.The performance of BO is compared with that of a genetic algorithm(GA)and a covariance matrix adaptation(CMA)-evolution strategy(ES).The results demonstrate the superior performance of BO,in that it achieves a competitive objective function value with over 60%fewer forward model evaluations. 展开更多
关键词 Compositional flow Bayesian optimization Geological carbon storage CCUS Machine learning AI for science
在线阅读 下载PDF
Application Server Aging Model and Multi-Level Rejuvenation Strategy Using Semi-Markov Process 被引量:1
11
作者 ZHAO Tianhai QI Yong +3 位作者 SHEN Junyi HOU Di ZHENG Xiaomei LIU Liang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1209-1215,共7页
Aiming at the characteristic of the dependency between the application components and the application server platform, a rejuvenation strategy with two different levels of rejuvenation granularities is put forward in ... Aiming at the characteristic of the dependency between the application components and the application server platform, a rejuvenation strategy with two different levels of rejuvenation granularities is put forward in this paper including the application component reiuvenation and the application server system rejuvenation. The availability and maintenance cost functions are obtained by means of establishing the application server aging model and the boundary condition of the optimal rejuvenation time is analyzed. Theory analysis indicates that the two-level rejuvenation strategy is superior to the traditional single level one. Finally, evaluation experiments are carried out and numerical result shows that compared with the traditional rejuvenation policy, the rejuvenation strategy proposed in this paper can further increase availability of the application server and reduce maintenance cost. 展开更多
关键词 application server software rejuvenation RELIABILITY software maintenance
在线阅读 下载PDF
Identification of QTL and underlying genes for root system architecture associated with nitrate nutrition in hexaploid wheat 被引量:1
12
作者 Marcus GRIFFITHS Jonathan A.ATKINSON +5 位作者 Laura-Jayne GARDINER Ranjan SWARUP Michael P.POUND Michael H.WILSON Malcolm J.BENNETT Darren M.WELLS 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2022年第4期917-932,共16页
The root system architecture(RSA) of a crop has a profound effect on the uptake of nutrients and consequently the potential yield. However, little is known about the genetic basis of RSA and resource adaptive response... The root system architecture(RSA) of a crop has a profound effect on the uptake of nutrients and consequently the potential yield. However, little is known about the genetic basis of RSA and resource adaptive responses in wheat(Triticum aestivum L.). Here, a high-throughput germination paper-based plant phenotyping system was used to identify seedling traits in a wheat doubled haploid mapping population, Savannah×Rialto. Significant genotypic and nitrate-N treatment variation was found across the population for seedling traits with distinct trait grouping for root size-related traits and root distribution-related traits. Quantitative trait locus(QTL) analysis identified a total of 59 seedling trait QTLs. Across two nitrate treatments, 27 root QTLs were specific to the nitrate treatment. Transcriptomic analyses for one of the QTLs on chromosome 2 D, which was found under low nitrate conditions, revealed gene enrichment in N-related biological processes and 28 differentially expressed genes with possible involvement in a root angle response. Together, these findings provide genetic insight into root system architecture and plant adaptive responses to nitrate, as well as targets that could help improve N capture in wheat. 展开更多
关键词 doubled-haploid population NITRATE RNA-SEQ quantitative trait loci root system architecture Triticum aestivum L.(wheat)
在线阅读 下载PDF
Key-Private Identity-Based Proxy Re-Encryption 被引量:1
13
作者 Chunpeng Ge Jinyue Xia Liming Fang 《Computers, Materials & Continua》 SCIE EI 2020年第5期633-647,共15页
