期刊文献+
共找到4,437篇文章
< 1 2 222 >
每页显示 20 50 100
Breeding of National Authorized New Wheat Variety Shannong 116 and Supporting Cultivation Technical Measures for High Yield, High Quality and High Efficiency
1
作者 Yanxun WANG Jichun TIAN +1 位作者 Ming YANG Li PENG 《Plant Diseases and Pests》 CAS 2023年第3期19-21,26,共4页
Shannong 116 is a strong gluten,high yield and multi-resistance wheat variety bred by Shandong Agricultural University,which was approved by the State in 2021 and by Shandong Province in 2022.Shannong 116 combines the... Shannong 116 is a strong gluten,high yield and multi-resistance wheat variety bred by Shandong Agricultural University,which was approved by the State in 2021 and by Shandong Province in 2022.Shannong 116 combines the excellent characteristics of the female parent(strong gluten,disease resistance and early maturity)and the male parent(high yield,water saving and lodging resistance),with a plant height of 76.9 cm,compact plant type,orderly spike layer and good maturity performance,which is suitable for large-scale promotion and market order planting in Huanghuai wheat area.In this paper,the characteristics of Shannong 116 are analyzed,and cultivation technical measures for high yield,high quality and high efficiency are put forward,in order to provide a technical support for the popularization and application of the variety. 展开更多
关键词 National authorized wheat Shannong 116 BREEDING High yield High quality High efficiency Cultivation measures
下载PDF
Study on wear characteristics and authorized limits of switch rails of high-speed turnout
2
作者 Pu Wang Shuguo Wang +2 位作者 Jing Ge Daolin Si Dongsheng Yang 《Railway Sciences》 2023年第2期157-169,共13页
Purpose-It is quite universal for high-speed turnouts to be exposed to the wear of the stock rail of the switch rail during the service process.The wear will cause the change of railhead profile and the relative posit... Purpose-It is quite universal for high-speed turnouts to be exposed to the wear of the stock rail of the switch rail during the service process.The wear will cause the change of railhead profile and the relative positions of the switch rail and the stock rail,which will directly affect the wheel-rail contact state and wheel load transition when a train passes the turnout and will further impose serious impacts on the safety and stability of train operation.The purpose of this paper is to provide suggestions for wear management of high-speed turnout.Design/methodology/approach-The actual wear characteristics of switch rails of high-speed turnouts in different guiding directions were studied based on the monitoring results on site;the authorized wear limits for the switch rails of high-speed turnout were studied through derailment risk analysis and switch rail strength analysis.Findings-The results show that:the major factor for the service life of a curved switch rail is the lateral wear.The wear characteristics of the curved switch rail of a facing turnout are significantly different from those of a trailing turnout.To be specific,the lateral wear of the curved switch rail mainly occurs in the narrower section at its front end for a trailing turnout,but in the wider section at its rear end when for a facing turnout.The maximum lateral wear of a dismounted switch rail from a trailing turnout is found on the 15-mm wide section and is 3.9 mm,which does not reach the specified limit of 6 mm.For comparison,the lateral wear of a dismounted switch rail from a facing turnout is found from the 35-mm wide section to the full-width section and is greater than 7.5 mm,which exceeds the specified limit.Based on this,in addition to meeting the requirements of maintenance rules,the allowed wear of switch rails of high-speed turnout shall be so that the dangerous area with a tangent angle of wheel profile smaller than 43.68 will not contact the switch rail when the wheel is lifted by 2 mm.Accordingly,the lateral wear limit at the 5-mm wide section of the curved switch rail shall be reduced from 6 mm(as specified)to 3.5 mm.Originality/value-The work in this paper is of reference significance to the research on the development law of rail wear in high-speed turnout area and the formulation of relevant standards. 展开更多
关键词 High-speed turnout Switch rail Wear characteristics authorized limit DERAILMENT STRENGTH On-site monitoring
下载PDF
Chinese version of NCCN Clinical Practice Guidelines in Oncology officially authorized by NCCN 被引量:5
3
