期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
安全科学用药要与提高农药利用率齐步并进——访农业部全国农技推广服务中心农药与药械处处长邵振润 被引量:2
1
作者 汪洋 《中国农资》 2014年第17期22-22,共1页
现状:亟需倡导安全科学使用农药《中国农资》记者:关于积极开展安全科学用药工作,您如何看待?邵振润:去年我国粮食取得了"十连增"的辉煌成绩,这其中病虫防治功不可没。我国农业病虫害发生种类多,年发生面积超过70亿亩次,专家... 现状:亟需倡导安全科学使用农药《中国农资》记者:关于积极开展安全科学用药工作,您如何看待?邵振润:去年我国粮食取得了"十连增"的辉煌成绩,这其中病虫防治功不可没。我国农业病虫害发生种类多,年发生面积超过70亿亩次,专家分析,通过防治每年可挽回粮食6000—9000万吨,皮棉150—180万吨,油料250—270万吨。据统计,我国每年使用农药30多万吨(折百)、制剂100多万吨,农药的科学使用,及时。 展开更多
关键词 农药利用率 科学用药 农业病虫害 中国农资 农技推广服务 农药管理条例 施药技术 专业化 统防统
下载PDF
Current understanding of maize and rice defense against insect herbivores 被引量:4
2
作者 Jinfeng Qi Saif ul Malook +6 位作者 Guojing Shen Lei Gao Cuiping Zhang Jing Li Jingxiong Zhang Lei Wang Jianqiang Wu 《Plant Diversity》 SCIE CAS CSCD 2018年第4期189-195,共7页
Plants have sophisticated defense systems to fend off insect herbivores. How plants defend against herbivores in dicotyledonous plants, such as Arabidopsis and tobacco, have been relatively well studied, yet little is... Plants have sophisticated defense systems to fend off insect herbivores. How plants defend against herbivores in dicotyledonous plants, such as Arabidopsis and tobacco, have been relatively well studied, yet little is known about the defense responses in monocotyledons. Here, we review the current un- derstanding of rice (Oryza sativa) and maize (Zea rnays) defense against insects. In rice and maize, elicitors derived from insect herbivore oral secretions or oviposition fluids activate phytohormone signaling, and transcriptomic changes mediated mainly by transcription factors lead to accumulation of defense-related secondary metabolites. Direct defenses, such as trypsin protein inhibitors in rice and benzoxazinoids in maize, have anti-digestive or toxic effects on insect herbivores. Herbivory-induced plant volatiles, such as terpenes, are indirect defenses, which attract the natural enemies of herbivores. R gene-mediated defenses against herbivores are also discussed. 展开更多
关键词 RICE MAIZE HERBIVORES Secondary metabolites R genes
下载PDF
Detecting Compromised Kernel Hooks with Support of Hardware Debugging Features 被引量:3
3
作者 Shi Wenchang Zhou HongWei +1 位作者 Yuan JinHui Liang Bin 《China Communications》 SCIE CSCD 2012年第10期78-90,共13页
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,... Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%. 展开更多
关键词 operating system kernel hook integrity HARDWARE control flow
下载PDF
Resistance against side channel attack for RSA cryptosystem
4
作者 祝力 谷大武 王超 《Journal of Shanghai University(English Edition)》 CAS 2008年第2期146-151,共6页
Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine with the randomization method for the message and secret exponent, a new implementation scheme of... Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine with the randomization method for the message and secret exponent, a new implementation scheme of CRT-based (the Chinese remained theorem) RSA is proposed. The proposed scheme can prevent simple power analysis (SPA), differential power analysis (DPA) and time attack, and is compatible with the existing RSA-CRT cryptosystem as well. In addition, an improvement for resisting fault attack is proposed, which can reduce extra computation time. 展开更多
关键词 RSA side channel attack (SCA) randomization method
下载PDF
Investigation of Braking Timing of Drivers for Design of Pedestrian Collision Avoidance System
5
作者 Keisuke Suzuki Takuya Kakihara Yasutoshi Horii 《Journal of Mechanics Engineering and Automation》 2016年第3期118-127,共10页
The braking behavior of drivers when a pedestrian comes out from the sidewalk to the road was analyzed using a driving simulator. Based on drivers' braking behavior, the braking control timing of the system for avoid... The braking behavior of drivers when a pedestrian comes out from the sidewalk to the road was analyzed using a driving simulator. Based on drivers' braking behavior, the braking control timing of the system for avoiding the collision with pedestrians was proposed. In this study, the subject drivers started braking at almost the same time in terms of TTC (Time to Collision), regardless of the velocity of a subject vehicle and crossing velocity of pedestrians. This experimental result showed that brake timing of the system which can minimize the interference for braking between drivers and the system is 1.3 s of TTC. Next, the drivers' braking behavior was investigated when the system controlled braking to avoid collision at this timing. As a result, drivers did not show any change of braking behavior with no excessive interference between braking control by the system and braking operation by drivers for avoiding collisions with pedestrians which is equivalent to the excessive dependence on the system. 展开更多
关键词 Active safety collision avoidance PEDESTRIAN brake timing TTC driving simulator.
