期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
超低容量喷洒对淡色库蚊和白纹伊蚊灭效评估 被引量:2
1
作者 汪中明 董言德 +6 位作者 李春晓 邢丹 余静 张晓龙 张勇 曾晓芃 赵彤言 《中华卫生杀虫药械》 CAS 2010年第5期335-337,共3页
目的评估保安定超低容量喷洒对淡色库蚊和白纹伊蚊的现场灭效。方法 WHO推荐挂笼法和现场密度调查法,其中现场密度调查分别采用人帐诱捕法和CO2灯诱法对蚊虫进行诱集。结果挂笼实验中,有效剂量为98.5 g a.i/ha的保安定对淡色库蚊和白纹... 目的评估保安定超低容量喷洒对淡色库蚊和白纹伊蚊的现场灭效。方法 WHO推荐挂笼法和现场密度调查法,其中现场密度调查分别采用人帐诱捕法和CO2灯诱法对蚊虫进行诱集。结果挂笼实验中,有效剂量为98.5 g a.i/ha的保安定对淡色库蚊和白纹伊蚊的24 h灭效均达到100%。在分别采用帐诱和灯诱的现场密度调查中,淡色库蚊的平均密度下降率分别为83.68%和80.63%。结论保安定是一种较好的ULV喷洒剂,可以应用于紧急状况下病媒生物的控制。 展开更多
关键词 保安定 淡色库蚊 白纹伊蚊 平均密度下降率
下载PDF
农户储粮中害虫防治之我见 被引量:9
2
作者 狄彦芳 赵英杰 《粮食科技与经济》 2005年第5期42-43,共2页
中国农户粮食在储存期间的虫害相当严重,农民朋友应该高度重视。虫害不仅导致储粮的数量减少,更重要的是引起粮食品质的劣变、商品粮价值的降低和影响人畜的健康。农户的储粮数量少,储存方法和使用的装具形式多样,储藏条件差。笔者根据... 中国农户粮食在储存期间的虫害相当严重,农民朋友应该高度重视。虫害不仅导致储粮的数量减少,更重要的是引起粮食品质的劣变、商品粮价值的降低和影响人畜的健康。农户的储粮数量少,储存方法和使用的装具形式多样,储藏条件差。笔者根据多年的工作经验,罗列了包括管理防治、化学防治和其他防治等方法,供农民朋友参考。 展开更多
关键词 害虫防治 催护剂 砻糠载体 熏蒸剂 防虫磷 杀虫松 保安定 凯安保 保粮安 农户储粮
下载PDF
Multipurpose audio watermarking algorithm 被引量:3
3
作者 Ning CHEN Jie ZHU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期517-523,共7页
To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is int... To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability. 展开更多
关键词 Multipurpose audio watermarking Copyright protection Content authentication
下载PDF
Analysis on preserving or increasing the value of social security funds under the new normal economy in China
4
作者 Longquan Xu Ge Peng 《International English Education Research》 2015年第6期83-85,共3页
The "new normal" is the current stage of development of China's economy. The "new" in new normal means different to past; the "normal" means relatively stable. For a period of time in the future, the decrease o... The "new normal" is the current stage of development of China's economy. The "new" in new normal means different to past; the "normal" means relatively stable. For a period of time in the future, the decrease of potential growth rate has become an indisputable fact. Social security fund is an important source of funds for the protection of people's livelihood, whose every movement often attract much attention. Under the situation of new normal economy, how to ensure the preserving or increasing value of social security funds on the premise of security is the core task in the operations management of social security fund investment. At present, there are some difficulties in the development of the social security funds, such as the management system and operation mechanism are not perfect, some institutional measures have not been fully implemented and the progress of the law and regulations is slow. In this paper, we will put forward some corresponding improvement measures, such as expand the scope of social security fund investment, accelerate the implementation of the nominal account system and strengthen the actuarial management of social security fund. 展开更多
关键词 The new normal economy Social security fund Preserve or increase the value.
下载PDF
有奖征联
5
《山海经(故事)(上)》 2014年第8期44-44,共1页
应征联选登长兴长旺长兴旺永安永宁永安宁[注:长兴县、长旺镇、兴旺镇分别在浙江、四川蓬安县、江苏镇江市。](邹立坚)木兰报国保安定桃园尚义为集贤[注:木兰县、报国乡、安定县分别在黑龙江、浙江新昌和海南。对句取意花木兰从军的故事... 应征联选登长兴长旺长兴旺永安永宁永安宁[注:长兴县、长旺镇、兴旺镇分别在浙江、四川蓬安县、江苏镇江市。](邹立坚)木兰报国保安定桃园尚义为集贤[注:木兰县、报国乡、安定县分别在黑龙江、浙江新昌和海南。对句取意花木兰从军的故事。](聂丁华)盘锦金帛织玉带龙泉白水汇清流[注:盘锦属辽宁省下辖城市;金帛指全帛山,属古地名.位于浙江绍兴县境内;玉带指玉带滩,为海南博鳌的著名景点;"锦"可拆为"金""帛"二字。 展开更多
关键词 玉带滩 海南博鳌 保安定 醉花间
原文传递
Stochastic stability analysis of networked control systems with random cryptographic protection under random zero-measurement attacks
6
作者 Meng-zhou GAO Dong-qin FENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第9期1098-1111,共14页
Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,whi... Security issues in networked control systems(NCSs) have received increasing attention in recent years.However, security protection often requires extra energy consumption, computational overhead, and time delays,which could adversely affect the real-time and energy-limited system. In this paper, random cryptographic protection is implemented. It is less expensive with respect to computational overhead, time, and energy consumption,compared with persistent cryptographic protection. Under the consideration of weak attackers who have little system knowledge, ungenerous attacking capability and the desire for stealthiness and random zero-measurement attacks are introduced as the malicious modification of measurements into zero signals. NCS is modeled as a stochastic system with two correlated Bernoulli distributed stochastic variables for implementation of random cryptographic protection and occurrence of random zero-measurement attacks; the stochastic stability can be analyzed using a linear matrix inequality(LMI) approach. The proposed stochastic stability analysis can help determine the proper probability of running random cryptographic protection against random zero-measurement attacks with a certain probability. Finally, a simulation example is presented based on a vertical take-off and landing(VTOL) system. The results show the effectiveness, robustness, and application of the proposed method, and are helpful in choosing the proper protection mechanism taking into account the time delay and in determining the system sampling period to increase the resistance against such attacks. 展开更多
关键词 Networked control systems Security Cyber attacks Stochastic stability Cryptographic protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部