期刊文献+
共找到4,048篇文章
< 1 2 203 >
每页显示 20 50 100
An Automatic Production Equipment of Animal Hide Chew
1
作者 Chen Wenjie Zhou Fuyi Wang Qingyan 《Animal Husbandry and Feed Science》 CAS 2023年第1期1-4,共4页
Animal hide chew is mainly hand crafted at home and abroad.This paper designed an automatic production equipment of animal hide chew.The equipment achieved the whole process automation from chicken breast smashing(mea... Animal hide chew is mainly hand crafted at home and abroad.This paper designed an automatic production equipment of animal hide chew.The equipment achieved the whole process automation from chicken breast smashing(meat grinding and feeding equipment),extrusion,tearing cowhide strip,rolling,wrapping chicken breast,cutting to strips,weighing and drying to packaging through automated production line,which saved a lot of manpower and material resources and leads to uniform and stable product quality. 展开更多
关键词 Animal hide chew DESIGN EQUIPMENT
下载PDF
Analysis on the Epidemic Situation of Intercepted Alien Pests from Imported Hides in Hebei and the Countermeasures during 2013-2014
2
作者 王建昌 高瑞清 +2 位作者 张帅 王珅 王照华 《Agricultural Science & Technology》 CAS 2015年第9期2007-2010,共4页
The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantin... The situation of intercepted alien pests from imported hides in Hebei during 2013-2014 was systematically analyzed. The results showed that 163 batches of alien pests were intercepted, including 2 batches of quarantine weeds and they both were Italian cocklebur. According to the statistics of original countries, the intercepted hides from 21 countries all had alien pests, in which Australia was the largest number of batches and species of alien pests. The analysis results showed that there was severe risk in the imported hides carrying alien pests, thus to effectively prevent the invasion of alien pests to our country, several quarantine measures should be taken in the future, such as enhancing the quarantine inspection in ports, and promoting the personnel ability of interception and species identification of alien pests. 展开更多
关键词 Imported hides Alien pests Quarantine measures
下载PDF
Chromium-Containing Organic Fertilizers from Tanned Hides and Skins: A Review on Chemical, Environmental, Agronomical and Legislative Aspects 被引量:1
3
作者 Claudio Ciavatta Chiara Manoli +2 位作者 Luciano Cavani Clizia Franceschi Paolo Sequi 《Journal of Environmental Protection》 2012年第11期1532-1541,共10页
A category of chromium (Cr)-containing fertilizers is represented by the fertilizers deriving from byproducts of tanning process. Their use is widespread because of their good agronomic response due to the high conten... A category of chromium (Cr)-containing fertilizers is represented by the fertilizers deriving from byproducts of tanning process. Their use is widespread because of their good agronomic response due to the high content of slow release or- ganic nitrogen (N) and carbon (C). They do not represent an environmental hazard because only the non-toxic form of Cr(III) is