首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   54篇
  免费   4篇
  国内免费   2篇
电工技术   1篇
综合类   9篇
化学工业   4篇
金属工艺   1篇
机械仪表   7篇
能源动力   1篇
轻工业   15篇
石油天然气   2篇
无线电   3篇
一般工业技术   2篇
冶金工业   4篇
自动化技术   11篇
  2023年   1篇
  2022年   2篇
  2021年   2篇
  2020年   3篇
  2019年   1篇
  2018年   4篇
  2017年   1篇
  2016年   3篇
  2015年   1篇
  2014年   4篇
  2013年   2篇
  2012年   3篇
  2011年   6篇
  2010年   1篇
  2009年   3篇
  2008年   3篇
  2005年   1篇
  2004年   2篇
  2003年   3篇
  2002年   1篇
  2001年   3篇
  1999年   2篇
  1998年   1篇
  1997年   1篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1986年   1篇
排序方式: 共有60条查询结果,搜索用时 62 毫秒
1.
Taxonomy of the genus Berberis is quite complex, due to overlapping morphological characters, making it very difficult to differentiate the species within the genus. In order to resolve this taxonomic complexity, the foliar anatomy of 10 Berberis L. species was carried out, for the first time from Pakistan, using light microscopy (LM). Significant variation in terms of epidermal cells shape, size, cell wall pattern, and stomata type was observed. B. baluchistanica has the largest epidermal cells, Adaxial: length = 45–(53.9 ± 3.6)–62.5 μm; and width = 22.5–(26.3 ± 1.3)–30 μm; Abaxial: length = 37.5–(43.25 ± 2.5)–50 μm; and width = 20–(22.6 ± 0.8)–25. The highest number of stomata was observed in B. glaucocarpa as 62 on the abaxial surface while the lowest number of stomata was recorded in B. baluchistanica as 8 on the adaxial surface. Of 10 investigated species, 6 possess anomocytic type stomata, while 2 species that is, B. aitchisonii and B. parkeriana have both anomocytic and anisocytic stomata while B. baluchistanica and B. calliobotrys have only paracytic type stomata. The highest number of cells per unit area was present on the adaxial surface of B. calliobotrys ranging from 245–(252.4)–260 followed by B. parkeriana with 209–(227.8)–250 on the abaxial surface. Stomatal index (SI) also varied considerably and was the lowest (2.6) percentage in B. baluchistanica and highest (31.9) percentage in B. kunawurensis. A taxonomic key based on micro‐morphological characters is provided for species identification.  相似文献   
2.
3.
赵丽芳  马翠云  罗海澜  王飞 《食品科学》2017,38(12):112-118
从赣南野生松木上分离到1株产蓝色素真菌F10,该菌经鉴定为葡萄糖座科Pseudofusicoccum属。为研究F10产生的蓝色素的性质,实验采用不同pH值、温度、光照、金属离子、氧化剂和还原剂处理蓝色素,结果表明,该蓝色素对光照、温度、氧化剂都不敏感,对pH值、金属离子、还原剂敏感,推测这几种因素可能改变了色素的化学结构。为确定该蓝色素的结构成分,采用高效液相色谱串联质谱、红外光谱法对其进行鉴定,结果表明该色素为芳香族羧酸类化合物。  相似文献   
4.
The present study describes a new genus and species Unicohormaphis sorini, which belongs to the subfamily Cerataphidinae. The contemporary distribution of aphids belonging to the Hormaphididae family is summarized and analyzed. According to the obtained data, the climate warming in Eocene was conducive to the expansion of the family over the areas of Europe. Subsequent climate changes, resulting from epeirogenic and orogenic movements towards the end of Eocene, led to a considerable cooling and drying of climate in the northern hemisphere. These processes contributed to the shrinking down of areas covered by subtropical forests, which constituted the habitat of Hormaphididae (Cerataphidinae). Retaining their way of life, the Cerataphidinae were forced to limit their distribution, and the representatives of the family in Europe became completely extinct.  相似文献   
5.
目的 调查我国熟制坚果与籽类食品中霉菌及其毒素污染状况,掌握该类食品中霉菌及真菌毒素污染风险的关联性。方法 通过采集市售商品,检测霉菌及其毒素,采用内转录间区(ITS)测序法对样品中污染的霉菌进行属鉴定。结果 19.32%(560/2 912)的熟制坚果与籽类食品霉菌计数>25 CFU/g。单一、混合坚果超过该限值的比例分别为14.78%(322/2 178)和32.56%(239/734),差异有统计学意义(P<0.05)。单一坚果中核桃超过该限值的比例最高,为24.10%(47/195),杏仁、巴达木和花生分别为17.44%(15/86)、16.81%(20/119)和16.22%(73/450),其余种类均在15%以下。对26份霉菌计数>25 CFU/g的样品进行真菌毒素检测,1份采自云南的花生检出白僵菌素污染量为16.37 μg/kg。ITS扩增子测序发现熟制坚果与籽类食品中主要污染曲霉属、交链孢霉属、念珠菌属等,和真菌毒素检出有相关性。结论 熟制坚果与籽类食品中霉菌污染较高,检出的霉菌属有产真菌毒素的风险,提示应加强该类食品中污染霉菌的监测、种属鉴定及产毒情况研究,掌握其污染途径和产毒规律,为开展风险评估,采取有效防控措施提供科学依据。  相似文献   
6.
It is widely believed that hyper elliptic curve cryptosystems (HECCs) are not attractive for wireless sensor network because of their complexity compared with systems based on lower genera, especially elliptic curves. Our contribution shows that for low cost security applications HECs cryptosystems can outperform elliptic curve cryptosystems. The aim of this paper is to propose a discrete logarithm problem‐based lightweight secure communication system using HEC. We propose this for different genus curves over varied prime fields performing a full scale study of their adaptability to various types of constrained networks. Also, we propose to evaluate the performance of the protocol for computational times with respect to different genus for main operations like Jacobian, Divisor identifications, key generation, signature generation/verification, message encryption, and decryption by changing the size of the field. A formal security model was established based on the hardness of HEC‐Decision Diffie‐Hellman (HEC‐DDH). Finally, a comparative analysis with ECC‐based cryptosystems was made, and satisfactory results were obtained.  相似文献   
7.
提出了一种基于频谱特征分析Logistic映射工作状态的方法.首先,对典型Logistic迭代映射函数,在给定初值的情况下随参数μ变化得到不同的数值分布序列图和分岔图;其次,通过傅立叶变换得到Logistic映射的频谱特性,从频域弥补了时域分析中无法观测到的Logistic映射混沌特性;最后,通过对比分析表明Logistic映射的类随机性适合应用于保密通信领域.  相似文献   
8.
王明强  薛海洋  展涛 《中国通信》2012,9(11):150-161
In this paper, we present two explicit inva-lid-curve attacks on the genus 2 hyperelliptic curve o-ver a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplica-tion (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest inva-lid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We al-so estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号