首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   37篇
  免费   1篇
电工技术   1篇
综合类   1篇
化学工业   5篇
能源动力   3篇
轻工业   12篇
石油天然气   3篇
一般工业技术   3篇
自动化技术   10篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   7篇
  2019年   1篇
  2018年   3篇
  2017年   1篇
  2016年   2篇
  2014年   5篇
  2011年   1篇
  2009年   1篇
  2006年   1篇
  2005年   1篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  2001年   5篇
  1999年   1篇
  1991年   1篇
  1986年   1篇
排序方式: 共有38条查询结果,搜索用时 140 毫秒
1.
2.
Along with the progress in nanoscience, a variety of advanced functional nanomaterials were constructed to develop effective and innovative analytical techniques for food safety surveillance. In this review, we summarized the advanced analytical methods that have been developed based upon advanced functional nanomaterials, including plasmonic nanomaterial-based colorimetric methods, fluorescent nanomaterial-based fluorescent methods, advanced functional material-based molecular imprinting technology, advanced functional material-based chromatographic methods, plasmonic nanomaterial-based surface enhanced Raman scattering technology, and advanced functional material-based electrochemical methods. This review provides a progressive roadmap for further development of portable, rapid, and in situ detection technology to promote food safety surveillance from bench to market and eventually reduce the gap between research in the laboratory and industrial applications.  相似文献   
3.
目的 建立一种在线全自动快速测定食用油脂中氯丙醇酯(MCPDE)和缩水甘油酯(GE)含量的分析方法,并考察植物油种类、温度等因素对GE转化为3-氯-1,2-丙二醇(3-MCPD)的影响。方法 参考AOCS Cd 29c-13基本原理,将样品置于全自动样品前处理平台进行水解、氯代、液-液萃取和衍生,采用毛细管柱(DB-5MS柱)分离,多反应监测模式(MRM)采集,内标法定量。结果 5种植物油中GE的转化率差异不明显,但温度的影响略大,当10℃下水解7 min时,MCPDE和GE水解基本完成。3-氯-1,2-丙二醇酯(3-MCPDE)、2-氯-1,3-丙二醇二酯(2-MCPDE)和GE的检出限均为5μg/kg(以醇计),在0~0.4μg/mL范围内浓度与峰面积比值呈良好的线性关系(决定系数R2≥0.999);在20~2 500μg/kg范围内加标,MCPDE和GE的回收率范围为90.3%~109.7%,相对标准偏差(n=6)为1.3%~7.7%,精密度上全自动方法优于手工前处理操作。与食品安全国家标准方法(送审稿)进行对比,方法间结果具有可比性,将该方法用于FAPAS考核样的测定,结果满足...  相似文献   
4.
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and encrypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.  相似文献   
5.
《Optical Materials》1999,11(2-3):205-216
This paper reviews recent advances in diode pumped cw solid-state lasers in the visible spectral region. Such lasers are based on rare earth doped materials. Visible wavelengths can be generated by frequency conversion of near IR-lasers or by up-conversion pumped rare earth ion lasers.  相似文献   
6.
《Computers & chemistry》1991,15(3):179-183
A program has been developed to study the effect of central forces on the Grüneisen parameters of a hexagonal close-packed lattice. Calculations are presented for the normal modes, the contributions to the Grüneisen parameters, polarization vectors and the two independent effective Grüneisen parameters, γ′ and γ″, for this lattice as a function of TD.  相似文献   
7.
8.
《Computer Networks》2001,35(2-3):327-350
In this paper, we propose a novel resource management technique, namely virtual cell layout (VCL), for rapidly deployable wireless networks that can be operated in hostile environments. In VCL, the area of communications is tessellated with regularly shaped fixed size virtual cells. The radio resources such as frequency carriers and scrambling codes are assigned to the fixed cells of this layout. The real cells, which do not have to be identical in size to the virtual cells, are mobile over VCL. Mobile base stations that make up the real cells use the radio resources assigned to the virtual cell in which they are located. The terminals of the system access to the network, as they are the terminals of an ordinary cellular network. When the terminals are not in the coverage of any mobile base station, VCL helps them to be organized into clusters. The performance evaluation of the proposed system shows that the VCL based architecture satisfies the rapid deployment requirement and gives an acceptable grade of service.  相似文献   
9.
The paper discusses issues of rule-based data transformation from arbitrary spreadsheet tables to a canonical (relational) form. We present a novel table object model and rule-based language for table analysis and interpretation. The model is intended to represent a physical (cellular) and logical (semantic) structure of an arbitrary table in the transformation process. The language allows drawing up this process as consecutive steps of table understanding, i. e. recovering implicit semantics. Both are implemented in our tool for spreadsheet data canonicalization. The presented case study demonstrates the use of the tool for developing a task-specific rule-set to convert data from arbitrary tables of the same genre (government statistical websites) to flat file databases. The performance evaluation confirms the applicability of the implemented rule-set in accomplishing the stated objectives of the application.  相似文献   
10.
Multi-stage collusive attack (MSCA) covers a large class of attack variants, and commonly refers to an attack consists of several atomic attack stages and is enforced by a number of coordinated attack parties. The rich history of the development of countermeasures for specific MSCA, e.g., DDoS, worms, has shown that it is the special spatio-temporal characteristic that causes the prevention, detection and response of MSCA to be challenging. Instead of focusing on fine-grained specific attack analysis, this paper presents a model from high-level viewpoint, aiming at characterizing the behaviors of MSCA in terms of key spatio-temporal properties for better understanding and more effective design of countermeasures. The model is specifically developed for two purposes: First, it sheds light on the fundamental elements of an MSCA by examining its spatio-temporal related observations, and formulating attacker behavior as a reward-directed Markov decision process; Second, it assists security administrator in identifying the potential causal relationship of system vulnerabilities based on the reports of deployed security tools, so as to suggest appropriate actions. Taking the model as a basis, two meta-heuristic algorithms are designed. Specifically, attackers nondeterministic trail search (ANTS) is developed for approximately searching attack schemes with the minimum attack cost, and attackers pivots discovery via backward searching (APD-BS) is designed for examining the pivots of attack schemes, namely the key observations associated with system state transitions during an attack. Finally, a proof-of-concept validation is conducted using a simulated enterprise network under DDoS attack, which is a typical MSCA variant.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号