It is important to select suitable organisms to adapt the requirement of different environment monitoring purposes.Following our previous study,the behavioral responses of Daphnia magna and Japanese madaka (Oryzias l...It is important to select suitable organisms to adapt the requirement of different environment monitoring purposes.Following our previous study,the behavioral responses of Daphnia magna and Japanese madaka (Oryzias latipes) were investigated and compared under flow-through conditions in an on-line biomonitoring system.The results showed that both D.magna and Japanese madaka had similar biological clock,but the circadian rhythms of Japanese madaka was more clearly recorded than that of D.magna.And the sensitivity of D.magna was about two orders of magnitudes higher than that of Japanese madaka in different types of toxic chemicals (dichlorovos,deltamethrin and cadmium chloride).However,when both animals were used in an on-line biomonitoring system,the life span of D.magna was less than 7 days and Japanese madaka could last for more than one month without feeding.Therefore,D.magna was proposed to be a more sensitive bioindicator and was suitable for short term monitoring the pollution events at concentration level closing to the water quality standard,while Japanese madaka was more suitable for the long-term monitoring for accidental discharges.展开更多
The FEM technology is used to analyze the welding line movement behavior of deep drawing TWB sheet with different thickness. It is found that high stress fields are concentrated around the welding line and large resid...The FEM technology is used to analyze the welding line movement behavior of deep drawing TWB sheet with different thickness. It is found that high stress fields are concentrated around the welding line and large residual stresses are left. The effect of the welding line movement is like a rigid string and the selected nodes of the thin part near the welding line show the related larger strain.展开更多
Objective To characterize and compare the different biological behaviors of two novel human osteosarcoma cell lines,Zos and Zos-M,established respectively from the primary site and the skip metastasis of an osteosarco...Objective To characterize and compare the different biological behaviors of two novel human osteosarcoma cell lines,Zos and Zos-M,established respectively from the primary site and the skip metastasis of an osteosarcoma patient.Methods Two展开更多
This article contains a system conversion from object oriented design into Software Product Line (SPL) using delta modeling of Abstract Behavioral Specification (ABS). ABS is a modeling language which targets system w...This article contains a system conversion from object oriented design into Software Product Line (SPL) using delta modeling of Abstract Behavioral Specification (ABS). ABS is a modeling language which targets system with high level of variety and supports SPL development with delta modeling. The case study of this thesis is a digital library system called Library Automation and Digital Archive (LONTAR). Originally, LONTAR only uses SOAP-based web service. With ABS, LONTAR will be converted into SPL and implement another web service called REST. The motivation of this conversion of LONTAR from object oriented into SPL is because it is easier to develop system with ABS than using regular object oriented. Product definition in ABS is relatively easier than creating a new subclass and do customization to make it works well.展开更多
The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third partie...The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required.展开更多
The access to electricity in rural areas is extremely limited, but it is crucial for all citizens. The population in rural areas of sub-Saharan African (SSA) countries is generally low, making it economically unfeasib...The access to electricity in rural areas is extremely limited, but it is crucial for all citizens. The population in rural areas of sub-Saharan African (SSA) countries is generally low, making it economically unfeasible to implement traditional rural electrification (CRE) projects due to the high cost of establishing the necessary distribution infrastructure. To address this cost issue, one alternative technology for rural electrification (URE) that can be explored is the Capacitor Coupled Substation (CCS) technology. CCS is a cost-effective solution for supplying electricity to rural areas. The research is necessitated by the need to offer a cost-effective technology for supplying electricity to sparsely populated communities. This paper examines the impact on the transmission network when a 400 kV/400V CCS is connected to it. The system response when a CCS is connected to the network was modeled using MATLAB/Si-mulink. The results, based on the fixed load of 80 kW, showed negligible interference on the transmission line voltage. However, there was minor impact on the parameters downstream of the tapping point. These findings were further supported by introducing a fault condition to the CCS, which showed that interferences with the CCS could affect the overall stability of the transmission network downstream of the tapping node, similar to the behavior of an unstable load.展开更多
Perceived risk is an important concept in consumer behavior in online shopping. It impedes the adopting online shopping. A structure model with seven factors of consumer's perceived risk in online shopping is deve...Perceived risk is an important concept in consumer behavior in online shopping. It impedes the adopting online shopping. A structure model with seven factors of consumer's perceived risk in online shopping is developed in this paper. The results have the descriptive power about Chinese consumers' perceived risk in Internet shopping and provide framework for managerial use in China's e-commerce market environment.展开更多