An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-t... An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-trusted,it should place as little trust as necessary to allow it to perform the translations.In some applications such as distributed file system,it demands the adversary cannot identify the sender and recipient’s identities.However,none of the exiting IB-PRE schemes satisfy this requirement.In this work,we first define the security model of key-private IB-PRE.Finally,we propose the first key-private IB-PRE scheme.Our scheme is chosen plaintext secure(CPA)and collusion resistant in the standard model. 展开更多
关键词 Proxy re-encryption identity-based proxy re-encryption key-private collusion resistant
在线阅读 下载PDF
基于扫描隧道显微镜的单原子自旋共振技术 被引量:1
14
作者 杨锴 Andreas Heinrich Christopher Lutz 《真空科学与技术学报》 CAS CSCD 北大核心 2021年第10期897-912,共16页
近年来,应用扫描隧道显微镜技术已经可以测量单个原子的电子自旋共振谱线,为实现原子尺度量子磁性的探测与操控迈出了重要一步。电子自旋共振扫描隧道显微镜具有原子分辨能力和几十个纳电子伏的超高能量分辨率,可以实现微弱信号的原子... 近年来,应用扫描隧道显微镜技术已经可以测量单个原子的电子自旋共振谱线,为实现原子尺度量子磁性的探测与操控迈出了重要一步。电子自旋共振扫描隧道显微镜具有原子分辨能力和几十个纳电子伏的超高能量分辨率,可以实现微弱信号的原子尺度探测,例如可以测量固体表面相距几纳米的两个原子之间的微弱磁偶极相互作用、单个原子的电子与核自旋之间的超精细相互作用,以及人工自旋阵列的量子涨落等。借助脉冲式电子自旋共振技术,可以进一步实现固体表面单个磁性原子以及耦合原子的量子相干操控,测量其拉比振荡、拉姆齐干涉条纹和自旋回波信号等。单原子脉冲式电子自旋共振的实现为应用单原子量子探针进行量子探测奠定了重要基础。另外,对具有原子级精度的人工自旋结构的量子相干操控,为多体系统的量子模拟提供了重要的固态实验平台。 展开更多
关键词 扫描隧道显微镜 电子自旋共振 磁性原子 量子探测 量子模拟
原文传递
Biophysics inspired artificial intelligence for colorectal cancer characterization 被引量:1
15
作者 Niall P Hardy Jeffrey Dalli +2 位作者 Pól Mac Aonghusa Peter M Neary Ronan A Cahill 《Artificial Intelligence in Gastroenterology》 2021年第3期77-84,共8页
Over the last ten years artificial intelligence(AI)methods have begun to pervade even the most common everyday tasks such as email filtering and mobile banking.While the necessary quality and safety standards may have... Over the last ten years artificial intelligence(AI)methods have begun to pervade even the most common everyday tasks such as email filtering and mobile banking.While the necessary quality and safety standards may have understandably slowed the introduction of AI to healthcare when compared with other industries,we are now beginning to see AI methods becoming more available to the clinician in select settings.In this paper we discuss current AI methods as they pertain to gastrointestinal procedures including both gastroenterology and gastrointestinal surgery.The current state of the art for polyp detection in gastroenterology is explored with a particular focus on deep leaning,its strengths,as well as some of the factors that may limit its application to the field of surgery.The use of biophysics(utilizing physics to study and explain biological phenomena)in combination with more traditional machine learning is also discussed and proposed as an alternative approach that may solve some of the challenges associated with deep learning.Past and present uses of biophysics inspired AI methods,such as the use of fluorescence guided surgery to aid in the characterization of colorectal lesions,are used to illustrate the role biophysicsinspired AI can play in the exciting future of the gastrointestinal proceduralist. 展开更多
关键词 GASTROENTEROLOGY Artificial intelligence Gastrointestinal surgery Deep learning BIOPHYSICS Machine learning
暂未订购
DETECTION AND DEPTH PROFILING OF ^(19)F USING RESONANCES IN THE ^(19)F(α,p) ^(22)Ne REACTION
16
作者 L.C.McIntyre Jr. J.A.Leavitt +5 位作者 M.D.Ashbaugh B.Dezfouly-Arjomandy Z.Lin J.Oder R.F.C.Farrow S.S.P.Parkin 《Nuclear Science and Techniques》 SCIE CAS CSCD 1990年第Z1期56-61,共6页
Resonances in the reaction 19F (α ,p) 22Ne have been used to detect and depth profile 19F in solid targets. Incident alpha particles in the range 2100-2500 keV were used and protons were detected at θ=135° with... Resonances in the reaction 19F (α ,p) 22Ne have been used to detect and depth profile 19F in solid targets. Incident alpha particles in the range 2100-2500 keV were used and protons were detected at θ=135° with a large solid angle surface barrier detector covered to stop elastically scattered alpha particles. This technique is a simple, nuclide specific probe and is particularly useful in detecting 19F in the presence of heavy elements such as GaAs where conventional Rutherford backscattering is ineffective. Examples using this technique on epitaxially grown thin films containing LaF3 layers will be presented. 展开更多