作者 Yanhua Zheng Dingyao Xu Zhaode Bu 《Chinese Journal of Cancer Research》 SCIE CAS CSCD 2016年第1期144-145,共2页
The publishing conference of the Chinese version of National Comprehensive Cancer Network (NCCN) Clinical Practice Guidelines in Oncology (hereinafter referred to as NCCN Guidelines) and the inaugural peer reviewe... The publishing conference of the Chinese version of National Comprehensive Cancer Network (NCCN) Clinical Practice Guidelines in Oncology (hereinafter referred to as NCCN Guidelines) and the inaugural peer reviewer meeting of NCCN Clinical Practice Guidelines in Oncology: Digestive System Cancers (hereinafter referred to as NCCN Guidelines on Digestive System Cancers) were held in People's Medical Publishing House in January 28^th, 2016 (Figure 1). 展开更多
关键词 Chinese version of NCCN Clinical Practice Guidelines in Oncology officially authorized by NCCN
下载PDF
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
4
作者 Boris S. Verkhovsky Roberto D. Rubino 《International Journal of Communications, Network and System Sciences》 2012年第5期245-252,共8页
Securing large corporate communication networks has become an increasingly difficult task. Sensitive information routinely leaves the company network boundaries and falls into the hands of unauthorized users. New tech... Securing large corporate communication networks has become an increasingly difficult task. Sensitive information routinely leaves the company network boundaries and falls into the hands of unauthorized users. New techniques are required in order to classify packets based on user identity in addition to the traditional source and destination host addresses. This paper introduces Gaussian cryptographic techniques and protocols to assist network administrators in the complex task of identifying the originators of data packets on a network and more easily policing their behavior. The paper provides numerical examples that illustrate certain basic ideas. 展开更多
关键词 CORPORATE Security authorized Traffic Data LEAKAGE CRYPTOGRAPHIC TOKEN Authentication TRUSTED Authorities Toom-Cook Algorithm
下载PDF
Considerations Regarding the Legal Regime of Authorized Natural Persons,the Sole Proprietorship and Family Businesses in Romania
5
作者 Radu Stefan Patru 《Chinese Business Review》 2018年第5期252-256,共5页
The present study will examine the legal regime of authorized natural persons,individual enterprises,and family businesses as regulated in Romania.Such an analysis aims at presenting a panoramic view of the legal fram... The present study will examine the legal regime of authorized natural persons,individual enterprises,and family businesses as regulated in Romania.Such an analysis aims at presenting a panoramic view of the legal framework in a representative country in Eastern Europe.Business activities can be carried out individually by individuals as well as large corporations,firms,and companies that have the status of legal persons.The business carried out by individuals,mainly in terms of the quality of an authorized natural person,is particularly important because it contributes to the development of the middle class within society and to giving professional and financial independence to different categories of professionals.The main aspects related to the qualification of specific notions in the field,the administrative steps for acquiring the status of an authorized natural person,individual enterprise and family enterprise,and their legal regime will be found in the article. 展开更多
关键词 authorized natural PERSON INDIVIDUAL ENTERPRISE FAMILY ENTERPRISE LEGAL REGIME
下载PDF
Authorized variance analysis with consumption rate
6
作者 ZHAO Xiao-yan 《Journal of Modern Accounting and Auditing》 2007年第4期42-45,52,共5页
On the base of budget or plan information, comparing with actual results, making variance analysis, finding real reasons behind variance, this is important way of control and also important function of budget. However... On the base of budget or plan information, comparing with actual results, making variance analysis, finding real reasons behind variance, this is important way of control and also important function of budget. However, without consideration of changes of environment, there are some limitations for static variance analysis with benchmark of plan data. Adjusting for benchmark according to actual condition, then doing variance analysis, these will improve utilization of variance analysis. Adjusted benchmark is often known as authorized cost/profit. For different understanding for authority concept, with RCA's (the abbreviation for Resource Consumption Accounting) view and numerical examples, this paper brings out the concept of consumption rate variance to promoting deeper understanding and analyzing reasons behind variance. 展开更多