present. Productive processes may involve chemical, enzymatic or thermal hydrolysis. The final product is characterized by different contents of peptides and free amino acids depending on the type of hydrolysis. Legislation concerning Cr-containing fertilizers is controversial because often do not consider any scientific evidences;nevertheless, the European Union, the United States and countries as Italy, do not set the restriction to Cr(III) and generally only the presence of the toxic form, Cr(VI), is limited. Depending on its two main oxidation forms, Cr issue has been studied for many years. Several authors confirmed that Cr(VI) is carcinogenic, while Cr(III) is an essential trace element in human and animal diet. In soil Cr(III) has low mobility, whereas Cr(VI) is highly water soluble. However Cr(VI) in soil is quickly reduced to Cr(III);on the contrary oxidation of Cr(III) to Cr(VI) is rarely possible because particular conditions must occur. Only a very small fraction of Cr in soil is available to plant uptake and its translocation in edible parts is limited because it is immobilized in roots as Cr(III). Therefore risks of environmental pollution using these fertilizers are negligible;on the contrary they have positive environmental and agronomical effects. The aim of this review is to deal with the category of the organic fertilizers containing Cr derived from tannery processes focusing on its chemical, productive, legislative, environmental and agronomical aspects. Special attention is given to the ambiguous issue of Cr briefly summarizing the most important studies of the last forty years. 展开更多
关键词 ORGANIC Fertilizers Tanned hides and Skins Hydrolyzed LEATHER TRIVALENT CHROMIUM Hexavalent CHROMIUM Soil
下载PDF
基于特征码的Imagehide与JPEGX图像隐藏信息检测以及提取 被引量:2
4
作者 胡昊然 钱萌 《科技广场》 2007年第1期125-127,共3页
信息隐藏技术利用载体中存在的冗余信息来隐藏秘密对象,以隐藏秘密信息的存在。隐写术是信息隐藏的一个重要分支。隐写分析是通过对隐密对象的分析,对秘密信息进行检测及破解的技术。本文针对Imagehide与JPEGX两种网上常见的隐写工具,... 信息隐藏技术利用载体中存在的冗余信息来隐藏秘密对象,以隐藏秘密信息的存在。隐写术是信息隐藏的一个重要分支。隐写分析是通过对隐密对象的分析,对秘密信息进行检测及破解的技术。本文针对Imagehide与JPEGX两种网上常见的隐写工具,从分析特征码出发,揭示了检测和提取秘密信息的方法,并进行了实验,取得了较好的结果,证明了该方法的有效性。 展开更多
关键词 信息隐藏 隐写分析 特征码
下载PDF
The Emerging Trade in Donkey Hide: An Opportunity or a Threat for Communities in Kenya?
5
作者 Gemma Carder Oscar Ingasia +3 位作者 Evans Ngenoh Samuel Theuri Desmond Rono Philemon Langat 《Agricultural Sciences》 2019年第9期1152-1177,共26页
Donkey hides are used in a form of Traditional Chinese medicine called ejiao, the demand for ejiao is currently so high the global donkey population is currently in decline. Africa’s donkey population is considered a... Donkey hides are used in a form of Traditional Chinese medicine called ejiao, the demand for ejiao is currently so high the global donkey population is currently in decline. Africa’s donkey population is considered a key source for the trade, with Kenya being highlighted as being particularly affected. In Kenya donkeys play a vital contribution to people’s livelihoods;this study aimed to explore the potential impact of the donkey hide trade on small