下载PDF
Research on Network Architecture and Security in Small and Medium Sized Enterprises
6
作者 Yanmei Zhang 《International Journal of Technology Management》 2014年第8期98-100,共3页
The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which in... The paper takes network security guard as a dynamic process, each link of the network security technology throughout the entire firm information operation, namely design an integrated network security system, which includes firewall system, VPN system etc.. The system can meet the requirements of network security and the goals of design network security. 展开更多
关键词 Small and medium-sized enterprises network security security system layered protection
下载PDF
Research and analysis about embedded operating computer system
7
作者 Weiyan Zhang 《International Journal of Technology Management》 2013年第10期104-107,共4页
Embedded operating system EOS (Embedded Operating System) is widely used system software which in the past is mainly used in fields of industrial control and defense system. EOS is responsible for the entire softwar... Embedded operating system EOS (Embedded Operating System) is widely used system software which in the past is mainly used in fields of industrial control and defense system. EOS is responsible for the entire software and hardware resource allocation, scheduling work and coordinating concurrent control activities; some more successful applied EOS products have been presently launched. With the development of lnternet technology, information appliances and the universal application of miniaturization and specialization of EOS, EOS started from a single weak situation to a higher professional direction with strong functions. 展开更多
关键词 embedded operating system COMPUTER management system.
下载PDF
Logical Design and Control of Network in Local Mine Air-Reversing System
8
作者 李建民 王省身 《Journal of China University of Mining and Technology》 2001年第1期33-38,共6页
This paper sets up a mathematical model of switching network and switching function by utilizing graph theory to describe the logical function of different paths.The function varies with open and closed states of air ... This paper sets up a mathematical model of switching network and switching function by utilizing graph theory to describe the logical function of different paths.The function varies with open and closed states of air doors in a complex mine air sub network, and the computer program for solving the switching function of complex networks are offered. It gives the method for discriminating a reversible branch in a complex network by means of the switching function, and the method of counter inverted logical control of airflow inversion by means of open and short circuit conversion of key branches. The research has solved the problem of the stablization of air flow for normal ventination and reversing ventination in a diagonal network. 展开更多
关键词 mine ventination air reversing graph theory local mine air network
下载PDF
NEQM (NFC Based Equipment Qualification Management) System Preventing Counterfeit and Fraudulent Item
9
作者 Choong Koo Chang Kyoung Jun Lee 《Journal of Energy and Power Engineering》 2015年第7期622-631,共10页
Qualification of equipment essential to safety in NPPs (nuclear power plants) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of inciden... Qualification of equipment essential to safety in NPPs (nuclear power plants) ensures its capability to perform designated safety functions on demand under postulated service conditions. However, a number of incidents identified by the NRC (Nuclear Regulatory Commission) since 1980s catalysed the US nuclear industry to adopt standard precautions to guard against counterfeit items. The purpose of this paper is to suggest the NFC (near field communication) based equipment qualification management system preventing counterfeit and fraudulent items. The NEQM (NFC based equipment qualification management) system works with the support of legacy systems such as PMS (procurement management system) and FMS (facility management system). 展开更多
关键词 Counterfeit items fraudulent items equipment qualification NFC
下载PDF
The Incorporation of Precautionary Principle in the Planning of Global System for Mobile Communications Mast Locations in Built-up Areas: Proposals for Jimeta, Nigeria
10
作者 Mohammed Abubakar Husain Abdurrahman Belel Ismaila 《Journal of Earth Science and Engineering》 2014年第5期284-294,共11页
This paper aimed at incorporating the precautionary principles into the planning and development of GSM (global system for mobile communications) masts within the built-up areas of Jimeta. Using GIS (geographic inf... This paper aimed at incorporating the precautionary principles into the planning and development of GSM (global system for mobile communications) masts within the built-up areas of Jimeta. Using GIS (geographic information system) analysis technique, the zone of precautionary principle was defined to 500 meters radius as the zone within which precautionary measures are exercised. The criteria for siting GSM base station are also equally identified. For instance, the presence of certain elements within the precautionary zone like schools, hospitals, residential density and overlap of RF (radio frequency) occurrences, may disqualify any mast location. Analysis of the land use within precautionary zone has shown various proportions of exposure to RF, whereas, only 3.39% of the masts are suitably located and 94.92% are not and therefore should be relocated. The study recommend measures for addressing physical development within precautionary areas, including land conversion and mast sharing to reduce potential harmful effects of RF emanating from GSM base stations. 展开更多
关键词 Precautionary principle GSM mast locations RF in built-up areas.
下载PDF
玉林市植保无人机应用中的难题破解思考与建议 被引量:5
11
作者 黄家善 《中国植保导刊》 北大核心 2016年第8期79-82,共4页
概述了玉林市应用无人机开展农作物病虫害专业化统防统治的现状以及推广应用过程中遇到的问题,并提出了解决的办法和建议。
关键词 农作物病虫害 农用无人机 专业化 统防统
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部