Electromagnetic holographic data are characterized by two modes, suggesting that image reconstruction requires a dual-mode sensitivity field as well. We analyze an electromagnetic holographic field based on tomography...Electromagnetic holographic data are characterized by two modes, suggesting that image reconstruction requires a dual-mode sensitivity field as well. We analyze an electromagnetic holographic field based on tomography theory and Radon inverse transform to derive the expression of the electromagnetic holographic sensitivity field (EMHSF). Then, we apply the EMHSF calculated by using finite-element methods to flow simulations and holographic imaging. The results suggest that the EMHSF based on the partial derivative of radius of the complex electric potential φ is closely linked to the Radon inverse transform and encompasses the sensitivities of the amplitude and phase data. The flow images obtained with inversion using EMHSF better agree with the actual flow patterns. The EMHSF overcomes the limitations of traditional single-mode sensitivity fields.展开更多
As a kind of substrate competition type 5α reductase inhibitor,finasteride is a promising medicine used in the clinical treatment of benign prostatic hyperplasia (BPH).In this paper,a new route for the synthesis of...As a kind of substrate competition type 5α reductase inhibitor,finasteride is a promising medicine used in the clinical treatment of benign prostatic hyperplasia (BPH).In this paper,a new route for the synthesis of finasteride from pregnenolone was proposed.Thus,pregnenolone was converted to finasteride in 10 steps,i.e.,ammoniumation,methoxylation,Oppenauer oxidation,hydrolyzation,cleavage of Δ 4 double bond by oxidation,ring closure by ammonia,hydrogenation of Δ 5 double bond,esterification with methanol,dehydrogenation of 1,2 position in A ring and Bodroux reaction.In this route,expensive reagent 2,2 dipyridyl disulfide commonly used in previous literature was avoided.All of the desired compounds were characterized by MS or/and NMR.The overall yield of finasteride was 13.67% based on pregnenolone.展开更多
Aim To design a practical synthetic route of anisodine. Methods Starting from3α-hydroxy-6β-acetyltropine, anisodine was synthesized in 11 steps. Result Anisodine wasobtainded with an overall yield of 2.6 % . Conclus...Aim To design a practical synthetic route of anisodine. Methods Starting from3α-hydroxy-6β-acetyltropine, anisodine was synthesized in 11 steps. Result Anisodine wasobtainded with an overall yield of 2.6 % . Conclusion Total synthetic route of anisodine wasachieved which may afford a possible route for commercial preparation of anisodine.展开更多
2.5 Gbit/s monolithic integrated circuits (ICs) for optical fiber transmitter and receiver in 0.35 μm CMOS (complementary metal-oxide-semiconductor transistor) process are presented. The transmitter, which includ...2.5 Gbit/s monolithic integrated circuits (ICs) for optical fiber transmitter and receiver in 0.35 μm CMOS (complementary metal-oxide-semiconductor transistor) process are presented. The transmitter, which includes a 4: 1 multiplexer and a laser diode driver (LDD), has four 622 Mbit/s random signals as its inputs and gets a 2.5 Gbit/s driving signal as its output; the receiver detects a 2.5 Gbit/s random signal and gets four 622 Mbit/s signals at the output. The main circuits include a trans-impedance amplifier (TIA), a limiting amplifier, a clock and data recovery (CDR) unit, and a 1: 4 demultiplexer (DEMUX). Test results prove the logic functions of the transmitter to be right, and the 10% to 90% rise and fall times of transmitter's output data eye diagram are 211.1 ps and 200 ps, respectively. The sensitivity of the receiver is measured to be better than 20 mV. The root mean square jitter of the DEMUX's output data is 15.6 ps and that of the clock after 1: 4 frequency dividing is 1.9 ps. Two chips are both applicable to 2.5 Gbit/s optical fiber communication systems.展开更多
Durability zonation standard (DZS) is proposed to provide useful parameters for durable concrete structure design. It deals not only with the influence of environment on structures, but also with types, functions an...Durability zonation standard (DZS) is proposed to provide useful parameters for durable concrete structure design. It deals not only with the influence of environment on structures, but also with types, functions and importance of structures based on the theory of life cycle cost(LCC). First, the basic concept of DZS for concrete structure design is defined. Then the basic principles for DZS are established. The factors for zonation according to natural environmental conditions and structural importance are identified. The usefulness of DZS by citing a real application for concrete highway bridges in Zhejiang Province is demonstrated. Finally, durability regulations are provided accordingly to zonation.展开更多
An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web mod...An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies.展开更多
Based on the status of land ecological resources in Hohhot, 20 indexes covering nature, resource environment, economy and society were selected and the evaluation index system was established. With the principal compo...Based on the status of land ecological resources in Hohhot, 20 indexes covering nature, resource environment, economy and society were selected and the evaluation index system was established. With the principal component analysis, the land ecological security of Hohhot from 2009 to 2015 was analyzed. The results showed that the land ecological security of Hohhot was declining year by year in 2009-2015. Besides, per capital GDP and public green area, the proportion of in- dustry and the price index of agricultural and animal husbandry production materials were the key factors influencing the land ecological security of Hohhot. The key for protection of the land ecological security may lie in the protection of land quality and prevention of land degradation in farming and stock-breeding areas.展开更多
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a...Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.展开更多
The individual functions of ACC and ABS/ASR are described in the improvements of active safety while the road vehicles travel at a high speed. Being a logic extension of and many inherent connections with ABS/BSR, ACC...The individual functions of ACC and ABS/ASR are described in the improvements of active safety while the road vehicles travel at a high speed. Being a logic extension of and many inherent connections with ABS/BSR, ACC is easily integrated with ABS/ASR to form an integrated system by adding the headway distance? detecting device to the existing ABS/ASR system and expanding the ABS/ASR software. The algorithm flowcharts and control methods of the ABS/ASR/ACC are given. The advantages of the ABS/ASR/ACC system compared with those using the stand alone systems ABS, ASR and ACC are mentioned in details.展开更多
基金supported by the National Science and Technology Major Project(No.2011ZX05020-006)
文摘Electromagnetic holographic data are characterized by two modes, suggesting that image reconstruction requires a dual-mode sensitivity field as well. We analyze an electromagnetic holographic field based on tomography theory and Radon inverse transform to derive the expression of the electromagnetic holographic sensitivity field (EMHSF). Then, we apply the EMHSF calculated by using finite-element methods to flow simulations and holographic imaging. The results suggest that the EMHSF based on the partial derivative of radius of the complex electric potential φ is closely linked to the Radon inverse transform and encompasses the sensitivities of the amplitude and phase data. The flow images obtained with inversion using EMHSF better agree with the actual flow patterns. The EMHSF overcomes the limitations of traditional single-mode sensitivity fields.
