Proximal interactions A direct manipulation technique for wireless networking

合集下载

薛定谔 蛋白质相互作用

薛定谔 蛋白质相互作用

薛定谔蛋白质相互作用全文共四篇示例,供读者参考第一篇示例:薛定谔蛋白质相互作用是生命科学领域一个重要的研究课题。

蛋白质是生物体内最基本的功能分子,它们在细胞内承担着各种生物学功能。

相互作用是指两种蛋白质之间的相互作用,这种相互作用可以是直接的物理作用,也可以是间接的,例如通过其他分子介导。

薛定谔蛋白质相互作用的研究旨在揭示蛋白质之间的相互作用机制,为生命科学领域的研究提供重要的理论和实验基础。

在蛋白质相互作用的研究中,薛定谔是一个重要的概念。

薛定谔表示蛋白质存在着双重性质,即在某种情况下可以像波一样展现出相互作用,而在另一种情况下又像粒子一样进行作用。

这种双重性质使得蛋白质的相互作用过程既具有确定性又具有随机性,这为研究蛋白质相互作用的机制提供了理论基础。

蛋白质的相互作用是生物体内许多生物学过程的基础,例如细胞信号传导、代谢调控、基因表达调控等。

蛋白质之间的相互作用可以通过多种方式实现,例如蛋白质与受体的结合、蛋白质与酶的催化作用、蛋白质与DNA的结合等。

这些相互作用不仅影响了蛋白质自身的功能,还影响了整个细胞的生物学功能。

蛋白质相互作用的研究主要包括两个方面:一是鉴定蛋白质之间的相互作用;二是解析蛋白质相互作用的机制。

在鉴定蛋白质之间的相互作用方面,常用的方法包括酵母双杂交技术、质谱分析、表面等离子共振技术等。

这些方法可以通过高通量、高灵敏度地检测蛋白质间的相互作用,为后续研究提供重要的数据。

在解析蛋白质相互作用的机制方面,研究者常常将蛋白质的结构与功能进行整合分析。

通过结构生物学的方法,可以揭示蛋白质之间相互作用的空间结构,为后续研究提供重要的参考。

通过生物物理学的方法,可以揭示蛋白质之间相互作用的热力学和动力学特征,深入理解蛋白质相互作用的机制。

薛定谔蛋白质相互作用的研究在生命科学领域有着广泛的应用。

通过研究蛋白质相互作用的机制,可以揭示蛋白质在细胞内的生物学功能,为疾病的研究提供重要的理论基础。

了解轴突导向:吸引和排斥的随机与概率

了解轴突导向:吸引和排斥的随机与概率

了解轴突导向:吸引和排斥的随机与概率了解轴突导向对开发由损伤或疾病引发的受损神经元连接治疗方法很重要。

轴突迁移响应于细胞外导向分子,这会诱导或抑制轴突内的轴突生长活性。

轴突的吸引和排斥反应会决定其导向方向。

这是一种指导确定性模型;指出每条轴突吸引和排斥的作用线索,也可以精确定位导向方向。

但是,如果有众多导向线索诱导吸引和排斥反应,吸引和排斥事件的方向波动将如何确定呢?如果每个吸引和排斥作用的导向因为太复杂而无法测量的话,那么就不可能了解了每个分子线索影响的导向决定。

通过之前的一系列研究论文,美国罗格斯大学罗伯特•伍德•约翰逊医学院的William G. Wadsworth教授认为,以随机过程研究轴突导向是有作用的。

这种方法将聚集所有轴突生长活动。

吸引和排斥作用被认为是发生在分子水平上的不可预知事件,因此每一个吸引或排斥活动的指导作用就变的微不足道了。

使用此种概率方法,导向作用可被认为是一种宏观运动,也是所有基本轴突生长事件集体影响的产物。

方向性是随机定向运动的系列产物。

通过统计物理方法可以对这种运动进行研究。

在这篇观点文章中,William G. Wadsworth教授解释了这一理论的合理性以及其对了解轴突导向的意义。

相关内容发表在2015年2月第2期《中国神经再生研究(英文版)》杂志上。

Article: "Understanding axon guidance: attraction, repulsion, and statistical physics" by William G. Wadsworth (Rutgers Robert Wood Johnson Medical School, Department of Pathology and Laboratory Medicine, 675 Hoes Lane West, Piscataway, NJ 08854-5635, USA)Wadsworth WG (2015) Understanding axon guidance: attraction, repulsion, and statistical physics. Neural Regen Res 10(2):176-179.欲获更多资讯:Neural Regen ResUnderstanding Axon Guidance: Attraction, Repulsion, and Statistical PhysicsUnderstanding axon guidance is important for developing therapies to restore neuronal connections damaged by injury or disease. Axons migrate in response to extracellular guidance molecules that induce or inhibit axon outgrowth activity within the axon. The attractive and repulsive responses of the axon determine the direction of guidance. This is a deterministic model of guidance; given knowledge of the attractive and repulsive effect that each cue has on the axon, the direction of guidance can be precisely determined. But what if there are numerous attractive and repulsive responses induced by multiple guidance cues, and the direction of the attractive and repulsive events fluctuates? If the effect that each attractive and repulsive event has on guidance becomes too complex to measure then understanding how each molecular cue influences the guidance decision becomes impossible.In a series of papers, Prof. William G. Wadsworth, comes from Rutgers Robert Wood Johnson Medical School, USA have argued that it is useful to study axon guidance as a stochastic process. This approach treats all the outgrowth activities in aggregate. Attraction and repulsion are considered as unpredictable events that occur at the molecular level. The contribution to guidance of each attractive or repulsive event becomes insignificant. Using this probabilistic approach, guidance is considered as macroscopic movement that is the product of the collective impact of all the underlying axon outgrowth events. Directionality is the product of a succession of randomly directed movement. This movement can be studied using the methods of statistical physics. In this perceptive article, Prof. William G. Wadsworth explains the rationale behind this theory and its significance for understanding axon guidance. The relevant study has been published in the Neural Regeneration Research (Vol. 10, No. 2, 2015).Article: "Understanding axon guidance: attraction, repulsion, and statistical physics" by William G. Wadsworth (Rutgers Robert Wood Johnson Medical School, Department of Pathology and Laboratory Medicine, 675 Hoes Lane West, Piscataway, NJ 08854-5635, USA)Wadsworth WG (2015) Understanding axon guidance: attraction, repulsion, and statistical physics. Neural Regen Res 10(2):176-179.。

