A 3-D electrostatic density map generated using the Wavefront Topology System and Finite Element Method clearly demonstrates the non-uniformity and periodicity present in even a single loop of an α-helix. The four di...A 3-D electrostatic density map generated using the Wavefront Topology System and Finite Element Method clearly demonstrates the non-uniformity and periodicity present in even a single loop of an α-helix. The four dihedral angles (N-C*-C-N, C*-C-N-C*, and C-N-C*-C) fully define a helical shape independent of its length: the three dihedral angles, φ = -33.5°, ω = 177.3°, and Ψ = -69.4°, generate the precise (and identical) redundancy in a one loop (or longer) α-helical shape (pitch = 1.59 /residue;r = 2.25 ). Nevertheless the pattern of dihedral angles within an 11 and a 22-peptide backbone atom sequence cannot be distributed evenly because the stoichiometry in fraction of four atoms never divides evenly into 11 or 22 backbone atoms. Thus, three sequential sets of 11 backbone atoms in an α-helix will have a discretely different chemical formula and correspondingly different combinations of molecular forces depending upon the assigned starting atom in an 11-step sequence. We propose that the unit cell of one loop of an α-helix occurs in the peptide backbone sequence C-(N-C*-C)3-N which contains an odd number of C* plus even number of amide groups. A two-loop pattern (C*-C-N)7-C* contains an even number of C* atoms plus an odd number of amide groups. Dividing the two-loop pattern into two equal lengths, one fraction will have an extra half amide (N-H) and the other fraction will have an extra half amide C=O, i.e., the stoichiometry of each half will be different. Also, since the length of N-C*-C-N, C*-C-N-C*, and C-N-C*-C are unequal, the summation of the number of each in any fraction of n loops of an α-helix in sequence will always have unequal length, depending upon the starting atom (N, C*, or C).展开更多
Traffic sign recognition (TSR, or Road Sign Recognition, RSR) is one of the Advanced Driver Assistance System (ADAS) devices in modern cars. To concern the most important issues, which are real-time and resource effic...Traffic sign recognition (TSR, or Road Sign Recognition, RSR) is one of the Advanced Driver Assistance System (ADAS) devices in modern cars. To concern the most important issues, which are real-time and resource efficiency, we propose a high efficiency hardware implementation for TSR. We divide the TSR procedure into two stages, detection and recognition. In the detection stage, under the assumption that most German traffic signs have red or blue colors with circle, triangle or rectangle shapes, we use Normalized RGB color transform and Single-Pass Connected Component Labeling (CCL) to find the potential traffic signs efficiently. For Single-Pass CCL, our contribution is to eliminate the “merge-stack” operations by recording connected relations of region in the scan phase and updating the labels in the iterating phase. In the recognition stage, the Histogram of Oriented Gradient (HOG) is used to generate the descriptor of the signs, and we classify the signs with Support Vector Machine (SVM). In the HOG module, we analyze the required minimum bits under different recognition rate. The proposed method achieves 96.61% detection rate and 90.85% recognition rate while testing with the GTSDB dataset. Our hardware implementation reduces the storage of CCL and simplifies the HOG computation. Main CCL storage size is reduced by 20% comparing to the most advanced design under typical condition. By using TSMC 90 nm technology, the proposed design operates at 105 MHz clock rate and processes in 135 fps with the image size of 1360 × 800. The chip size is about 1 mm2 and the power consumption is close to 8 mW. Therefore, this work is resource efficient and achieves real-time requirement.展开更多
The fast convergence without initial value dependence is the key to solving large angle relative orientation.Therefore,a hybrid conjugate gradient algorithm is proposed in this paper.The concrete process is:①stochast...The fast convergence without initial value dependence is the key to solving large angle relative orientation.Therefore,a hybrid conjugate gradient algorithm is proposed in this paper.The concrete process is:①stochastic hill climbing(SHC)algorithm is used to make a random disturbance to the given initial value of the relative orientation element,and the new value to guarantee the optimization direction is generated.②In local optimization,a super-linear convergent conjugate gradient method is used to replace the steepest descent method in relative orientation to improve its convergence rate.③The global convergence condition is that the calculation error is less than the prescribed limit error.The comparison experiment shows that the method proposed in this paper is independent of the initial value,and has higher accuracy and fewer iterations.展开更多
