首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 375 毫秒
1.
Based on observing and analyzing the typical soil animals, the flexible unsmoothness is defined, which is the moving unsmoothness made by the flexible deformation of the structural units, and its characteristics of reducing adhesion and resistance is analyzed. The tests show that on the same conditions, compared with 45 Steel, the adhesion of the field-mouse’s fur is reduced by about 35%, its sliding resistance is reduced by about 80%.  相似文献   

2.
Cell-to-cell and cell-to-extracellular matrix (ECM) interactions in the functions of cell adhesion and signal transduction are important in global control of cell phenotypes and cell behavior and are crucial for maintenance of homeostasis and structural/functional stabilization of tissues and organs. Cell adhesion receptors are recognized as the molecular basis of cell adhesion. Cadherin and Integrin are widely expressed adhesion receptors in most tissues. They are transmembrane glycoproteins which, through their cytoplasmic domain, bind to many proteins at the inner surface of cell membrane to form molecule-linkage complexes and then connect with the cytoskeleton. Through cell adhesion receptors a network functioning as cell adhesion and signal transduction is organized between tissue cells and cell-ECM. In this regard cell adhesion receptors play an important role in regulation of morphogenesis, cell-cell recognition, cell migration, cell sorting and the determination of cell's fate in development. They mediate cell functions and their fault expression is intimately correlated with development of disorders like cancer. Several isoforms of Integrin were found to have tumor suppressor effect. Some components in the molecule-linkage of focal contact are actin-binding proteins as well as substrates of kinase in the Integrin initiated signal pathway to play a role as signal transducer. Some of these molecules exhibited tumor suppressor effect too. Decreased expression of E-Cadherin has been demonstrated in many epithelium originated carcinomas. Cadherin associated membrane adhesion plaque molecule β-Catenin is also involved in the oncogene Wnt signal pathway. Both E-Cadherin and β-Catenin were proved respectively with tumor suppressor effect against invasiveness and metastasis. That Cadherin is important for the posttranslationally functional expression of Connexin has been supported by evidence from developmental biology and cancer cell differentiation studies to suggest that some sort of interrelation feedback control exists between the two signal pathways.  相似文献   

3.
Some insects and animals, such as bugs, grasshoppers and tree frogs, realize their efficient adhesion mechanism to glass surface, wall and ceiling by injecting a wetting liquid thin film into the pad-substrate contact area. Their ability to control adhesion (attaching or detaching from a surface) is in many cases connected to the contact geometry and surface patterns of their attachment pads. This paper focuses on the dependence of the capillary adhesion (wet adhesion) on the micro patterns of the bio-adhesive pads. The objective is to reveal the possible mechanism for a bio-adhesive pad to control capillary force through adjusting its micro-scale surface pattern and topography. A capillary adhesion force model is built up taking account of the combined role of micro-dimple geometry as well as the wetting behavior of the confined liquid thin film. Calculated results of the apparent contact angle on the regularly micro-dimpled surfaces are compared with and in good agreement with the experimental measurements. Simulation of the capillary adhesion force reveals that it is controllable in a large magnitude by adjusting a dimensionless surface pattern parameter k defined as a/(a+b), where a is the diameter of micro dimple, and (a+b) is the side length of one pattern cell. When adjusting the parameter k more than 0.75, the capillary adhesion force could be switchable from attractive to repulsive. This effect of micro patterns on the interfacial capillary force is proved to be dominant when the pad-substrate clearance decreases to the nano/micrometer scale. These results indicate that a controllable and switchable capillary adhesive mechanism might be utilized by a living insect or animal to realize its stable adhesion and quick releasing movement through adjusting the micro-pattern topography of its bio-adhesive pad. Supported by the National Natural Science Foundation of China (Grant Nos. 50575123, 50730007), PPP Project from CSC and DAAD, and German Research Foundation (DFG) (Grant No. SFB622) (Y.H. Liu and S.I.-U. Ahmed)  相似文献   