材料物理性能第八章课后作业课后习题英文版

材料物理性能第八章课后作业课后习题英文版

Third Edition (© 2001 McGraw-Hill) Chapter 88.1 Inductance of a long solenoid Consider the very long (ideally infinitely long) solenoid shown in Figure 8.69. If r is the radius of the core and is the length of the solenoid, then >> r. The total number of turns is N and the number of turns per unit length is n = N/ . The current through the coil wires is I. Apply Ampere's law around C, which is the rectangular circuit PQRS,and show thatB≈μoμr nIFurther, show that the inductance isL≈μoμr n2V core Inductance of long solenoid where V core is the volume of the core. How would you increase the inductance of a long solenoid?Figure 8.69What is the approximate inductance of an air-cored solenoid with a diameter of 1 cm, length of 20 cm, and 500 turns? What is the magnetic field inside the solenoid and the energy stored in the whole solenoid when the current is 1 A? What happens to these values if the core medium has a relative permeability μr of 600? SolutionWe use Ampere's law in Equation 8.15. Consider Figure 8.9. If H is the field along a small length d along a closed path C, then around C, ⎰Hd= total threaded current = I total = NI.Figure 8.9:Ampere’s circuital lawAssume that the solenoid is infinitely long. The rectangular loop PQRS has n (PQ ) number of turns where n is the number of turns per unit length or n = N / (See Figure 8.69). The field is only inside the solenoid and only along the PQ direction (long solenoid assumption) and therefore the field along QR , RS and SP is zero. Assume that the field H is uniform across the solenoid core cross section. Then the path integral of the magnetic field intensity H around PQRS is simply is H = H (PQ ). Ampere's law ⎰ Hd = I total is then H (PQ ) = I (nPQ ) i.e.H = nIThe dimensions of the solenoid are such that length >> diameter. We can assume that H field isrelatively uniform at all points inside the solenoid. Note: The approximate equality sign in the text (equation for B ) is due to the fact that we assumed H is uniform across the core and, further, along the whole length of the solenoid from one end to the other. The ends of the solenoid will have different fields (lower). Let A be the cross-sectional area of the solenoid. The magnetic field B , the flux Φ and hence the inductance L are B = μo μr H ≈ μo μr nI∴ Φ = BA ≈ μo μr nAI = μo μr (N / )AIand L = (N Φ)/I = N [μo μr (N / )AI ]/I = μo μr (N 2/ )A = μo μr n 2( A ) ∴L = μo μr n 2V corewhere V core is the volume of the core. Inductance depends on n 2, where n is the number of turns per unit length, on the relative permeability μr and on the volume of the core containing the magnetic flux. For a given volume inductor, L can be increased by using a higher μr material or increasing n , e.g. thinner wire to get more turns per unit length (not so thin that the skin effect diminishes the Q -factor, quality factor; see §2.8). The theoretical inductance of the coil is L = (4π ⨯ 10-7 H/m)(1)[(500)/(0.2 m)]2(0.2 m)(π)[(0.01 m)/(2)]2 ∴ L = 1.23 ⨯ 10-4 H or 0.123 mHB ≈ (4π ⨯ 10-7 Wb A -1 m -1)(1)[(500)/(0.2 m)](1 A) = 3.14 ⨯ 10-3 T The energy per unit volume is,E vol = B 2/(2μo ) = (3.14 ⨯ 10-3 T)2/[2(4π ⨯ 10-7 Wb A -1 m -1)] ∴E vol = 3.92 J / m 3The total energy stored is then,()()()J 61.6tot μm 2.02m 01.0J/m 92.3Area Length 23vol =⎪⎭⎫ ⎝⎛=⨯=πE E Suppose that μr = 600 and suppose that the core does not saturate (an ideal ferromagnetic material) then, ()()H 0.0738=⨯≈-600H 1023.14L()()T 1.88=⨯≈-600T 1014.33Band()()()372vol J/m 2344600m Wb/A 1042T 88.1=⋅⨯≈-πEso that E tot = (E vol )(Volume) = 36.8 mJThis is a dramatic increase and shows the virtue of using a magnetic core material for increasing theinductance and the stored magnetic energy.8.2 Magnetization Consider a long solenoid with a core that is an iron alloy (see Problem 8.1 for therelevant formulas). Suppose that the diameter of the solenoid is 2 cm and the length of the solenoid is 20 cm. The number of turns on the solenoid is 200. The current is increased until the core is magnetized to saturation at about I = 2 A and the saturated magnetic field is 1.5 T.a . What is the magnetic field intensity at the center of the solenoid and the applied magnetic field, μo H , forsaturation? b . What is the saturation magnetization M sat of this iron alloy?c . What is the total magnetization current on the surface of the magnetized iron alloy specimen?d . If we were to remove the iron-alloy core and attempt to obtain the same magnetic field of 1.5 T inside thesolenoid, how much current would we need? Is there a practical way of doing this?Solutiona. Applying Ampere’s law or H = NI we have,()()m2.0A 2200==NI H Since I = 2 A gives saturation, corresponding magnetizing field is H sat ≈ 2000 A/mSuppose the applied magnetic field is the magnetic field in the toroid core in the absence of material. ThenB ap p =μo H sat =4π⨯10-7 Wb A -1 m -1()2000 A/m () ∴ B app = 2.51 ⨯ 10-3 Tb. Apply()sat sat sat H M B o +=μ∴ A/m 2000mA Wb 104T5.11-1-7sat satsat -⨯=-=-πμH B M o∴ M sat ≈ 1.19 ⨯ 106 A/m c. Since M is the magnetization current per unit length,I m = M sat ≈ 1.19 ⨯ 106 A/mThen I surf ace = Total circulating surface current:∴I surface =I m =1.19⨯106 A/m ()0.2 m ()=2.38⨯105 ANote that the actual current in the wires, 2 A is negligible compared with I surf ace . d. Apply, B ≈μo nI (for air)()⎪⎭⎫⎝⎛⨯≈-m 2.0200m A Wb 104T5.11-1-7πI = 1194 ANot very practical in every day life! Perhaps this current (thus field B = 1.5 T) could be achieved byusing a superconducting solenoid.8.3 Paramagnetic and diamagnetic materials Consider bismuth with χm = -16.6×10-5 andaluminum with χm = 2.3×10-5. Suppose that we subject each sample to an applied magnetic field B o of 1 T applied in the +x direction. What is the magnetization M and the equivalent magnetic field μo M in each sample? Which is paramagnetic and which is diamagnetic?SolutionBismuth: χm = -16.6×10-5 χm is negative and small. Bismuth is a diamagnetic material.M = χm H = χm B o /μo∴M = (-16.6×10-5) (1 Wb m -2)/(4π×10-7 Wb m -1 A -1) = -132.1 A m -1Negative sign indicate – x direction.Magnetic field = B o + μo M = B o + χm B o = B o (1 + χm ) = (1 - 16.6×10-5)(1 T) = 0.999834 TAluminum: χm = 2.3×10-5 χm is positive and small. Aluminum is paramagnetic material.M = χm H = χm B o /μo∴M = (2.3×10-5) (1 Wb m -2)/(4π×10-7 Wb m -1 A -1) = 18.3 A m -1Positive sign indicates + x direction.Magnetic field = B o + μo M = B o + χm B o = B o (1 + χm ) = (1 +2.3×10-5)(1 T) = 1.000023 T Author's Note: Both effects are quite small.8.4 Mass and molar susceptibilities Sometimes magnetic susceptibilities are reported as molar ormass susceptibilities. Mass susceptibility (in m 3 kg -1) is χm /ρ where ρ is the density. Molar susceptibility (inm 3 mol -1) is χm (M at /ρ) where M at is the atomic mass. Terbium (Tb) has a magnetic molar susceptibility of 2 cm 3 mol -1. Tb has a density of 8.2 g cm -3 and an atomic mass of 158.93 g mol -1. What is its susceptibility, masssusceptibility and relative permeability? What is the magnetization in the sample in an applied magnetic field of 2 T?Solutionχm = Molar susceptibility (ρ/M at ) = (2 cm 3 mol -1) (8.2 g cm -3)/(158.93 g mol -1) = 0.1032 μr = 1 + χm = 1 + 0.1032 = 1. 1032 M = χm H = χm B o /μo∴M = (0.1032)(2 Wb m -2)/(4π×10-7 Wb m -1 A -1) = 1.642×105 A m -1Note: The magnetic field in the sample iso r o r B H B μμμ===1.1032( 2 T) = 2.206 T.8.5 Pauli spin paramagnetism Paramagnetism in metals depends on the number of conductionelectrons that can flip their spins and align with the applied magnetic field. These electrons are near the Fermilevel E F , and their number is determined by the density of states g (E F ) at E F . Since each electron has a spin magnetic moment of β, paramagnetic susceptibility can be shown to be given byχpara ≈ μo β 2 g (E F )Pauli spin paramagnetismwhere the density of states is given by Equation 4.10. The Fermi energy of calcium, E F , is 4.68 eV. Evaluate the paramagnetic susceptibility of calcium and compare with the experimental value of 1.9 ⨯ 10-5.SolutionApply,()()E h m E e 23228⎪⎭⎫⎝⎛=πg(Equation 4.10)so that ()()()()()J/eV 10602.1eV 68.4s J 10626.6kg 10109.928192323431---⨯⎪⎪⎭⎫⎝⎛⋅⨯⨯=πF E g∴g E F ()=9.197⨯1046 J -1 m -3Then, χpara ≈ μo β 2 g (E F )()()()314622241-1-7para m J 10199.9m A 10273.9m A Wb 104----⨯⨯⨯≈πχ∴χpara ≈ 0.994 ⨯ 10-5This is in reasonable agreement within an order of magnitude with the experimental value of 1.9 ⨯ 10-5.8.6 Ferromagnetism and the exchange interaction Consider dysprosium (Dy), which is arare earth metal with a density of 8.54 g cm -3 and atomic mass of 162.50 g mol -1. The isolated atom has theelectron structure [Xe] 4f 106s 2. What is the spin magnetic moment in the isolated atom in terms of number of Bohr magnetons? If the saturation magnetization of Dy near absolute zero of temperature is 2.4 MA m -1, whatis the effective number of spins per atom in the ferromagnetic state? How does this compare with the number of spins in the isolated atom? What is the order of magnitude for the exchange interaction in eV per atom in Dy if the Curie temperature is 85 K?SolutionIn an isolated Dy atom, the valence shells will fill in accordance with the exchange interaction:4f 106s 2Obviously, there are 4 unpaired electrons. Therefore for an isolated Dy atom, the spin magnetic moment = 4β.Atomic concentration in dysprosium (Dy) solid is (where ρ is the density, N A is Avogadro’s number and M at is the atomic mass):()()3283-12333m 10165.3kg/mol1050.162mol 10022.6kg/m 1054.8--⨯=⨯⨯⨯==atAat M N n ρSuppose that each atom contributes x Bohr magnetons, then βx n M at =sat()()2243286sat mA 10273.9m 10165.3A/m104.2--⨯⨯⨯==βat n M x = 8.18 This is almost twice the net magnetic moment in the isolated atom. Suppose that the Dy atom in the solid loses all the 4 electrons that are paired into the "electron gas" in the solid. This would make Dy +4 have 8 unpaired electrons and a net spin magnetic moment of 8β (this is an oversimplified view).Exchange interaction ~ kT C =8.617⨯10-5 eV/K ()85 K ()=0.00732 eV The order of magnitude of exchange interaction ~ 10-2 eV/atom for Dy (small).8.7 Magnetic domain wall energy and thickness The energy of a Bloch wall depends on twomain factors: the exchange energy E ex (J /atom) and magnetocrystalline energy K (J m -3). If a is the interatomicdistance, δ is the wall thickness, then it can be shown that the potential energy per unit area of the wall isδδπK a E U +=2ex2wall Potential energy of a Bloch wallShow that the minimum energy occurs when the wall has the thickness2/1ex 22⎪⎪⎭⎫ ⎝⎛='aK E πδBloch wall thicknessand show that when δ = δ', the exchange and anisotropy energy contributions are equal . Using reasonable values for various parameters, estimate the Bloch energy and wall thickness for Ni. (See Example 8.4)SolutionδδπK a E U +=2ex2wall∴K a E d dU +-=2ex2wall 2δπδ Minimum energy occurs, when 0wall=δd dU ∴ 022ex 2=+'-K a E δπ ∴2/1ex 22⎪⎪⎭⎫ ⎝⎛='aK E πδAt δδ'=δδδδπ'=''='=K K a E U 2ex 2exchange 2Andexchange anisotropy U K U ='=δFor Ni, T C = 631 K and K = 5 mJ cm -3 = 5×103 J m -3 E ex = kT C = (1.38×10-23 J K -1) (631 K) = 8.71×10-21 J ∴⎥⎦⎤⎢⎣⎡⨯⨯⨯=⎪⎪⎭⎫ ⎝⎛='---)m J 10(5 m)103.0(2)J 1071.8(23392122/1ex 2ππδaK E = 1.69×10-7m or 169 nm And m)10(1.69)m J 105(m)10m)(1.69103.0(2 J) 108.71(27-337-9-212ex 2wall ⨯⨯+⨯⨯⨯='+'=--πδδπK a E U= 1.69×10-3 J m -2 or 1.69 mJ m -2.