The soils of the semi-arid Sudano-Sahelian region of West Africa have been identified as being highly vulnerable to soil degradation with impacts on their capacity to provide goods and services in which soil microorga...The soils of the semi-arid Sudano-Sahelian region of West Africa have been identified as being highly vulnerable to soil degradation with impacts on their capacity to provide goods and services in which soil microorganisms participate. Unfortunately, soil microbial diversity from this semi-arid region with high rainfall variability remains largely unexplored. The aim of the present study was to characterize the diversity and composition of the soil bacterial communities and to identify factors involved in their spatial distribution along an environmental gradient in Senegal. Samples were collected from non-anthropogenic sites across four pedoclimatic zones. Bacterial communities were characterized using next-generation sequencing and soil physico-chemical parameters were determined. Our results showed that Firmicutes, Actinobacteria, Proteobacteria, Chloroflexi, Gemmatimonadetes, Acidobacteria, and Verrucomicrobia phyla were predominant in the soils of the region. Bacterial α-diversity was stable along the environmental gradient whereas β-diversity highlighted significant changes in the composition of the soil bacterial community. Changes were driven by shifts in the relative abundance of OTUs belonging mainly to the genus Bacillus, Conexibacter, Kaistobacter, Solirubrobacter, Ktedonobacter, Sphingomonas, Microvirga, Rubrobacter and Pelobacter. Soil properties like pH, soil moisture and clay content were the environmental parameters identified as drivers of the composition of the bacterial communities in the semi-arid Sudano-Sahelian region of Senegal (West Africa).展开更多
The Xianshuihe fault(XSHF) zone, characterized by intense tectonic activity, is located at the southwest boundary of the Bayan Har block, where several major earthquakes have occurred, including the 2008 Wenchuan an...The Xianshuihe fault(XSHF) zone, characterized by intense tectonic activity, is located at the southwest boundary of the Bayan Har block, where several major earthquakes have occurred, including the 2008 Wenchuan and the 2013 Lushan earthquakes. This study analysed underground temperature sequence data for four years at seven measuring points at different depths(maximum depth: 18.9 m) in the southeastern section of the XSHF zone. High-frequency atmospheric noise was removed from the temperature sequences to obtain relatively stable temperature fields and heat fluxes near the measurement points. Our measurements show that the surrounding bedrock at(the seven stations distributed in the fault zone) had heat flux values range from-41.0 to 206 m W/m^2, with a median value of 54.3 m W/m^2. The results indicate a low heat flux in the northern section of DaofuKangting and a relatively high heat flux in the southern section of Kangting, which is consistent with the temperature distributions of the hot springs near the fault. Furthermore, our results suggest that the heat transfer in this field results primarily from stable underground heat conduction. In addition, the underground hydrothermal activity is also an obvious factor controlling the geothermal gradient.展开更多
One of the most important methods that finds usefulness in various applications, such as searching historical manuscripts, forensic search, bank check reading, mail sorting, book and handwritten notes transcription, i...One of the most important methods that finds usefulness in various applications, such as searching historical manuscripts, forensic search, bank check reading, mail sorting, book and handwritten notes transcription, is handwritten character recognition. The common issues in the character recognition are often due to different writing styles, orientation angle, size variation(regarding length and height), etc. This study presents a classification model using a hybrid classifier for the character recognition by combining holoentropy enabled decision tree(HDT) and deep neural network(DNN). In feature extraction, the local gradient features that include histogram oriented gabor feature and grid level feature, and grey level co-occurrence matrix(GLCM) features are extracted. Then, the extracted features are concatenated to encode shape, color, texture, local and statistical information, for the recognition of characters in the image by applying the extracted features to the hybrid classifier. In the experimental analysis, recognition accuracy of 96% is achieved. Thus, it can be suggested that the proposed model intends to provide more accurate character recognition rate compared to that of character recognition techniques used in the literature.展开更多
Rapidly developing sequencing technologies and bioinformatic approacheshave provided us with an unprecedented instrument allowing for an unbiased and exhaustive characterization of the cancer genome in genetic, epigen...Rapidly developing sequencing technologies and bioinformatic approacheshave provided us with an unprecedented instrument allowing for an unbiased and exhaustive characterization of the cancer genome in genetic, epigenetic and transcriptomic dimensions. This review introduces recent excitingfindings and new methodologies in genomic breast cancer research. With this development, cancer genome research will illuminate new delicate interactionsbetween molecular networks and thereby unravelthe underlying biological mechanisms for cancer initiation and progression. It also holds promise for providing a molecular clock for the estimation of the temporal processes of tumorigenesis. These methods in combination with single cell sequencing will make it possible to construct a family tree elucidating the evolutionary lineage relationships between cell populations at single-cell resolution. The anticipatedrapid progress in genomic breast cancer research should lead to anenhanced understanding of breast cancer biology andguide us towardsnovel ways to ultimatelyprevent and cure breast cancer.展开更多