4.
Forward secrecy is an important security property in key agreement protocol. Based on Ham's protocol, in this paper a new authenticated Diffie-Hellman key agreement protocol with half forward secrecy is proposed. This protocol is also based on a single cryptographic assumption, and is user authentication and shared key authentication. More importantly, our protocol provides forward secrecy with respect to one of the parties. For this reason, besides the advantages of Ham's protocol, in practice, our protocol can reduce the damages resulted from the disclosure of the user's secret key and it is very beneficial to today's communication with portable devices.  相似文献   

5.
During locomotion, insect feet endure dramatic impact force and generate adhesive force which is controlled by the architecture of the foot. The patterns of smooth attachment pads in insect feet vary widely among insect orders and families. The functional significance of the micro-structure and geometric design of insect feet remains largely unknown. In this study, we developed a two-dimensional finite element model of a grasshopper’s attachment pad. Realistic geometric microstructure and material propertie...  相似文献   

6.
At present, how to enable Search Engine to construct user personal interest model initially, master user's personalized information timely and provide personalized services accurately have become the hotspot in the research of Search Engine area. Aiming at the problems of user model's construction and combining techniques of manual customization modeling and automatic analytical modeling, a User Interest Model (UIM) is proposed in the paper. On the basis of it, the corresponding establishment and update algorithms of User lnterest Profile (UIP) are presented subsequently. Simulation tests proved that the UIM proposed and corresponding algorithms could enhance the retrieval precision effectively and have superior adaptability.  相似文献   

7.
A new sanitizable signature scheme is proposed, in which the security flaw of Miyazaki's sanitizable signature scheme SUMI-4 is improved. The new scheme overcomes the shortcomings of the original scheme SUM1-4 by using sanitizable authorization certificates. The new scheme enables the primitive signer to limit the sanitizer's power and still satisfies the security request of sanitizable signature.  相似文献   

8.
Feature selection methods have been successfully applied to text categorization but seldom applied to text clustering due to the unavailability of class label information. In this paper, a new feature selection method for text clustering based on expectation maximization and cluster validity is proposed. It uses supervised feature selection method on the intermediate clustering result which is generated during iterative clustering to do feature selection for text clustering; meanwhile, the Davies-Bouldin's index is used to evaluate the intermediate feature subsets indirectly. Then feature subsets are selected according to the curve of the Davies-Bouldin's index. Experiment is carried out on several popular datasets and the results show the advantages of the proposed method.  相似文献   

9.
Current uplink power control algorithm of code division multiple access (CDMA) time division duplex(TDD) system contains signal-to-interference-ratio(SIR) and interference measurement, which is based on history information. However, the adjustment of transmission power of one user equipment(UE) will affect SIR of the others, because the power control is done independently of the power adjustment of other UE's. So the convergence speed of power control is not fast and the system performance degrades. In the proposed algorithm, all UE's assigned in same time slot adjust their transmission power based on current information, which takes into account the adjustments of transmission power of all UE's. The simulation results indicated that the proposed algorithm outperforms the old algorithm.  相似文献   

10.
11.
Understanding the underlying goal behind a user's Web query has been proved to be helpful to improve the quality of search. This paper focuses on the problem of automatic identification of query types according to the goals. Four novel entropy-based features extracted from anchor data and click-through data are proposed, and a support vector machines (SVM) classifier is used to identify the user's goal based on these features. Experi- mental results show that the proposed entropy-based features are more effective than those reported in previous work. By combin- ing multiple features the goals for more than 97% of the queries studied can be correctly identified. Besides these, this paper reaches the following important conclusions: First, anchor-based features are more effective than click-through-based features; Second, the number of sites is more reliable than the number of links; Third, click-distribution- based features are more effective than session-based ones.  相似文献   

12.
13.
In a blind signcryption, besides the functions of digital signature and encryption algorithm for authentication and confidentiality, a user can delegates another user's capability with the anonymity of the participants guaranteed. Some blind signcryptions were proposed but without a blind signcryption with public public verifiability. In this paper, verifiability that is proved to be efficient and secure is proposed. Through the security analysis, we proved that the scheme can offer confidentiality, integrity, unforgeability, non-repudiation and public verifiability. The coming research direction is also summarized.  相似文献   