*8.8 Toroidal inductor and radio engineers toroidal inductance equationa . Consider a toroidal coil (Figure 8.10) whose mean circumference is and has N tightly wound turnsaround it. Suppose that the diameter of the core is 2a and >> a . By applying Ampere's law, show that if the current through the coil is I , then the magnetic field in the core isNIB r o μμ=[8.30]where μr is the relative permeability of the medium. Why do you need >> a for this to be valid? Doesthis equation remain valid if the core cross section is not circular but rectangular, a ⨯ b , and >> a and b ? b . Show that the inductance of the toroidal coil isAN L r o 2μμ=Toroidal coil inductance [8.31]where A is the cross-sectional area of the core.c . Consider a toroidal inductor used in electronics that has a ferrite core size FT-37, that is, round but with arectangular cross section. The outer diameter is 0.375 in (9.52 mm), the inner diameter is 0.187 in (4.75 mm), and the height of the core is 0.125 in (3.175 mm). The initial relative permeability of the ferrite core is 2000, which corresponds to a ferrite called the 77 Mix. If the inductor has 50 turns, then using Equation 8.31, calculate the approximate inductance of the coil. d . Radio engineers use the following equation to calculate the inductances of toroidal coils,6210)mH (N A L L =Radio engineers inductance equation [8.32]where L is the inductance in millihenries (mH) and A L is an inductance parameter, called an inductance index , that characterizes the core of the inductor. A L is supplied by the manufacturers of ferrite cores and is typically quoted as millihenries (mH) per 1000 turns. In using Equation 8.32, one simply substitutes the numerical value of A L to find L in millihenries. For the FT-37 ferrite toroid with the 77 Mix as the ferrite core, A L is specified as 884 mH/1000 turns. What is the inductance of the toroidal inductor in part (c ) from the radio engineers equation in Equation 8.32? What is the percentage difference in values calculated by Equations 8.32 and 8.31? What is your conclusion? (Comment : The agreement is not always this close).SolutionFigure 8.10: A toroidal coil with N turns.a. As in Figure 8.10, if we choose a closed path C that runs along the geometric center of the core and if I is the current, N is the number of turns and = mean circumference, then: NIH d H Ct ==⎰ or H = (NI )/∴NIH B r o r o μμμμ==This particular derivation only applies in the special case of >> radius (a ); that is, for a very long, narrow core. If the core is very long and narrow, it may be safely assumed that the magnetic flux density B is uniform across the entire width (2a ) of the core. If B was not uniform, then applying Ampere’s Law to different (concentric) closed paths would yield different results.This above derivation for B is valid for a rectangular cross-sectioned core of area a ⨯ b , provided that >> a and >> b . The magnetic field is then,B =μo μrNIb. The inductance by definition is given by,A N I NAI N I BA N I N L r o r o 2)(μμμμ=⎪⎭⎫ ⎝⎛==Φ=c.Figure 8Q8-1: Toroidal core with rectangular cross section.Given, outer radius = r outer = 0.00476 m, inner radius = r inner = 0.002375 m and height = H = 0.003175 m.We take the mean circumference through the geometric center of the core so that the mean radius is: mm 5675.32inner innerouter =+-=r r r r ∴()()m 1042.22m 105675.32233--⨯=⨯==ππ rWidth = W = r outer - r inner = 0.002385 mA = Cross sectional area = W ⨯ H = (0.002385 m)(0.003175 m) = 7.572 ⨯ 10-6 m 2. Since >> a and >> b (at least approximately) we can calculate L as follows:AN L r o 2μμ=∴ ()()()()m1042.22m 10572.7502000H/m 10432627---⨯⨯⨯=πL ∴L = 0.00212 H or 2.12 mH (2)d. Using the radio engineer’s equation,()()()mH 2.21mH ===62621050mH 88410N A L L (3)so that 4.07%=⨯-=%100mH21.2mH12.2mH 21.2difference %Equations 2 and 3 differ only by 4.1% in this case. This is a good agreement.*8.9 A toroidal inductora . Equations 8.31 and 8.32 allow the inductance of a toroidal coil in electronics to be calculated. Equation8.32 is the equation that is used in practice. Consider a toroidal inductor used in electronics that has a ferrite core of size FT-23 that is round but with a rectangular cross section. The outer diameter is 0.230 in (5.842 mm), the inner diameter is 0.120 in (3.05 mm), and the height of the core is 0.06 in (1.5 mm). The ferrite core is a 43-Mix that has an initial relative permeability of 850 and a maximum relative permeability of 3000. The inductance index for this 43-Mix ferrite core of size FT-23 is A L =188 (mH/1000 turns). If the inductor has 25 turns, then using Equations 8.31 and 8.32, calculate the inductance of the coil under small-signal conditions and comment on the two values. b . The saturation field, B sat , of the 43-mix ferrite is 0.2750 T. What will be typical dc currents that willsaturate the ferrite core (an estimate calculation is required)? It is not unusual to find such an inductor in an electronic circuit also carrying a dc current? Will your calculation of the inductance remain valid in these circumstances? c . Suppose that the above toroidal inductor discussed in parts (a) and (b) is in the vicinity of a very strongmagnet that saturates the magnetic field inside the ferrite core. What will be the inductance of the coil?Solutiona. Provided that the mean circumference is much greater than any long cross sectional dimension (e.g. >> diameter or >> a and >> b ), then we can use,AN L r o 2μμ≈Note that μr is the initial permeability. We need the mean circumference which can be calculated from the mean radius r ,mm 97.132 that so mm 223.22inner innerouter ===+-=r r r r r π Width = W = r outer - r inner = 0.001396 m and Height = H = 0.0015 m.A = Cross sectional area = W ⨯ HSince >> a and >> b (at least approximately) we can calculate L as follows:)(2WH N L r o μμ≈()()()()()m1097.13m105.1m 10396.125850H/m 10433327----⨯⨯⨯⨯≈πLL ≈ 0.10 mHAnd, the radio engineer’s equation, Equation 8.32, (radio engineers toroidal inductance equation, pg. 6.25 and data pg. 24.7 in The ARRL Handbook 1995)()()mH 0.118===62621025mH 18810N A L L There is a 15% difference between the two inductances; limitations of the approximation are apparent. b. To estimate H sat , we’ll take the maximum relative permeability μr max = 3000 as an estimate in order to findH sat (see Figure 8Q9-1). We know that sat max sat and H B NIH o r μμ==∴satmax sat NI B r o μμ=∴ ()()()m1097.13253000m A Wb 104T 2750.03sat-1-17--⨯⨯=I π∴I sat = 40.8 mAwill saturate the core.Figure 8Q9-1: B versus H curve for 43 - Mix ferrite .If the core is saturated, the calculation of inductance is of course no longer valid as it used the initialpermeability. The inductance now will be much reduced. Since under saturation ∆B = μ0∆H , effectively μr = 1. The use of an initial permeability such as μr = 850 implies that we have small changes (and also reversible changes) near around H = 0 or I = 0.When an inductor carries a dc current in addition to an ac current, the core will operate “centered” at a different part of the material’s B -H curve, depending on the magnitude of the dc current inasmuch as H ∝ I . Thus, a dc current I 1 imposes a constant H 1 and shifts the operation of the inductor to around H 1. μr will depend on the magnitude of the dc current.c. The same effect as passing a large dc current and saturating the core. When the core is saturated, theincrease in the magnetic field B in the core is that due to free space, i.e. ∆B = μo ∆H . This means we can use μ = 1 in Equation 8.31 to find the inductance under saturation. It will be about 0.10 mH / 850 or 0.12 μH , very small.Author’s Note: Static inductance can be defined as L = Flux linked per unit dc current or L = N Φ/I . It applies under dc conditions and I = dc current. For ac signals, the current i will be changing harmonically (or following some other time dependence) and we use the definition⎪⎭⎫ ⎝⎛⎪⎭⎫ ⎝⎛Φ=Φ=dt di dt d N i N L δδ Further, by Faraday’s law, since v is the induced voltage across the inductor by the changing total flux Nd Φ/dt , we can also define L by,⎪⎭⎫ ⎝⎛=dt di L vMoreover, since L = N δΦ/δi we see that the ac L is proportional to the slope of the B versus H behavior.*8.10 The transformera . Consider the transformer shown in Figure 8.70a whose primary is excited by an ac (sinusoidal) voltage offrequency ƒ. The current flowing into the primary coil sets up a magnetic flux in the transformer core. By virtue of Faraday's law of induction and Lenz's law, the flux generated in the core is the flux necessary to induce a voltage nearly equal and opposite to the applied voltage. Thus,dtNAdBdt d ==)linked f lux Total (υwhere A is the cross-sectional area, assumed constant, and N is the number of turns in the primary.Show that if V rms is the rms voltage at the primary (V max = V rms √2) and B m is the maximum magnetic field in the core, thenV rms = 4.44 NAƒB mTransformer equation[8.33]Transformers are typically operated with B m at the "knee" of the B -H curve, which corresponds roughly to maximum permeability. For transformer irons, B m ≈ 1.2 T. Taking V rms = 120 V and a transformer core with A = 10 cm ⨯ 10 cm, what should N be for the primary winding? If the secondary winding is to generate 240 V, what should be the number of turns for the secondary coil?b . The transformer core will exhibit hysteresis and eddy current losses. The hysteresis loss per unitsecond, as power loss in watts, is given byP h = KƒB m n V coreHysteresis loss[8.34]where K = 150.7, ƒ is the ac frequency (Hz), B m is the maximum magnetic field (T) in the core (assumed to be in the range 0.2 - 1.5 T), n = 1.6 and, V core is the volume of the core. The eddy current losses are reduced by laminating the transformer core as shown in Figure 8.70b. The eddy current loss is given bycore 22265.1V d B f P me ⎪⎪⎭⎫⎝⎛=ρEddy current loss [8.35]where d is the thickness of the laminated iron sheet in meters (8.70b) and ρ is its resistivity (Ω m). Suppose that the transformer core has a volume of 0.0108 m 3 (corresponds to a mean circumference of 1.08 m). If the core is laminated into sheets of thickness 1 mm and the resistivity of the transformer iron is 6 ⨯ 10-7 Ω m, calculate both the hysteresis and eddy current losses at f = 60 Hz, and comment on theirrelative magnitudes. How would you achieve this?Figure 8.70(a) A transformer with N turns in the primary. (b) Laminated core reduces eddy current losses.Solutiona. The induced voltage either at the primary or the secondary is given by Faraday’s law of induction (the negative sign indicates an induced voltage opposite to the applied voltage), that is,dtdB NA-=υ Suppose we apply this to the primary winding. Then υ = V m sin(2πft ) where f = 60 Hz and V m is the maximum voltage, that is V m = V rms (√2). ThendtdB NAft V m -=π)2sin( It is clear that B is also a sinusoidal waveform. Integrating this equation we find,)2cos()2(ft f NA V B mππ=which can be written asB = B m cos(2πft )so that the maximum B is B m given byfNAV fNA V B m m ππ222rms==where we used V m = V rms (√2). Thus,V rms =4.44NAfB mLet N P = Primary winding turns and assume f = 60 Hz, then()()()()T 2.1Hz 60m 1.044.4V12044.42rms ==m AfB V P N = 38 turns on primary Secondary winding turns are()()()()T 2.1Hz 60m 1.044.4V2402=S N = 75 turns on secondary b. Part a gives B m = 1.2 T. Then the hysteresis loss isP h =KfB m nV co reB m = 1.2 T()()()()36.1m 0108.0T 2.1Hz 607.150=h P = 131 WEddy current loss iscore 22265.1V d B f P me ⎪⎪⎭⎫ ⎝⎛=ρB m = 1.2 T()()()()W 154=⎪⎪⎭⎫ ⎝⎛Ω⨯=-37222m 0108.0m 106m 001.0T 2.1Hz 6065.1e P With 1 mm lamination and at this low frequency (60 Hz) hysteresis loss seems to dominate the eddycurrent loss. Eddy current loss can be reduced with thinner laminations or higher resistivity core materials (e.g. ferrites at the expense of B max ). Hysteresis loss can be reduced by using different core material but that changes B . Eqn. 8.34 is valid for only silicon steel cores only which have the required typical B m for power applications.8.11 Losses in a magnetic recording head Consider eddy current losses in a permalloymagnetic head for audio recording up to 10 kHz. We will use Equation 8.35 for the eddy current losses.Consider a magnetic head weighing 30 g and made from a permalloy with density 8.8 g cm -3 and resistivity 6 ⨯ 10-7 Ω m. The head is to operate at B m of 0.5 T. If the eddy current losses are not to exceed 1 mW, estimate the thickness of laminations needed. How would you achieve this?SolutionWe will apply the eddy current loss equation in this problem though this equation has a number of assumptions so that answer is only an estimate . The eddy current loss iscore 22265.1V d B f P me ⎪⎪⎭⎫⎝⎛=ρwhere the core volume is3633core m 10409.3 or cm 409.3g/cm8.8g30Density Mass -⨯===V Then,core22265.1V B f P d m e ρ=∴ ()()()()()()362273m10409.3T 5.0Hz 000,1065.1mW 106W 101---⨯⨯⨯=d ∴d = 2.07 μmVery thin (a page of a textbook is typically about 50 - 100 μm).*8.12 Design of a ferrite antenna for an AM receiver We consider an AM radio receiverthat is to operate over the frequency range 530 - 1600 kHz. Suppose that the receiving antenna is to be a coil with a ferrite rod as core, as depicted in Figure 8.71. The coil has N turns, its length is , and the cross-sectional area is A . The inductance, L , of this coil is tuned with a variable capacitor C . The maximum value of C is 265 pF, which with L should correspond to tuning in the lowest frequency at 530 kHz. The coil with the ferrite core receives the EM waves, and the magnetic field of the EM wave permeates the ferrite core and induces a voltage across the coil. This voltage is detected by a sensitive amplifier, and in subsequent electronics it is suitably demodulated. The coil with the ferrite core therefore acts as the antenna of the receiver (ferrite antenna). We will try to find a suitable design for the ferrite coil by carrying out approximate calculations - in practice some trial and error experimentation would also be necessary. We will assume that the inductance of a finite solenoid is2AN L o ri μγμ=Inductance of a solenoid [8.36]where A is the cross-sectional area of the core, is the coil length, N is the number of turns, and γ is a geometric factor that accounts for the solenoid coil being of finite length. Assume γ ≈ 0.75. The resonant frequency f of an LC circuit is given by()2/121LC f π=[8.37]a . If d is the diameter of the enameled wire to be used as the coil winding, then the length ≈ Nd . If we usean enameled wire of diameter 1 mm, what is the number of coil turns, N , we need for a ferrite rod given its diameter is 1 cm and its initial relative permeability is 100? b . Suppose that the magnetic field intensity H of the signal in free space is varying sinusoidally, that isH = H m sin(2πƒt )[8.38]where H m is the maximum magnetic field intensity. H is related to the electric field E at a point by H = E /Z space where Z space is the impedance of free space given by 377 Ω.. Show that the induced voltage at the antenna coil is2ππ377CfdE V m m =Induced voltage across a ferrite antenna [8.39]。

