首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
化学工业   1篇
轻工业   1篇
无线电   1篇
  2022年   1篇
  2004年   1篇
  2003年   1篇
排序方式: 共有3条查询结果,搜索用时 854 毫秒
1
1.
Sweet pickled mango named Ma-Muang Bao Chae-Im is a traditional preserved mango from Hat Yai, Thailand. This study investigated (I) volatile and non-volatile compound profiles of commercial Ma-Muang Bao Chae-Im and (II) their relationship to consumer preference. Untargeted metabolomics profiling was performed by gas chromatography-mass quadrupole-time of flight analysis. There were 117 volatile and 44 non-volatile compounds annotated in six commercial brands of Ma-Muang Bao Chae-Im. Furthermore, 46 volatile and 19 non-volatile compounds’ discriminant markers were found by Partial least square discriminant analysis. Among those markers, sorbic and benzoic acid were observed in several brands; moreover, the combination of both compounds altered the volatile profile, especially the ester group. Partial least square regression revealed that overall consumer liking is correlated to 1-heptanol; 1-octanol; acetoin; acetic acid, 2-phenylethyl ester; D-manitol; terpenes and terpenoids, while firmness to sucrose and L-(-)-sorbofuranose. On the other hand, most ester compounds were not related to consumer preference.  相似文献   
2.
In situ precipitation of microporous and nanosized hydroxyapatite particles (5–40 nm) has been conducted in poly(vinyl alcohol) and bovine serum albumin gels. The process, which is similar to biomineralization, is highly controlled with respect to microstructural features, such as size and shape, and to precipitation of hydroxyapatite phase having a calcium:phosphorus stoichiometric ratio of 1.67. Nanosized precipitated hydroxyapatite particles show remarkable thermal stability and do not decompose to other calcium phosphate phases, even at higher temperatures.  相似文献   
3.
Intrusion detection in wireless ad hoc networks   总被引:3,自引:0,他引:3  
Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security, more so in the case of wireless ad hoc networks. These are networks that do not have an underlying infrastructure; the network topology is constantly changing. The inherently vulnerable characteristics of wireless ad hoc networks make them susceptible to attacks, and it may be too late before any counter action can take effect. Second, with so much advancement in hacking, if attackers try hard enough they will eventually succeed in infiltrating the system. This makes it important to constantly (or at least periodically) monitor what is taking place on a system and look for suspicious behavior. Intrusion detection systems (IDSs) do just that: monitor audit data, look for intrusions to the system, and initiate a proper response (e.g., email the systems administrator, start an automatic retaliation). As such, there is a need to complement traditional security mechanisms with efficient intrusion detection and response. In this article we present a survey on the work that has been done in the area of intrusion detection in mobile ad hoc networks.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号