关键词 FLUORINE DEPTH profile NUCLEAR REACTION analysis
在线阅读 下载PDF
掩膜对不准测量用的电压对比度测试结构
17
作者 Oliver D.Patterson Stephen R.Fox Roland Hahn 《功能材料与器件学报》 CAS CSCD 北大核心 2013年第3期136-141,共6页
由于目前最先进CMOS器件的尺寸非常小,对准要求变得极具挑战性。测量触点至栅极对准的方法涉及用SEM扫描触点阵列,每次与接地栅极的重叠部分数量不同。电压对比信号表明哪些触点正在触及栅极。把样品晶圆数据与光学对准数据进行了比较... 由于目前最先进CMOS器件的尺寸非常小,对准要求变得极具挑战性。测量触点至栅极对准的方法涉及用SEM扫描触点阵列,每次与接地栅极的重叠部分数量不同。电压对比信号表明哪些触点正在触及栅极。把样品晶圆数据与光学对准数据进行了比较。阐述了更充分比较二种技术的精度必须要做的后续工作。 展开更多
关键词 光学对准 触点 栅条 栅极 晶圆 掩膜 测试结构 电压
原文传递
The Influence of Systematic Errors on the Asian Summer Monsoon Circulation
18
作者 P. L. S. Rao 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2000年第4期576-586,共11页
The systematic errors of wind field associated with the prediction of Asian summer monsoon and their impact on the monsoon circulation have been studied in this paper. The daily operational analyses and fore-casts (up... The systematic errors of wind field associated with the prediction of Asian summer monsoon and their impact on the monsoon circulation have been studied in this paper. The daily operational analyses and fore-casts (up to day-5) of the National Centre for Medium Range Weather Forecasting (NCMRWF), India, over the Asian summer monsoon domain for the period June, July and August of 1995 are made use for the purpose. The systematic errors associated with the low level flow delineate, reduction in the strength of trade winds leading to weakening of cross equatorial flow as well as westerly flow over Indian Ocean. The upper level errors connote weakening of Tibetan anticyclone and reduction in the strength of return flow into the Southern Hemisphere. Further, these errors evince growing tendency with increase in the forecast period. Apart from the general underestimation of kinetic energy budget terms, the model forecasts fail to represent the transient eddies. The forecasts show increasing trend in the conversion of eddy to mean kinetic energy. These errors enfeeble Asian summer monsoon circulation with increase in the forecast period. Key words Monsoon - Systematic errors - Kinetic energy budget The author is grateful to the NCMRWF for providing data and computing facilities to carry out the present study. 展开更多
关键词 MONSOON Systematic errors Kinetic energy budget
在线阅读 下载PDF
更好的聚酯化学回收工艺——糖酵解、甲醇分解或水解? 被引量:1
19
作者 U.Thiele G.Breyta +1 位作者 姜柏(译) 于俊荣(校) 《国际纺织导报》 2023年第1期1-3,共3页
与聚烯烃通过热解破坏聚合物链并产生未知烯烃混合物不同,通过平衡反应合成的聚酯,如聚对苯二甲酸乙二醇酯(PET),可以通过强制反向反应解聚成单体或中间体,如对苯二甲酸(TA)和单乙二醇(MEG)等单体、对苯二甲酸二甲酯(DMT)或双(β-羟乙基... 与聚烯烃通过热解破坏聚合物链并产生未知烯烃混合物不同,通过平衡反应合成的聚酯,如聚对苯二甲酸乙二醇酯(PET),可以通过强制反向反应解聚成单体或中间体,如对苯二甲酸(TA)和单乙二醇(MEG)等单体、对苯二甲酸二甲酯(DMT)或双(β-羟乙基)对苯二甲酸乙二醇酯(BHET)等中间体。比较了3种可行的PET化学回收方法:糖酵解法、甲醇分解法和水解法。 展开更多
关键词 聚酯化学回收 糖酵解法 甲醇分解法 水解法
在线阅读 下载PDF
Editorial:special issue on"big data security and privacy" 被引量:1
20
作者 Shui Yu Peter Muer Abert Zomaya 《Digital Communications and Networks》 SCIE 2017年第4期211-212,共2页
As human beings are deep into the information age, we have been witnessing the rapid development of Big Data. Security and privacy are the most concerned issues in Big Data. Big Data definitely desires the security an... As human beings are deep into the information age, we have been witnessing the rapid development of Big Data. Security and privacy are the most concerned issues in Big Data. Big Data definitely desires the security and privacy protection all through the collection, transmission and analysis procedures. The features of Big Data bring unprecedented challenges to security and privacy protection. To protect the confiden- tiality, integrity and availability, traditional security measures such as cryptography, event analysis, intrusion detection, prevention and access control have taken a new dimension. To protect the privacy, new pattern of measures such as privacy-preserved data analysis need to be explored. There is a lot of work to be done in this emerging field. 展开更多
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部