We analyze the particular behavior exhibited by a chaotic waves field containing Peregrine soliton and Akhmediev breathers. This behavior can be assimilated to a tree with “roots of propagation” which propagate rand...We analyze the particular behavior exhibited by a chaotic waves field containing Peregrine soliton and Akhmediev breathers. This behavior can be assimilated to a tree with “roots of propagation” which propagate randomly. Besides, this strange phenomenon can be called “tree structures”. So, we present the collapse of dark and bright solitons in order to build up the above mentioned chaotic waves field. The investigation is done in a particular nonlinear transmission line called chameleon nonlinear transmission line. Thus, we show that this line acts as a bandpass filter at low frequencies and the impact of distance, frequency and dimensionless capacitor are also presented. In addition, the chameleon’s behavior is due to the fact that without modifying the appearance structure, it can present alternatively purely right- or left-handed transmission line. This line is different to the composite one.展开更多
基金supported by the National Key Program for Water Pollution Control (No. 2009ZX07210-009,2009ZX07209-005,2009ZX07527-002)the State Key Laboratory of Environmental Aquatic Chemistry (No.08K07ESPCR)
文摘It is important to select suitable organisms to adapt the requirement of different environment monitoring purposes.Following our previous study,the behavioral responses of Daphnia magna and Japanese madaka (Oryzias latipes) were investigated and compared under flow-through conditions in an on-line biomonitoring system.The results showed that both D.magna and Japanese madaka had similar biological clock,but the circadian rhythms of Japanese madaka was more clearly recorded than that of D.magna.And the sensitivity of D.magna was about two orders of magnitudes higher than that of Japanese madaka in different types of toxic chemicals (dichlorovos,deltamethrin and cadmium chloride).However,when both animals were used in an on-line biomonitoring system,the life span of D.magna was less than 7 days and Japanese madaka could last for more than one month without feeding.Therefore,D.magna was proposed to be a more sensitive bioindicator and was suitable for short term monitoring the pollution events at concentration level closing to the water quality standard,while Japanese madaka was more suitable for the long-term monitoring for accidental discharges.
文摘The FEM technology is used to analyze the welding line movement behavior of deep drawing TWB sheet with different thickness. It is found that high stress fields are concentrated around the welding line and large residual stresses are left. The effect of the welding line movement is like a rigid string and the selected nodes of the thin part near the welding line show the related larger strain.
文摘Objective To characterize and compare the different biological behaviors of two novel human osteosarcoma cell lines,Zos and Zos-M,established respectively from the primary site and the skip metastasis of an osteosarcoma patient.Methods Two
文摘This article contains a system conversion from object oriented design into Software Product Line (SPL) using delta modeling of Abstract Behavioral Specification (ABS). ABS is a modeling language which targets system with high level of variety and supports SPL development with delta modeling. The case study of this thesis is a digital library system called Library Automation and Digital Archive (LONTAR). Originally, LONTAR only uses SOAP-based web service. With ABS, LONTAR will be converted into SPL and implement another web service called REST. The motivation of this conversion of LONTAR from object oriented into SPL is because it is easier to develop system with ABS than using regular object oriented. Product definition in ABS is relatively easier than creating a new subclass and do customization to make it works well.
文摘The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required.
文摘The access to electricity in rural areas is extremely limited, but it is crucial for all citizens. The population in rural areas of sub-Saharan African (SSA) countries is generally low, making it economically unfeasible to implement traditional rural electrification (CRE) projects due to the high cost of establishing the necessary distribution infrastructure. To address this cost issue, one alternative technology for rural electrification (URE) that can be explored is the Capacitor Coupled Substation (CCS) technology. CCS is a cost-effective solution for supplying electricity to rural areas. The research is necessitated by the need to offer a cost-effective technology for supplying electricity to sparsely populated communities. This paper examines the impact on the transmission network when a 400 kV/400V CCS is connected to it. The system response when a CCS is connected to the network was modeled using MATLAB/Si-mulink. The results, based on the fixed load of 80 kW, showed negligible interference on the transmission line voltage. However, there was minor impact on the parameters downstream of the tapping point. These findings were further supported by introducing a fault condition to the CCS, which showed that interferences with the CCS could affect the overall stability of the transmission network downstream of the tapping node, similar to the behavior of an unstable load.
文摘Perceived risk is an important concept in consumer behavior in online shopping. It impedes the adopting online shopping. A structure model with seven factors of consumer's perceived risk in online shopping is developed in this paper. The results have the descriptive power about Chinese consumers' perceived risk in Internet shopping and provide framework for managerial use in China's e-commerce market environment.
文摘We analyze the particular behavior exhibited by a chaotic waves field containing Peregrine soliton and Akhmediev breathers. This behavior can be assimilated to a tree with “roots of propagation” which propagate randomly. Besides, this strange phenomenon can be called “tree structures”. So, we present the collapse of dark and bright solitons in order to build up the above mentioned chaotic waves field. The investigation is done in a particular nonlinear transmission line called chameleon nonlinear transmission line. Thus, we show that this line acts as a bandpass filter at low frequencies and the impact of distance, frequency and dimensionless capacitor are also presented. In addition, the chameleon’s behavior is due to the fact that without modifying the appearance structure, it can present alternatively purely right- or left-handed transmission line. This line is different to the composite one.