Finding successors for private enterprises has become an urgent problem in recent years, partially because those firms' owners lack trust in professional managers. Previous research on agents focuses on preventing op...Finding successors for private enterprises has become an urgent problem in recent years, partially because those firms' owners lack trust in professional managers. Previous research on agents focuses on preventing opportunistic behavior and neglects the value of their entrepreneurship. In our research, professional managers' credit is divided into three dimensions: personal credit, professional credit and operational credit. Using a sample of 379 firm owners from 27 provinces in China, we find that credit and its detailed dimensions are positively related to private owners' trust in professional managers. We also found that a rigorous and effective credit identification mechanism positively moderate the above relationships. Furthermore, trust affects professional managers' work performance in a positive way. Accordingly, we advise that (1) professional managers' credit assessment system should be established and improved; (2) professional managers and enterprise owners should attach importance to enhancing professionalism and promoting rigorous credit identification mechanisms; (3) the closed-loop of the credit-trust psychologically interactive mechanism based on credit mechanisms and credit identification mechanisms should be put to use.展开更多
Convection and its ensuing severe weather, such as heavy rainfall, hail, tornado, and high wind, have significant im- pacts on our society and economy (e.g., Cao et al., 2004; Fritsch and Carbone, 2004; Verbout et al...Convection and its ensuing severe weather, such as heavy rainfall, hail, tornado, and high wind, have significant im- pacts on our society and economy (e.g., Cao et al., 2004; Fritsch and Carbone, 2004; Verbout et al., 2006; Ashley and Black, 2008; Cao, 2008; Cao and Ma, 2009; Zhang et al., 2014). Due to its localized and transient nature, the initiation of convection or convective initiation remains one of the least understood aspects of convection in the scientific communi- ties, and it is a significant challenge to accurately predict the exact timing and location of convective initiation (e.g., Cai et al., 2006; Wilson and Roberts, 2006; Xue and Martin, 2006; Cao and Zhang, 2016).展开更多
Typical application scenarios,such as vehicle to grid(V2G)and frequency regulation,have imposed significant long-life demands on lithium-ion batteries.Herein,we propose an advanced battery life-extension method employ...Typical application scenarios,such as vehicle to grid(V2G)and frequency regulation,have imposed significant long-life demands on lithium-ion batteries.Herein,we propose an advanced battery life-extension method employing bidirectional pulse charging(BPC)strategy.Unlike traditional constant current charging methods,BPC strategy not only achieves comparable charging speeds but also facilitates V2G frequency regulation simultaneously.It significantly enhances battery cycle ampere-hour throughput and demonstrates remarkable life extension capabilities.For this interesting conclusion,adopting model identification and postmortem characterization to reveal the life regulation mechanism of BPC:it mitigates battery capacity loss attributed to loss of lithium-ion inventory(LLI)in graphite anodes by intermittently regulating the overall battery voltage and anode potential using a negative charging current.Then,from the perspective of internal side reaction,the life extension mechanism is further revealed as inhibition of solid electrolyte interphase(SEI)and lithium dendrite growth by regulating voltage with a bidirectional pulse current,and a semi-empirical life degradation model combining SEI and lithium dendrite growth is developed for BPC scenarios health management,the model parameters are identified by genetic algorithm with the life simulation exhibiting an accuracy exceeding 99%.This finding indicates that under typical rate conditions,adaptable BPC strategies can extend the service life of LFP battery by approximately 123%.Consequently,the developed advanced BPC strategy offers innovative perspectives and insights for the development of long-life battery applications in the future.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne...Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.展开更多
LepA, the highly conserved translational GTPase (trGTPase), triggers one-codon back-movement of the elongating ribosome. Here we identify a new enzymatic activity
文摘Finding successors for private enterprises has become an urgent problem in recent years, partially because those firms' owners lack trust in professional managers. Previous research on agents focuses on preventing opportunistic behavior and neglects the value of their entrepreneurship. In our research, professional managers' credit is divided into three dimensions: personal credit, professional credit and operational credit. Using a sample of 379 firm owners from 27 provinces in China, we find that credit and its detailed dimensions are positively related to private owners' trust in professional managers. We also found that a rigorous and effective credit identification mechanism positively moderate the above relationships. Furthermore, trust affects professional managers' work performance in a positive way. Accordingly, we advise that (1) professional managers' credit assessment system should be established and improved; (2) professional managers and enterprise owners should attach importance to enhancing professionalism and promoting rigorous credit identification mechanisms; (3) the closed-loop of the credit-trust psychologically interactive mechanism based on credit mechanisms and credit identification mechanisms should be put to use.
文摘Convection and its ensuing severe weather, such as heavy rainfall, hail, tornado, and high wind, have significant im- pacts on our society and economy (e.g., Cao et al., 2004; Fritsch and Carbone, 2004; Verbout et al., 2006; Ashley and Black, 2008; Cao, 2008; Cao and Ma, 2009; Zhang et al., 2014). Due to its localized and transient nature, the initiation of convection or convective initiation remains one of the least understood aspects of convection in the scientific communi- ties, and it is a significant challenge to accurately predict the exact timing and location of convective initiation (e.g., Cai et al., 2006; Wilson and Roberts, 2006; Xue and Martin, 2006; Cao and Zhang, 2016).
基金supported by the National Natural Science Foundation of China(52177217)。
文摘Typical application scenarios,such as vehicle to grid(V2G)and frequency regulation,have imposed significant long-life demands on lithium-ion batteries.Herein,we propose an advanced battery life-extension method employing bidirectional pulse charging(BPC)strategy.Unlike traditional constant current charging methods,BPC strategy not only achieves comparable charging speeds but also facilitates V2G frequency regulation simultaneously.It significantly enhances battery cycle ampere-hour throughput and demonstrates remarkable life extension capabilities.For this interesting conclusion,adopting model identification and postmortem characterization to reveal the life regulation mechanism of BPC:it mitigates battery capacity loss attributed to loss of lithium-ion inventory(LLI)in graphite anodes by intermittently regulating the overall battery voltage and anode potential using a negative charging current.Then,from the perspective of internal side reaction,the life extension mechanism is further revealed as inhibition of solid electrolyte interphase(SEI)and lithium dendrite growth by regulating voltage with a bidirectional pulse current,and a semi-empirical life degradation model combining SEI and lithium dendrite growth is developed for BPC scenarios health management,the model parameters are identified by genetic algorithm with the life simulation exhibiting an accuracy exceeding 99%.This finding indicates that under typical rate conditions,adaptable BPC strategies can extend the service life of LFP battery by approximately 123%.Consequently,the developed advanced BPC strategy offers innovative perspectives and insights for the development of long-life battery applications in the future.
基金Supported by the Ministry of Educationin China(No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.
文摘LepA, the highly conserved translational GTPase (trGTPase), triggers one-codon back-movement of the elongating ribosome. Here we identify a new enzymatic activity