人体结构学 Human Structure学习通章节答案期末考试题库2023年

人体结构学 Human Structure学习通章节答案期末考试题库2023年

人体结构学 Human Structure学习通超星课后章节答案期末考试题库2023年1.Which bones belong to the shoulder girdle?答案:Scapula###Clavicle2.The paired cerebral bones are答案:parietal bone###temporal bone3.Shoulder joint is formed by答案:head of humerus###glenoid cavity of scapula4.Please deseribe the location and openings of the paranasal sinuses答案:答5.Please describe the formation, main structures and communications of the middle Cranial fossa.答案:答6.Please describe the joints of the vertebral bodies.答案:答7.Please describe the joints of the vertebral arches.答案:答8.Please describe the composition, characteristics and movements of theshoulder joint.答案:答9.Which bone belongs to the long bone?答案:Femur10.Which bones belong to the irregular bone?答案:Vertebra###Sphenoid bone11.The blood- testis barrier does NOT include the答案:gap junction between adjacent spermatogomia12.Which of the following description is true about the primordial follicles答案:The primordial follicle consists of a primary oocyte and a layer of flat follicle cells.13.(英文答题,第一空填1个单词,第二空3个单词)The axial bone contains fromup downwards _____ and_____.答案:skull###bonesoftrunk14.About the component of nephron, the correct option is答案:renal corpuscle, proximal tubules, distal tubules and thin segment15.About the features of proximal tubule, the WRONG option is答案:The cytoplasm of epithelial cell is weakly basophilic.16. A patient presents in your office after having a positive result on a homepregnancy test. Her menstrual cycle has always been the classic 28-day cycle discussed in textbooks, with ovulation occurring on the 14th day following the start of menstruation. Her menstrual period began on August 19.2019.You estimate her EDD to be答案:on May 26, 202017.Which of the following is NOT considered one of the fetal membranes答案:buccopharyngeal membrane18.Which bone does not form the anterior cranial fossa?答案:Temporal bone19.Which bone forms both the middle and posterior cranial fossa?答案:Temporal bone20.(英文答题,第一空填1个单词,第二空1个单词,第三空2个单词)Thesternum consists from up downwards of_____ , _______ and ______ .答案:manubrium###body###xiphoidprocess21.Of the following statements about epididymis, the WRONG option is答案:The ductus epididymis is lined with a simple columnar epithelium22.Of the following statements about trachea, the WRONG option is答案:The adventitia is constructed of the elastic cartilage rings.23.The interalveolar septum does NOT contain答案:ciliated cell24.All the following cells are included in the spermatogenic epithelium, EXCEPTthe答案:Leydig cells25.Please describe the general features of the vertebrae.答案:答26.Which bone forms the posteroinferior part of the bony nasal septum?答案:Vomer27.Drawing pictures of Thoracic vertebra from anterior and lateral view.答案:答28.Which bone does not form the thoracic Cage?答案:Sacrum29.About the scapula, which of the statements is not true?答案:It has three borders, three angles and three surfaces.30.About the component of the renal corpuscle, the WRONG option is答案:At the vascular pole, the efferent arteriole enters the glomerulus.31.Of the following statements about podocyte, the correct option is答案:They form the visceral layer of the Bowman's capsule.32.An infant is born with a sacrococcygeal teratoma. Biopsy(组织活检) andhistologic analysis reveal that it contains intestinal epithelia, cardiac muscle, cartilage, and integument tissue. You counsel the mother that the tumor is benign(良性的)and recommend surgical removal. This tumor was caused by which developmental anomaly?答案:Failure of primitive streak regression33.Which of the following structure is NOT included in the secondary follicle?答案:secondary oocyte34.All the following are from mesoderm EXCEPT the答案:spinal cord35.Which of the following descriptions is NOT true about the corpus luteum?答案:The corpus luteum continues to produce estrogen and progesterone during the whole process of pregnancy.36.Of the following statements about the alveolus of lung, the WRONG option is答案:It opens on the wall of terminal bronchioles.37.Which of the following descriptions is NOT true about the secretory phase ofa menstrual cycle?答案:The basal layer of endometrium becomes thicker .38.Of the following statements about Leydig cells, the correct option is答案:It secretes testosterone.39.Of the following statements about macula densa, the WRONG option is答案:It is derived from smooth muscle fibers of afferent arteriole.40.Of the following statements concerning terminal bronchioles, the WRONGoption is答案:They have some mixed gland.41.Of the following options, the blood-air barrier does NOT contain答案:typeⅡalveolar cells42.All the following cells are included in the spermatogenic cells, EXCEPT答案:Sertoli cells43.Which of the following does not belong to the joints of the vertebral arches?答案:Anterior longitudinal ligament44.Human chorionic gonadotropin is produced by the答案:syncytiotrophoblast45.Which of the followings is not enclosed in the articular capsule of shoulderjoint ?答案:Tendon of the short head of the biceps46.The pathway connecting the infratemporal fossa with the orbit is答案:inferior orbital fissure47.When does ovulation occur in a menstrual cycle?答案:the 14th day。

