Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy o...Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy originating from transformative research based on ego citation network.Design/methodology/approach:Key Nobel Prize-winning publications(NPs)in fields of gene engineering and astrophysics are regarded as a proxy for transformative research.In this contribution,we introduce a network-structural indicator of citing patents to measure technological impact of a target article and use policy citations as a preliminary tool for policy impact.Findings:The results show that the impact on technology and policy of NPs are higher than that of their subsequent citation generations in gene engineering but not in astrophysics.Research limitations:The selection of Nobel Prizes is not balanced and the database used in this study,Dimensions,suffers from incompleteness and inaccuracy of citation links.Practical implications:Our findings provide useful clues to better understand the characteristics of transformative research in technological and policy impact.Originality/value:This study proposes a new framework to explore the direct and indirect impact on technology and policy originating from transformative research.展开更多
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog...In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers.展开更多
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens...With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel.展开更多
Terahertz biotechnology has been increasingly applied in various biomedical fields and has especially shown great potential for application in brain sciences.In this article,we review the development of terahertz biot...Terahertz biotechnology has been increasingly applied in various biomedical fields and has especially shown great potential for application in brain sciences.In this article,we review the development of terahertz biotechnology and its applications in the field of neuropsychiatry.Available evidence indicates promising prospects for the use of terahertz spectroscopy and terahertz imaging techniques in the diagnosis of amyloid disease,cerebrovascular disease,glioma,psychiatric disease,traumatic brain injury,and myelin deficit.In vitro and animal experiments have also demonstrated the potential therapeutic value of terahertz technology in some neuropsychiatric diseases.Although the precise underlying mechanism of the interactions between terahertz electromagnetic waves and the biosystem is not yet fully understood,the research progress in this field shows great potential for biomedical noninvasive diagnostic and therapeutic applications.However,the biosafety of terahertz radiation requires further exploration regarding its two-sided efficacy in practical applications.This review demonstrates that terahertz biotechnology has the potential to be a promising method in the field of neuropsychiatry based on its unique advantages.展开更多
[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advant...[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion.展开更多
Real-time ultrasound has been, and will continue to be, one of the most important tools in enhancing genetic improvement in the U.S. Recent advancements in the technology have allowed ultrasound to be used in evaluati...Real-time ultrasound has been, and will continue to be, one of the most important tools in enhancing genetic improvement in the U.S. Recent advancements in the technology have allowed ultrasound to be used in evaluating intramuscular fat in live animals. Together with other genetic improvement tools, ultrasound technology will offer seedstock producers the opportunity to select for improved IMF in potential breeding stock replacements and hence speed genetic progress for the improvement of this trait. After three generations of selection for IMF using real-time ultrasound in an Iowa State University study, the average EBV for select line pigs is 0.83% greater than for control line pigs. Selection for IMF has, however, resulted in slightly more backfat and less loin muscle area, and a trend toward more days to 114 kg in the select line compared to the control line. Carcass evaluation of a sample of pigs from each litter indicated a similar increase in IMF, increase in backfat, and reduction in loin muscle area for select line pigs. No differences were found for Hunter L* color, Minolta reflectance, and ultimate pH.展开更多
Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice techn...Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.展开更多
Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. I...Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network.展开更多
China is characterized as ’a large country with many smallholder farmers’ whose participation in modern agriculture is key to the country’s modern agriculture development. Promoting smallholder farmers’ adoption o...China is characterized as ’a large country with many smallholder farmers’ whose participation in modern agriculture is key to the country’s modern agriculture development. Promoting smallholder farmers’ adoption of modern agricultural production technology is one effective way to improve the capabilities of smallholder farmers. This paper aims to explore the impact of Internet use on the adoption of agricultural production technology by smallholder farmers based on a survey of 1 449 smallholders across 14 provinces in China. The results suggest that Internet use can significantly promote technology adoption, with the probability of adopting new crop varieties, water-saving irrigation technology and straw-returning technology increasing by 0.200, 0.157 and 0.155, respectively. Furthermore, the effect of Internet use is found to be heterogeneous with a greater effect on smallholder farmers having low education levels, limited training, and high incomes. To increase agricultural production technology adoption by smallholders, rural Internet infrastructure and Internet use promotion should be the focus for the Chinese government.展开更多
Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies...Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies in WSN. There are many kinds of location algorithms currently and the research to performance evaluation and applicability analysis of algorithms has fundamental significance. For this reason, the paper firstly elaborated the performance evaluation indexes of location algorithms, and analyzed the location prin-ciples, characteristics and current fundamental problems to typical and some new location algorithms, and then analyzed and compared some typical location algorithms according to the location accuracy, node den-sity and hardware requirement, obtaining the sphere of application of these algorithms and pointing out the problems which need to be solved in WSN currently.展开更多
This work represents the extraction of oil with high free fatty acid content from spent bleaching earth using sub-critical water technology as a greener production pathway. The extraction efficiencies under different ...This work represents the extraction of oil with high free fatty acid content from spent bleaching earth using sub-critical water technology as a greener production pathway. The extraction efficiencies under different conditions were investigated. The studied parameters include temperatures in the range of 180 to 270°C, the feed to solventfeed-to-solvent (in this case water) ratio (1:1, 1:2, 1:3, 1:4 and 1:5) and extraction times in the range of 5-60 minutes. The results showed that the optimum temperature, feed to solventfeed-to-solvent ratio, and extraction time were 270°C, 1:3, and 20 minutes, respectively. In another experiment, the extracted free fatty acids were converted into mono-, di-, and triglycerides through esterification with glycerol to increase the value added of the extracted products. The kinetics of the extraction process was found to be corresponding to an irreversible consecutive unimolecular-type first order reaction, consisting of the extraction step followed by the decomposition reaction step. Both reaction rates of extraction and decomposition were estimated using the reaction rate equations utilizing the nonlinear regression method. The apparent activation energy was calculated to be 46.1 kJ·mol-1. This result indicates a diffusion controlled reaction. For more exploration and deep understanding of the extraction mechanism, other thermodynamic parameters were also calculated and analyzed including,ΔH#, ΔS#, and ΔG# of the extraction step.展开更多
In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm i...In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm is proposed.The optimization of the power distribution network fault system based on multiagent technology realizes fast recovery of multi-objective fault,solve the problem of network learning and parameter adjustment in the later stage of particle swarm optimization algorithm falling into the local extreme value dilemma,and realize the multi-dimensional nonlinear optimization of the main grid and the auxiliary grid.The system proposed in this study takes power distribution network as the goal,applies fuzzy probability algorithm,simplifies the calculation process,avoids local extreme value,and finally realizes the energy balance between each power grid.Simulation results show that the Multi-Agent Technology enjoys priority in restoring important load,shortening the recovery time of power grid balance,and reducing the overall line loss rate of power grid.Therefore,the power grid fault self-healing system can improve the safety and stability of the important power grid,and reduce the economic loss rate of the whole power grid.展开更多
With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process proble...With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process problem in e-commerce,focusing on the specific application of Internet of Things technology in e-commerce.Warehousing logistics is an important link in today’s e-commerce transactions.This article proposes a distributed analysis method for RFID-based e-commerce warehousing process optimization and an e-commerce supply chain management process based on Internet of Things technology.This article first introduces the advantages and disadvantages of shared IoT identification technology and the IoT resource sharing platform based on the three-layer abstract data model and representational state transfer(REST)style.Combining actual IoT applications and the characteristics of an existing platform,a REST-based IoT resource sharing platform is proposed.Combined with actual projects,a REST-based IoT resource sharing platform was built,and key technology experiments were conducted for verification.Finally,optimizing the e-commerce supply chain management process under Internet of Things technology and explaining the advantages of optimized e-commerce supply chain management are discussed.Research on this subject provides a theoretical basis for the application of the Internet of Things in e-commerce and has practical significance and practical value for managing service capabilities and service levels in e-commerce.展开更多