holder farmer’s livelihoods. The study was conducted in five counties in Kenya;data was collected using household survey questionnaires, focus group discussions and key informant interviews. When household survey participants (n = 421) were asked if the number of donkeys in their herd had decreased within the last two years 34.2% (n = 144) reported a decrease, of those 43.8% (n = 63) reported the selling of donkeys as the primary cause of reduction in herd size. Increased money spent on the transportation of farm produce, water and firewood was the most frequently reported effect of the loss of donkeys (62.5%, n = 263). Some focus group discussion participants said that they had previously sold their donkeys to raise money for school fees, likewise 43% (n = 97) of focus group discussion participants said that they would sell their donkeys to pay medical bills. Results from the study suggest that small holder farmers are choosing to sell their donkeys for an instant boost in income, but long-term this is unlikely to be a sustainable livelihood option. 展开更多
关键词 DONKEY hide TRADE Kenya Livelihoods Traditional Chinese Medicine Ejiao Working EQUIDS
下载PDF
难识庐山真面目——用Hide In Picture将你的秘密藏在图片里
6
作者 Sword 《电脑》 2004年第3期122-123,共2页
关键词 电子邮件 密码 QQ hide In PICTURE
下载PDF
hide,假如你能推开一切羁绊
7
作者 何春霞 《南腔北调》 2006年第8期66-67,共2页
失去的总是会显得弥足珍贵,那就让我们把 hide 在人间犹如绯红的樱花用尽生命全部力量绽放出的瞬间精彩绵延成一抹永不泯灭的红,无论阴郁或明朗,宁静或喧嚣,那抹红总是极致清澈艳丽的。
关键词 在人间 全部力量 hide 告诉我 物欲横流 痛彻心扉 就这样 经过时间 吉他手 醉梦
下载PDF
Hide And Seek
8
作者 高亚沛 《小雪花(初中高分作文)》 2006年第7期36-37,共2页
关键词 hide And Seek
下载PDF
Nowhere to Hide
9
作者 Denis Green 《ChinAfrica》 2014年第8期59-59,共1页
CHINA has recently deployed unmanned drones to detect the levels of air pollution in northern areas of the country, to aid an inspection on the enforcement of environmental protection laws, according to a statement fr... CHINA has recently deployed unmanned drones to detect the levels of air pollution in northern areas of the country, to aid an inspection on the enforcement of environmental protection laws, according to a statement from the country's Ministry of Environmental Protection. 展开更多
关键词 Nowhere to hide
下载PDF
Fabricated Picture Can't hide the Truth
10
作者 SHAN CHU 《The Journal of Human Rights》 2013年第2期17-17,共1页
New Yorkbased Human Rights Watch re cently released its annual World Human Rights Report, in which it habitually points an accusing finger at other countnes" human nglats records. As a Chinese scholar of human right... New Yorkbased Human Rights Watch re cently released its annual World Human Rights Report, in which it habitually points an accusing finger at other countnes" human nglats records. As a Chinese scholar of human rights studies, I have to express my observations about the report's allegations against China. First, the report still takes an outdated and biased approach to judge human rights records and makes comments that are beyond reality. For instance, it continues to claim that China's household registration, or hukou, system, denies migrant workers' children the chance of a decent education. However, a regulation introduced in 2003 already allows the children of migrant workers to receive nineyear compulsory education in cities where their parents work. 展开更多
