期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
光学膜厚监控方法 被引量:7
1
作者 殷浩 应雄纯 宗杰 《红外与激光工程》 EI CSCD 北大核心 2008年第4期723-727,共5页
光学膜厚监控方法是光学镀膜过程中用以控制光学薄膜光学厚度的主要方法,也是实现镀膜自动化的关键技术之一。了解光学膜厚监控方法的工作原理、特点及误差来源,有助于在实际应用中根据所镀产品的要求选择合适的光学监控方法及监控参数... 光学膜厚监控方法是光学镀膜过程中用以控制光学薄膜光学厚度的主要方法,也是实现镀膜自动化的关键技术之一。了解光学膜厚监控方法的工作原理、特点及误差来源,有助于在实际应用中根据所镀产品的要求选择合适的光学监控方法及监控参数。文中针对最常用的两种光学膜厚监控方法—单波长法和宽光谱法,分别介绍其工作原理,给出了单波长下根据薄膜的透射率或反射率推算膜层厚度的计算方法以及宽光谱法所常用的3种评价函数,总结出影响单波长法测量的8种因素和宽光谱法的11种因素,并根据这些因素分析了这两种方法的特点和适用范围。 展开更多
关键词 膜厚监控 光学薄膜 单长法 宽光谱法
下载PDF
Analysis of both chitinase and chitosanase produced by Sphingomonas sp.CJ-5 被引量:4
2
作者 ZHU Xu-fen ZHOU Ying FENG Jun-li 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2007年第11期831-838,共8页
A novel chitinolytic and chitosanolytic bacterium, Sphingomonas sp. CJ-5, has been isolated and characterized. It secretes both chitinase and chitosanase into surrounding medium in response to chitin or chitosan induc... A novel chitinolytic and chitosanolytic bacterium, Sphingomonas sp. CJ-5, has been isolated and characterized. It secretes both chitinase and chitosanase into surrounding medium in response to chitin or chitosan induction. To characterize the enzymes, both chitinase and chitosanase were purified by ammonium sulfate precipitation, Sephadex G-200 gel filtration and DEAE-Sepharose Fast Flow. SDS-PAGE analysis demonstrated molecular masses of chitinase and chitosanase were 230 kDa and 45 kDa respectively. The optimum hydrolysis conditions for chitinase were about pH 7.0 and 36 ℃, and these for chitosanase were pH 6.5 and 56 ℃, respectively. Both enzymes were quite stable up to 45 ℃ for one hour at pH 5-8. These results show that CJ-5 may have potential for industrial application particularly in recycling of chitin wastes. 展开更多
关键词 Sphingomonas sp. CHITINASE CHITOSANASE
下载PDF
Simulation of Heat Transfer and Oxygen Transport in a Czochralski Silicon System with and Without a Cusp Magnetic Field 被引量:1
3
作者 宇慧平 王敬 +2 位作者 隋允康 戴小林 安国平 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2006年第1期8-14,共7页
Simulations of heat transfer and oxygen transport during a Czochralski growth of silicon with and without a cusp magnetic field were carried out. A finite volume method with a low-Reynolds number K-e model proposed by... Simulations of heat transfer and oxygen transport during a Czochralski growth of silicon with and without a cusp magnetic field were carried out. A finite volume method with a low-Reynolds number K-e model proposed by Jones-Launder was employed. The numerical results were compared with the experimental data in the literature. It is found that the calculated results are in good agreement with the experimental data. 展开更多
关键词 CZOCHRALSKI magnetic field turbulent model SILICON
下载PDF
Optimized Algorithms for Flexible Length-Based Authenticated Skip List 被引量:1
4
作者 XU Jian LI Mingjie +2 位作者 LI Fuxiang YANG Qingsong ZHOU Fucai 《China Communications》 SCIE CSCD 2016年第1期124-138,共15页
With the growing trend toward using cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Many cryptography and security schemes,such as PDP(Provable Data Possession) an... With the growing trend toward using cloud storage,the problem of efficiently checking and proving data integrity needs more consideration.Many cryptography and security schemes,such as PDP(Provable Data Possession) and POR(Proofs of Retrievability) were proposed for this problem.Although many efficient schemes for static data have been constructed,only a few dynamic schemes exist,such as DPDP(Dynamic Provable Data Possession).But the DPDP scheme falls short when updates are not proportional to a fixed block size.The FlexList-based Dynamic Provable Data Possession(FlexDPDP) was an optimized scheme for DPDP.However,the update operations(insertion,remove,modification)in Flex DPDP scheme only apply to single node at a time,while multiple consecutive nodes operation is more common in practice.To solve this problem,we propose optimized algorithms for multiple consecutive nodes,which including MultiNodes Insert and Verification,MultiNodes Remove and Verification,MultiNodes Modify and Verification.The cost of our optimized algorithms is also analyzed.For m consecutive nodes,an insertion takes O(m) + O(log N) + O(log m),where N is the number of leaf nodes of FlexList,a remove takes O(log/V),and a modification is the same as the original algorithm.Finally,we compare the optimized algorithms with original FlexList through experiences,and the results show that our scheme has the higher efficiency of time and space. 展开更多
关键词 authenticated skip list provable data possession data integrity
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部