Two key challenges raised by a product images classification system are classification precision and classification time. In some categories, classification precision of the latest techniques, in the product images cl...Two key challenges raised by a product images classification system are classification precision and classification time. In some categories, classification precision of the latest techniques, in the product images classification system, is still low. In this paper, we propose a local texture descriptor termed fan refined local binary pattern, which captures more detailed information by integrating the spatial distribution into the local binary pattern feature. We compare our approach with different methods on a subset of product images on Amazon/e Bay and parts of PI100 and experimental results have demonstrated that our proposed approach is superior to the current existing methods. The highest classification precision is increased by 21% and the average classification time is reduced by 2/3.展开更多
The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that c...The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced.This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images.The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression.This paper introduces a content-based image authentication mechanism that is suitable for usage across an untrusted network and resistant to data loss during transmission.By employing scale attributes and a key-dependent parametric Long Short-Term Memory(LSTM),it is feasible to improve the resilience of digital signatures against image deterioration and strengthen their security against malicious actions.Furthermore,the successful implementation of transmitting biometric data in a compressed format over a wireless network has been accomplished.For applications involving the transmission and sharing of images across a network.The suggested technique utilizes the scalability of a structural digital signature to attain a satisfactory equilibrium between security and picture transfer.An effective adaptive compression strategy was created to lengthen the overall lifetime of the network by sharing the processing of responsibilities.This scheme ensures a large reduction in computational and energy requirements while minimizing image quality loss.This approach employs multi-scale characteristics to improve the resistance of signatures against image deterioration.The proposed system attained a Gaussian noise value of 98%and a rotation accuracy surpassing 99%.展开更多
The electroformed copper layer with gradient microstructure was prepared using the ultrasonic technique. The microstructure of the electroformed copper layer was observed by using an optical microscope (OM) and a sc...The electroformed copper layer with gradient microstructure was prepared using the ultrasonic technique. The microstructure of the electroformed copper layer was observed by using an optical microscope (OM) and a scanning electron microscope (SEM). The preferred orientations of the layer were characterized by X-ray diffraction (XRD). The mechanical properties were evaluated with a Vicker's hardness tester and a tensile tester. It is found the gradient microstructure consists of two main parts: the outer part (faraway substrate) with columnar crystals and the inner part (nearby substrate) with equiaxed grains. The Cu-(220) preferred orientation increases with the increasing thickness of the copper layer. The test results show that the microhardness of the electroformed copper layer decreases with increasing grain size along the growth direction and presents a gradient distribution. The tensile strength of the outer part of the electroformed copper layer is higher than that of the inner part but at the cost of ductility. Meanwhile, the integral mechanical properties of the electroformed copper with gradient microstrucmre are significantly improved in comparison with the pure copper deposit.展开更多
With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there e...With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there exists a number of e-learning legacy assets with accumulated practical business experience, such as program resource, usage behaviour data resource, and so on. In order to use these legacy assets adequately and efficiently, we should not only utilize the explicit assets but also discover the hidden assets. The usage behaviour data resource is the set of practical operation sequences requested by all users. The hidden patterns in this data resource will provide users' practical experiences, which can benefit the service composition in service-oriented architecture (SOA) migration. Namely, these discovered patterns will be the candidate composite services (coarse-grained) in SOA systems. Although data mining techniques have been used for software engineering tasks, little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA. In this paper, we propose a service composition approach based on sequence mining techniques for MELS. Composite services found by this approach will be the complementation of business logic analysis results of MELS. The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system. According to the features of execution trace data on usage behaviour from this e-learning legacy system and needs of further pattern analysis, we propose a sequential mining algorithm to mine this kind of data of tile legacy system. For validation, this approach has been applied to the corresponding real data, which was collected from the e-learning legacy system; meanwhile, some investigation questionnaires were set up to collect satisfaction data. The investigation result is 90% the same with the result obtained through our approach.展开更多