关键词 Fabricated Picture Can’t hide the Truth
下载PDF
Hacking Anti-Shoplifting System to Hide Data within Clothes
11
作者 Al Hussien Seddik Saad E.H.Hafez Zubair Ahmad 《Computers, Materials & Continua》 SCIE EI 2021年第4期659-674,共16页
Steganography has been used to prevent unauthorized access to private information during transmission.It is the scheme of securing sensitive information by concealing it within carriers such as digital images,videos,a... Steganography has been used to prevent unauthorized access to private information during transmission.It is the scheme of securing sensitive information by concealing it within carriers such as digital images,videos,audio,or text.Current steganography methods are working by assigning a cover le then embed the payload within it by making some modications,creating the stego-le.However,the left traces that are caused by these modications will make steganalysis algorithms easily detect the hidden payload.Aiming to solve this issue,a novel,highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes.The anti-Shoplifting system is an anti-theft security system that protects goods and products,leaving the store in an illegal way(i.e.,without paying for them).The proposed method works by modifying the default anti-shoplifting system by changing its built-in soft RFID(radio-frequency identication)tags sewn in clothes into NFC(Near Field Communication)tags.These NFC tags are smart tags that can communicate with NFC-Enabled smart-phones using NDEF(NFC Data Exchange Format).NDEF is one of the advancements added to RFID technology by NFC,which allows the data exchange.Every NDEF message has one/more NDEF records that contain record type,a unique ID,a length,and a payload of data that contains the secret message content that can be any type of data that ts in a byte stream.Based on NDEF and NFC-enabled smart-phones,the proposed method will take the secret message from the sender,make use of his NFC-enabled smart-phone to communicate with the NFC tag,then hide the secret message within the NDEF’s payload of the NFC tag stuck in clothes.Finally,to evaluate the proposed method,it has been compared with default(digital)steganography weak points.Such as time,lockable,robustness,attacks,capacity,and a few more points.The results and comparisons showed that the proposed method is more efcient than default(digital)steganography and has many advantages. 展开更多
关键词 Near-eld communication radio-frequency identication STEGANOGRAPHY data hiding tags
下载PDF
An Approach to Hide Secret Speech Information
12
作者 吴志军 段海新 李星 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期134-139,共6页
This paper presented an approach to hide secret speech information in code excited linear prediction (CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information ... This paper presented an approach to hide secret speech information in code excited linear prediction (CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4 Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers’ recognition. 展开更多
