The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses the impact of the back-gate bias on the dc, low-frequency noise, and dynamic behavior characteristics of a p-GaN gate high-electron mobility transistor on silicon substrate. This paper is investigated to understand the physical mechanisms of the back-gate terminal modulation of normally OFF GaN power devices. When a negative back-gate bias $V_{B}$ voltage is applied, the 2-D...
Recent researchers have found stable relationship between media attention and stock price, trading volume as well as liquidity, but rare study focus on the interactive effect of media attention and trading volume on stock return. Our research bases on the listed bank stocks in China, uses the Baidu index data, and drive a panel data analysis. We find that there is a negative relationship between media...
An identification system of wheat pests is established by the combination of PCA (Principal Component Analysis) and SVM (Support Vector Machine) in this paper. Here PCA is used to extract image features on the wheat pests and SVM is used to identify classification on the feature vectors. It is shown that the system can get better identification efficiency, which can reach an identification rate of...
[Objective] A pepper cDNA library was screened to look for the WRKY transcriptional factor homologous molecules. Then a novel cDNA was found during the screen and cloned. Bioinformatics analysis was performed in order to study the possible function of this cDNA sequence. [Method] Various bioinformatics methods including blastn, ORF Finder, Wolf Psort and DNAMAN were used to analyze and predict the...
Taking Information Technology Curriculum and Teaching course as an example, the paper has discussed how to build the knowledge-ability curriculum which is to emphasize the ability standard in the curriculum function, to realize the knowledge-action unity in composition of the contents, to solute practical problems with the main line in the sequence of course contents organization, and to aim at the...
The integrated development of manufacturing and logistics industry is necessary for increasing the competitiveness of manufacturing industry and prompting the logistics industry. There are some misunderstandings about the integrated development at present both in theory and practicing as for its form, premise, guarantee and the relative position between manufacturing company and logistics enterprise...
The modification of most traditional steganography algorithms based on motion vector is relatively high. After analyzing these steganography algorithms, we propose a novel steganography algorithm. The information is embedded into the optimal component (horizontal component or vertical component) of the motion vector with large amplitude. The main contributions of this scheme are as follows: First,...
Current content adaptation systems make only limited use of the user context. In this paper, the user context is analyzed in detail and semantic divergence is found as a hamper of making use of context. Aiming at handling these problems, an intelligent control model using semantic web techniques is proposed, some implementation details and examples are discussed as well. Under the favor of model,...
In RFID system, more than one tag answering the query of reader together can result in tag collision, which makes the communication between reader and tag failure. For the problem, a novel anti-collision algorithm was present in the paper. The new algorithm transmitted the maximal collision bit position but the serial number of tag, which reduced the data transmitted greatly, and uses splitting to...
The evaluation criteria of entrepreneurial capacity of college students are numerous and fuzzy, so how to pick out adequate self-employed student is crucial in the early phase of doing pioneering work. Based on fuzzy analytic hierarchy process (FAHP), the mathematics evaluation model of the entrepreneurial capacity has been established. Take some simulative college students as example, according to...
The purpose of this study was to explore the professional competence for offset printing participants. Survey questionnaire methodology was used in this research. The surveyed participants in this research were the managers and supervisors of the press operators in commercial printing companies. To analyze the result of surveys, several statistical methods including frequency distribution, percentage,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.