The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline cons...The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline construction projects due to the advantages of automatic control for welding parameters at all-position, moving speed of bugs and operating. In this paper, the key control technologies of PAWM all-position automatic welding machine ( developed by Pipeline Research Institute of CNPC) such us the automatic control system, control software, personal digital assistant (PDA) software and complex programmable logic device ( CPLD ) program as well us the control method of welding parameter have been described detailedly. With the higher welding quality, higher welding effwiency and lower labor intensity, PA WM all-position automatic welding machine has been successfully applied in many famous pipeline construction projects.展开更多
The control points are the key issue of the internal control, and the key control points mean the control joints that play an important part in the process of the operation. If these key control points are not well co...The control points are the key issue of the internal control, and the key control points mean the control joints that play an important part in the process of the operation. If these key control points are not well controlled, the process of the operation disposal will be mistaken and cannot reach the goal. However, for the confirmation of the control points, many studies only do qualitative research from the important aspect instead of quantificational research. They are devoid of a series of scientific methods. This paper advances quantificational methods to confirm the key control points from two aspects of job evaluation and mathematics model.展开更多
The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in ...The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in overlying strata,the current study divides the overlying strata into the following three longitudinal zones in terms of the state of gas flow:a turbulent channel zone,a transitional circulation channel zone and a seepage channel zone.According to the key strata discrimination theory of controlling the overlying strata,the calculation method establishes that the step-type expansion of the mining gas channel corresponds to the advancing distance of working face,and this research also confrms the expanding rule that the mining gas channel in overlying strata follows the advancing distance of mining working face.Based on the geological conditions of Xinjing Coal Mine of Yangquan,this paper researches the expanding rule of mining gas channel as well as the control action of the channel acting on the pressure relief flow under the condition of the remote protective layer,and got the distance using inversion that the step-type expanding of mining gas channel is corresponding to the advancing distance of working face,which verifes the accuracy and feasibility of theoretical calculation method proposed in this study.The research provides the theoretical basis for choosing the technology of pressure relief gas drainage and designing the parameters of construction.展开更多
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockc...The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockchain network and is increasingly applied to multiple critical areas such as finance and the internet of things(IoT).Blockchain can be divided into three main categories of blockchain networks:public blockchains,private blockchains,and consortium blockchains.However,there are differences in block structures,consensus mechanisms,and complex working mechanisms among heterogeneous blockchains.The fragility of the cross-chain system itself makes the cross-chain system face some potential security and privacy threats.This paper discusses security defects on the cross-chain implementation mechanism,and discusses the impact of the structural features of blockchain networks on cross-chain security.In terms of cross-chain intercommunication,a cross-chain attack can be divided into a multi-chain combination attack,native chain attack,and inter-chain attack diffusion.Then various security threats and attack paths faced by the cross-chain system are analyzed.At last,the corresponding security defense methods of cross-chain security threats and future research directions for cross-chain applications are put forward.展开更多
The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols a...The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols are mostly two-party or three-party,and they do not entirely meet the actual needs.To address this problem,this paper proposes new CQKA protocols based on Bell states and Bell measurements.The new CQKA protocols can be successfully implemented for any N-party,not just two-party.Furthermore,the security and efficiency analyses demonstrate that the new CQKA protocols are not only secure but also more efficient in terms of quantum bit.展开更多
Root hairs are tubular outgrowths specifically differentiated from epidermal cells in a differentiation zone. The formation of root hairs greatly increases the surface area of a root and maximizes its ability to absor...Root hairs are tubular outgrowths specifically differentiated from epidermal cells in a differentiation zone. The formation of root hairs greatly increases the surface area of a root and maximizes its ability to absorb water and inorganic nutrients essential for plant growth and development. Root hair development is strictly regulated by intracellular and intercellular signal communications. Cell surface-localized receptor-like protein kinases (P, LKs) have been shown to be important components in these cellular processes, tn this review, the functions of a number of key P, LKs in regulating Arabidopsis root hair development are discussed, especially those involved in root epidermal cell fate determination and root hair tip growth.展开更多
Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely R...Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely RED-DTB. This buffer control technique is used to enforce approximate fairness among a large number of concurrent Internet flows. Like RED (Random Early Detection) algorithm, the RED-DTB mechanism can be deployed to actively respond to the gateway congestion, keep the gateway in a healthy state, and protect the fragile flows from being stolen bandwidth by greedy ones. The algorithm is based on the so-called Dual Token Bucket (DTB) pattern. That is, on the one hand, every flow is rate-limited by its own token bucket, to ensure that it can not consume more than its fair share of bandwidth; On the other hand, to make some compensations to less aggressive flows, such as connections with larger round trip time or smaller sending window, and to gain a relatively higher system utilization coefficient, all flows, depending on their individual behavior, may have a chance to fetch tokens from the public token bucket when they run out of their own share of tokens. The algorithm is analyzed and evaluated by simulations, and is proved to be effective in protecting the gateway buffer and controlling the fair allocation of bandwidth among flows.展开更多
This paper proposes to develop a data-driven via's depth estimator of the deep reactive ion etching process based on statistical identification of key variables.Several feature extraction algorithms are presented to ...This paper proposes to develop a data-driven via's depth estimator of the deep reactive ion etching process based on statistical identification of key variables.Several feature extraction algorithms are presented to reduce the high-dimensional data and effectively undertake the subsequent virtual metrology(VM) model building process.With the available on-line VM model,the model-based controller is hence readily applicable to improve the quality of a via's depth.Real operational data taken from a industrial manufacturing process are used to verify the effectiveness of the proposed method.The results demonstrate that the proposed method can decrease the MSE from 2.2×10^(-2) to 9×10^(-4) and has great potential in improving the existing DRIE process.展开更多
Tectonic movements formed several unconfor- mities in the north-west margin of the Junggar basin. Based on data of outcrop, core, and samples, the unconformity is a structural body whose formation associates with weat...Tectonic movements formed several unconfor- mities in the north-west margin of the Junggar basin. Based on data of outcrop, core, and samples, the unconformity is a structural body whose formation associates with weath- ering, leaching, and onlap. At the same time, the structural body may be divided into three layers, including upper layer, mid layer, and lower layer. The upper layer with good primary porosity serves as the hydrocarbon migration system, and also accumulates the hydrocarbon. The mid layer with compactness and ductility can play a role as cap rock, the strength of which increases with depth. The lower layer with good secondary porosity due to weathering and leaching can form the stratigraphic truncation traps. A typical stratigraphie reservoir lying in the unconformity between the Jurassic and Triassic in the north-west margin of the Junggar basin was meticulously analyzed in order to reveal the key controlling factors. The results showed that the hydrocarbon distribution in the stratigraphic onlap reservoirs was controlled by the onlap line, the hydro- carbon distribution in the stratigraphic truncation reser- voirs was confined by the truncation line, and the mid layer acted as the key sealing rock. So a conclusion was drawn that "two lines (onlap line and truncation line) and a body (unconformity structural body)" control the formation and distribution of stratigraphic reservoirs.展开更多
Objective To observe the efficacy of treating vascular dementia gait disorder with electroacupuncture (EA) on Jiaji (夹脊EX-B2) along the lumbar vertebra combined with scalp acupuncture, in order to explore a more...Objective To observe the efficacy of treating vascular dementia gait disorder with electroacupuncture (EA) on Jiaji (夹脊EX-B2) along the lumbar vertebra combined with scalp acupuncture, in order to explore a more effective therapeutic method. Methods Forty-two patients were divided into an acupuncture group and a drug group according to the method of random number table, with 21 cases in each group. EA on EX-B2 from L2 to L5 (bilateral) and scalp acupuncture on Baihui (百会 CV 20) and Sishencong (四神聪EX-HN 1) were applied in the acupuncture group, once a day the course of treatment was 30 days; Duxil was taken orally by the drug group, one pill twice a day for 30 days as a course of treatment. After treatment was completed, the efficacy was evaluated and activities of daily living (ADL) were compared between the two groups. Results The total effectiveness rate for the acupuncture group was 90.5%, which was significantly better than that of the drug group (61.9%), and the differences were statistically significant (P〈0.05); ADL was compared before and after treatment, and the differences were statistically significant (the acupuncture group: 24.52±9.34 vs 32.85±13.56; the drug group: 25.47±10.04 vs 29.99±13.87, both P〈0.01); after treatment, ADL, including gait disorders, in the acupuncture group was more significantly improved than that of the drug group, and the differences were statistically significant (32.85±13.56 vs 29.99± 13.87, P〈0.01). Conclusion The efficacy of treating vascular dementia gait disorder with electro-acupuncture (EA) on EX-B2 along lumbar vertebra combined with scalp acupuncture was superior to orally administered Duxil.展开更多
文摘The pipeline all-position automatic welding machine system is a special welding system for automatically welding circumferential joint of pipeline on site, which has been widely used to the long-distance pipeline construction projects due to the advantages of automatic control for welding parameters at all-position, moving speed of bugs and operating. In this paper, the key control technologies of PAWM all-position automatic welding machine ( developed by Pipeline Research Institute of CNPC) such us the automatic control system, control software, personal digital assistant (PDA) software and complex programmable logic device ( CPLD ) program as well us the control method of welding parameter have been described detailedly. With the higher welding quality, higher welding effwiency and lower labor intensity, PA WM all-position automatic welding machine has been successfully applied in many famous pipeline construction projects.