关键词 information hiding analysis-by-synthesis (ABS) code excited linear prediction (CELP) EMBED EXTRACT
下载PDF
Use of quotient-embedding scheme with smart arrangement technique to hide gray-scale data
13
作者 YANG Ching-yu LAI Chen-yuan 《通讯和计算机(中英文版)》 2008年第12期23-27,共5页
关键词 数字水印 计算机技术 图像处理 峰值
下载PDF
差异化授权型领导与知识型员工知识隐藏——基于跨层分析 被引量:1
14
作者 郭元源 吴亮 +1 位作者 陈意锒 秦武 《科技进步与对策》 CSSCI 北大核心 2024年第5期109-118,共10页
基于团队和个体视角构建两个中介模型,探讨差异化授权型领导对知识型员工知识隐藏的内在作用机制。通过对67个团队的358位员工进行跨层检验,分析发现:在团队层面,差异化授权型领导通过降低团队信任,从而增强知识型员工知识隐藏动机;在... 基于团队和个体视角构建两个中介模型,探讨差异化授权型领导对知识型员工知识隐藏的内在作用机制。通过对67个团队的358位员工进行跨层检验,分析发现:在团队层面,差异化授权型领导通过降低团队信任,从而增强知识型员工知识隐藏动机;在个体层面,差异化授权型领导通过对知识型员工角色负荷、情绪耗竭的链式影响而诱发知识隐藏行为。上述结论丰富了差异化授权型领导影响后果研究,为促进团队成员知识分享与流动提供了重要的实践启示。 展开更多
关键词 差异化授权型领导 团队信任 角色负荷 情绪耗竭 知识隐藏
下载PDF
基于区块链与CP-ABE策略隐藏的众包测试任务隐私保护方案
15
作者 高改梅 张瑾 +2 位作者 刘春霞 党伟超 白尚旺 《计算机应用》 CSCD 北大核心 2024年第3期811-818,共8页
为完善云环境下众测(众包测试)数据共享体系,解决众测领域存在的数据安全与隐私保护问题,提出基于区块链与基于密文策略的属性加密(CP-ABE)策略隐藏的众测任务隐私保护(CTTPP)方案。将区块链和属性基加密相结合,以提高众测数据共享的隐... 为完善云环境下众测(众包测试)数据共享体系,解决众测领域存在的数据安全与隐私保护问题,提出基于区块链与基于密文策略的属性加密(CP-ABE)策略隐藏的众测任务隐私保护(CTTPP)方案。将区块链和属性基加密相结合,以提高众测数据共享的隐私性。首先,利用末端内部节点构造访问树表达访问策略,配合CP-ABE中的指数运算和双线性配对运算实现策略隐藏,以提高众测场景下数据共享的隐私保护能力;其次,调用区块链智能合约自动化验证数据访问者的合法性,与云服务器共同完成对任务密文访问权限的验证,进一步提高众测任务的安全性。性能测试结果表明,与同类型访问树策略隐藏算法相比,平均加密解密时间更短,加解密的计算开销更小;另外,当解密请求频率达到每秒1000笔时,区块链的处理能力开始逐渐饱和,数据上链和数据查询的最大处理时延为0.80 s和0.12 s,适用于轻量级的商业化众测应用场景。 展开更多
关键词 隐私保护 众包测试 策略隐藏 区块链 属性基加密
下载PDF
基于分层结构的匹配量隐藏加密多重映射方案
16
作者 陈晶 李瀚星 +3 位作者 何琨 加梦 李雨晴 杜瑞颖 《通信学报》 EI CSCD 北大核心 2024年第1期94-105,共12页
匹配量隐藏的加密多重映射(EMM)方案可以防止攻击者利用匹配量泄露推理搜索的明文,但是现有方案存在查询计算开销较大的问题。基于被检索数据的匹配量往往服从齐夫定律的特性,设计了一种分层结构的匹配量隐藏EMM方案。相对将全部键值匹... 匹配量隐藏的加密多重映射(EMM)方案可以防止攻击者利用匹配量泄露推理搜索的明文,但是现有方案存在查询计算开销较大的问题。基于被检索数据的匹配量往往服从齐夫定律的特性,设计了一种分层结构的匹配量隐藏EMM方案。相对将全部键值匹配量填充至相等的朴素设计,所提方案将对整体数据的填充转为对多块子数据的填充,减少了存储开销,并实现了常数复杂度的查询开销。安全性分析表明,所提方案能够在查询结果无损的情况下实现匹配量隐藏。仿真结果表明,与当前最高效的方案XorMM相比,所提方案能够以增加10%的存储开销为代价,减小90%的查询计算开销,显著提高查询效率。 展开更多
关键词 云存储 可搜索加密 匹配量隐藏 结构化加密 分层结构
下载PDF
基于全光混沌注入双环电光相位反馈环的混沌保密通信系统研究
17
作者 周雪芳 王飞 +3 位作者 杨国伟 毕美华 许蒙蒙 胡淼 《通信学报》 EI CSCD 北大核心 2024年第7期138-147,共10页
针对现有混沌保密光通信系统时延特征隐藏所需反馈增益系数较大这一问题,设计了一种基于全光混沌注入双环电光相位反馈环的混沌保密通信系统。首先,由全光反馈产生光混沌并将其耦合至2个电光相位混沌反馈环中。然后,通过相位调制的方式... 针对现有混沌保密光通信系统时延特征隐藏所需反馈增益系数较大这一问题,设计了一种基于全光混沌注入双环电光相位反馈环的混沌保密通信系统。首先,由全光反馈产生光混沌并将其耦合至2个电光相位混沌反馈环中。然后,通过相位调制的方式实现信息与混沌载波的非线性耦合并参与混沌载波的生成。最后,在检测端通过光混沌同步实现信号的解密。借助MATLAB软件仿真分析了系统中混沌信号的复杂度、时延特征隐藏、同步性、鲁棒性和通信性能。仿真结果表明,所设计的混沌保密通信系统在较小的反馈系数时具有较高的复杂度且时延特征得到较好的隐藏。 展开更多
关键词 混沌保密通信 光混沌 光反馈 双反馈环 相位调制 时延特征隐藏
下载PDF
分享还是沉默?参与型领导对员工知识隐藏的非线性影响研究 被引量:1
18
作者 刘芳 王涵 《科技创业月刊》 2024年第4期131-136,共6页
在工作组织中,面对领导、同事的知识请求,员工故意隐藏知识的现象十分常见,而知识隐藏行为并不利于组织发展。虽然参与型领导能够鼓励员工建言和参与管理,但同时该领导风格赋予员工相应的角色期望与角色压力。参与型领导能否有效抑制员... 在工作组织中,面对领导、同事的知识请求,员工故意隐藏知识的现象十分常见,而知识隐藏行为并不利于组织发展。虽然参与型领导能够鼓励员工建言和参与管理,但同时该领导风格赋予员工相应的角色期望与角色压力。参与型领导能否有效抑制员工的知识隐藏行为,以及存在何种边界机制有待揭示。基于角色理论和激活理论,以327份员工有效问卷作为样本,运用Mplus3.0和Tableau进行数据分析。研究结果表明,参与型领导显著降低员工的知识隐藏行为,但当参与型领导风格过于凸显时,员工感知的角色压力持续上升,员工知识隐藏行为被重新激活;组织支持感在参与型领导与员工角色压力、知识隐藏之间起负向调节作用。研究结果揭示了参与型领导对员工知识隐藏的非线性影响机制,以期在组织管理中提供参考。 展开更多