关键词 variance analysis authorized expense consumption rate variance
下载PDF
Research and Reference of the Authorized Generic Drug System in the US
7
作者 Wang Hongwei Yang Yue 《Asian Journal of Social Pharmacy》 2021年第1期11-22,共12页
Objective To study the significance of authorized generic drugs due to the successive relevant documents issued by China’s government in recent years,which clearly stipulated that China should establish a drug patent... Objective To study the significance of authorized generic drugs due to the successive relevant documents issued by China’s government in recent years,which clearly stipulated that China should establish a drug patent linkage system.Methods The authorized generic drugs play an important role in keeping the balance between brandname drugs and generic drugs in the US.Therefore,this system was investigated,focusing on its difference from independent generics,marketing procedures,application in patent litigation and legitimacy analysis through case evidence.This analogy analysis could provide a reference for the research of authorized generic drug systems in China.Results and Conclusion As an important factor affecting the balance between brand-name drugs and generic drugs,authorized generic drugs should be comprehensively analyzed and discussed,and a suitable system for China’s national conditions should be established by referring to the experiences of the US. 展开更多
关键词 authorized generic drug patent linkage system DRUG SETTLEMENT patent litigation
下载PDF
Three National Standardizetion Technical Committees Authorized By SAC
8
《China Standardization》 2005年第2期14-14,共1页
In December, 2004, the Standardization Administration of China (SAC) has approved the establishments of three National Standardization Technical Committees. They are the National Standardization Technical Committees f... In December, 2004, the Standardization Administration of China (SAC) has approved the establishments of three National Standardization Technical Committees. They are the National Standardization Technical Committees for Environmental Protection Products (SAC/TC275), for Safety Management of Agricultural Transgenic Biology (SAC/TC276) and for Testing of New Varieties of Plant (SAC/TC277).The National Standardization Technical Committee for Environmental Protection Products is responsible for the development and revision of national standards in the following fields: 展开更多
关键词 Three National Standardization Technical Committees authorized By SAC
下载PDF
Legal Statement authorized by Veken Holding Group Co.,Ltd.
9
《China Textile》 2007年第9期27-27,共1页
关键词 Legal Statement authorized by Veken Holding Group Co LTD
下载PDF
Differentially Authorized Deduplication System Based on Blockchain
10
作者 ZHAO Tian LI Hui +4 位作者 YANG Xin WANG Han ZENG Ming GUO Haisheng WANG Dezheng 《ZTE Communications》 2021年第2期67-76,共10页
In architecture of cloud storage, the deduplication technology encrypted with theconvergent key is one of the important data compression technologies, which effectively improvesthe utilization of space and bandwidth. ... In architecture of cloud storage, the deduplication technology encrypted with theconvergent key is one of the important data compression technologies, which effectively improvesthe utilization of space and bandwidth. To further refine the usage scenarios for varioususer permissions and enhance user’s data security, we propose a blockchain-based differentialauthorized deduplication system. The proposed system optimizes the traditionalProof of Vote (PoV) consensus algorithm and simplifies the existing differential authorizationprocess to realize credible management and dynamic update of authority. Based on thedecentralized property of blockchain, we overcome the centralized single point fault problemof traditional differentially authorized deduplication system. Besides, the operations oflegitimate users are recorded in blocks to ensure the traceability of behaviors. 展开更多
关键词 convergent key DEDUPLICATION blockchain differential authorization
下载PDF
Beyond authorship: Analyzing contributions in PLOS ONE and the challenges of appropriate attribution 被引量:1
11