《孟德尔随机化研究指南》中英文版

《孟德尔随机化研究指南》中英文版

《孟德尔随机化研究指南》中英文版English:"Mendelian randomization (MR) has emerged as an important tool in epidemiology and biostatistics for investigating causal relationships between risk factors and disease outcomes. In order to ensure the validity and reliability of MR studies, researchers need to follow a standardized set of guidelines. The 'Mendelian Randomization Reporting Guidelines (MR-REWG)' provide detailed recommendations for conducting, reporting, and appraising MR studies. These guidelines cover key aspects such as study design, instrument selection, data sources, statistical analysis, and result interpretation. By adhering to these guidelines, researchers can minimize bias and confounding, and produce more robust evidence for causal inference in epidemiological research."中文翻译:“孟德尔随机化(MR)已经成为流行病学和生物统计学中研究危险因素与疾病结果之间因果关系的重要工具。

甘蓝挥发物对小菜蛾幼虫取食行为的影响

甘蓝挥发物对小菜蛾幼虫取食行为的影响

2022,42(2):065J.SHANXI AGRIC,UNIV.(Natural Science Edition )学报(自然科学版)04098甘蓝挥发物对小菜蛾幼虫取食行为的影响原少斐1,邓彩萍2,郝赤1*,闫喜中1*(1.山西农业大学植物保护学院,山西太谷030801;2.山西农业大学林学院,山西太谷030801)摘要:[目的]明确寄主植物甘蓝(Brassica oleracea L.)挥发物对小菜蛾(Plutella xylostella )幼虫取食行为反应的影响,为筛选小菜蛾植物源引诱剂提供理论依据。

[方法]利用Y 型嗅觉仪测定小菜蛾幼虫雌雄虫对甘蓝3种活性挥发物的嗅觉反应,通过田间试验测定在挥发物存在下小菜蛾幼虫对花椰菜植株的取食效果。

[结果]甘蓝3种挥发物能够引起小菜蛾幼虫嗅觉反应,但不同浓度下引诱选择率不同。

异硫氰酸烯丙酯浓度为1μg·μL -1时对雌雄小菜蛾幼虫均表现出极显著引诱效果,引诱率分别为75%和80%;浓度为10μg·μL -1的异硫氰酸丁酯对雌、雄幼虫的引诱率分别为75%和80%;顺⁃3⁃己烯醇对幼虫雄虫引诱率为70%;在田间取食试验中,3种化合物总体上可以促进小菜蛾幼虫取食,取食指数均显著高于对照,然而浓度为500μg·μL -1的异硫氰酸烯丙酯则对雄性幼虫表现出拒食效果。

[结论]异硫氰酸烯丙酯、异硫氰酸丁酯和顺⁃3⁃己烯醇对小菜蛾幼虫具有较强的引诱作用,这些可为治理小菜蛾为害十字花科植物提供新的思路和方法。

关键词:小菜蛾幼虫;寄主植物;挥发物;取食行为中图分类号:S433.4文献标识码:A文章编号:1671-8151(2022)02-0065-08小菜蛾(Plutella xylostella L.)属于鳞翅目(Lepidoptera )菜蛾科(Plutellidae ),是世界上主要的十字花科蔬菜害虫之一,每年因为其造成的经济损失可达40~50亿美元[1]。

《孟德尔随机化研究指南》中英文版

《孟德尔随机化研究指南》中英文版

《孟德尔随机化研究指南》中英文版全文共3篇示例,供读者参考篇1Mendel's Randomization Research GuideIntroductionMendel's Randomization Research Guide is a comprehensive resource for researchers in the field of genetics who are interested in incorporating randomization into their study designs. Developed by Dr. Gregor Mendel, a renowned geneticist known for his pioneering work on the inheritance of traits in pea plants, this guide provides a detailed overview of the principles and methods of randomization in research.Key ConceptsRandomization is a crucial tool in scientific research that helps to eliminate bias and increase the validity of study findings. By randomly assigning participants to different treatment groups or conditions, researchers can ensure that the groups are comparable and that any observed differences are truly due to the intervention being studied.The guide covers a range of topics related to randomization, including the importance of random assignment, the different types of randomization methods, and the potential pitfalls to avoid when implementing randomization in a study. It also provides practical guidance on how to design and conduct randomized experiments, including tips on sample size calculation, randomization procedures, and data analysis methods.Benefits of RandomizationRandomization offers several key benefits for researchers, including:1. Increased internal validity: Random assignment helps to ensure that the groups being compared are equivalent at the outset of the study, reducing the risk of confounding variables influencing the results.2. Improved generalizability: By minimizing bias and increasing the reliability of study findings, randomization enhances the external validity of research findings and allows for more generalizable conclusions to be drawn.3. Ethical considerations: Randomization is considered a fair and unbiased method for allocating participants to differentgroups, helping to ensure that all participants have an equal chance of receiving the intervention being studied.Practical ApplicationsThe guide provides practical examples of how randomization can be applied in research studies, ranging from clinical trials to observational studies. For example, researchers conducting a randomized controlled trial may usecomputer-generated randomization software to assign participants to different treatment groups, while researchers conducting an observational study may use stratified random sampling to ensure that key variables are evenly distributed across study groups.In addition, the guide outlines best practices for implementing randomization in research studies, including the importance of blinding participants and investigators to group assignment, documenting the randomization process, and conducting sensitivity analyses to assess the robustness of study findings.ConclusionIn conclusion, Mendel's Randomization Research Guide is an invaluable resource for researchers seeking to incorporaterandomization into their study designs. By following the principles and methods outlined in the guide, researchers can enhance the validity and reliability of their research findings, ultimately leading to more impactful and meaningful contributions to the field of genetics.篇2Mendel Randomization Research GuideIntroduction:The Mendel randomization research guide is a comprehensive manual that provides researchers with detailed instructions on using Mendelian randomization (MR) in their studies. MR is a statistical method that uses genetic information to investigate causal relationships between exposures, known as risk factors, and outcomes, such as diseases or health-related outcomes. This guide aims to help researchers understand the principles of MR, design robust studies, and interpret their results accurately.Key Sections:1. Introduction to Mendelian Randomization:- Overview of MR as a method for assessing causality- Explanation of the assumptions underlying MR studies- Discussion of the advantages and limitations of MR compared to traditional observational studies2. Study Design:- Selection of genetic instruments for exposure variables- Matching of genetic instruments to outcome variables- Consideration of potential biases and confounding factors- Power calculations and sample size considerations3. Data Analysis:- Methods for instrumental variables analysis- Sensitivity analyses to assess the robustness of results- Techniques for handling missing data and population stratification4. Interpretation of Results:- Methods for assessing causality using MR- Consideration of biases and limitations in MR studies- Implications of findings for public health and clinical practiceCase Studies:The Mendel randomization research guide includes several case studies that demonstrate the application of MR in various research settings. These case studies illustrate the steps involved in designing MR studies, selecting appropriate genetic instruments, analyzing data, and interpreting results. Researchers can use these examples as a guide for conducting their own MR studies and interpreting their findings.Conclusion:The Mendel randomization research guide is a valuable resource for researchers interested in using MR to investigate causal relationships in health research. By following the guidelines outlined in this manual, researchers can design rigorous MR studies, analyze their data accurately, and draw meaningful conclusions about the impact of risk factors on health outcomes. This guide will help advance the field of epidemiology and pave the way for more robust and reliable research in the future.篇3Mendel Randomization Research GuideIntroductionThe Mendel Randomization Research Guide is a comprehensive resource aimed at providing researchers with the necessary tools and techniques to conduct randomized studies in the field of genetics. The guide covers various aspects of Mendel randomization, a method that uses genetic variants as instruments for studying the causal effects of exposures or interventions on outcomes.Key Concepts1. Mendelian Randomization: Mendelian randomization is a technique that uses genetic variants as instrumental variables to study the causal relationship between an exposure and an outcome. By leveraging genetic variability, researchers can overcome confounding and reverse causation biases that often plague traditional observational studies.2. Instrumental Variables: Instrumental variables are genetic variants that are associated with the exposure of interest but do not have a direct effect on the outcome, except through the exposure. These genetic variants serve as instruments for estimating the causal effect of the exposure on the outcome.3. Bias Minimization: Mendel randomization helps minimize bias in observational studies by mimicking the random assignment of exposures in a controlled experiment. By usinggenetic variants as instruments, researchers can ensure that any observed associations are less likely to be influenced by confounding factors.Guide Contents1. Study Design: The guide provides detailed information on how to design Mendelian randomization studies, including selecting genetic instruments, conducting power calculations, and assessing instrument validity.2. Data Collection: Researchers will learn about the various data sources available for Mendel randomization studies, such as genome-wide association studies, biobanks, and electronic health records.3. Analysis Methods: The guide covers statistical techniques for analyzing Mendelian randomization data, includingtwo-sample MR, inverse variance-weighted regression, and sensitivity analyses.4. Reporting Guidelines: Researchers will find guidelines on how to report Mendelian randomization studies in a clear and transparent manner, following best practices in scientific research.ConclusionThe Mendel Randomization Research Guide offers a comprehensive overview of the principles, methods, and applications of Mendelian randomization in genetic research. By following the guidelines outlined in the guide, researchers can conduct rigorous and unbiased studies that provide valuable insights into the causal effects of exposures on health outcomes.。

SRM、MRM与PRM的区别

SRM、MRM与PRM的区别

百泰派克生物科技
SRM、MRM与PRM的区别
MRM(Multiple Reaction Monitoring)多重反应监测也称SRM(selected
reaction monitoring)选定反应监测,与PRM(Parallel Reaction Monitoring)平行反应监测技术是靶向定量蛋白质组学研究中两种不同的质谱数据采集模式,PRM是在MRM/SRM的基础上发展而来的,两者主要存在以下几点不同之处:
(1)MRM/SRM一次监测每个前体离子/产物离子的转变,而PRM以高分辨率和高质
量精度分析来自前体离子的所有产物离子;
(2)PRM质量准确度可达ppm级,能比SRM / MRM更好地消除背景干扰和假阳性,有效提高复杂背景下的检出限和灵敏度;
(3)PRM不仅具有定量分析能力,还具备定性能力;
(4)PRM无需选择离子对和优化碎裂能量,更容易建立分析;
(5)PRM通常在高分辨率的混合四极杆-轨道阱(Q-OT)或飞行时间仪器上进行,MRM/SRM基于三重四极杆质谱仪进行。

百泰派克公司采用AB SCIEX TripleTOF 5600结合Nano-LC色谱,提供基于PRM和MRM数据采集模式的蛋白质质谱分析服务技术包裹,可对各种蛋白进行快速精确的
定性和定量鉴定,还可分析蛋白质相互作用,表征蛋白质翻译后修饰方式等,欢迎免费咨询。

