[Objective]The aim of this study was to investigate whether communication signal C6-HSL among individual bacteria can influence plant growth and disease resistance ability. [Method]With potato virus-free plantlets as ...[Objective]The aim of this study was to investigate whether communication signal C6-HSL among individual bacteria can influence plant growth and disease resistance ability. [Method]With potato virus-free plantlets as the test materials and C6-HSL as the inducer,the potato's growth and the ability of resistance against Erwinia carotovora subp carotovora were tested after being treated by C6-HSL with different concentrations. The effects of C6-HSL on plant landmark defense enzyme activities and H2O2 content in potato leaves were measured especially. [Result]C6-HSL with different concentrations could obviously inhibit the growth rate of root and the number of roots,but had no effect on plant height,number of nodes and leaf size. POD or SOD activity and H2O2 content in plant landmark defense enzymes significantly increased after induction of C6-HSL,but PAL and PPO activity had no obvious change. In the resistant test,potato plants induced by C6-HSL could inhibit the infection of Erwinia carotovora subp carotovora effectively,and its incidence was significantly lower than the control group. [Conclusion]Bacteria AHL can be possibly used as a new kind of plant disease-resistant activator.展开更多
A cDNA library was successfully constructed from Anip973, a human lung adenocarcinoma cell line with high metastatic potential. NIH3T3 cells were stably transfected using this cDNA library and screened for morphologic...A cDNA library was successfully constructed from Anip973, a human lung adenocarcinoma cell line with high metastatic potential. NIH3T3 cells were stably transfected using this cDNA library and screened for morphological changes in a soft agar assay. Genomic DNA was isolated from putative clones and the integrated sequence was retrieved by PCR and sequencing. Three known genes, ribosomal protein L23, hypothetical protein FLJ22104, and serine protease inhibitor, kazal type 6 and a number of 5'-terminally truncated sequences were identified. Furthermore, cells transfected with ribosomal protein L23 was highly invasive compared with the empty vector as control (P 〈 0.02). These results indicate that the expression cloning of cDNA libraries in NIH3T3 cells and subsequent screening for loss of contact inhibition in soft agar is a viable tool for identifying tumor-related genes and ribosomal protein L23 gene plays a role in cell movement and metastasis.展开更多
There exists an inherent difficulty in the original algorithm for the construction of Dwarf, which prevents it from constructing true Dwarfs. We explained when and why it introduces suffix redundancies into the Dwarf ...There exists an inherent difficulty in the original algorithm for the construction of Dwarf, which prevents it from constructing true Dwarfs. We explained when and why it introduces suffix redundancies into the Dwarf structure. To solve this problem, we proposed a completely new algorithm called PID. It bottom-up computes partitions of a fact table, and inserts them into the Dwarf structure. If a partition is an MSV partition, coalesce its sub-Dwarf; otherwise create necessary nodes and cells. Our performance study showed that PID is efficient. For further condensing of Dwarf, we proposed Condensed Dwarf, a more com- pressed structure, combining the strength of Dwarf and Condensed Cube. By eliminating unnecessary stores of “ALL” cells from the Dwarf structure, Condensed Dwarf could effectively reduce the size of Dwarf, especially for Dwarfs of the real world, which was illustrated by our experiments. Its query processing is still simple and, only two minor modifications to PID are required for the construction of Condensed Dwarf.展开更多
The purpose of this study is to investigate the role of bolt profile configuration in load transfer capacity between the bolt and grout.Therefore,five types of rock bolts are used with different profiles.The rock bolt...The purpose of this study is to investigate the role of bolt profile configuration in load transfer capacity between the bolt and grout.Therefore,five types of rock bolts are used with different profiles.The rock bolts are modeled by ANSYS software.Models show that profile rock bolt T_3 and T_ with load capacity 180 and 195 kN in the jointed rocks,are the optimum profiles.Finally,the performances of the selected profiles are examined in Tabas Coal Mine by FLAC software.There is good subscription between the results of numerical modeling and instrumentation reading such as tells tale,sonic extensometer and strain gauge rock bolt.According to the finding of this study,the proposed pattern of rock bolts,on 7 + 6 patterns per meter with 2 flexi bolt(4 m) for support gate road.展开更多
This paper presents a new approach to determining whether an interested personal name across doeuments refers to the same entity. Firstly,three vectors for each text are formed: the personal name Boolean vectors deno...This paper presents a new approach to determining whether an interested personal name across doeuments refers to the same entity. Firstly,three vectors for each text are formed: the personal name Boolean vectors denoting whether a personal name occurs the text the biographical word Boolean vector representing title, occupation and so forth, and the feature vector with real values. Then, by combining a heuristic strategy based on Boolean vectors with an agglomeratie clustering algorithm based on feature vectors, it seeks to resolve multi-document personal name coreference. Experimental results show that this approach achieves a good performance by testing on "Wang Gang" corpus.展开更多