Due to the lack of representation of an object-oriented database on hand-held devices, the present work describes an approach to send the information in the form of an object-oriented database on hand-held devices. A ...Due to the lack of representation of an object-oriented database on hand-held devices, the present work describes an approach to send the information in the form of an object-oriented database on hand-held devices. A smart phone is selected as a hand-held device and connectivity between the object-oriented databases has been established by the use of the object-oriented programming language C#.Net. For modeling purpose, Unified Modeling Language (UML) is used to specify a UML Class Model and Sequence diagram. A concept of star schema is also used to represent the object-oriented database.展开更多
文摘A 3-D electrostatic density map generated using the Wavefront Topology System and Finite Element Method clearly demonstrates the non-uniformity and periodicity present in even a single loop of an α-helix. The four dihedral angles (N-C*-C-N, C*-C-N-C*, and C-N-C*-C) fully define a helical shape independent of its length: the three dihedral angles, φ = -33.5°, ω = 177.3°, and Ψ = -69.4°, generate the precise (and identical) redundancy in a one loop (or longer) α-helical shape (pitch = 1.59 /residue;r = 2.25 ). Nevertheless the pattern of dihedral angles within an 11 and a 22-peptide backbone atom sequence cannot be distributed evenly because the stoichiometry in fraction of four atoms never divides evenly into 11 or 22 backbone atoms. Thus, three sequential sets of 11 backbone atoms in an α-helix will have a discretely different chemical formula and correspondingly different combinations of molecular forces depending upon the assigned starting atom in an 11-step sequence. We propose that the unit cell of one loop of an α-helix occurs in the peptide backbone sequence C-(N-C*-C)3-N which contains an odd number of C* plus even number of amide groups. A two-loop pattern (C*-C-N)7-C* contains an even number of C* atoms plus an odd number of amide groups. Dividing the two-loop pattern into two equal lengths, one fraction will have an extra half amide (N-H) and the other fraction will have an extra half amide C=O, i.e., the stoichiometry of each half will be different. Also, since the length of N-C*-C-N, C*-C-N-C*, and C-N-C*-C are unequal, the summation of the number of each in any fraction of n loops of an α-helix in sequence will always have unequal length, depending upon the starting atom (N, C*, or C).
文摘Traffic sign recognition (TSR, or Road Sign Recognition, RSR) is one of the Advanced Driver Assistance System (ADAS) devices in modern cars. To concern the most important issues, which are real-time and resource efficiency, we propose a high efficiency hardware implementation for TSR. We divide the TSR procedure into two stages, detection and recognition. In the detection stage, under the assumption that most German traffic signs have red or blue colors with circle, triangle or rectangle shapes, we use Normalized RGB color transform and Single-Pass Connected Component Labeling (CCL) to find the potential traffic signs efficiently. For Single-Pass CCL, our contribution is to eliminate the “merge-stack” operations by recording connected relations of region in the scan phase and updating the labels in the iterating phase. In the recognition stage, the Histogram of Oriented Gradient (HOG) is used to generate the descriptor of the signs, and we classify the signs with Support Vector Machine (SVM). In the HOG module, we analyze the required minimum bits under different recognition rate. The proposed method achieves 96.61% detection rate and 90.85% recognition rate while testing with the GTSDB dataset. Our hardware implementation reduces the storage of CCL and simplifies the HOG computation. Main CCL storage size is reduced by 20% comparing to the most advanced design under typical condition. By using TSMC 90 nm technology, the proposed design operates at 105 MHz clock rate and processes in 135 fps with the image size of 1360 × 800. The chip size is about 1 mm2 and the power consumption is close to 8 mW. Therefore, this work is resource efficient and achieves real-time requirement.
基金National Natural Science Foundation of China(Nos.4156108241161061)。
文摘The fast convergence without initial value dependence is the key to solving large angle relative orientation.Therefore,a hybrid conjugate gradient algorithm is proposed in this paper.The concrete process is:①stochastic hill climbing(SHC)algorithm is used to make a random disturbance to the given initial value of the relative orientation element,and the new value to guarantee the optimization direction is generated.②In local optimization,a super-linear convergent conjugate gradient method is used to replace the steepest descent method in relative orientation to improve its convergence rate.③The global convergence condition is that the calculation error is less than the prescribed limit error.The comparison experiment shows that the method proposed in this paper is independent of the initial value,and has higher accuracy and fewer iterations.