作者 Abdelghani Maddi Jaime A.Teixeira da Silva 《Journal of Data and Information Science》 CSCD 2024年第3期88-115,共28页
Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approa... Purpose:This study aims to evaluate the accuracy of authorship attributions in scientific publications,focusing on the fairness and precision of individual contributions within academic works.Design/methodology/approach:The study analyzes 81,823 publications from the journal PLOS ONE,covering the period from January 2018 to June 2023.It examines the authorship attributions within these publications to try and determine the prevalence of inappropriate authorship.It also investigates the demographic and professional profiles of affected authors,exploring trends and potential factors contributing to inaccuracies in authorship.Findings:Surprisingly,9.14%of articles feature at least one author with inappropriate authorship,affecting over 14,000 individuals(2.56%of the sample).Inappropriate authorship is more concentrated in Asia,Africa,and specific European countries like Italy.Established researchers with significant publication records and those affiliated with companies or nonprofits show higher instances of potential monetary authorship.Research limitations:Our findings are based on contributions as declared by the authors,which implies a degree of trust in their transparency.However,this reliance on self-reporting may introduce biases or inaccuracies into the dataset.Further research could employ additional verification methods to enhance the reliability of the findings.Practical implications:These findings have significant implications for journal publishers,Beyond authorship:Analyzing contributions in PLOS ONE and Maddi,A.,&the challenges of appropriate attribution highlighting the necessity for robust control mechanisms to ensure the integrity of authorship attributions.Moreover,researchers must exercise discernment in determining when to acknowledge a contributor and when to include them in the author list.Addressing these issues is crucial for maintaining the credibility and fairness of academic publications.Originality/value:This study contributes to an understanding of critical issues within academic authorship,shedding light on the prevalence and impact of inappropriate authorship attributions.By calling for a nuanced approach to ensure accurate credit is given where it is due,the study underscores the importance of upholding ethical standards in scholarly publishing. 展开更多
关键词 Authorship Funding acquisition Research integrity Author contributions CREDIT Inappropriate authorship APC ring
下载PDF
Brief introduction for application of USA authorized generic drugs 被引量:1
12
作者 Dongsheng Yang Lingyun Ma +1 位作者 Jianzhao Niu Mingdi Xu 《Journal of Chinese Pharmaceutical Sciences》 CAS CSCD 2019年第6期439-445,共7页
The authorized generic drugs(AGs)are drug products marketed in the USA with the permission of sponsor or holder of the approved brand name drug(usually refers to an innovator drug).Other than the fact that it does not... The authorized generic drugs(AGs)are drug products marketed in the USA with the permission of sponsor or holder of the approved brand name drug(usually refers to an innovator drug).Other than the fact that it does not have the brand name on its label,it is the exact same drug product as the brand name product.In China,for those published comparator products of generic drug products,the market availability is the first question to affect the smooth development and investigation for the process of the re-evaluation of the generic drugs.In the present paper,we systemically elaborated the definition,classification and relevant background of the AGs,as well as their differences to the generic drugs.At the same time,by taking drug products,which are adopted in the Chinese comparator product directories for generic medicinal products(first batch)and sourced from USA orange book,as examples,we introduced the searching process of the AGs with the integration of FDA listing of AGs,the USA orange book and the USA national drug code directory.It can facilitate the domestic and foreign pharmaceutical enterprises to search,identify and purchase the corresponding AGs of the designated comparator product when question emerges to its market availability. 展开更多
关键词 authorized generic drugs New drug application National drug code Comparator product Re-evaluation of generic medicinal product Orange book
原文传递
Modeling mitochondria,where are the numbers?