The purpose of this study was to investigate the effect of bolt profile on load transfer mechanism of fully grouted bolts in jointed rocks using analytical and numerical methods. Based on the analytical method with de...The purpose of this study was to investigate the effect of bolt profile on load transfer mechanism of fully grouted bolts in jointed rocks using analytical and numerical methods. Based on the analytical method with development of methods, a new model is presented. To validate the analytical model, five different profiles modeled by ANSYS software. The profile of rock bolts T3 and T4with load transfer capacity,respectively 180 and 195 kN in the jointed rocks was selected as the optimum profiles. Finally, the selected profiles were examined in Tabas Coal Mine. FLAC analysis indicates that patterns 6+7 with2 NO flexi bolt 4 m better than other patterns within the faulted zone.展开更多
This paper investigates social dimensions in the Libyan family and their relationship to the common practice of bribery. In Libya, bribery is most noticeable in administrative contexts where other practices such as fa...This paper investigates social dimensions in the Libyan family and their relationship to the common practice of bribery. In Libya, bribery is most noticeable in administrative contexts where other practices such as favouritism, fraud and forgery are also found. The paper aims to make an original contribution to knowledge in a little-researched area by examining social dimensions and cultural practices. The paper is based on the basic assumption that there is a relationship between accepting bribes and social dimensions surrounding the family in Libya and will thus also examine bribery as a social culture, by means of a set of variables such as gifts, promises, assistance and loans. The study took place in Benghazi, Libya, where the number of employees exceeded 200. The study was conducted using an interpretative epistemology and a quantitative method. Data were collected using quantitative research instruments and the Statistical Package for the Social Sciences (SPSS) was used to analyse the data. The findings of the study suggest that there is a relationship between family relationships, social status and the commission of the crime of bribery except for variables of social status and cultural background, in addition to the social relationship's effect on administration.展开更多
Software architectures shift the focus of developers from lines-of-code to coarser-grained architectural elements and their overall interconnection structure. There are, however, many features of the distributed softw...Software architectures shift the focus of developers from lines-of-code to coarser-grained architectural elements and their overall interconnection structure. There are, however, many features of the distributed software that make the developing methods of distributed software quite different from the traditional ways. Furthermore, the traditional centralized ways with fixed interfaces cannot adapt to the flexible requirements of distributed software. In this paper, the attributed grammar (AG) is extended to refine the characters of distributed software, and a distributed software architecture description language (DSADL) based on attributed grammar is introduced, and then a model of integrated environment for software architecture design is proposed. It can be demonstrated by the practice that DSADL can help the programmers to analyze and design distributed software effectively, so the efficiency of the development can be improved greatly.展开更多
This research is dedicated to assessment of a method that was earlier proposed and developed in order to increase the degree of automation and software involvement into conceptual decision making during design of stru...This research is dedicated to assessment of a method that was earlier proposed and developed in order to increase the degree of automation and software involvement into conceptual decision making during design of structural elements of buildings. Such instruments of the theory of inventive problem solving as contradiction and function analysis and trimming formed the basis of the proposed approach that was realized in a modern building information modeling software. The common logic of the approach is also provided in the article. Qualitative research methods and particularly collecting, analyzing and interpreting data were applied in this research. Firstly, a literature review of indexed journal articles in the field of the study was performed and some trends for possible development of the topic were identified. Secondly, a survey of potential users of the methodology was conducted and analyzed. The questionnaire results showed that the suggested method and its technical realization gained attraction among respondents, however, some of them are rather cautious regarding application of the approach potentials in their practice. The paper ends with evaluation results discussion, conclusion and proposals for further research.展开更多
Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt f...Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software.展开更多