文摘The soils of the semi-arid Sudano-Sahelian region of West Africa have been identified as being highly vulnerable to soil degradation with impacts on their capacity to provide goods and services in which soil microorganisms participate. Unfortunately, soil microbial diversity from this semi-arid region with high rainfall variability remains largely unexplored. The aim of the present study was to characterize the diversity and composition of the soil bacterial communities and to identify factors involved in their spatial distribution along an environmental gradient in Senegal. Samples were collected from non-anthropogenic sites across four pedoclimatic zones. Bacterial communities were characterized using next-generation sequencing and soil physico-chemical parameters were determined. Our results showed that Firmicutes, Actinobacteria, Proteobacteria, Chloroflexi, Gemmatimonadetes, Acidobacteria, and Verrucomicrobia phyla were predominant in the soils of the region. Bacterial α-diversity was stable along the environmental gradient whereas β-diversity highlighted significant changes in the composition of the soil bacterial community. Changes were driven by shifts in the relative abundance of OTUs belonging mainly to the genus Bacillus, Conexibacter, Kaistobacter, Solirubrobacter, Ktedonobacter, Sphingomonas, Microvirga, Rubrobacter and Pelobacter. Soil properties like pH, soil moisture and clay content were the environmental parameters identified as drivers of the composition of the bacterial communities in the semi-arid Sudano-Sahelian region of Senegal (West Africa).
基金supported by the National Natural Science Foundation of China (NSFC) (Grant No.4147408641174084)+2 种基金the CAS/CAFEA international partnership program for creative research teams (KZZD-EW-TZ-19)funded by the Special Fund for Seismic Scientific Research (200808011,2004DIB3J1290)the State Key Laboratory of Earthquake Dynamics,Institute of Geology (LED2009A07)
文摘The Xianshuihe fault(XSHF) zone, characterized by intense tectonic activity, is located at the southwest boundary of the Bayan Har block, where several major earthquakes have occurred, including the 2008 Wenchuan and the 2013 Lushan earthquakes. This study analysed underground temperature sequence data for four years at seven measuring points at different depths(maximum depth: 18.9 m) in the southeastern section of the XSHF zone. High-frequency atmospheric noise was removed from the temperature sequences to obtain relatively stable temperature fields and heat fluxes near the measurement points. Our measurements show that the surrounding bedrock at(the seven stations distributed in the fault zone) had heat flux values range from-41.0 to 206 m W/m^2, with a median value of 54.3 m W/m^2. The results indicate a low heat flux in the northern section of DaofuKangting and a relatively high heat flux in the southern section of Kangting, which is consistent with the temperature distributions of the hot springs near the fault. Furthermore, our results suggest that the heat transfer in this field results primarily from stable underground heat conduction. In addition, the underground hydrothermal activity is also an obvious factor controlling the geothermal gradient.
文摘One of the most important methods that finds usefulness in various applications, such as searching historical manuscripts, forensic search, bank check reading, mail sorting, book and handwritten notes transcription, is handwritten character recognition. The common issues in the character recognition are often due to different writing styles, orientation angle, size variation(regarding length and height), etc. This study presents a classification model using a hybrid classifier for the character recognition by combining holoentropy enabled decision tree(HDT) and deep neural network(DNN). In feature extraction, the local gradient features that include histogram oriented gabor feature and grid level feature, and grey level co-occurrence matrix(GLCM) features are extracted. Then, the extracted features are concatenated to encode shape, color, texture, local and statistical information, for the recognition of characters in the image by applying the extracted features to the hybrid classifier. In the experimental analysis, recognition accuracy of 96% is achieved. Thus, it can be suggested that the proposed model intends to provide more accurate character recognition rate compared to that of character recognition techniques used in the literature.
文摘Rapidly developing sequencing technologies and bioinformatic approacheshave provided us with an unprecedented instrument allowing for an unbiased and exhaustive characterization of the cancer genome in genetic, epigenetic and transcriptomic dimensions. This review introduces recent excitingfindings and new methodologies in genomic breast cancer research. With this development, cancer genome research will illuminate new delicate interactionsbetween molecular networks and thereby unravelthe underlying biological mechanisms for cancer initiation and progression. It also holds promise for providing a molecular clock for the estimation of the temporal processes of tumorigenesis. These methods in combination with single cell sequencing will make it possible to construct a family tree elucidating the evolutionary lineage relationships between cell populations at single-cell resolution. The anticipatedrapid progress in genomic breast cancer research should lead to anenhanced understanding of breast cancer biology andguide us towardsnovel ways to ultimatelyprevent and cure breast cancer.