文摘The control points are the key issue of the internal control, and the key control points mean the control joints that play an important part in the process of the operation. If these key control points are not well controlled, the process of the operation disposal will be mistaken and cannot reach the goal. However, for the confirmation of the control points, many studies only do qualitative research from the important aspect instead of quantificational research. They are devoid of a series of scientific methods. This paper advances quantificational methods to confirm the key control points from two aspects of job evaluation and mathematics model.
基金the National Basic Research Programs of China (No. 2011CB201204)the National Natural Science Foundation of China (Nos. 51074160)+1 种基金the Fundamental Research Funds for the Central Universities (No. 2010QNA03)Project Funded by the Priority Academic Program Development of Jiangsu Higher Education institutions for their support for this project
文摘The technology of pressure relief gas drainage is one of the most effective and economic for preventing gas emissions in underground mines.Based on current understanding of strata breakage and fracture development in overlying strata,the current study divides the overlying strata into the following three longitudinal zones in terms of the state of gas flow:a turbulent channel zone,a transitional circulation channel zone and a seepage channel zone.According to the key strata discrimination theory of controlling the overlying strata,the calculation method establishes that the step-type expansion of the mining gas channel corresponds to the advancing distance of working face,and this research also confrms the expanding rule that the mining gas channel in overlying strata follows the advancing distance of mining working face.Based on the geological conditions of Xinjing Coal Mine of Yangquan,this paper researches the expanding rule of mining gas channel as well as the control action of the channel acting on the pressure relief flow under the condition of the remote protective layer,and got the distance using inversion that the step-type expanding of mining gas channel is corresponding to the advancing distance of working face,which verifes the accuracy and feasibility of theoretical calculation method proposed in this study.The research provides the theoretical basis for choosing the technology of pressure relief gas drainage and designing the parameters of construction.
基金supported by the Beijing Natural Science Foundation(4212008)the National Natural Science Foundation of China(62272031)+2 种基金the Open Foundation of Information Security Evaluation Center of Civil Aviation,Civil Aviation University of China(ISECCA-202101)Guangxi Key Laboratory of Cryptography and Information Security(GCIS201915)supported in part by the National Natural Science Foundation of China(U21A20463,U22B2027)。
文摘The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockchain network and is increasingly applied to multiple critical areas such as finance and the internet of things(IoT).Blockchain can be divided into three main categories of blockchain networks:public blockchains,private blockchains,and consortium blockchains.However,there are differences in block structures,consensus mechanisms,and complex working mechanisms among heterogeneous blockchains.The fragility of the cross-chain system itself makes the cross-chain system face some potential security and privacy threats.This paper discusses security defects on the cross-chain implementation mechanism,and discusses the impact of the structural features of blockchain networks on cross-chain security.In terms of cross-chain intercommunication,a cross-chain attack can be divided into a multi-chain combination attack,native chain attack,and inter-chain attack diffusion.Then various security threats and attack paths faced by the cross-chain system are analyzed.At last,the corresponding security defense methods of cross-chain security threats and future research directions for cross-chain applications are put forward.
基金supported by the National Natural Science Foundation of China(61802302)the Basic Research Project of Natural Science of Shaanxi Province(2021JM-462)
文摘The controlled quantum key agreement(CQKA)protocol requires a controller to oversee the process of all participants negotiating a key,which can satisfy the needs of certain specific scenarios.Existing CQKA protocols are mostly two-party or three-party,and they do not entirely meet the actual needs.To address this problem,this paper proposes new CQKA protocols based on Bell states and Bell measurements.The new CQKA protocols can be successfully implemented for any N-party,not just two-party.Furthermore,the security and efficiency analyses demonstrate that the new CQKA protocols are not only secure but also more efficient in terms of quantum bit.
基金supported by grants from the National Natural Science Foundation of China(31700245 to Zhuoyun Wei,31720103902,31470380,and 31530005 to Jia Li)the China Postdoctoral Science Foundation(2018T111116 and 2016M602889 to Zhuoyun Wei)
文摘Root hairs are tubular outgrowths specifically differentiated from epidermal cells in a differentiation zone. The formation of root hairs greatly increases the surface area of a root and maximizes its ability to absorb water and inorganic nutrients essential for plant growth and development. Root hair development is strictly regulated by intracellular and intercellular signal communications. Cell surface-localized receptor-like protein kinases (P, LKs) have been shown to be important components in these cellular processes, tn this review, the functions of a number of key P, LKs in regulating Arabidopsis root hair development are discussed, especially those involved in root epidermal cell fate determination and root hair tip growth.