Compressed porous membrane reactor and its manipul

Compressed porous membrane reactor and its manipul

专利名称:Compressed porous membrane reactor and its manipulation manner发明人:アイザクソン,ユハニ申请号:JP特願平7-522152申请日:19950203公开号:JP第2695992号B2公开日:19980114专利内容由知识产权出版社提供摘要: And a fluidized bed reactor housed a pressure tank (5) in (6), the reactor vessel and which (57) pressurized fluidized bed reactor power plants [Abstract] The present invention, (5) you have pressurized gas volume to be defined between the (21). (16) is fed to the reactor primary gas from the gas volume the first conduit. First conduit back to the reactor through the pressure vessel, and again extends to the outside of the pressure vessel. The pressurized gas is supplied to the gas volume through a second conduit (4) from the compressor (2). (8, 11) is sent to the gas from the reactor a third conduit which constitutes the high-temperature gas delivery unit, is sent to (1) turbine and finally through a filter (9). When the power generating device is performing a normal operation, are drawn in the flow rate that is controlled substantially continuous pressurized gas from the gas volume and introduced as primary gas to the reactor through the first conduit. Operation failure of the power generation unit occurs, the flow of gas in the third conduit first, second, and then, is stopped in response thereto after this, pressure relief valves provided in the third conduit and the first ( by passing to the turbine air directly to the second conduit and in some cases, by 19 and 20 open), the pressure of the gas volume is reduced substantially small.申请人:フォスター ホイーラー エナージア オサケ ユキチュア地址:フィンランド国エフアイエヌ - 00440 ヘルシンキ,セントネリクヤ 2国籍:FI代理人:浅村 皓 (外3名)更多信息请下载全文后查看。

非经典反应扩散方程全局吸引子的分型维数

非经典反应扩散方程全局吸引子的分型维数
2 0 1 3年 3月
四川 师 范大 学 学 报 ( 自然 科 学 版 )
J o u na r l o f S i c h u a n N o r m a l U n i v e r s i t y ( N a t u r a l S c i e n c e )
Ma r ., 2 01 3
第3 6卷
第 2期
V0 1 . 3 6. N o . 2
非经典反应扩散方程全局吸 引子的分型维数
赵娟 霞, 汪 璇
( 西北师范大学 数学与信息科学学院 , 甘肃 兰州 7 3 0 0 7 0 )
摘要 : 研究 了具有衰退记忆的非经典反应扩散方程的周期边值 问题 , 通过应用一些最新结果 , 运用半 群 理论的方法和分型维数定理 , 获得 了该方程 当非线性 项 g ( “ ) 满足临界增长条件且 g ( )∈C ( R, R) 时其 全 局吸引子的分形维数是有限的 , 对文献的一些结果作了改进和推广.
关键词 : 非经典反应扩散方程 ;全局吸 引子 ;分型维数 ; 临界指数 ;衰退记 忆
中图 分 类 号 : O 1 7 5 . 8 文献标志码 : A 文章编号 : 1 0 0 1 — 8 3 9 5 ( 2 0 1 3 ) 0 2— 0 2 1 1 —0 5
d o i : 1 0 . 3 9 6 9 / j . i s s n . 1 0 0 1 —8 3 9 5 . 2 0 1 3 . 0 2 . 0 1 1
维数 是 有 限的.

J 0
J ( s ) △“ ( , t —s ) d s + g ( “ )= 厂 ( ) ,
z £ ( , t ) = u o ( , t ) , ∈R。 , t ≤0 , ∈R , t∈ R,( 1 )

林木病理学_东北林业大学中国大学mooc课后章节答案期末考试题库2023年

林木病理学_东北林业大学中国大学mooc课后章节答案期末考试题库2023年

林木病理学_东北林业大学中国大学mooc课后章节答案期末考试题库2023年1.According to plant pathology, which of the following is not caused by viraldiseases?答案:Bacterial gall on the stem2.Parasite is答案:an organism that grows part or all of the time on or within another organism of a different species(known as its host),and from which it derives all or part of its food.3. A pathogen is答案:an organism that causes disease.4.Biotic disease is答案:Disease caused by living organisms.5.Host is答案:An organism upon which an organism of a different species grows and from which all or most of its food is derived.6.which feature is not characteristic of mushroom structure?答案:leaf7.What is plant disease?答案:sustained physiological and structural damage to plant tissues caused by biological and non-biological agents ending sometimes in plant death.8.abiotic disease is答案:Disease resulting from nonliving agents.9.Saprophyte is答案:An organism that lives on dead organic matter.10.What is the definition of obligate parasite?答案:A parasite that is incapable of existing independently of living tissues.11.What is the definition of Facultative saprophytes?答案:are mostly parasitic, but have the faculty to live on dead organic matter, like Phytophthora spp.12.What is the definition of toxicity?答案:The inherent ability of a toxicant to damage plants and animals. 13.What is the possible diameter for mushroom spores?答案:10μm14.which of the following cells or structures are associated with sexualreproduction in fungi?答案:ascospores15.All fungi share which of the following characteristics?答案:heterotrophic16.chestnut blight is a kind of _____ disease.答案:Infectious17.Crown gall often grows on willow in Sun Island Park,Crown gall is a _____disease.答案:Bacterial18.对Forest decline正确的理解的是答案:森林衰退19.Diplodia Blight of Pines(松枯梢病)is casused by Sphaeropsis sapinea, syn.Diplodia pinea,which of the following is the correct description of thedisease.答案:A fungal infectious disease20.According to the knowledge of Plant Pathology, the correct description of thevirus is:答案:Viruses are too small to be seen even with the aid of a powerful lightmicroscope.Viruses are systemic pathogens.21.Viruses are characteristically composed of which one?答案:a protein coata nucleic acid core22.The correct description of fungi is答案:Fungi are heterotrophs that feed by absorptionFungi play key roles in nutrient cycling, ecological interactions, and human welfareFungi produce spores through sexual or asexual life cyclesFungi have radiated into a diverse set of lineages23.Which are biotic factors in the following items?答案:Bacteria Fungi。

脑科学专业术语中英对照

脑科学专业术语中英对照

小世界网络( small-world network)无标度网络( scale-free network)随机网络( random network)规则网络( regular network)无向网络( undirected network)加权网络( weighted network)图论( Graph theory)邻接矩阵( adjacency matrix)结构性脑网络( structural brain networks 或anatomical brain networks)功能性脑网络( functional brain networks)因效性脑网络( effective brain networks)感兴趣脑区( region of interest,ROI)血氧水平依赖( BOLD,blood oxygenation level depended)体素( voxel)自发低频震荡( spontaneous low-frequency fluctuations,LFF) 默认功能网络( default mode network,DMN)大范围皮层网络( Large-scale cortical network)效应连接(effective connectivity)网络分析工具箱(Graph Analysis Toolbox,GAT)自动解剖模板(automatic anatomical template,AAL)脑电图(electroencephalogram, EEG)脑磁图(magnetoencephalogram, MEG)功能磁共振成像(Functional magnetic resonance imaging, fMRI)弥散张量成像(Diffusion Tensor Imaging, DTI)弥散谱成像( diffusion spectrum imaging ,DSI)细胞结构量化映射( quantitative cytoarchitecture mapping)正电子发射断层扫描(PET, positron emisson tomography)精神疾病:阿尔茨海默症( Alzheimer’ s disease,AD)癫痫( epilepsy)精神分裂症( Schizophrenia)抑郁症( major depression)单侧注意缺失( Unilateral Neglect)轻度认知障碍(mild cognitive impairment, MCI)正常对照组(normal control, NC)MMSE (Mini-mental state examination) 简易精神状态检查量表CDR (Clinic dementia rating) 临床痴呆量表边( link,edge)节点(vertex 或node)节点度(degree)区域核心节点(provincial hub)度分布(degree distribution)节点强度( node strength)最短路径长度(shortest path length)特征路径长度( characteristic path length) 聚类系数( clustering coefficient)中心度(centrality)度中心度(degree centrality)介数中心度( betweenness centrality)连接中枢点( connector hub)局部效率(local efficiency)全局效率( global efficiency)相位同步( phase synchronization)连接密度(connection density/cost)方法:互相关分析( cross-correlation analysis) 因果关系分析( Causality analysis)直接传递函数分析( Directed Transfer Function,DTF)部分定向相干分析( Partial Directed Coherence,PDC)多变量自回归建模( multivariate autoregressive model,MV AR) 独立成分分析( independent component analysis,ICA)同步似然性(synchronization likelihood, SL)结构方程建模(structural equation modeling, SEM)动态因果建模(dynamic causal modeling, DCM)心理生理交互作用模型(Psychophysiological interaction model)非度量多维定标(non-metric multidimensional scaling)体素形态学(voxel-based morphometry, VBM)统计参数映射(statistical parametric mapping,SPM)皮尔逊相关系数(Pearson correlation)偏相关系数(Partial correlation)DTI指标:MD (Mean diffusivity) 平均扩散率ADC (Apparent diffusion coefficient) 表观弥散系数FA (Fractional anisotropy) 部分各向异性DCavg (Average diffusion coefficient) 平均弥散系数RA (Relative anisotropy) 相对各项异性VR (V olume ratio) 体积比AI (Anisotrop index) 各项异性指数TBSS (Tract-based Spatial Statistics) 基于纤维追踪束体素的空间统计DWI (Diffusion Weight Imaging) 弥散加权成像。

机械敏感性离子通道蛋白Piezo1在椎间盘髓核细胞中的表达及意义

机械敏感性离子通道蛋白Piezo1在椎间盘髓核细胞中的表达及意义

机械敏感性离子通道蛋白Piezo1在椎间盘髓核细胞中的表达及意义1. 引言1.1 Piezo1是什么Piezo1是一种机械敏感性离子通道蛋白,是最新发现的一种参与机械感应的蛋白分子。

它的发现填补了机械感应通路中的一个关键缺口,为人们深入研究细胞对于外部机械刺激做出响应的机制提供了新的线索。

Piezo1作为机械感知通道蛋白,能够感知和传导机械刺激,从而引发细胞内一系列生理反应。

它在多种细胞类型中均有表达,在哺乳动物的细胞中广泛存在。

Piezo1的结构研究表明,其蛋白分子呈现出类似于激活门控离子通道的结构,具有特殊的机械感受性。

Piezo1是一种重要的机械感知通道蛋白,在细胞内扮演着重要的角色。

通过对Piezo1的研究,可以更深入地了解细胞对于机械刺激的感知和响应机制,为相关疾病的治疗提供新的思路和途径。

Piezo1的发现和研究将为生命科学领域的进一步发展带来新的突破和机遇。

1.2 机械敏感性离子通道蛋白在细胞中的作用机械敏感性离子通道蛋白在细胞中起着重要的作用。

细胞内的Piezo1通道是一种重要的机械感受器,可以感知和传导细胞外的机械力信号。

当外部机械力作用在细胞膜上时,Piezo1通道会被激活,导致离子通道开放,进而引发钙离子通道通透性的改变,从而影响细胞内的钙离子浓度。

这一过程是细胞对于机械刺激做出快速反应的重要机制。

Piezo1通道不仅在传递机械信号中起到关键作用,还参与了多种细胞活动,如胞外基质的附着、细胞迁移、细胞增殖、细胞肥大等。

在神经元和心肌细胞中,Piezo1通道还参与到神经递质释放和心律的调节中。

Piezo1通道不仅在椎间盘髓核细胞中具有重要作用,还在许多其他细胞类型中发挥着重要功能。

深入研究Piezo1通道的作用机制,将有助于揭示细胞对于机械刺激的感知和响应机制,同时也有望为相关疾病的治疗提供新的思路和靶点。

2. 正文2.1 椎间盘髓核细胞中Piezo1的表达情况针对椎间盘髓核细胞中Piezo1的表达情况进行了研究。

交互作用(XDL)

交互作用(XDL)
交互作用
Interaction
2021/4/11
1
主要内容
交互作用的概念与类型 交互作用的模型 交互作用的识别 交互作用的分析
1)统计学交互作用 2)生物学交互作用 3)公共卫生交互作用
2021/4/11
2
交互作用的概念 (1)
MacMahon的定义为:当两个或更多危险因子存在时 疾病的发病率不同于根据它们单独作用所估计的发病 率。
R11 R00 R01 R00 R10 R00 1
我们可以将之改写成超额危险度的形式:
R11 R00 1 R01 R00 1 R10 R00 1
2021/4/11
23
统计学交互作用 (4)
如果 Z=1 时 X=1 与 X=0 的相对危险度(R11/ R01) 与 Z=0 时的相对危险度(R10/ R00)相等,则: R11 R01 R10 R00 两边同乘: R01 R00 ,即相乘模型:
2021/4/11
27
生物学交互作用
表 16-4、关于两个二分暴露变量的四种可能暴露组合的反应类型
暴露组合(类型)
X=1 X=0 X=1 X=0


Z=1 Z=1 Z=0 Z=0
假设 Z=0 时 X=1 与 X=0 的危险度差(R10-R00)等于 Z =1 时 X=1 与 X=0 的危险度差(R11-R01):
R11 R01 R10 R00
该式与相加模型的基本公式( R11 R00 R10 R00 R01 R00 ) 一致。
如果再将该式两边都除以 R0(0 X=0,Z=0 时的危险度), 就得到:
如应用交互作用的相加模型,则两种危险因素表现出正的交互作
用(协同),因为:13.6 > 6.9+3.1

