期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Quantitative Study on Morphological Change Characteristics of Tonle Sap Lake Based on DEM
1
作者 Yan Huang Yifei Tian +6 位作者 Changwen Li Wu Liu Nan Zhang Haiyang Wang yue Wu Wanting Feng yifan yu 《Open Journal of Modern Hydrology》 CAS 2024年第1期1-13,共13页
Lake is an important part of the natural ecosystem, and its morphological characteristics reflect the capacity of lake regulation and storage, the strength of material migration, and the characteristics of shoreline d... Lake is an important part of the natural ecosystem, and its morphological characteristics reflect the capacity of lake regulation and storage, the strength of material migration, and the characteristics of shoreline development. In most existing studies, remote sensing images are used to quantify the morphological characteristics of lakes. However, the extraction accuracy of lake water is greatly affected by cloud cover and vegetation cover, and the inversion accuracy of lake elevation data is poor, which cannot accurately describe the response relationship of lake landscape morphology with water level change. Therefore, this paper takes Tonle Sap Lake as the research object, which is the largest natural freshwater lake in Southeast Asia. DEM is constructed based on high-resolution measured topographic data, and morphological indicators such as lake area, lake shoreline length, perimeter area ratio, longest axis length, maximum width, shoreline development index, lake shape complexity, compactness ratio and form ratio are adopted to researching the evolution law of high water overflows and low water outbursts quantitatively, and clarifying the variation characteristics of landscape morphology with water level gradient in Tonle Sap Lake. The research results have important theoretical significance for the scientific utilization of Tonle Sap Lake water resources and the protection of the lake ecosystem. 展开更多
关键词 Tonle Sap Lake DEM Geometrical Morphology Variation Characteristic
下载PDF
植物质体基因工程调控元件研究进展
2
作者 于一凡 欧阳臻 +2 位作者 郭娟 赵瑜君 黄璐琦 《遗传》 CAS CSCD 北大核心 2023年第6期501-513,共13页
随着植物合成生物学的发展,质体逐渐成为许多具有商业价值的次生代谢产物和治疗性蛋白异源生产的理想平台。与核基因工程相比,质体基因工程在外源基因高效表达和生物安全性等方面具有其独特优势。然而,外源基因在质体系统中的组成型表... 随着植物合成生物学的发展,质体逐渐成为许多具有商业价值的次生代谢产物和治疗性蛋白异源生产的理想平台。与核基因工程相比,质体基因工程在外源基因高效表达和生物安全性等方面具有其独特优势。然而,外源基因在质体系统中的组成型表达或对植物生长不利,因此需进一步挖掘、设计调控元件实现对外源基因的精准调控。本文概述了质体基因工程调控元件的研究进展,内容包括操纵子设计与优化思路、多基因共表达调控策略及新型表达调控元件的挖掘等,为植物合成生物学的发展提供参考。 展开更多
关键词 植物合成生物学 质体基因工程 遗传转化 操纵子 调控元件
下载PDF
Mobile Edge Computing Towards 5G: Vision, Recent Progress, and Open Challenges 被引量:28
3
作者 yifan yu 《China Communications》 SCIE CSCD 2016年第S2期89-99,共11页
Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers ... Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers inside or adjacent to the base station.The endto-end latency perceived by the mobile user is therefore reduced with the MEC platform.The context-aware services are able to be served by the application developers by leveraging the real time radio access network information from MEC.The MEC additionally enables the compute intensive applications execution in the resource constraint devices with the collaborative computing involving the cloud servers.This paper presents the architectural description of the MEC platform as well as the key functionalities enabling the above features.The relevant state-of-the-art research efforts are then surveyed.The paper finally discusses and identifies the open research challenges of MEC. 展开更多
关键词 mobile edge computing 5G mobile internet mobile network mobile application
下载PDF
Macroscopic damping model for structural dynamics with random polycrystalline configurations 被引量:1
4
作者 Yantao Yang Junzhi Cui +1 位作者 yifan yu Meizhen Xiang 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2018年第3期493-506,共14页
In this paper the macroscopic damping model for dynamical behavior of the structures with random polycrystalline configurations at micro–nano scales is established.First, the global motion equation of a crystal is de... In this paper the macroscopic damping model for dynamical behavior of the structures with random polycrystalline configurations at micro–nano scales is established.First, the global motion equation of a crystal is decomposed into a set of motion equations with independent single degree of freedom(SDOF) along normal discrete modes, and then damping behavior is introduced into each SDOF motion.Through the interpolation of discrete modes, the continuous representation of damping effects for the crystal is obtained.Second, from energy conservation law the expression of the damping coefficient is derived, and the approximate formula of damping coefficient is given. Next, the continuous damping coefficient for polycrystalline cluster is expressed,the continuous dynamical equation with damping term is obtained, and then the concrete damping coefficients for a polycrystalline Cu sample are shown. Finally, by using statistical two-scale homogenization method, the macroscopic homogenized dynamical equation containing damping term for the structures with random polycrystalline configurations at micro–nano scales is set up. 展开更多
关键词 多晶 宏观 结构 配置 随机 模型 动力学 抑制系数
下载PDF
Study on Ultimate Pullout Force of Grouting Anchors of the Anchor-Pull Retaining Wall