This paper mainly describes a research of fabrication-technology of silicon magnetic-sensitive transistor (SMST) with rectangle-plank-cubic structure fabricated on silicon wafer by MEMS technique.An experiment researc...This paper mainly describes a research of fabrication-technology of silicon magnetic-sensitive transistor (SMST) with rectangle-plank-cubic structure fabricated on silicon wafer by MEMS technique.An experiment research on basic characteristic of the silicon magnetic-sensitive transistor was done.Anisotropic etching and reliable technique project were provided and applied in order to fabricate SMST with rectangle-plank-cubic construction.This means that a new kind of fabrication technology for silicon magnetic-sensitive transistor was provided.The result shows that the technique can be not only compatible with IC technology but also integrated easily,and has a wide application field.展开更多
The problem of mine water source has always been an important hidden danger in mine safety production.The water source under the mine working face may lead to geological disasters,such as mine collapse and water disas...The problem of mine water source has always been an important hidden danger in mine safety production.The water source under the mine working face may lead to geological disasters,such as mine collapse and water disaster.The research background of mine water source identification involves many fields such as mining production,environmental protection,resource utilization and technological progress.It is a comprehensive and interdisciplinary subject,which helps to improve the safety and sustainability of mine production.Therefore,timely and accurate identification and control of mine water source is very important to ensure mine production safety.Laser-Induced Fluorescence(LIF)technology,characterized by high sensitivity,specificity,and spatial resolution,overcomes the time-consuming nature of traditional chemical methods.In this experiment,sandstone water and old air water were collected from the Huainan mining area as original samples.Five types of mixed water samples were prepared by varying their proportions,in addition to the two original water samples,resulting in a total of seven different water samples for testing.Four preprocessing methods,namely,MinMaxScaler,StandardScaler,Standard Normal Variate(SNV)transformation,and Centering Transformation(CT),were applied to preprocess the original spectral data to reduce noise and interference.CT was determined as the optimal preprocessing method based on class discrimination,data distribution,and data range.To maintain the original data features while reducing the data dimension,including the original spectral data,five sets of data were subjected to Principal Component Analysis(PCA)and Linear Discriminant Analysis(LDA)dimensionality reduction.Through comparing the clustering effect and Fisher's ratio of the first three dimensions,PCA was identified as the optimal dimensionality reduction method.Finally,two neural network models,CT+PCA+CNN and CT+PCA+ResNet,were constructed by combining Convolutional Neural Networks(CNN)and Residual Neural Networks(ResNet),respectively.When selecting the neural network models,the training time,number of iterative parameters,accuracy,and cross-entropy loss function in the classification problem were compared to determine the model best suited for water source data.The results indicated that CT+PCA+ResNet was the optimal approach for water source identification in this study.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
The increasing requirements for bandwidth drive the 100G Ethernet into use as quickly as possible. The major technologies supporting 100G Ethernet interface include the physical layer channel convergence technology, m...The increasing requirements for bandwidth drive the 100G Ethernet into use as quickly as possible. The major technologies supporting 100G Ethernet interface include the physical layer channel convergence technology, multi-fiber channel and Wavelength Division Multiplexing (WDM) technology. The key technology for high-speed optical devices at the interface requires a breakthrough. The demands driven by the increase of interface rate require better packet processing and storage, system switching, and backplane technology. In addition, in the network, the transport problem of the new interface should be solved, including defining transport standards and pushing the development of key transport technologies. As far as the cost and requirements are concerned, the commercial application of 100G Ethernet is viable in Metropolitan Area Networks (MANs).展开更多
Objective: To evaluate the effect of Internet technology on continuing nursing in elderly patients with diabetic feet, Method: From January 2015 to July 2016,12 elderly patients with diabetic foot ulcers were enroll...Objective: To evaluate the effect of Internet technology on continuing nursing in elderly patients with diabetic feet, Method: From January 2015 to July 2016,12 elderly patients with diabetic foot ulcers were enrolled from the Endocrinology Department in our hospital. We used "WeChat", "E nursing" and other Internet technologies to perform remote extended care and to observe the foot ulcer outcomes. Results: All foot ulcers healed with a wound healing time between 38 and 73 days (average 57.08 ~ 12.69 days). Patients did not need to travel long distances to seek medical treatment for foot ulcers, improving their satisfaction. Conclusions: The implementation of extended care for elderly patients with diabetic foot ulcers was based on the application of Internet technology. It is helpful to facilitate medical treatment, share high quality health resources and promote disease rehabilitation.展开更多
Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and intr...Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .展开更多
基金supported by the National Natural Science Foundation of China(Grant No.71974167).