益生菌对阿尔茨海默病作用的研究进展

益生菌对阿尔茨海默病作用的研究进展

益生菌对阿尔茨海默病作用的研究进展发布时间:2021-12-14T06:08:15.523Z 来源:《中国结合医学杂志》2021年12期作者:宋鑫萍1,2,李盛钰2,金清1[导读] 阿尔茨海默病已成为威胁全球老年人生命健康的主要疾病之一,患者数量逐年攀升,其护理的经济成本高,给全球经济造成重大挑战。

近年来研究显示,益生菌在适量使用时作为有益于宿主健康的微生物,在防治阿尔茨海默病方面具有积极影响,其作用机制可能通过调节肠道菌群,影响神经免疫系统,调控神经活性物质以及代谢产物,通过肠-脑轴影响该病发生和发展。

宋鑫萍1,2,李盛钰2,金清11.延边大学农学院,吉林延吉 1330022.吉林省农业科学院农产品加工研究所,吉林长春 130033摘要:阿尔茨海默病已成为威胁全球老年人生命健康的主要疾病之一,患者数量逐年攀升,其护理的经济成本高,给全球经济造成重大挑战。

近年来研究显示,益生菌在适量使用时作为有益于宿主健康的微生物,在防治阿尔茨海默病方面具有积极影响,其作用机制可能通过调节肠道菌群,影响神经免疫系统,调控神经活性物质以及代谢产物,通过肠-脑轴影响该病发生和发展。

本文综述了近几年来国内外益生菌对阿尔茨海默病的作用进展,以及其预防和治疗阿尔茨海默病的潜在作用机制。

关键词:益生菌;阿尔茨海默病;肠道菌群;机制Recent Progress in Research on Probiotics Effect on Alzheimer’s DiseaseSONG Xinping1,2,LI Shengyu2,JI Qing1*(1.College of Agricultural, Yanbian University, Yanji 133002,China)(2.Institute of Agro-food Technology, Jilin Academy of Agricultural Sciences, Chanchun 130033, China)Abstract:Alzheimer’s disease has become one of the major diseases threatening the life and health of the global elderly. The number of patients is increasing year by year, and the economic cost of nursing is high, which poses a major challenge to the global economy. In recent years, studies have shown that probiotics, as microorganisms beneficial to the health of the host, have a positive impact on the prevention and treatment of Alzheimer’s disease. Its mechanism may be through regulating intestinal flora, affecting the nervous immune system, regulating the neuroactive substances and metabolites, and affecting the occurrence and development of the disease through thegut- brain axis. This paper reviews the progress of probiotics on Alzheimer’s disease at home and abroad in recent years, as well as its potential mechanism of prevention and treatment.Key words:probiotics; Alzheimer’s disease; gut microbiota; mechanism阿尔茨海默病(Alzheimer’s disease, AD),系中枢神经系统退行性疾病,属于老年期痴呆常见类型,临床特征主要包括:记忆力减退、认知功能障碍、行为改变、焦虑和抑郁等。

《小型微型计算机系统》期刊简介

《小型微型计算机系统》期刊简介

2656小型微型计算机系统2020 年in collaborative filtering recommender systems [ J ]. Knowledge- Based Systems,2016,100( 10) :74-88.[19] Zhou W,W en J,Xiong Q,et al. SVM-TIA a shilling attack detec­tion method based on SVM and target item analysis in recommen­der systems [ J ]. Neurocomputing, 2016,210 (40) : 197 -205.[20] Tong C, Yin X,Li J,et al. A shilling attack detector based on conv­olutional neural network for collaborative recommender system in social aware network [ J ]. The Computer Journal ,2018,61 ( 7 ):949-958.[21 ] Xu Y,Zhang F. Detecting shilling attacks in social recommendersystems based on time series analysis and trust features[ J]. Knowl­edge-Based Systems,2019,178(16) :25-47.[22] Wu Z,G ao J,M ao B,et al. Semi-SAD: applying semi-supervisedlearning to shilling attack detection [ C ]//Proceedings of the 5th ACM Conference on Recommender Systems, ( RecSys),ACM, 2011:289-292.[23] Wu Z,W u J,Cao J,et al. HySAD:a semi-supervised hybrid shillingattack detector for trustworthy product recommendation[ C]//P ro­ceedings of the ACM SIGKDD Conference on Knowledge Discov­ery and Data Mining(KDD) ,ACM.2012:985-993.[24] Nie F,Wang Z, Wang R. Adaptive local linear discriminant analysis[J ]. ACM Transactions on Knowledge Discovery from Data, 2020,14(1) :1-19.[25] Abdi H,Williams L J. Principal component analysis[ J]. Wiley In­terdisciplinary Reviews:Computational Statistics,2010,2(4) :433-459.[26] Zhong S,Wen Q,Ge Z. Semi-supervised Fisher discriminant analysismodel for fault classification in industrial processes [ J ]. Chemomet-rics and Intelligent Laboratory Systems,2014,138(9) :203-211. [27] Wu Fei,Pei Yuan,Wu Xiang-qian. Android malware traffic featureanalysis technique based on improved Bayesian mcxlel [ J ]. Journalof Chinese Computer Systems,2018,39(2) :230-234.[28] Chen Zhi,Guo Wu. Text classification based on depth learning onunbalanced data[ J]. Journal of Chinese Computer Systems,2020, 41(l):l-5.附中文参考文献:[1]陈海蚊,努尔布力.协同推荐研究前沿与发展趋势的知识图谱分析[J].小型微型计算机系统,2018,39(4) :814名19.[9]李聪,骆志刚,石金龙.一种探测推荐系统托攻击的无监督算法[J].自动化学报,2011,37(2):160-167.[15]伍之昂,庄毅,王有权,等.基于特征选择的推荐系统托攻击检测算法[J].电子学报,2012,40(8): 1687-1693.[17]李文涛,高旻,李华,等.一种基于流行度分类特征的托攻击检测算法[J].自动化学报,2015,41 (9) :1563-1576.[27]吴非,裴源,吴向前.一种改进贝叶斯模型的Android恶意软件流量特征分析技术[J] •小型微型计算机系统,2〇18,39(2) :230-234.[28]陈志,郭武.不平衡训练数据下的基于深度学习的文本分类[J].小型微型计算机系统,2020,41 (1): 1 -5.《小型微型计算机系统》期刊简介《小型微型计算机系统》创刊于1980年,由中国科学院主管、中国科学院沈阳计算技术研究所主办,为中国计算机 学会会刊.创刊40年来,该刊主要面向国内从事计算机研究和教学的科研人员与大专院校的教师,始终致力于传播我国计算 机研究领域最新科研和应用成果,发表高水平的学术文章和高质量的应用文章,坚持严谨的办刊风格,因而受到计算机 业界的普遍欢迎.《小型微型计算机系统》所刊登的内容涵盖了计算机学科的各个领域,包括计算机科学理论、体系结构、软件、数据 库理论、网络(含传感器网络)、人工智能与算法、服务计算、计算机图形与图像等.在收录与检索方面,在国内入选为:《中文核心期刊要目总览》、《中国学术期刊文摘(中英文版)》、《中国科学引文 数据库》(CSCD)、《中国科技论文统计源期刊》、《中国科技论文统计与分析》(RCCSE),并被中国科技论文与引文数据 库、中国期刊全文数据库、中国科技期刊精品数据库、中国学术期刊综合评价数据库、中国核心期刊(遴选)数据库等收 录.还被英国《科学文摘》(INSPEC)、俄罗斯《文摘杂志》(AJ)、美国《剑桥科学文摘》(C S A(N S)和CSA(T))、美国《乌利希期刊指南》(UPD)、日本《日本科学技术振兴机构中国文献数据库》(JS T)和波兰《哥白尼索弓|》(IC)收录.。

基于诺贝尔自然科学奖的学科交叉研究

基于诺贝尔自然科学奖的学科交叉研究

基于诺贝尔自然科学奖的学科交叉研究随着科学技术的不断进步,越来越多的学科之间形成了交叉研究,诺贝尔自然科学奖也经常授予那些在多个学科之间开展融合与创新的研究工作者。

本文将从历届诺贝尔自然科学奖的角度,探讨基于诺贝尔自然科学奖的学科交叉研究。

诺贝尔自然科学奖。

是世界最高荣誉之一,分为物理学、化学和生理学或医学三个领域。

其被授予那些取得了对于人类知识、技术和生活有重大贡献的科学家。

然而,在当代科学发展中,单独的学科已经无法解决许多现实问题,交叉学科的研究成为时下科学界研究的热点。

首先,化学与物理学的交叉研究已经在材料科学和高能物理等领域得到广泛应用。

例如,1986 年诺贝尔物理学奖授予了杨振宁和李政道,以表彰他们提出的非直线幺正性可以以量子力学的框架解释物质世界中一些基本现象的理论。

此外,2007年诺贝尔物理学奖授予了阿尔伯特·弗斯特和罗伯特·理查德·斯莫利,表彰他们发现电场中磁通量量子化的效应。

这些研究成果的涵盖了物理学和化学学科,如果两个学科之间缺少紧密的合作,则这些成果将难以实现。

其次,生物医学领域也需要化学、物理学等学科的补充。

例如,1990 年诺贝尔生理学和医学奖授予了Erwin Neher和Bert Sakmann,以表彰他们开发出一种测量神经细胞排放电信号的技术。

这项技术在神经生物学和神经科学领域被广泛应用。

而在 2014 年,诺贝尔化学奖授予了斯特凡·赛法克斯和威廉·莫尔莱,以表彰他们关于生物分子的光学显微镜成像技术。

这项技术可使得研究人员在生物体内更深层次地观察分子构造和作用。

从这些事例可以看出,生物医学研究中需要跨学科合作,各学科之间的交叉研究成为推进该领域发展的必要手段和途径。

最后,专家和科学家们强调交叉研究的重要性。

例如,罗杰·科恩表示,“一项好的科学研究可能包含若干学科或领域,所以各学科之间的合作和交流是非常必要的”。

陈竺

陈竺
2016年12月26日 -28日,陈竺率农工党中央调研组赴上海开展“医学教育改革发展”专题调研,在调研中针 对中国医学人才队伍面临的困难、中国医学教育面临的重大机遇和挑战、中国医学本科教育存在问题以及改革发 展等问题,提出了建设性的意见和建议。他指出,思政课要更多将社会主义核心价值观与医学人文社会实践相结 合;注重培养医学生临床辨识能力和临床思维能力;临床实践课要合理安排在大型医院、社区中心等的比例;在 教师队伍建设导向上,要重视培养医教研结合的复合型师资,发挥老专家的作用;要重视培养医学生自主管理能 力,发挥临床实践中的老生带新生作用;注意加强国际合作,博采众长 。
现任中国红十字会会长。
人物履历
1970-1975年江西省信丰县、横峰县插队知青 1975-1977年江西省上饶地区卫生学校医士专业学习 1977-1978年江西省上饶地区卫生学校内科教研组教师 1978-1981年上海第二医学院医疗系一部血液病学专业硕士研究生 1981-1984年上海第二医学院附属瑞金医院内科住院医师 1984-1989年法国巴黎第七大学圣·路易医院血液中心实验室外籍住院医师,血液学研究所博士研究生、博士 后 1989-1993年上海第二医科大学(现上海交通大学医学院)附属瑞金医院内科主治医师,上海血液学研究所 分子生物学实验室主任、研究员 1993-1995年上海第二医科大学附属瑞金医院上海血液学研究所副所长(1995年当选为中国科学院院士) 1995-2000年上海第二医科大学附属瑞金医院上海血液学研究所所长(2000年当选为发展中国家科学院院士) 2000-2007年中国科学院副院长,上海第二医科大学附属瑞金医院上海血液学研究所所长(2003年当选为国 际
陈竺
第十三届全国人大常委会副委员长,中国红十字会会长
01 人物履历