关键词 参与型领导 员工知识隐藏 角色理论 激活理论 非线性关系
下载PDF
基于多尺度注意力的生成式信息隐藏算法
19
作者 刘丽 侯海金 +1 位作者 王安红 张涛 《计算机应用》 CSCD 北大核心 2024年第7期2102-2109,共8页
针对现有生成式信息隐藏算法嵌入容量低且提取的秘密图像视觉质量欠佳的问题,提出基于多尺度注意力的生成式信息隐藏算法。首先,设计基于多尺度注意力的双编码-单解码生成器,载体图像与秘密图像的特征在编码端分两个支路独立提取,在解... 针对现有生成式信息隐藏算法嵌入容量低且提取的秘密图像视觉质量欠佳的问题,提出基于多尺度注意力的生成式信息隐藏算法。首先,设计基于多尺度注意力的双编码-单解码生成器,载体图像与秘密图像的特征在编码端分两个支路独立提取,在解码端通过多尺度注意力模块进行融合,并利用跳跃连接为解码端提供不同尺度的细节特征,从而获得高质量的载密图像。其次,在U-Net结构的提取器中引入自注意力模块,以弱化载体图像特征、增强秘密图像深层特征,并利用跳跃连接弥补秘密图像细节特征,提高秘密信息提取的准确率;同时,多尺度判决器与生成器的对抗训练可以有效提升载密图像的视觉质量。实验结果表明,所提算法在嵌入容量为24 bpp的情况下,生成的载密图像峰值信噪比(PSNR)和结构相似性(SSIM)平均可达到40.93 dB和0.9883,且提取的秘密图像PSNR和SSIM平均可达到30.47 dB和0.9543。 展开更多
关键词 信息隐藏 注意力机制 多尺度 编码-解码结构 生成对抗网络
下载PDF
Characteristic analysis of 5D symmetric Hamiltonian conservative hyperchaotic system with hidden multiple stability
20
作者 黄丽莲 马衍昊 李创 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期303-315,共13页
Conservative chaotic systems have unique advantages over dissipative chaotic systems in the fields of secure communication and pseudo-random number generator because they do not have attractors but possess good traver... Conservative chaotic systems have unique advantages over dissipative chaotic systems in the fields of secure communication and pseudo-random number generator because they do not have attractors but possess good traversal and pseudorandomness. In this work, a novel five-dimensional(5D) Hamiltonian conservative hyperchaotic system is proposed based on the 5D Euler equation. The proposed system can have different types of coordinate transformations and time reversal symmetries. In this work, Hamilton energy and Casimir energy are analyzed firstly, and it is proved that the new system satisfies Hamilton energy conservation and can generate chaos. Then, the complex dynamic characteristics of the system are demonstrated and the conservatism and chaos characteristics of the system are verified through the correlation analysis methods such as phase diagram, equilibrium point, Lyapunov exponent, bifurcation diagram, and SE complexity. In addition, a detailed analysis of the multistable characteristics of the system reveals that many energy-related coexisting orbits exist. Based on the infinite number of center-type and saddle-type equilibrium points, the dynamic characteristics of the hidden multistability of the system are revealed. Then, the National Institute of Standards and Technology(NIST)test of the new system shows that the chaotic sequence generated by the system has strong pseudo-random. Finally, the circuit simulation and hardware circuit experiment of the system are carried out with Multisim simulation software and digital signal processor(DSP) respectively. The experimental results confirm that the new system has good ergodicity and realizability. 展开更多
关键词 Hamilton conservative hyperchaotic system symmetry wide parameter range hide multiple stability
下载PDF
上一页 1 2 203 下一页 到第
使用帮助 返回顶部