文摘Purpose:The disseminating of academic knowledge to nonacademic audiences partly relies on the transition of subsequent citing papers.This study aims to investigate direct and indirect impact on technology and policy originating from transformative research based on ego citation network.Design/methodology/approach:Key Nobel Prize-winning publications(NPs)in fields of gene engineering and astrophysics are regarded as a proxy for transformative research.In this contribution,we introduce a network-structural indicator of citing patents to measure technological impact of a target article and use policy citations as a preliminary tool for policy impact.Findings:The results show that the impact on technology and policy of NPs are higher than that of their subsequent citation generations in gene engineering but not in astrophysics.Research limitations:The selection of Nobel Prizes is not balanced and the database used in this study,Dimensions,suffers from incompleteness and inaccuracy of citation links.Practical implications:Our findings provide useful clues to better understand the characteristics of transformative research in technological and policy impact.Originality/value:This study proposes a new framework to explore the direct and indirect impact on technology and policy originating from transformative research.
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
文摘In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers.
文摘With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel.
基金supported by grants from the National Key R&D Program of China,No.2017YFC0909200(to DC)the National Natural Science Foundation of China,No.62075225(to HZ)+1 种基金Zhejiang Provincial Medical Health Science and Technology Project,No.2023XY053(to ZP)Zhejiang Provincial Traditional Chinese Medical Science and Technology Project,No.2023ZL703(to ZP).
文摘Terahertz biotechnology has been increasingly applied in various biomedical fields and has especially shown great potential for application in brain sciences.In this article,we review the development of terahertz biotechnology and its applications in the field of neuropsychiatry.Available evidence indicates promising prospects for the use of terahertz spectroscopy and terahertz imaging techniques in the diagnosis of amyloid disease,cerebrovascular disease,glioma,psychiatric disease,traumatic brain injury,and myelin deficit.In vitro and animal experiments have also demonstrated the potential therapeutic value of terahertz technology in some neuropsychiatric diseases.Although the precise underlying mechanism of the interactions between terahertz electromagnetic waves and the biosystem is not yet fully understood,the research progress in this field shows great potential for biomedical noninvasive diagnostic and therapeutic applications.However,the biosafety of terahertz radiation requires further exploration regarding its two-sided efficacy in practical applications.This review demonstrates that terahertz biotechnology has the potential to be a promising method in the field of neuropsychiatry based on its unique advantages.
基金Supported by the National Social Science Foundation of China:the Sociological Study on the Technology Adoption Behaviors of Farmers(08BSH049)~~
文摘[Objective] To analyze the key factor in agricultural technology diffusion- technology support, and to explore the method to quicken the diffusion of agricultural technology. [Method] The technology acquisition advantage of social network was il- lustrated by summarizing the status and characteristics of agricultural technology and technology supporting types in the process of agriculture technology diffusion. [Result] The multi-layer, complex, persistence, systematization features of agricultural technol- ogy require support and help of technology from surrounding social network to ulti- mately internalize the technology. [Conclusion] Using social networks for the technol- ogy support will be a powerful supplement to the system of agricultural technology diffusion.