5
作者 Hongbo Zhang yifan yu +2 位作者 Xiuguang Song Yingyong Li Jianqing Wu 《Journal of Geoscience and Environment Protection》 2014年第5期32-37,共6页
Determination of the grouting anchor pullout force is a key step during the design of anchor-pull retaining wall, but it is mostly determined relied on empirical formula at present, and the rationality and the safety ... Determination of the grouting anchor pullout force is a key step during the design of anchor-pull retaining wall, but it is mostly determined relied on empirical formula at present, and the rationality and the safety cannot be effectively guaranteed. Based on the engineering case of the gravity retaining wall of Qinglin Freeway, the model test was designed, and combined with the results of the ABAQUS finite element numerical analysis, it was analyzed that how the anchor axial pulling force distributes. The results showed that the force of the anchor near the wall bolt was large and which far from the wall was small and the ultimate pullout force was proportional to the length, diameter and shear strength. When the end tension of the anchor was small, the top load played a leading role on the anchor tension. This conclusion confirmed the calculation formula of ultimate pullout force was and provided a theoretical basis for anchor-pull retaining wall design and calculation. 展开更多
关键词 Anchor-Pull Retaining Wall ULTIMATE PULLOUT Force Lateral Earth Pressure Model Test Numerical Analysis
下载PDF
Molecular Epidemiological Study of a Human Brucellosis Outbreak—Weihai City,Shandong Province,China,2022
6
作者 Yan Li yifan yu +4 位作者 Jian Zhao Shujun Ding Guoying Zhang Xiaolin yu Zengqiang Kou 《China CDC weekly》 SCIE CSCD 2024年第12期230-234,共5页
Summary What is already known about this topic?Brucellosis,mainly caused by Brucella melitensis(B.melitensis),is regarded as a significant zoonotic disease in China.In Weihai,located at the eastern end of the Shandong... Summary What is already known about this topic?Brucellosis,mainly caused by Brucella melitensis(B.melitensis),is regarded as a significant zoonotic disease in China.In Weihai,located at the eastern end of the Shandong Peninsula,brucellosis has been in a low epidemic phase for the past five years. 展开更多
关键词 SHANDONG China. BREAK
原文传递
Vaccine adjuvants:mechanisms and platforms 被引量:3
7
作者 Tingmei Zhao yulong Cai +4 位作者 yujie Jiang Xuemei He yuquan Wei yifan yu Xiaohe Tian 《Signal Transduction and Targeted Therapy》 SCIE CSCD 2023年第8期3681-3704,共24页
Adjuvants are indispensable components of vaccines.Despite being widely used in vaccines,their action mechanisms are not yet clear.With a greater understanding of the mechanisms by which the innate immune response con... Adjuvants are indispensable components of vaccines.Despite being widely used in vaccines,their action mechanisms are not yet clear.With a greater understanding of the mechanisms by which the innate immune response controls the antigen-specific response,the adjuvants’action mechanisms are beginning to be elucidated.Adjuvants can be categorized as immunostimulants and delivery systems.Immunostimulants are danger signal molecules that lead to the maturation and activation of antigenpresenting cells(APCs)by targeting Toll-like receptors(TLRs)and other pattern recognition receptors(PRRs)to promote the production of antigen signals and co-stimulatory signals,which in turn enhance the adaptive immune responses.On the other hand,delivery systems are carrier materials that facilitate antigen presentation by prolonging the bioavailability of the loaded antigens,as well as targeting antigens to lymph nodes or APCs.The adjuvants’action mechanisms are systematically summarized at the beginning of this review.This is followed by an introduction of the mechanisms,properties,and progress of classical vaccine adjuvants.Furthermore,since some of the adjuvants under investigation exhibit greater immune activation potency than classical adjuvants,which could compensate for the deficiencies of classical adjuvants,a summary of the adjuvant platforms under investigation is subsequently presented.Notably,we highlight the different action mechanisms and immunological properties of these adjuvant platforms,which will provide a wide range of options for the rational design of different vaccines.On this basis,this review points out the development prospects of vaccine adjuvants and the problems that should be paid attention to in the future. 展开更多
关键词 ACTIVATION RATIONAL summarized
原文传递
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security 被引量:3
8
作者 Zhen Chen Linyun Ruan +2 位作者 Junwei Cao yifan yu Xin Jiang 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期406-417,共12页
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves stora... The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics. 展开更多
关键词 分布式文件系统 网络安全 粒度 交通流 性能对比试验 网络流量 存储设备 法医
原文传递
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining 被引量:2
9
作者 Jianlin Xu yifan yu +4 位作者 Zhen Chen Bin Cao Wenyu Dong yu Guo Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期418-427,共10页
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Inter... With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage. 展开更多
关键词 移动应用 数据挖掘 计算平台 应用程序 安全评估 移动设备 程序存储 恶意软件
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部