文摘As a kind of substrate competition type 5α reductase inhibitor,finasteride is a promising medicine used in the clinical treatment of benign prostatic hyperplasia (BPH).In this paper,a new route for the synthesis of finasteride from pregnenolone was proposed.Thus,pregnenolone was converted to finasteride in 10 steps,i.e.,ammoniumation,methoxylation,Oppenauer oxidation,hydrolyzation,cleavage of Δ 4 double bond by oxidation,ring closure by ammonia,hydrogenation of Δ 5 double bond,esterification with methanol,dehydrogenation of 1,2 position in A ring and Bodroux reaction.In this route,expensive reagent 2,2 dipyridyl disulfide commonly used in previous literature was avoided.All of the desired compounds were characterized by MS or/and NMR.The overall yield of finasteride was 13.67% based on pregnenolone.
文摘Aim To design a practical synthetic route of anisodine. Methods Starting from3α-hydroxy-6β-acetyltropine, anisodine was synthesized in 11 steps. Result Anisodine wasobtainded with an overall yield of 2.6 % . Conclusion Total synthetic route of anisodine wasachieved which may afford a possible route for commercial preparation of anisodine.
基金The National High Technology Research and Develop-ment Program of China (863 Program) (No.2001AA312010).
文摘2.5 Gbit/s monolithic integrated circuits (ICs) for optical fiber transmitter and receiver in 0.35 μm CMOS (complementary metal-oxide-semiconductor transistor) process are presented. The transmitter, which includes a 4: 1 multiplexer and a laser diode driver (LDD), has four 622 Mbit/s random signals as its inputs and gets a 2.5 Gbit/s driving signal as its output; the receiver detects a 2.5 Gbit/s random signal and gets four 622 Mbit/s signals at the output. The main circuits include a trans-impedance amplifier (TIA), a limiting amplifier, a clock and data recovery (CDR) unit, and a 1: 4 demultiplexer (DEMUX). Test results prove the logic functions of the transmitter to be right, and the 10% to 90% rise and fall times of transmitter's output data eye diagram are 211.1 ps and 200 ps, respectively. The sensitivity of the receiver is measured to be better than 20 mV. The root mean square jitter of the DEMUX's output data is 15.6 ps and that of the clock after 1: 4 frequency dividing is 1.9 ps. Two chips are both applicable to 2.5 Gbit/s optical fiber communication systems.
基金The Key Project of National Natural Science Foun-dation of China (No50538070)
文摘Durability zonation standard (DZS) is proposed to provide useful parameters for durable concrete structure design. It deals not only with the influence of environment on structures, but also with types, functions and importance of structures based on the theory of life cycle cost(LCC). First, the basic concept of DZS for concrete structure design is defined. Then the basic principles for DZS are established. The factors for zonation according to natural environmental conditions and structural importance are identified. The usefulness of DZS by citing a real application for concrete highway bridges in Zhejiang Province is demonstrated. Finally, durability regulations are provided accordingly to zonation.
基金The National Natural Science Foundation of China(No.60474037),Program for New Century Excellent Talents in Univer-sity (No.NCET-04-415).
文摘An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies.
基金Supported by the Funding Project for the Youth of Education Ministry for the Development of Liberal Arts and Social Sciences(12YJC790058)the Guidance Plan Project for the Natural Science Foundation of Hubei(2013CFC089)the Open-end Fund of Hubei Ecological Culture Research Center,China University of Geosciences(Wuhan)~~
文摘Based on the status of land ecological resources in Hohhot, 20 indexes covering nature, resource environment, economy and society were selected and the evaluation index system was established. With the principal component analysis, the land ecological security of Hohhot from 2009 to 2015 was analyzed. The results showed that the land ecological security of Hohhot was declining year by year in 2009-2015. Besides, per capital GDP and public green area, the proportion of in- dustry and the price index of agricultural and animal husbandry production materials were the key factors influencing the land ecological security of Hohhot. The key for protection of the land ecological security may lie in the protection of land quality and prevention of land degradation in farming and stock-breeding areas.
基金The National Natural Science Foundation of China(No.71371050)
文摘Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.
文摘The individual functions of ACC and ABS/ASR are described in the improvements of active safety while the road vehicles travel at a high speed. Being a logic extension of and many inherent connections with ABS/BSR, ACC is easily integrated with ABS/ASR to form an integrated system by adding the headway distance? detecting device to the existing ABS/ASR system and expanding the ABS/ASR software. The algorithm flowcharts and control methods of the ABS/ASR/ACC are given. The advantages of the ABS/ASR/ACC system compared with those using the stand alone systems ABS, ASR and ACC are mentioned in details.