文摘Real-time ultrasound has been, and will continue to be, one of the most important tools in enhancing genetic improvement in the U.S. Recent advancements in the technology have allowed ultrasound to be used in evaluating intramuscular fat in live animals. Together with other genetic improvement tools, ultrasound technology will offer seedstock producers the opportunity to select for improved IMF in potential breeding stock replacements and hence speed genetic progress for the improvement of this trait. After three generations of selection for IMF using real-time ultrasound in an Iowa State University study, the average EBV for select line pigs is 0.83% greater than for control line pigs. Selection for IMF has, however, resulted in slightly more backfat and less loin muscle area, and a trend toward more days to 114 kg in the select line compared to the control line. Carcass evaluation of a sample of pigs from each litter indicated a similar increase in IMF, increase in backfat, and reduction in loin muscle area for select line pigs. No differences were found for Hunter L* color, Minolta reflectance, and ultimate pH.
基金sponsored by the National Key R&D Program of China(No.2018YFB1003201)the National Natural Science Foundation of China(No.61672296,No.61602261)Major Natural Science Research Projects in Colleges and Universities of Jiangsu Province(No.18KJA520008)
文摘Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology. According to the packet loss problem of private protection algorithm based on slice technology, this paper proposes the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. Moreover,it selects the routing tree generated by CTP(Collection Tree Protocol) as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time,the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result,it improves the reliability and privacy of data transmission and ensures the data redundancy.
基金National Natural Science Foundation of China(No. 60474021)
文摘Various force disturbances influence the thrust force of linear motors when a linear motor (LM) is running. Among all of force disturbances, the force ripple is the dominant while a linear motor runs in low speed. In order to suppress the force ripple, back propagation(BP) neural network is proposed to learn the function of the force ripple of linear motors, and the acquisition method of training samples is proposed based on a disturbance observer. An off-line BP neural network is used mainly because of its high running efficiency and the real-time requirement of the servo control system of a linear motor. By using the function, the force ripple is on-line compensated according to the position of the LM. The experimental results show that the force ripple is effectively suppressed by the compensation of the BP neural network.
基金supported by the Agricultural Science and Technology Innovation Program of Chinese Academy of Agricultural Sciences(CAAS-ASTIP-IAED-2020-06CAAS-ASTIP-IAED-2021-SR-02CAAS-ASTIP-IAED-2021-06)。
文摘China is characterized as ’a large country with many smallholder farmers’ whose participation in modern agriculture is key to the country’s modern agriculture development. Promoting smallholder farmers’ adoption of modern agricultural production technology is one effective way to improve the capabilities of smallholder farmers. This paper aims to explore the impact of Internet use on the adoption of agricultural production technology by smallholder farmers based on a survey of 1 449 smallholders across 14 provinces in China. The results suggest that Internet use can significantly promote technology adoption, with the probability of adopting new crop varieties, water-saving irrigation technology and straw-returning technology increasing by 0.200, 0.157 and 0.155, respectively. Furthermore, the effect of Internet use is found to be heterogeneous with a greater effect on smallholder farmers having low education levels, limited training, and high incomes. To increase agricultural production technology adoption by smallholders, rural Internet infrastructure and Internet use promotion should be the focus for the Chinese government.
文摘Wireless Sensor Network (WSN) which is composed of lots of self-organizational intelligence nodes has become new technology of information acquisition and processing. Location technology is one of the key technologies in WSN. There are many kinds of location algorithms currently and the research to performance evaluation and applicability analysis of algorithms has fundamental significance. For this reason, the paper firstly elaborated the performance evaluation indexes of location algorithms, and analyzed the location prin-ciples, characteristics and current fundamental problems to typical and some new location algorithms, and then analyzed and compared some typical location algorithms according to the location accuracy, node den-sity and hardware requirement, obtaining the sphere of application of these algorithms and pointing out the problems which need to be solved in WSN currently.
