全文获取类型
收费全文 | 54篇 |
免费 | 4篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 1篇 |
综合类 | 9篇 |
化学工业 | 4篇 |
金属工艺 | 1篇 |
机械仪表 | 7篇 |
能源动力 | 1篇 |
轻工业 | 15篇 |
石油天然气 | 2篇 |
无线电 | 3篇 |
一般工业技术 | 2篇 |
冶金工业 | 4篇 |
自动化技术 | 11篇 |
出版年
2023年 | 1篇 |
2022年 | 2篇 |
2021年 | 2篇 |
2020年 | 3篇 |
2019年 | 1篇 |
2018年 | 4篇 |
2017年 | 1篇 |
2016年 | 3篇 |
2015年 | 1篇 |
2014年 | 4篇 |
2013年 | 2篇 |
2012年 | 3篇 |
2011年 | 6篇 |
2010年 | 1篇 |
2009年 | 3篇 |
2008年 | 3篇 |
2005年 | 1篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 1篇 |
2001年 | 3篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1986年 | 1篇 |
排序方式: 共有60条查询结果,搜索用时 62 毫秒
1.
Rahman Saeed‐ur Shujaul Mulk Khan Mushtaq Ahmad Muhammad Zafar Raees Khan Muhammad Khalid Hui Nan Farooq Jan Sadaf‐Ilyas Kayani Sajad Hussain 《Microscopy research and technique》2020,83(5):541-550
Taxonomy of the genus Berberis is quite complex, due to overlapping morphological characters, making it very difficult to differentiate the species within the genus. In order to resolve this taxonomic complexity, the foliar anatomy of 10 Berberis L. species was carried out, for the first time from Pakistan, using light microscopy (LM). Significant variation in terms of epidermal cells shape, size, cell wall pattern, and stomata type was observed. B. baluchistanica has the largest epidermal cells, Adaxial: length = 45–(53.9 ± 3.6)–62.5 μm; and width = 22.5–(26.3 ± 1.3)–30 μm; Abaxial: length = 37.5–(43.25 ± 2.5)–50 μm; and width = 20–(22.6 ± 0.8)–25. The highest number of stomata was observed in B. glaucocarpa as 62 on the abaxial surface while the lowest number of stomata was recorded in B. baluchistanica as 8 on the adaxial surface. Of 10 investigated species, 6 possess anomocytic type stomata, while 2 species that is, B. aitchisonii and B. parkeriana have both anomocytic and anisocytic stomata while B. baluchistanica and B. calliobotrys have only paracytic type stomata. The highest number of cells per unit area was present on the adaxial surface of B. calliobotrys ranging from 245–(252.4)–260 followed by B. parkeriana with 209–(227.8)–250 on the abaxial surface. Stomatal index (SI) also varied considerably and was the lowest (2.6) percentage in B. baluchistanica and highest (31.9) percentage in B. kunawurensis. A taxonomic key based on micro‐morphological characters is provided for species identification. 相似文献
2.
3.
4.
New Hormaphididae(Hemiptera,Aphidomorpha)from the Baltic Amber and its Palaeogeographic Significance
The present study describes a new genus and species Unicohormaphis sorini, which belongs to the subfamily Cerataphidinae. The contemporary distribution of aphids belonging to the Hormaphididae family is summarized and analyzed. According to the obtained data, the climate warming in Eocene was conducive to the expansion of the family over the areas of Europe. Subsequent climate changes, resulting from epeirogenic and orogenic movements towards the end of Eocene, led to a considerable cooling and drying of climate in the northern hemisphere. These processes contributed to the shrinking down of areas covered by subtropical forests, which constituted the habitat of Hormaphididae (Cerataphidinae). Retaining their way of life, the Cerataphidinae were forced to limit their distribution, and the representatives of the family in Europe became completely extinct. 相似文献
5.
目的 调查我国熟制坚果与籽类食品中霉菌及其毒素污染状况,掌握该类食品中霉菌及真菌毒素污染风险的关联性。方法 通过采集市售商品,检测霉菌及其毒素,采用内转录间区(ITS)测序法对样品中污染的霉菌进行属鉴定。结果 19.32%(560/2 912)的熟制坚果与籽类食品霉菌计数>25 CFU/g。单一、混合坚果超过该限值的比例分别为14.78%(322/2 178)和32.56%(239/734),差异有统计学意义(P<0.05)。单一坚果中核桃超过该限值的比例最高,为24.10%(47/195),杏仁、巴达木和花生分别为17.44%(15/86)、16.81%(20/119)和16.22%(73/450),其余种类均在15%以下。对26份霉菌计数>25 CFU/g的样品进行真菌毒素检测,1份采自云南的花生检出白僵菌素污染量为16.37 μg/kg。ITS扩增子测序发现熟制坚果与籽类食品中主要污染曲霉属、交链孢霉属、念珠菌属等,和真菌毒素检出有相关性。结论 熟制坚果与籽类食品中霉菌污染较高,检出的霉菌属有产真菌毒素的风险,提示应加强该类食品中污染霉菌的监测、种属鉴定及产毒情况研究,掌握其污染途径和产毒规律,为开展风险评估,采取有效防控措施提供科学依据。 相似文献
6.
Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks 下载免费PDF全文
Vankamamidi S. Naresh Reddi Sivaranjani Nistala V.E.S. Murthy 《International Journal of Communication Systems》2018,31(15)
It is widely believed that hyper elliptic curve cryptosystems (HECCs) are not attractive for wireless sensor network because of their complexity compared with systems based on lower genera, especially elliptic curves. Our contribution shows that for low cost security applications HECs cryptosystems can outperform elliptic curve cryptosystems. The aim of this paper is to propose a discrete logarithm problem‐based lightweight secure communication system using HEC. We propose this for different genus curves over varied prime fields performing a full scale study of their adaptability to various types of constrained networks. Also, we propose to evaluate the performance of the protocol for computational times with respect to different genus for main operations like Jacobian, Divisor identifications, key generation, signature generation/verification, message encryption, and decryption by changing the size of the field. A formal security model was established based on the hardness of HEC‐Decision Diffie‐Hellman (HEC‐DDH). Finally, a comparative analysis with ECC‐based cryptosystems was made, and satisfactory results were obtained. 相似文献
7.
提出了一种基于频谱特征分析Logistic映射工作状态的方法.首先,对典型Logistic迭代映射函数,在给定初值的情况下随参数μ变化得到不同的数值分布序列图和分岔图;其次,通过傅立叶变换得到Logistic映射的频谱特性,从频域弥补了时域分析中无法观测到的Logistic映射混沌特性;最后,通过对比分析表明Logistic映射的类随机性适合应用于保密通信领域. 相似文献
8.
In this paper, we present two explicit inva-lid-curve attacks on the genus 2 hyperelliptic curve o-ver a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplica-tion (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest inva-lid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We al-so estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice. 相似文献
9.
10.