基金the National Natural Science Foundation of China(60132030)and the National Education Department Doctorial Foundation Project(RFDP1999048602)
文摘Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely RED-DTB. This buffer control technique is used to enforce approximate fairness among a large number of concurrent Internet flows. Like RED (Random Early Detection) algorithm, the RED-DTB mechanism can be deployed to actively respond to the gateway congestion, keep the gateway in a healthy state, and protect the fragile flows from being stolen bandwidth by greedy ones. The algorithm is based on the so-called Dual Token Bucket (DTB) pattern. That is, on the one hand, every flow is rate-limited by its own token bucket, to ensure that it can not consume more than its fair share of bandwidth; On the other hand, to make some compensations to less aggressive flows, such as connections with larger round trip time or smaller sending window, and to gain a relatively higher system utilization coefficient, all flows, depending on their individual behavior, may have a chance to fetch tokens from the public token bucket when they run out of their own share of tokens. The algorithm is analyzed and evaluated by simulations, and is proved to be effective in protecting the gateway buffer and controlling the fair allocation of bandwidth among flows.
基金supported by the National Natural Science Foundation of China(No.60904053)the Natural Science Foundation of Jiangsu(No. SBK201123307)the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)
文摘This paper proposes to develop a data-driven via's depth estimator of the deep reactive ion etching process based on statistical identification of key variables.Several feature extraction algorithms are presented to reduce the high-dimensional data and effectively undertake the subsequent virtual metrology(VM) model building process.With the available on-line VM model,the model-based controller is hence readily applicable to improve the quality of a via's depth.Real operational data taken from a industrial manufacturing process are used to verify the effectiveness of the proposed method.The results demonstrate that the proposed method can decrease the MSE from 2.2×10^(-2) to 9×10^(-4) and has great potential in improving the existing DRIE process.
文摘Tectonic movements formed several unconfor- mities in the north-west margin of the Junggar basin. Based on data of outcrop, core, and samples, the unconformity is a structural body whose formation associates with weath- ering, leaching, and onlap. At the same time, the structural body may be divided into three layers, including upper layer, mid layer, and lower layer. The upper layer with good primary porosity serves as the hydrocarbon migration system, and also accumulates the hydrocarbon. The mid layer with compactness and ductility can play a role as cap rock, the strength of which increases with depth. The lower layer with good secondary porosity due to weathering and leaching can form the stratigraphic truncation traps. A typical stratigraphie reservoir lying in the unconformity between the Jurassic and Triassic in the north-west margin of the Junggar basin was meticulously analyzed in order to reveal the key controlling factors. The results showed that the hydrocarbon distribution in the stratigraphic onlap reservoirs was controlled by the onlap line, the hydro- carbon distribution in the stratigraphic truncation reser- voirs was confined by the truncation line, and the mid layer acted as the key sealing rock. So a conclusion was drawn that "two lines (onlap line and truncation line) and a body (unconformity structural body)" control the formation and distribution of stratigraphic reservoirs.
基金Supported by the first batch of research projects of the studio of "Henan SHAO’s acupuncture stream",one of the nationally recognized schools of traditional Chinese medicine
文摘Objective To observe the efficacy of treating vascular dementia gait disorder with electroacupuncture (EA) on Jiaji (夹脊EX-B2) along the lumbar vertebra combined with scalp acupuncture, in order to explore a more effective therapeutic method. Methods Forty-two patients were divided into an acupuncture group and a drug group according to the method of random number table, with 21 cases in each group. EA on EX-B2 from L2 to L5 (bilateral) and scalp acupuncture on Baihui (百会 CV 20) and Sishencong (四神聪EX-HN 1) were applied in the acupuncture group, once a day the course of treatment was 30 days; Duxil was taken orally by the drug group, one pill twice a day for 30 days as a course of treatment. After treatment was completed, the efficacy was evaluated and activities of daily living (ADL) were compared between the two groups. Results The total effectiveness rate for the acupuncture group was 90.5%, which was significantly better than that of the drug group (61.9%), and the differences were statistically significant (P〈0.05); ADL was compared before and after treatment, and the differences were statistically significant (the acupuncture group: 24.52±9.34 vs 32.85±13.56; the drug group: 25.47±10.04 vs 29.99±13.87, both P〈0.01); after treatment, ADL, including gait disorders, in the acupuncture group was more significantly improved than that of the drug group, and the differences were statistically significant (32.85±13.56 vs 29.99± 13.87, P〈0.01). Conclusion The efficacy of treating vascular dementia gait disorder with electro-acupuncture (EA) on EX-B2 along lumbar vertebra combined with scalp acupuncture was superior to orally administered Duxil.