文摘This work represents the extraction of oil with high free fatty acid content from spent bleaching earth using sub-critical water technology as a greener production pathway. The extraction efficiencies under different conditions were investigated. The studied parameters include temperatures in the range of 180 to 270°C, the feed to solventfeed-to-solvent (in this case water) ratio (1:1, 1:2, 1:3, 1:4 and 1:5) and extraction times in the range of 5-60 minutes. The results showed that the optimum temperature, feed to solventfeed-to-solvent ratio, and extraction time were 270°C, 1:3, and 20 minutes, respectively. In another experiment, the extracted free fatty acids were converted into mono-, di-, and triglycerides through esterification with glycerol to increase the value added of the extracted products. The kinetics of the extraction process was found to be corresponding to an irreversible consecutive unimolecular-type first order reaction, consisting of the extraction step followed by the decomposition reaction step. Both reaction rates of extraction and decomposition were estimated using the reaction rate equations utilizing the nonlinear regression method. The apparent activation energy was calculated to be 46.1 kJ·mol-1. This result indicates a diffusion controlled reaction. For more exploration and deep understanding of the extraction mechanism, other thermodynamic parameters were also calculated and analyzed including,ΔH#, ΔS#, and ΔG# of the extraction step.
基金This work is supported by the project of Hebei power technology of state grid from 2018 to 2019:Research and application of real-time situation assessment and visualization(SZKJXM20170445).
文摘In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network,a fault recovery method based on multi-objective optimization algorithm is proposed.The optimization of the power distribution network fault system based on multiagent technology realizes fast recovery of multi-objective fault,solve the problem of network learning and parameter adjustment in the later stage of particle swarm optimization algorithm falling into the local extreme value dilemma,and realize the multi-dimensional nonlinear optimization of the main grid and the auxiliary grid.The system proposed in this study takes power distribution network as the goal,applies fuzzy probability algorithm,simplifies the calculation process,avoids local extreme value,and finally realizes the energy balance between each power grid.Simulation results show that the Multi-Agent Technology enjoys priority in restoring important load,shortening the recovery time of power grid balance,and reducing the overall line loss rate of power grid.Therefore,the power grid fault self-healing system can improve the safety and stability of the important power grid,and reduce the economic loss rate of the whole power grid.
文摘With in-depth development of the Internet of Things(IoT)in various industries,the informatization process of various industries has also entered the fast lane.This article aims to solve the supply chain process problem in e-commerce,focusing on the specific application of Internet of Things technology in e-commerce.Warehousing logistics is an important link in today’s e-commerce transactions.This article proposes a distributed analysis method for RFID-based e-commerce warehousing process optimization and an e-commerce supply chain management process based on Internet of Things technology.This article first introduces the advantages and disadvantages of shared IoT identification technology and the IoT resource sharing platform based on the three-layer abstract data model and representational state transfer(REST)style.Combining actual IoT applications and the characteristics of an existing platform,a REST-based IoT resource sharing platform is proposed.Combined with actual projects,a REST-based IoT resource sharing platform was built,and key technology experiments were conducted for verification.Finally,optimizing the e-commerce supply chain management process under Internet of Things technology and explaining the advantages of optimized e-commerce supply chain management are discussed.Research on this subject provides a theoretical basis for the application of the Internet of Things in e-commerce and has practical significance and practical value for managing service capabilities and service levels in e-commerce.
文摘This paper mainly describes a research of fabrication-technology of silicon magnetic-sensitive transistor (SMST) with rectangle-plank-cubic structure fabricated on silicon wafer by MEMS technique.An experiment research on basic characteristic of the silicon magnetic-sensitive transistor was done.Anisotropic etching and reliable technique project were provided and applied in order to fabricate SMST with rectangle-plank-cubic construction.This means that a new kind of fabrication technology for silicon magnetic-sensitive transistor was provided.The result shows that the technique can be not only compatible with IC technology but also integrated easily,and has a wide application field.
基金the Collaborative Innovation Center of Mine Intelligent Equipment and Technology,Anhui University of Science&Technology(CICJMITE202203)National Key R&D Program of China(2018YFC0604503)Anhui Province Postdoctoral Research Fund Funding Project(2019B350).