13
作者 Adrian M.Davies Alan G.Holt 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第7期1435-1436,共2页
Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authoriti... Models and simulations are particularly useful for exploring ideas and concepts in the biological sciences that are expe rimentally impracticable.in silico methods are also gaining acceptance with regulatory authorities as an alternative to animal testing.For example,the Environmental Protection Agency aims to eliminate animal testi ng by 2035. 展开更多
关键词 eliminate authorities ACCEPTANCE
下载PDF
Information for Authors
14
《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第3期I0001-I0001,共1页
Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launche... Chinese Phaysics Letters(CPL)is a peer-reviewed,inter-national and multidisciplinary journal sponsored by the Chi-nese Phaysical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 asthe flagship journal of CPS,CPL has become one of the mostprestigious periodicals published in China,and been among thegood choices for worldwide physicists to disseminate their mostimportant breakthroughs. 展开更多
关键词 JOURNAL BREAKTHROUGH AUTHORS
下载PDF
Information for Authors
15
《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第10期I0003-I0003,共1页
Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in... Chinese Physics Letters(CPL)is a peer-reviewed,international and multidisciplinary journal sponsored by the Chinese Physical Society(CPS)and Institute of Physics,CAS,and hosted online by IOP Publishing Ltd.Launched in 1984 as the flagship journal of CPS,CPL has become one of the most prestigious periodicals published in China. 展开更多
关键词 JOURNAL China. AUTHORS
下载PDF
Guide for Authors
16
《Water Science and Engineering》 EI CAS CSCD 2024年第1期I0003-I0007,共5页
Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate... Introduction Types ofpaper Contributions falling into the following categories will be considered for publication:Reviews,Technical papers,Theoretical papers,and Editorial.Please ensure that you select the appropriate article type from the list of options when making your submission.Authors contributing to special issues should ensure that they select the special issue article type from this list. 展开更多
关键词 AUTHORS SUBMISSION contributing
下载PDF
Unsupervised Spectrum Anomaly Detection Method for Unauthorized Bands 被引量:1
17
作者 Yu Tian Haihua Liao +3 位作者 Jing Xu Ya Wang Shuai Yuan Naijin Liu 《Space(Science & Technology)》 2022年第1期462-471,共10页
With the rapid development of wireless communication,spectrum plays increasingly important role in both military and civilian fields.Spectrum anomaly detection aims at detecting emerging anomaly signals and spectrum u... With the rapid development of wireless communication,spectrum plays increasingly important role in both military and civilian fields.Spectrum anomaly detection aims at detecting emerging anomaly signals and spectrum usage behavior in the environment,which is indispensable to secure safety and improve spectrum efficiency.However,spectrum anomaly detection faces many difficulties,especially for unauthorized frequency bands.In unauthorized bands,the composition of spectrum is complex and the anomaly usage patterns are unknown in prior.In this paper,a Variational Autoencoder-(VAE-)based method is proposed for spectrum anomaly detection in unauthorized bands.First of all,we theoretically prove that the anomalies in unauthorized bands will introduce Background Noise Enhancement(BNE)effect and Anomaly Signal Disappearance(ASD)effects after VAE reconstruction.Then,we introduce a novel anomaly metric termed as percentile(PER)score,which focuses on capturing the distribution variation of reconstruction error caused by ASD and BNE.In order to verify the effectiveness of our method,we developed an ISM Anomaly Detection(IAD)dataset.The proposed PER score achieves superior performance against different type of anomalies.For QPSK type anomaly,our method increases the recall rate from 80%to 93%while keeping a false alarm rate of 5%.The proposed method is beneficial to broadband spectrum sensing and massive spectrum data processing.The code will be released at git@github.com:QXSLAB/vae_ism_ano.git. 展开更多
关键词 BANDS authorized false
原文传递
Information for Authors
18
《Journal of Beijing Institute of Technology》 EI CAS 2024年第1期F0003-F0003,共1页
General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Informat... General Journal of Beijing Institute of Technology(JBIT)is a periodical publication on science and technology published by Beijing Institute of Technology under the sponsorship of the Ministry of Industry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992. 展开更多
关键词 China. REPUBLIC AUTHORS
下载PDF
Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration
19
作者 Aiman Muhammad Arshad +2 位作者 Bilal Khan Sadique Ahmad Muhammad Asim 《Computers, Materials & Continua》 SCIE EI 2024年第5期3333-3353,共21页
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction. 展开更多
关键词 Digital forensics author profiling for security AdaBoostM1 random forest ensemble learning
下载PDF
Information for Authors
20
《Journal of Beijing Institute of Technology》 EI CAS 2024年第4期F0003-F0003,共1页
General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information... General Journal of Bejing Institute of Technology(JBIT)is a periodical publication on science andtechnology published by Beijing Institute of Technology under the sponsorship of the Ministry ofIndustry and Information Technology of the People's Republic of China.JBIT was inaugurated in 1992. 展开更多
关键词 China REPUBLIC AUTHORS
下载PDF
上一页 1 2 222 下一页 到第
使用帮助 返回顶部