There are several software estimation models such as Line of Code, Function Point and COnstructive COst MOdel (COCOMO). The original COCOMO model is one of the most widely practiced and popular among the software de...There are several software estimation models such as Line of Code, Function Point and COnstructive COst MOdel (COCOMO). The original COCOMO model is one of the most widely practiced and popular among the software development community because of its flexible usage. It is a suite of models i.e., COnstructive Cost MOdel I and COnstructive Cost MOdel II. in this paper, we are evaluating the both models, to find out the level of efficiency they present and how they can be tailored to the needs of modem software development projects. We are applying COCOMO models on a case study of an e-commerce application that is built using Hyper Text Markup Language (HTML) and JavaScript. We will also shed light on the different components of each model, and how their Cost Drivers effect on the accuracy of cost estimations for software development projects.展开更多
Computer Assisted Language Learning (CALL) is playing a more important role in Teaching of English as a Foreign Language (TEFL). Teachers of English classroom need to discover more benefits from the computer as an...Computer Assisted Language Learning (CALL) is playing a more important role in Teaching of English as a Foreign Language (TEFL). Teachers of English classroom need to discover more benefits from the computer as an assisting tool. This paper first deals with the roles of the computer, and then expatiates on the benefits software can bring to both English teachers and learners. This paper also suggests some tasks designed upon software and attempts to serve as a little drop which can make a shower on a further study on CALL.展开更多
The paper shows a proposition of metrics for measuring the complexity of the business organization and business software. The metrics is based on a subjective estimation of complexity of the elements from a part of th...The paper shows a proposition of metrics for measuring the complexity of the business organization and business software. The metrics is based on a subjective estimation of complexity of the elements from a part of the structure of business organization or business software in relation to other elements from the observed part. Estimation is performed based on the measuring scale for comparison of complexity of elements, and reaching a final conclusion on the complexity of elements in relation to other elements, through the Analytic Hierarchy Process (AHP). Defined in this manner, the metrics represents a unique metrics for measuring the complexity of elements of business organization and business software, which enables their comparison. The paper also presents a short overview of existing metrics for measuring the complexity of business organization and business software.展开更多
Several problems about acupuncture and moxibustion for treatment of soft tissue injury are probed in the present paper. The author holds that for treatment of soft tissue injury with acupuncture and moxibustion, first...Several problems about acupuncture and moxibustion for treatment of soft tissue injury are probed in the present paper. The author holds that for treatment of soft tissue injury with acupuncture and moxibustion, firstly, must clarify the lesion location, so as to understand pathogenic characteristics and select the best acupuncture forcing point; secondly, must distinguish different stages of the disease, so as to select the best proper acupuncture stimulation method according to different pathological mechanisms in acute and chronic stages. Finally, the author analyzes different stimulation characteristics and indications according to own experience on clinical commonly-used several acupuncture and moxibustion stimulation methods such as filiform needle, acupoint injection, micro-needle therapy including ear acupuncture, abdomen acupuncture, eye acupuncture and so on, and blood-letting puncturing and cupping, fire needle and small needle-knife, and puts forward own treatment points of view.展开更多
基金Supported by Natural Science Foundation in Hebei Province(C200600707)~~
文摘[Objective]The aim of this study was to investigate whether communication signal C6-HSL among individual bacteria can influence plant growth and disease resistance ability. [Method]With potato virus-free plantlets as the test materials and C6-HSL as the inducer,the potato's growth and the ability of resistance against Erwinia carotovora subp carotovora were tested after being treated by C6-HSL with different concentrations. The effects of C6-HSL on plant landmark defense enzyme activities and H2O2 content in potato leaves were measured especially. [Result]C6-HSL with different concentrations could obviously inhibit the growth rate of root and the number of roots,but had no effect on plant height,number of nodes and leaf size. POD or SOD activity and H2O2 content in plant landmark defense enzymes significantly increased after induction of C6-HSL,but PAL and PPO activity had no obvious change. In the resistant test,potato plants induced by C6-HSL could inhibit the infection of Erwinia carotovora subp carotovora effectively,and its incidence was significantly lower than the control group. [Conclusion]Bacteria AHL can be possibly used as a new kind of plant disease-resistant activator.
基金This work was supported by Returning Scholars Fund of Heilongjiang Province (No. LC04C02) the Department of Education Overseas Researcher Fund of Heilongjiang Province (No. 1054HZ013).