基金Supported by the National Natural Science Foundation of China(60802061, 11426087) Supported by Key Project of Science and Technology of the Education Department Henan Province(14A120009)+1 种基金 Supported by the Program of Henan Province Young Scholar(2013GGJS-027) Supported by the Research Foundation of Henan University(2013YBZR016)
文摘Two key challenges raised by a product images classification system are classification precision and classification time. In some categories, classification precision of the latest techniques, in the product images classification system, is still low. In this paper, we propose a local texture descriptor termed fan refined local binary pattern, which captures more detailed information by integrating the spatial distribution into the local binary pattern feature. We compare our approach with different methods on a subset of product images on Amazon/e Bay and parts of PI100 and experimental results have demonstrated that our proposed approach is superior to the current existing methods. The highest classification precision is increased by 21% and the average classification time is reduced by 2/3.
文摘The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced.This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images.The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression.This paper introduces a content-based image authentication mechanism that is suitable for usage across an untrusted network and resistant to data loss during transmission.By employing scale attributes and a key-dependent parametric Long Short-Term Memory(LSTM),it is feasible to improve the resilience of digital signatures against image deterioration and strengthen their security against malicious actions.Furthermore,the successful implementation of transmitting biometric data in a compressed format over a wireless network has been accomplished.For applications involving the transmission and sharing of images across a network.The suggested technique utilizes the scalability of a structural digital signature to attain a satisfactory equilibrium between security and picture transfer.An effective adaptive compression strategy was created to lengthen the overall lifetime of the network by sharing the processing of responsibilities.This scheme ensures a large reduction in computational and energy requirements while minimizing image quality loss.This approach employs multi-scale characteristics to improve the resistance of signatures against image deterioration.The proposed system attained a Gaussian noise value of 98%and a rotation accuracy surpassing 99%.
文摘The electroformed copper layer with gradient microstructure was prepared using the ultrasonic technique. The microstructure of the electroformed copper layer was observed by using an optical microscope (OM) and a scanning electron microscope (SEM). The preferred orientations of the layer were characterized by X-ray diffraction (XRD). The mechanical properties were evaluated with a Vicker's hardness tester and a tensile tester. It is found the gradient microstructure consists of two main parts: the outer part (faraway substrate) with columnar crystals and the inner part (nearby substrate) with equiaxed grains. The Cu-(220) preferred orientation increases with the increasing thickness of the copper layer. The test results show that the microhardness of the electroformed copper layer decreases with increasing grain size along the growth direction and presents a gradient distribution. The tensile strength of the outer part of the electroformed copper layer is higher than that of the inner part but at the cost of ductility. Meanwhile, the integral mechanical properties of the electroformed copper with gradient microstrucmre are significantly improved in comparison with the pure copper deposit.
基金supported by E-learning Platform, National Torch Project (No. z20040010)
文摘With the fast development of business logic and information technology, today's best solutions are tomorrow's legacy systems. In China, the situation in the education domain follows the same path. Currently, there exists a number of e-learning legacy assets with accumulated practical business experience, such as program resource, usage behaviour data resource, and so on. In order to use these legacy assets adequately and efficiently, we should not only utilize the explicit assets but also discover the hidden assets. The usage behaviour data resource is the set of practical operation sequences requested by all users. The hidden patterns in this data resource will provide users' practical experiences, which can benefit the service composition in service-oriented architecture (SOA) migration. Namely, these discovered patterns will be the candidate composite services (coarse-grained) in SOA systems. Although data mining techniques have been used for software engineering tasks, little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA. In this paper, we propose a service composition approach based on sequence mining techniques for MELS. Composite services found by this approach will be the complementation of business logic analysis results of MELS. The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system. According to the features of execution trace data on usage behaviour from this e-learning legacy system and needs of further pattern analysis, we propose a sequential mining algorithm to mine this kind of data of tile legacy system. For validation, this approach has been applied to the corresponding real data, which was collected from the e-learning legacy system; meanwhile, some investigation questionnaires were set up to collect satisfaction data. The investigation result is 90% the same with the result obtained through our approach.
文摘Due to the lack of representation of an object-oriented database on hand-held devices, the present work describes an approach to send the information in the form of an object-oriented database on hand-held devices. A smart phone is selected as a hand-held device and connectivity between the object-oriented databases has been established by the use of the object-oriented programming language C#.Net. For modeling purpose, Unified Modeling Language (UML) is used to specify a UML Class Model and Sequence diagram. A concept of star schema is also used to represent the object-oriented database.