A few Ca-containing mono-metallofullerenes, i.e. Ca@C76, Ca@C88, Ca@C90 (I, II), were synthesized by an improved DC arc discharge method and isolated by a multi-stage HPLC method for the first time. These isomer-separated metallofullerenes were characterized by LD-TOF MS and UV-vis-NIR spectrometry. Their HOMO-LUMO band gaps and possible molecular geometries are discussed according to the absorption spectra in this report. In addition, the cyclic and differential pulse voltammetry of Ca@C76 was conducted in MeCN/C6H5CH3 (1:4 v/v). The voltammograms of Ca@C82 (II, III) and Ca@C84 (II) were also recorded. Their electrochemical behaviors are discussed compared with those of corresponding ytterbium metallofullerenes. The features of the Ca metallofullerenes’ electronic structures are also discussed. 相似文献
Software systems can be represented as complex networks and their artificial nature can be investigated with approaches developed in network analysis.Influence maximization has been successfully applied on software networks to identify the important nodes that have the maximum influence on the other parts.However,research is open to study the effects of network fabric on the influence behavior of the highly influential nodes.In this paper,we construct class dependence graph(CDG)networks based on eight practical Java software systems,and apply the procedure of influence maximization to study empirically the correlations between the characteristics of maximum influence and the degree distributions in the software networks.We demonstrate that the artificial nature of CDG networks is reflected partly from the scale free behavior:the in-degree distribution follows power law,and the out-degree distribution is lognormal.For the influence behavior,the expected influence spread of the maximum influence set identified by the greedy method correlates significantly with the degree distributions.In addition,the identified influence set contains influential classes that are complex in both the number of methods and the lines of code(LOC).For the applications in software engineering,the results provide possibilities of new approaches in designing optimization procedures of software systems. 相似文献
In the face of increasingly prominent cyber security issues, the organization of cyber team analysts has become crucial to thwart cyber threats. Few studies have examined the functioning of the team and the interaction between individuals in a cyber defense context and how the context influences team adaptation. The present study investigates team cognition in a cyber defense context and in particular the nature of task- or team-centered communication among analysts during a cyber defense simulation exercise. Results indicate that markers of situation assessment and shared mental models are both strategically present and linked. Nevertheless, the frequency of these markers varies depending on the quantity and quality of problems encountered; in particular, variations in social support behaviors are observed. Decreasing social support behaviors during high level activities suggests the adaptation of social behaviors depending on the threats and attacks on the system. Theoretical and practical implications are discussed in terms of theories and potential consequences for strategic adaptation and team resilience.
Multimedia Systems - Camouflage effect evaluation and examination is an important procedure in digital camouflage pattern design as it is helpful in improving the objectivity and effectiveness... 相似文献