文摘A cDNA library was successfully constructed from Anip973, a human lung adenocarcinoma cell line with high metastatic potential. NIH3T3 cells were stably transfected using this cDNA library and screened for morphological changes in a soft agar assay. Genomic DNA was isolated from putative clones and the integrated sequence was retrieved by PCR and sequencing. Three known genes, ribosomal protein L23, hypothetical protein FLJ22104, and serine protease inhibitor, kazal type 6 and a number of 5'-terminally truncated sequences were identified. Furthermore, cells transfected with ribosomal protein L23 was highly invasive compared with the empty vector as control (P 〈 0.02). These results indicate that the expression cloning of cDNA libraries in NIH3T3 cells and subsequent screening for loss of contact inhibition in soft agar is a viable tool for identifying tumor-related genes and ribosomal protein L23 gene plays a role in cell movement and metastasis.
基金Project (No. 20030487032) supported by the Specialized Research Fund for the Doctoral Program of Higher Education, China
文摘There exists an inherent difficulty in the original algorithm for the construction of Dwarf, which prevents it from constructing true Dwarfs. We explained when and why it introduces suffix redundancies into the Dwarf structure. To solve this problem, we proposed a completely new algorithm called PID. It bottom-up computes partitions of a fact table, and inserts them into the Dwarf structure. If a partition is an MSV partition, coalesce its sub-Dwarf; otherwise create necessary nodes and cells. Our performance study showed that PID is efficient. For further condensing of Dwarf, we proposed Condensed Dwarf, a more com- pressed structure, combining the strength of Dwarf and Condensed Cube. By eliminating unnecessary stores of “ALL” cells from the Dwarf structure, Condensed Dwarf could effectively reduce the size of Dwarf, especially for Dwarfs of the real world, which was illustrated by our experiments. Its query processing is still simple and, only two minor modifications to PID are required for the construction of Condensed Dwarf.
文摘The purpose of this study is to investigate the role of bolt profile configuration in load transfer capacity between the bolt and grout.Therefore,five types of rock bolts are used with different profiles.The rock bolts are modeled by ANSYS software.Models show that profile rock bolt T_3 and T_ with load capacity 180 and 195 kN in the jointed rocks,are the optimum profiles.Finally,the performances of the selected profiles are examined in Tabas Coal Mine by FLAC software.There is good subscription between the results of numerical modeling and instrumentation reading such as tells tale,sonic extensometer and strain gauge rock bolt.According to the finding of this study,the proposed pattern of rock bolts,on 7 + 6 patterns per meter with 2 flexi bolt(4 m) for support gate road.
文摘This paper presents a new approach to determining whether an interested personal name across doeuments refers to the same entity. Firstly,three vectors for each text are formed: the personal name Boolean vectors denoting whether a personal name occurs the text the biographical word Boolean vector representing title, occupation and so forth, and the feature vector with real values. Then, by combining a heuristic strategy based on Boolean vectors with an agglomeratie clustering algorithm based on feature vectors, it seeks to resolve multi-document personal name coreference. Experimental results show that this approach achieves a good performance by testing on "Wang Gang" corpus.
文摘The purpose of this study was to investigate the effect of bolt profile on load transfer mechanism of fully grouted bolts in jointed rocks using analytical and numerical methods. Based on the analytical method with development of methods, a new model is presented. To validate the analytical model, five different profiles modeled by ANSYS software. The profile of rock bolts T3 and T4with load transfer capacity,respectively 180 and 195 kN in the jointed rocks was selected as the optimum profiles. Finally, the selected profiles were examined in Tabas Coal Mine. FLAC analysis indicates that patterns 6+7 with2 NO flexi bolt 4 m better than other patterns within the faulted zone.
文摘This paper investigates social dimensions in the Libyan family and their relationship to the common practice of bribery. In Libya, bribery is most noticeable in administrative contexts where other practices such as favouritism, fraud and forgery are also found. The paper aims to make an original contribution to knowledge in a little-researched area by examining social dimensions and cultural practices. The paper is based on the basic assumption that there is a relationship between accepting bribes and social dimensions surrounding the family in Libya and will thus also examine bribery as a social culture, by means of a set of variables such as gifts, promises, assistance and loans. The study took place in Benghazi, Libya, where the number of employees exceeded 200. The study was conducted using an interpretative epistemology and a quantitative method. Data were collected using quantitative research instruments and the Statistical Package for the Social Sciences (SPSS) was used to analyse the data. The findings of the study suggest that there is a relationship between family relationships, social status and the commission of the crime of bribery except for variables of social status and cultural background, in addition to the social relationship's effect on administration.