文摘The problem of mine water source has always been an important hidden danger in mine safety production.The water source under the mine working face may lead to geological disasters,such as mine collapse and water disaster.The research background of mine water source identification involves many fields such as mining production,environmental protection,resource utilization and technological progress.It is a comprehensive and interdisciplinary subject,which helps to improve the safety and sustainability of mine production.Therefore,timely and accurate identification and control of mine water source is very important to ensure mine production safety.Laser-Induced Fluorescence(LIF)technology,characterized by high sensitivity,specificity,and spatial resolution,overcomes the time-consuming nature of traditional chemical methods.In this experiment,sandstone water and old air water were collected from the Huainan mining area as original samples.Five types of mixed water samples were prepared by varying their proportions,in addition to the two original water samples,resulting in a total of seven different water samples for testing.Four preprocessing methods,namely,MinMaxScaler,StandardScaler,Standard Normal Variate(SNV)transformation,and Centering Transformation(CT),were applied to preprocess the original spectral data to reduce noise and interference.CT was determined as the optimal preprocessing method based on class discrimination,data distribution,and data range.To maintain the original data features while reducing the data dimension,including the original spectral data,five sets of data were subjected to Principal Component Analysis(PCA)and Linear Discriminant Analysis(LDA)dimensionality reduction.Through comparing the clustering effect and Fisher's ratio of the first three dimensions,PCA was identified as the optimal dimensionality reduction method.Finally,two neural network models,CT+PCA+CNN and CT+PCA+ResNet,were constructed by combining Convolutional Neural Networks(CNN)and Residual Neural Networks(ResNet),respectively.When selecting the neural network models,the training time,number of iterative parameters,accuracy,and cross-entropy loss function in the classification problem were compared to determine the model best suited for water source data.The results indicated that CT+PCA+ResNet was the optimal approach for water source identification in this study.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
文摘The increasing requirements for bandwidth drive the 100G Ethernet into use as quickly as possible. The major technologies supporting 100G Ethernet interface include the physical layer channel convergence technology, multi-fiber channel and Wavelength Division Multiplexing (WDM) technology. The key technology for high-speed optical devices at the interface requires a breakthrough. The demands driven by the increase of interface rate require better packet processing and storage, system switching, and backplane technology. In addition, in the network, the transport problem of the new interface should be solved, including defining transport standards and pushing the development of key transport technologies. As far as the cost and requirements are concerned, the commercial application of 100G Ethernet is viable in Metropolitan Area Networks (MANs).
基金supported by Science and Technology Commission of Shanghai Municipality(No.16411971300)Key Laboratory of Geriatrics of Shanghai Municipality(No.13dz2260700)
文摘Objective: To evaluate the effect of Internet technology on continuing nursing in elderly patients with diabetic feet, Method: From January 2015 to July 2016,12 elderly patients with diabetic foot ulcers were enrolled from the Endocrinology Department in our hospital. We used "WeChat", "E nursing" and other Internet technologies to perform remote extended care and to observe the foot ulcer outcomes. Results: All foot ulcers healed with a wound healing time between 38 and 73 days (average 57.08 ~ 12.69 days). Patients did not need to travel long distances to seek medical treatment for foot ulcers, improving their satisfaction. Conclusions: The implementation of extended care for elderly patients with diabetic foot ulcers was based on the application of Internet technology. It is helpful to facilitate medical treatment, share high quality health resources and promote disease rehabilitation.
基金This work was funded by the Natural Science Foundation of China under Grant 60572066
文摘Wireless Mesh Network (WMN) has been actively researched and developed as a new network technology to support broadband high- speed multimedia services . This paper discusses WMN technology and applications , and introduces the basic technologies , typical applications and current development of the WMN. With the future development of wireless distribution technology and network, wireless Mesh technology and network will become the key networking technology and architecture of wireless mobile communications , and will be widely used in various wireless networks with more important roles .