In order to observe the transport ability of peritoneum to small molecular substances, peritoneal equilibration test (PET) was performed in 52 CAPD patients. By analysing the relationship between peritoneal transport function and dialysis adequacy, we found the average urea KT/V and Cr were significantly lower in high and low transport groups (n = 6 and n = 2) than in high average and low average groups (n = 35 and n = 9). According to the results of PET, we adjusted the dialysis program of 11 patients and the dialysis adequacy was markedly improved. We concluded that PET was helpful for selecting and adjusting CAPD program, and discussed some questions which should be payed more attention in PET operation. 相似文献
This paper presents the mass transfer results from an impinging liquid jet to a rotating disk. The mass transfer coefficients were measured using the electrochemical limiting diffusion current technique (ELDCT). Rotational Reynolds number (Rer) in the range of 3.4 × 104–1.2 × 105, jet Reynolds number (Rej) 1.7 × 104–5.3 × 104 and non-dimensional jet-to-disk spacing (H/d) 2–8 were taken into consideration as parameters. It was found that the jet impingement resulted in a substantial enhancement in the mass transfer compared to the case of the rotating disk without jet. 相似文献
Predictions of the discharge and the associated sediment concentration are very useful ingredients in any water resources reservoir design, planning, maintenance, and operation. Although there are many empirical relationships between the discharge and sediment concentration amounts, they need estimation of model parameters. Generally, parameter estimations are achieved through the regression method (RM), which has several restrictive assumptions. Such models are locally valid and their structures and parameter values are questionable from region to others. This paper proposes a new approach for sediment concentration prediction provided that there are measurements of discharge and sediment concentration. The basis of the methodology is a dynamic transitional model between successive time instances based on two variables, namely, discharge and sediment concentration measurements. The transition matrix elements are estimated from the measurements through a special form of the artificial neural networks as perceptrons. The sediment concentration predictions from discharge measurements are achieved through a perceptron Kalman filtering (PKF) technique. In the meantime, this technique also provides temporal predictions. A certain portion of the measurement sequence is employed for the model parameter estimations through training and the remaining part is used for the model verification. Detailed comparisons between RM and PKF approaches are presented and, finally, it is shown that the latter model works dynamically by simulating the observation scatter diagram in the best possible manner with smaller prediction errors. The application of the methodology is performed for the discharge and sediment concentration measurements obtained from the Mississippi River basin at St. Louis, Missouri. It is found that the PKF methodology has smaller average relative, root-mean-square, and absolute errors than RM. Furthermore, graphical representation, such as the scatter and frequency diagrams, indicated that the PKF approach has superiority over the RM. 相似文献
Since the introduction of warranty provisions in federal highway jobs, more and more state departments of transportation (DOTs) have considered the use of such provisions to protect their initial investment. This paper describes the pros and cons of warranty contracting in highway construction based on a survey of warranty practices in the United States. In particular, the need for state DOTs to buy a warranty for a well-built project is questioned. As an alternative, this paper introduces the warranty option, which gives the DOT the right to buy a warranty only if it becomes necessary at the end of construction. This option is exercised if the performance on site warrants it. This paper describes the mechanics of the warranty option and its advantages over the conventional warranty. A bid evaluation model is also developed for the warranty option approach. 相似文献
This paper presents the results of urease immobilization onto methacrylic acid–acrylamide grafted poly(ethyleneterephthalate) fibres. The graft yield strongly affected the maximum activity of the immobilized enzyme up to a value of 70·2%. Higher grafting caused a decline in urease activity and led to the degradation of the fibres. The minor changes observed in Km and Vmax demonstrated that the conformational changes existed during immobilization were not extensive. However, 70·2% methacrylic acid–acrylamide-g-fibres containing urease were more stable towards acidic and alkaline pH, high temperature and storage conditions compared with free enzyme. Apart from the increase in stability to heat inactivation, the initial enzymatic activity of the urease–fibre system remained almost unchanged even after 40 repeated assays corresponding to 10 h of operation in 4 months, indicating the excellent durability of the system. 相似文献
After a series of earthquakes in 1999, Turkish Red Crescent (TRC) has engaged in a restructuring for all of its activities, including the blood services. Our study on the blood management system had been started as part of this initiative to restructure the blood services and improve both their effectiveness and efficiency. In the current system of TRC, not much consideration has been given to how the locational decisions affect the performance of blood centers, stations and mobile units. In recent years, however, there has been much discussion regarding the regionalization of the blood management system in Turkey. In this study, we develop several mathematical models to solve the location–allocation decision problems in regionalization of blood services. We report our computational results, obtained by using real data, for TRC blood services. 相似文献
The detection of software vulnerabilities is considered a vital problem in the software security area for a long time. Nowadays, it is challenging to manage software security due to its increased complexity and diversity. So, vulnerability detection applications play a significant part in software development and maintenance. The ability of the forecasting techniques in vulnerability detection is still weak. Thus, one of the efficient defining features methods that have been used to determine the software vulnerabilities is the metaheuristic optimization methods. This paper proposes a novel software vulnerability prediction model based on using a deep learning method and SYMbiotic Genetic algorithm. We are first to apply Diploid Genetic algorithms with deep learning networks on software vulnerability prediction to the best of our knowledge. In this proposed method, a deep SYMbiotic-based genetic algorithm model (DNN-SYMbiotic GAs) is used by learning the phenotyping of dominant-features for software vulnerability prediction problems. The proposed method aimed at increasing the detection abilities of vulnerability patterns with vulnerable components in the software. Comprehensive experiments are conducted on several benchmark datasets; these datasets are taken from Drupal, Moodle, and PHPMyAdmin projects. The obtained results revealed that the proposed method (DNN-SYMbiotic GAs) enhanced vulnerability prediction, which reflects improving software quality prediction.
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments. 相似文献