基金Project (No. 2000K08-G12) supported by Shaanxi Provincial Science and Technology Development Plan, China
文摘Software architectures shift the focus of developers from lines-of-code to coarser-grained architectural elements and their overall interconnection structure. There are, however, many features of the distributed software that make the developing methods of distributed software quite different from the traditional ways. Furthermore, the traditional centralized ways with fixed interfaces cannot adapt to the flexible requirements of distributed software. In this paper, the attributed grammar (AG) is extended to refine the characters of distributed software, and a distributed software architecture description language (DSADL) based on attributed grammar is introduced, and then a model of integrated environment for software architecture design is proposed. It can be demonstrated by the practice that DSADL can help the programmers to analyze and design distributed software effectively, so the efficiency of the development can be improved greatly.
文摘This research is dedicated to assessment of a method that was earlier proposed and developed in order to increase the degree of automation and software involvement into conceptual decision making during design of structural elements of buildings. Such instruments of the theory of inventive problem solving as contradiction and function analysis and trimming formed the basis of the proposed approach that was realized in a modern building information modeling software. The common logic of the approach is also provided in the article. Qualitative research methods and particularly collecting, analyzing and interpreting data were applied in this research. Firstly, a literature review of indexed journal articles in the field of the study was performed and some trends for possible development of the topic were identified. Secondly, a survey of potential users of the methodology was conducted and analyzed. The questionnaire results showed that the suggested method and its technical realization gained attraction among respondents, however, some of them are rather cautious regarding application of the approach potentials in their practice. The paper ends with evaluation results discussion, conclusion and proposals for further research.
文摘Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software.
文摘There are several software estimation models such as Line of Code, Function Point and COnstructive COst MOdel (COCOMO). The original COCOMO model is one of the most widely practiced and popular among the software development community because of its flexible usage. It is a suite of models i.e., COnstructive Cost MOdel I and COnstructive Cost MOdel II. in this paper, we are evaluating the both models, to find out the level of efficiency they present and how they can be tailored to the needs of modem software development projects. We are applying COCOMO models on a case study of an e-commerce application that is built using Hyper Text Markup Language (HTML) and JavaScript. We will also shed light on the different components of each model, and how their Cost Drivers effect on the accuracy of cost estimations for software development projects.
文摘Computer Assisted Language Learning (CALL) is playing a more important role in Teaching of English as a Foreign Language (TEFL). Teachers of English classroom need to discover more benefits from the computer as an assisting tool. This paper first deals with the roles of the computer, and then expatiates on the benefits software can bring to both English teachers and learners. This paper also suggests some tasks designed upon software and attempts to serve as a little drop which can make a shower on a further study on CALL.
文摘The paper shows a proposition of metrics for measuring the complexity of the business organization and business software. The metrics is based on a subjective estimation of complexity of the elements from a part of the structure of business organization or business software in relation to other elements from the observed part. Estimation is performed based on the measuring scale for comparison of complexity of elements, and reaching a final conclusion on the complexity of elements in relation to other elements, through the Analytic Hierarchy Process (AHP). Defined in this manner, the metrics represents a unique metrics for measuring the complexity of elements of business organization and business software, which enables their comparison. The paper also presents a short overview of existing metrics for measuring the complexity of business organization and business software.
文摘Several problems about acupuncture and moxibustion for treatment of soft tissue injury are probed in the present paper. The author holds that for treatment of soft tissue injury with acupuncture and moxibustion, firstly, must clarify the lesion location, so as to understand pathogenic characteristics and select the best acupuncture forcing point; secondly, must distinguish different stages of the disease, so as to select the best proper acupuncture stimulation method according to different pathological mechanisms in acute and chronic stages. Finally, the author analyzes different stimulation characteristics and indications according to own experience on clinical commonly-used several acupuncture and moxibustion stimulation methods such as filiform needle, acupoint injection, micro-needle therapy including ear acupuncture, abdomen acupuncture, eye acupuncture and so on, and blood-letting puncturing and cupping, fire needle and small needle-knife, and puts forward own treatment points of view.