rna-蛋白质相互作用预测及描述符设计

rna-蛋白质相互作用预测及描述符设计

RNA-蛋白相互作用预测是指预测RNA分子和蛋白分子之间的相互作用。

这种相互作用可以通过多种方法来预测,其中一种常用的方法是使用生物信息学工具和数据库。

有多种预测RNA-蛋白相互作用的方法,其中一些常用的方法如下:基于序列的方法:这类方法使用RNA和蛋白质序列的相似性来预测相互作用。

基于结构的方法:这类方法使用RNA和蛋白质结构的相似性来预测相互作用。

基于功能的方法:这类方法使用RNA和蛋白质功能的相似性来预测相互作用。

描述符(descriptors)。

描述符是用来表示RNA或蛋白质分子特征的数值,它可以用来描述分子的结构、序列、功能等特征。

这些描述符可以用来预测RNA-蛋白相互作用。

常用的RNA-蛋白相互作用预测描述符包括RNA结构、蛋白质结构、RNA序列、蛋白质序列、RNA功能、蛋白质功能等。

这些描述符可以用来预测RNA-蛋白相互作用。

需要注意的是,RNA-蛋白相互作用预测是一个复杂的问题,目前尚没有一种完美的方法可以预测所有RNA-蛋白相互作用。

不同的预测方法有不同的优缺点,需要根据具体应用场景选择合适的方法进行预测。

在使用RNA-蛋白相互作用预测描述符进行预测时,通常需要使用机器学习算法来建立模型。

这些算法通常包括逻辑回归、支持向量机、随机森林等。

这些算法可以利用大量的训练数据来学习RNA-蛋白相互作用的特征,并建立模型来预测新的RNA-蛋白相互作用。

需要注意的是,RNA-蛋白相互作用预测的准确性受到训练数据的质量和数量的影响。

因此,在使用机器学习算法进行预测时,需要使用高质量和大量的训练数据来建立模型。

总结而言,RNA-蛋白相互作用预测是一个复杂的问题,需要综合运用生物信息学,机器学习等技术来解决。

这种预测可以用来提高对RNA-蛋白相互作用的理解,为生物医学研究和药物开发提供新的思路。

在RNA-蛋白相互作用预测中,RNA-蛋白相互作用预测描述符是非常重要的。

预测描述符可以用来描述RNA和蛋白质的特征,并且可以用来预测RNA-蛋白相互作用。

VI 胚层发育与器官系统发生(II)共44页PPT资料

VI 胚层发育与器官系统发生(II)共44页PPT资料

FGF10 secreted from the lateral plate mesoderm cells is the signal for limb bud induction
FGF10
Ectopic limb
A: FGF10 becomes expressed in the lateral plate mesoderm of the limb budforming region
Development of thevelopment 3.1 Specification and formation of the limb bud 3.2 The limb outgrowth and generation of the proximal-distal axis 3.3 The anterior-posterior axial patterning 3.4 Patterning the dorsal-ventral axis 3.5 Coordinating the three axes 3.6 Development of the digits
Since the limbs, unlike heart or brain, are not essential for embryonic life, one can experimentally remove or transplant parts of the developing limb, or create limb-specific mutants without interfering with the vital processes of the organism. This is good advantage of studying pattern formation in organogenesis
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Proximal Interactions:A Direct Manipulation Technique forWireless NetworkingJun Rekimoto,Yuji Ayatsuka,Michimune Kohno,Hauro ObaInteraction LaboratorySony Computer Science Laboratories,Inc.3-14-13HigashigotandaShinagawa-ku,Tokyo141-0022,JapanPhone:+81354484380Fax:+81354484273Mail:rekimoto,aya,mkohno,oba@csl.sony.co.jphttp://www.csl.sony.co.jp/person/rekimoto.htmlAbstract As a number of networked digital devices are ubiquitously used,control of inter-device communications becomes a complicated task.People can no longer keep track of all the devices’addresses and name.Some devices (such as wireless headsets)have very limited information display capability,making it difficult to use normal GUI techniques(such as menu selection).This paper proposes a solution to these problems by introducing a nearfield communication channel based on radio-frequency identification(RFID)or infrared communication technologies. By using this nearfield communication channel in conjunction with a normal wireless network,people can establish wireless connections among nearby devices with intuitive actions such as directly pointing one device at another or putting two devices within close proximity of one another.Secure network communication is ensured by passing session key information over the nearfield channel.This paper presents the basic idea,network protocols,and several applications,including inter-device data transfer,universal remote commanders,and extensible mobile IP-phones.Keywords:wireless networking,ubiquitous computing,mobile devices,service discovery1IntroductionAs Mark Weiser suggests[14],our styles of using com-puters are radically shifting from PC-centric computing to”ubiquitous computing.”In the ubiquitous computing environment,many different types of computers,or dig-ital devices,enable communication via wired or wire-less networks.The concept of”computer”is not lim-ited to today’s general purpose”personal computers,”but also includes digital appliances such as TV sets,cel-lular phones,personal digital assistants,portable audio players,or even ers will perform tasks through the combination of several devices.They will purchase a digital movie using a cellular phone,and watch it on a TV at home.They will also take pictures with a digital camera,view them on a computer screen, and send them to other devices.In such environments, network connectivity(both wireless and wired)is of ut-most work configurations are not stable, but are dynamically changing.However,without an easy and intuitive User Inter-face,such environments could be very frustrating and perhaps unsafe.A summary of the problems follows.Identifying target devices:Traditionally,networks were used for connecting re-mote devices.For this purpose,specifying a network address,such as the Internet address is inevitable.Re-cently,networks,especially wireless ones,have also been used for connecting nearby devices.These devices range from normal computers to various types of digi-tal appliances,such as PDAs,cellular phones,or digital TVs.One of the expectations of future ubiquitous com-puting is that a user will always carry a mobile device and will use it for controlling nearby devices,and for transferring data from one device to another.In such environments,wireless network connections will be fre-quently established,and configurations will be dynam-ically changed,according to the user’s location or in-tentions.Since most of the target devices are within the user’s physical reach,requiring a user to enter a network address(such as an IP address)when connecting to these devices is not a good idea.It is difficult to assume thatusers always remember all the IP addresses of all sur-rounding devices.Furthermore,many devices now rely on a dynamic IP address allocation mechanism,such as DHCP or AutoIP[3],instead of static IP addresses. Then it becomes impossible to know beforehand the ad-dress corresponding to the specific device.From the user’s point of view,there should be more direct and unmistakable ways to identify devices.Several recent activities on network services try to provide a method for accessing network resources though more understandable names such as”Kate’s PC”or a service name like”Printer in the copier room.”How-ever,maintaining these names and real addresses still requires considerable effort.Some digital devices,such as wireless headsets,do not provide a GUI interface for selecting target,thus a name-based selection is not al-ways a good solution.Security and authentication:Another issue that becomes increasingly important is how to intuitively establish and control secure commu-nication in a ubiquitous computing environment.Se-curity policies based on thefirewall are inadequate be-cause it assumes static organization of computers(i.e., assumes computers to permanently connect to thefixed position).User authentication based on passwords is in-creasingly cumbersome because users may change the destination devices with a high frequency and entering a password every time becomes unrealistic.These problems stem from the fact that traditional networks treat all the network communications the same. In actuality,though,accessibility is naturally separated by physical context.Personal computers located in per-sonal offices are considered to be more secure than the ones in common terminal rooms.There are physical and social barriers that prohibit unknown outsiders from ac-cessing personally owned computers.When leaving an office,we simply lock the office room instead of locking (logging out)the computer.2The Proximal Interaction Model Our proposed user interface model addresses these prob-lems by introducing another communication channel, called the nearfield channel,in addition to convention-ally used normal wireless networks(here we refer to these as the standard channel).The nearfield channel is typically a range-limited wireless data transmission such as infrared beaming or radio-frequency identifi-cation(RFID)technologies(Figure1).The nearfield Dynamic Host Configuration ProtocolFigure1:Proximal Interaction Model Figure2:Two typical operation styles of proximal interaction.(left:two devices within close proximity, right:beaming at target device)Wireless LAN Card(IEEE.11b)Infrared(IrDA)RFID Tag(TIRIS)Figure3:An example of enhanced PDA.Two prox-imal interaction channels(RFID tag and infrared beaming)are available in combination with normal wireless LAN.channel might be a complete bi-directional wireless channel,or a one-way data transmission(e.g.,RFID tags).To set up a wireless communication between two devices over the standard channel,a userfirst puts two devices within proximity of each other,or pointing one device at the other(i.e.,beaming).Then,the nearfieldchannel is used to transfer necessary information for set-ting up a connection,such as the device’s address or a session key(Figure2).Once the information is trans-mitted over the nearfield channel,devices establish a wireless connection over the standard channel.After that,these devices should have no restrictions within range of the nearfield channel.By combining this nearfield channel and the standard wireless channel,such as IEEE802.11a,b,g or Blue-tooth,a wireless connection can be set up by perform-ing a direct operation.During the operation,users are not required to enter any addresses or passwords.In this paper,we present several application systems based on this idea,as well as internal system architecture and net-work protocols.3Related TechnologiesOur research described in this paper is an attempt to introduce the notion of”direct manipulation”[9]into the physical world.We are inspired by a series of previous research aiming at a similar goal.”Pick and Drop”[7]extends a popular”drag and drop”GUI tech-nique and handles inter-computer data manipulations. MediaBlocks[11]uses a tagged physical block as a graspable data container.Both systems eliminate the ne-cessity of identifying computers by addresses or names. Instead,more direct operations such as pointing can be used.These systems mainly concern one-shot data transmission,and continuous network connections are not explicitly supported.Our work also supports secure wireless connections,where these previous systems did not support security.Our approach differs from short-range wireless tech-nologies such as Bluetooth[2].Bluetooth’s commu-nication area normally covers a ten-meter range and it is hard to distinguish a target device among other de-vices within this range.Our proposed method uses more user controllable methods such as RFID or infrared,and the Bluetooth connection could be established by the nearfield channel.Although data transmission by infrared light has been used for a long time(such as IrDA–infrared data asso-ciation[4]),because of several limitations(e.g.,devices cannot move freely to keep a line-of-sight connection during data transmission),this technology devolves its position to wireless networks.Our proposed method re-gards infrared beaming as a trigger for a wireless con-nection,instead of using it as a primary data transfer channel.Infrared beacons are widely used in museums for providing context information to mobile navigation de-vices.The active badge system[12]deploys an infrared sensor in each office to detect people’s location.The Cooltown project uses infrared transmitters that period-ically emit location-related URLs[5].There have also been a wide variety of systems that uses RFID tags to connect physical and virtual.For example,Want’s sys-tem shows how everyday objects such as books,can be enhanced by attaching an RFID to them[13].Other tag-ging technologies,such as those based on visual pat-terns,are also used to identify target devices[8].While these systems use tags as simple identifiers,our system also combines communication with wireless networks. Active research is being done on configuration-less networking where computers and digital devices can dy-namically join the network.For example,IETF Zero-Conf[15]defines a set of internet protocols that support dynamic assignment of IP addresses without a central (i.e.,DHCP)server,and supports discovery of resources by device name(e.g.,”Printer in the copier room”). However,handling such nicknames for many devices re-quires human effort(i.e.,who decides when the printer is moved to the meeting room?),and selecting a device name from the long menu list is also a cumbersome task, especially when the target device is in front of a user. Ensuring secure wireless communication with intu-itive user interfaces is also important.Despite a long history of secure network protocols,user interfaces for secure networks have not been well studied until re-cently.Stajano and Anderson introduced the”Resur-recting Duckling”security model[10],where devices establish a transient association by physical contact. The Bluetooth SIG also suggests physical connection as a method for defining association and passkey shar-ing between devices.Balfanz et al.propose the use of the out-of-band channel to exchange the session key information[1],which is similar to our(bi-directional nearfield channel)protocol.In this case,physical con-tact is not a prerequisite,but nearfield communication methods such as infrared beaming can be used for this purpose.We also designed a protocol to be used where only a unidirectional nearfield channel is available.We also developed various applications and user interface techniques which have not been well studied in past.4ApplicationsThis section presents several examples for showing how the combination of the nearfield and the standard wire-less channels are used in various situations.abcdFigure4:Ad hoc wireless connection data transmis-sion using proximal interaction:(a)User attaches PDA to display side.(b)Wireless connection between PDA and computer starts,and a portal window ap-pears on the display.(c)User drags an onscreen item (such as afile)to this window,(d)Data is transmitted through wireless network connection.4.1Setting up a wireless connection be-tween devicesFor configuring wireless peripheral devices,such as a wireless mouse or a wireless headset,a user is typically required to enter the device identification number before using ing the proximal interaction model,a user simply”attaches”a device to another device in order to make a wireless connection(Figures4and5).When a PDA with an RFID tag(Figure3)is attached to the other computer,the ID is recognized and a wireless con-nection for data transmission is established.Similarly, when a PC is playing a musicstream,attaching a wire-Figure5:Notebook PC configuration:The RFID reader is embeddedatthe palm rest.Figure6:A presenter attaches his/her PDA to the presentation screen to make a connection between them.Then a user can select afile from the PDA display and show it on the presentation screen.less headphone to the PC would result in wireless music transfer from the PC to the headset.A wireless mouse would also be connected when a user picks up the mouse and places it close to the PC.In both cases,once a wire-less connection is established,a user can freely move devices(i.e.,the device’s position is not restricted to the nearfield channel’s range).4.2Mobile PresentationSuppose that you are going to do a presentation in a meeting room where you have never been.Y our pre-sentationfile is stored on afileserver at your office.Y ou only bring a mobile wireless device,such as a PDA or a cellular phone.Y oufirst put your mobile device on a tag reader installed on the presentation screen.The tag reader then identifies your device and wireless network environment in the room accepts your device and con-nects it to the network.Then,you select a presentation file on the mobile device’s screen,and issue a”show”command.Since the mobile device already knows your target destination is the screen in front of you,your pre-sentationfile automatically appears on the screen.Figure7:PDA automatically becomes remote com-mander of target device.(left)An IP address is trans-mitted from PDA to target device via an infrared beam.(right)The target device responds to the PDA with a description of the device,and user can control it using the PDA.(bottom)The PDA also maintains the access log so user can also connect to the device through the”recently connected”list.To achieve this scenario,an RFID reader is installed at the side of the presentation screen(Figure6).When a presenter attaches a wireless PDA(shown in Figure3)to the screen,an icon appears on the screen to indicate that a connection has been established.Once this operation is done,the presenter can freely walk around without being limited by the RFID reader’s sensor range.When a user selected a presentationfile on the PDA,a corre-sponding URL is transmitted to the screen’s computer. We also implemented a remote mouse protocol,which is similar to[3],to control presentation screens through the PDA screen.While the Pebbles system requires a user to explicitly enter the target device’s address,our system automatically delivers mouse commands to the presentation computer.4.3Universal remote commandersWhen surrounded by a number of digital devices,con-trol of these devices becomes complicated.Selecting a proper remote commander for each device would be frustrating.Operations that involve two or more target devices,such as showing a moviefile stored in a PC on a TV,are difficult to perform because each commander deals only with the corresponding device,and there is no way to carry out inter-device operations.Even the uni-versal commander,which learns commander sequences and acts like other remote commanders,does not solve this problem because the user still has to select the ap-propriate mode for each target device.A remote commander system based on our interac-tion model addresses this situation and offers a simple operation style.When a user wants to control the de-vice(e.g.,a TV set)in front of the user,the userfirst points at it using his/her mobile device(e.g.,a PDA). Then,an infrared beam containing the PDA’s IP address is transmitted to the target device,and a wireless con-nection between the PDA and the target device is estab-lished.Next,the target device transmits necessary infor-mation for controlling it(such as a command set).Based on this information,PDA becomes a corresponding re-mote commander for the selected target device.Note that once this connection is set,people can freely move outside of the range limitation of infrared beaming. Figure7shows a typical operation style and a screen shot when a PDA acts as a remote commander.In this case,an IrDA port equipped with the PDA is used to set up a wireless connection.When a connection is estab-lished,a web page containing a clickable image map is transmitted back to the PDA(Figure7right).As the user clicks on a button on this image,the PDA creates and sends an HTTP request corresponding to the button. The target device(in this case,a PC that functions as a TV)acts as a web server,and handles this request. When the user wants to show a moviefile on the TV screen,the userfirst selects a moviefile on the PDA’s screen,and issues a”send”command.While the PDA becomes a TV set’s remote commander,it enables the movie to be played on the TV screen.Internally,a han-dle to the moviefile is transmitted to the TV,and the TV retrieves and shows the corresponding moviefile from the network server.In our current implementation,a ”handle”is simply a URL link,but a handle with au-thentication information could also be used.This approach extends the concept of traditional uni-versal commanders in several ways.First,when a con-nection is established,any prior knowledge about the target device is not rmation about the target device,such as available commands,can be ob-tained from the target device.Second,since the PDA belongs to each user,a user’s personal information can be used while operating the target device.For example, a user can browse his/her moviefile list using the PDA’s screen,and send its handle to the target device.In this sense,the PDA becomes a”personalized”commander for the target device.Figure8:Extensible mobile phones:During a mo-bile phone conversation(1),user walks up to nearby computer display and makes a connection between the phone and the display(2).The IP addresses and a session key is transmitted over the mobile phone connection(3),displays in front of the phone talkers become a shared screen(4).4.4Extensible mobile phonesThe proximal interaction model can also be used to con-nect mobile phones with nearby devices.The sophis-tication of IP telephony technology advancing quickly, and the industry expects the development of”smart phones”capable of combining the capabilities of mo-bile computers with telephones,will be released in the near future.These devices will have the ability to ex-change short messages,browse web pages,and execute downloaded programs.However,conventional mobile phones are generally isolated from users’nearby com-puting environment.For example,consider the follow-ing situation:....Pete is talking to Kane using a cellular phone. They discuss recent changes in design documents.Pete is in his office and looking at a largeflat panel display on his desk during the phone conversation.The display shows the design document.Pete wanted to share this information with Kane,but theyfind it is not a simple op-eration.Although they are already communicating with IP-based phones,theyfirst have to manually inspect the computers’IP addresses,and exchange them by reading them out,and manually enter these addresses to setup a shared screen application....The problem with this scenario is that there is no easy way to exchange addresses with nearby devices,even though they are already communicating with IP-based ing our model,this situation could be as fol-lows:....Pete is talking to Kane using a cellular phone. When they want to share the display information in front of them,they simply attach their cellular phones to the display sides.Then the RFID readers recognize their cellular phone IDs,and IP communication between the cellular phones and the computer corresponding to the display is established.Then,through the connection be-tween cellular phones,the IP addresses of the display computers are exchanged.The system also exchanges one-time session keys to establish secure communica-tion,and the shared screen session starts without enter-ing any passkeys or addresses...In this case,two kinds of network connections are established.Thefirst connection is between the user’s mobile phone and the nearby display computer.Next, a connection is made between display computers.The second connection is established byfirst exchanging each devices’s address and a session key over the desk-top computer(Figure8),through the created connection (desktop computer A cellular phone A cellular phone B desktop computer B).Since secure commu-nication between cellular phones can be assumed,data transmission over the established phone connection can also be assumed to be secure.We have implemented this method using PDAs as IP-mobile phones.The PDA with a wireless network card is used as a mobile phone.An RFID tag is attached to the PDA,and an RFID reader is attached to the display side.We use a customized version of IP-phone soft-ware that can transmit data packets as well as voice. Microsoft Netmeeting is used as a screen sharing ap-plication.Customized gatekeeper software is used to connect both IP-phones and Netmeeting.When a PDA is attached to the display,program on the desktop com-puter automatically reads the PDA’s RFID tag,identifies the PDA’s IP address,and transfers this information to the gatekeeper.When a set of this kind of information is transmitted the gatekeeper,it issues a session initi-ation command to the Netmeeting on both sides with exchanged IP addresses.5System ArchitectureAs shown in the previous examples,we use the combi-nation of physical operations(proximity,pointing,etc.) that initiates wireless connections.These user interface model is achieved using the following elements.Figure9:Protocol for establishing secure connec-tion.5.1Nearfield communication channelsThe nearfield channel is a kind of wireless data trans-mission method that can be directly controlled by users.”Directly”means that a user can control initiation of data transmission on the nearfield channel with a direct action such as”putting one device within a proximity of another device”,or”pointing at one device with the other device.”Although a wide variety of range-limited wireless communication technologies might be used,we mainly consider the following types:RFID:A radio-frequency identification technology,which is widely used in the inventory of ID-cards.As a nearfield channel,one device(normally a mobile de-vice)would have an ID,while the other device would have an ID reader.Infrared beaming:Infrared beaming is also widely used in remote commanders or data transmission.The transmission range is from to several meters.Un-like RFID tags,this transmission is”directional”,a user can point at the target device from a distance.5.2Standard ChannelThe term”standard channel”refers to normal wireless networks,such as IEEE802.11a,802.11b,or Blue-tooth.There are two types of standard channel com-munications,ad-hoc mode and infrastructure mode.In ad-hoc mode,two devices establish a network con-nection after exchanging address information using the nearfield channel.For example,Bluetooth establishes a connection this way.On the other hand,when a de-vice is in an infrastructure mode,such as common in IEEE802.11a/b,the wireless connection is already es-tablished.In this case,the nearfield channel is used for resolving the address of the devices(i.e.,knowing the IP address of the target).5.3Communication ProtocolTo initiate a network connection,the nearfield channel is used for two purposes:(1)identifying the target de-vice by passing network address such as an IP address, and(2)optionally passing information for a secure con-nection.Since we consider RFID tags as simplified case of the nearfield channel,the protocol should handle both bi-directional and one-way communications.The actual protocol is shown in Figure9.When users initiates a wireless connection,they typ-ically hold the mobile device(i.e.,PDA),point it to-ward the target device(a TV for example).Then,an infrared beam is transmitted from the mobile device to the target device.This beam contains the mobile de-vice’s address and a public key corresponding to the mo-bile device.Upon receiving this information,the target device generates a one-time session key,and completes an encrypted transmission using the received public key. Since only the mobile device can decrypt this key,this reply message can be transmitted through the normal wireless channel.After receiving this message,both sides can communicate with each other using a shared secret session key.6Conclusion and Future Research This paper presents an interaction model for providing an intuitive interface to control and communicate with nearby networked devices.A combination of nearfield communication,such as an RFID or infrared beaming with normal wireless networks offers users a direct way to deal with networked devices,as well as the full ca-pabilities of wireless networking communication.We also present how secure communication can be estab-lished using our model,and describe several application examples to show how our model can be used in various situations.This research is still at an early stage and we need more user feedback.We are currently installing a sys-tem in our laboratory environment to study its usability in realistic settings.In the applications section,we demonstrated how a conventional PDA turns into a remote commander for Some RFID technologies provide a bi-directional function that al-lows communications between two readers,as well as communication between an ID-card and a reader.the specific target device.In our current implementa-tion,a web page containing a clickable map is trans-mitted from the target device,and a PDA acts as a web browser.Adding to this simple method,we are also con-sidering dynamically generating commanders GUI from the client side,based on information transmitted from the target device.In this case,the target device transmits the device’s description information as a form of XML according to the Universal Plug and Play(UpnP)archi-tecture[6],and the client PDA creates a user interface screen based on this information.Although this method is much moreflexible(i.e.,the user interface could be tailored depending on the capabilities of the mobile de-vice,such as screen sizes and the number of keypads), automatically generating screen layout is not a simple task.We also believe that wireless data emission with lim-ited power can also be used as a nearfield channel.For example,a Bluetooth device inquiry message with lim-ited power can be received only by the closest device. Once the target device is identified,normal(full-power) Bluetooth data communication can be established.In this case,the same physical layer(i.e.,Bluetooth)is used in both the nearfield and the standard channels. Similarly,sensing the strength of the wireless signal can be used to select the target device.The other area we are interested in is how the pro-posed interaction model can managefirewall-based se-curity.Since we regularly carry mobile devices and con-stantly connecting to surrounding networks,which can be inside or outside of thefirewalls,depending on the location of the device and the type of the network.Cur-rently,users have to be responsible for this condition change and must adapt their operation style accordingly. We think our proposed interaction model could simplify this confusing situation. AcknowledgementsWe thank our colleagues at Sony Computer Science Laboratories for the initial exploration of ideas de-scribed in this paper.We also would like to thank Toshi Doi and Mario Tokoro for their continuing support of our research.References[1]Dirk Balfanz,D.K.Smetters,Paul Stewart,andH.Chi Wong.Talking to strangers:Authentica-tion in adhoc wireless networks.In Symposium onNetwork and Distributed Systems Security(NDSS’02),2002.[2]Inc.Bluetooth SIG.Bluetooth sig home page..[3]Suart Cheshire.Dynamic configuration of IPv4link-local addresses.IETF Draft,2000.[4]Infrared data association home page..[5]T.Kindberg and J.Barton.A web-based nomadiccomputing puter Networks,35:443–456,2001.[6]Universal plug and play forum..[7]Jun Rekimoto.Pick-and-Drop:A Direct Manipu-lation Technique for Multiple Computer Environ-ments.In Proceedings of UIST’97,pages31–39, October1997.[8]Jun Rekimoto and Y uji Ayatsuka.CyberCode:De-signing augmented reality environments with vi-sual tags.In Designing Augmented Reality Envi-ronments(DARE2000),1999.[9]Ben Shneiderman.Direct manipulation:A stepbeyond programming languages.IEEE Computer, 16(8):57–69,1983.[10]Frank Stajano and Ross Anderson.The resurrect-ing duckling:Security issues for ad-hoc wirelessnetworks.In7th International Workshop Proceed-ings on Securiy Protocols,Lecture Notes in Com-puter Science,pages172–194,1999.[11]Brygg Ullmer,Hiroshi Ishii,and Dylan Glas.me-diaBlocks:Physical containers,transports,and controls for online media.In SIGGRAPH’98Pro-ceedings,pages379–386,1998.[12]R.Want,A.Hopper,V.Falcao,and J.Gibbons.The active badge location system.ACM Trans.Inf.Syst.,January1992.[13]Roy Want,Kenneth P.Fishkin,Anuj Gujar,andBeverly L.Harrison.Bridging physical and virtualworlds with electronic tags.In CHI’99Proceed-ings,pages370–377,1999.[14]Mark Weiser.The computer for the twenty-first century.Scientific American,pages94–104, September1991.[15]Zero Configuration Networking..。

相关文档
最新文档