14.
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol.  相似文献   

15.
Combining the concept of partially blind signature with the concept of directed signature, we introduce a new concept of convertible directed partially blind signature (CDPBS), in which only the signer and the user can verify, confirm and disavow the validity of given signatures and convert given signatures into universally verifiable ones, to meet the need of signing personally or commercially sensitive messages. We give a formal definition of CDPBS and propose a concrete provably secure CDPBS scheme. The proposed scheme is efficient and secure, in which its unforgeability is the same as that of the Schnorr's signature scheme and its untransferability relies on the hardness of the decisional Diffie-Hellman problem. Furthermore, by letting the user's private key be a common constant, the proposed scheme can be used as a normal partially blind signature scheme.  相似文献   

16.
China’s COMPASS satellite navigation system consists of five or more geostationary (GEO) satellites.The roles of GEO satellites are to improve the regional user’s positioning accuracy and provide the continuous Radio Determination Satellite Service.The motion of GEO satellites relative to a ground tracking station is almost fixed,and regular orbit maneuvers are necessary to maintain the satellites’ allocated positions above the equator.These features present difficulties in precise orbit determination (POD).C-band ranging via onboard transponders and the L-band pseudo-ranging technique have been used in the COMPASS system.This paper introduces VLBI tracking,which has been successfully employed in the Chinese lunar exploration programs Chang’E-1 and Chang’E-2,to the POD of GEO satellites.In contrast to ranging,which measures distances between a GEO satellite and an observer,VLBI is an angular measurement technique that constrains the satellite’s position errors perpendicular to the satellite-to-observer direction.As a demonstration,the Chinese VLBI Network organized a tracking and orbit-determination experiment for a GEO navigation satellite lasting 24 h.This paper uses the VLBI delay and delay-rate data,in combination with C-band ranging data,to determine the GEO satellite’s orbit.The accuracies of the VLBI delay and delay rate data are about 3.6 ns and 0.4 ps/s,respectively.Data analysis shows that the VLBI data are able to calibrate systematic errors of the C-band ranging data,and the combination of the two observations improves orbit prediction accuracy with short-arc data,which is important for orbital recovery after maneuvers of GEO satellites.With the implementation of VLBI2010,it is possible for VLBI to be applied in the COMPASS satellite navigation system.  相似文献   

17.
A novel personalized Web search model is proposed. The new system, as a middleware between a user and a Web search engine, is set up on the client machine. It can learn a user's preference implicitly and then generate the user profile automatically. When the user inputs query keywords, the system can automatically generate a few personalized expansion words by computing the term-term associations according to the current user profile, and then these words together with the query keywords are submitted to a popular search engine such as Yahoo or Google. These expansion words help to express accurately the user's search intention. The new Web search model can make a common search engine personalized, that is, the search engine can return different search results to different users who input the same keywords. The experimental results show the feasibility and applicability of the presented work.  相似文献   

18.
It has very realistic significance for improving the quality of users' accessing information to filter and selectively retrieve the large number of information on the Internet. On the basis of analyzing the existing users' interest models and some basic questions of users' interest (representation, derivation and identification of users' interest), a Bayesian network based users' interest model is given. In this model, the users' interest reduction algorithm based on Markov Blanket model is used to reduce the interest noise, and then users' interested and not interested documents are used to train the Bayesian network. Compared to the simple model, this model has the following advantages like small space requirements, simple reasoning method and high recognition rate. The experiment result shows this model can more appropriately reflect the user's interest, and has higher performance and good usability.  相似文献   

19.
To analyze the type of Algerian’s gallstones and put forward relative measures of prevention and treatment, The NICOLET 170SX FT-IR spectrometer was used to measure the infra-red spectrum and analyze the feature of spectrum of Algerian’s gallstones. The results shown that Algerian have cholesterol gallstones. Reasons to form Algerian’s multiple cholesterol gallstones were investigated. We have put forward five suggestions to prevent and treat cholelithiasis. Biography: Li Zong-shan (1944-), male, Professor, research direction: Biophysics.  相似文献   

20.
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号