期刊文献+
共找到41,727篇文章
< 1 2 250 >
每页显示 20 50 100
基于Origin的土遗址防雨水侵蚀调控机理研究——以晋阳古城西城墙为例
1
作者 尚瑞华 韩鹏举 +3 位作者 谷瑞芳 程驰 吴雅娟 刘伟伟 《太原理工大学学报》 CAS 北大核心 2024年第4期686-695,共10页
【目的】通过Origin软件分析,了解晋阳古城西城墙裸土土遗址与草本植物覆盖土遗址的防雨水侵蚀机理及最终效果。【方法】通过Origin软件分析原位人工模拟降雨实验数据的方法,对比植物生长状况对土遗址坡面产流、产沙效果的影响作用。【... 【目的】通过Origin软件分析,了解晋阳古城西城墙裸土土遗址与草本植物覆盖土遗址的防雨水侵蚀机理及最终效果。【方法】通过Origin软件分析原位人工模拟降雨实验数据的方法,对比植物生长状况对土遗址坡面产流、产沙效果的影响作用。【结果】产流前降雨截留量Q_(0)与新生草产流起始时间T_(0)呈负相关,且Q_(0)遵循枯草>新生草>裸土;新生草产沙系数C_(sy)、产沙强度I_(sy)与降雨强度呈显著正相关,产流、产沙效果遵循规律为裸土>枯草>新生草;裸露土遗址通过形成泥皮面层的方式,保证土体内部少受雨水浸润,适用于干旱气候区;草本植物通过强化土遗址抗冲性,减少土体表面冲刷,适用于半干旱半湿润气候区。【结论】Origin软件分析证实,草本植物提高土遗址抗冲性效果显著,草本植物覆盖土遗址现象利于山西本地土遗址保护,但当极端持续强降雨发生在9-10月间时,草本植物覆盖土遗址是否适用仍待继续研究。 展开更多
关键词 origin软件 土遗址 强降雨 侵蚀 雨水 草本
下载PDF
Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence 被引量:1
2
作者 Xiong Zhang Minqing Zhang +3 位作者 Xu AnWang Wen Jiang Chao Jiang Pan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期1925-1938,共14页
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designe... This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission.The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission.The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data.This process effectively enhances the concealment and imperceptibility of confidential information,thereby improving the security of such information during transmission and reducing security risks.Furthermore,we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments.Through adversarial training,the algorithm is strengthened to enhance its resilience against attacks and overall robustness,ensuring better protection against potential threats.Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity.Additionally,it ensures the quality and fidelity of the stego image.The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information. 展开更多
关键词 Information hiding neural style transfer ROBUSTNESS
下载PDF
Origin软件在大学物理实验教学中的应用
3
作者 刘念 左绪忠 +2 位作者 何恩节 秦炎福 官邦贵 《科技风》 2024年第26期124-126,共3页
Origin软件强大的数据处理及绘图能力有助于学生在大学物理实验中对数据进行分析、拟合和图像的绘制。以霍尔效应法测电螺线管轴向磁感应强度实验为例,介绍Origin软件的数据处理及拟合功能。结果表明,Origin软件的应用有效地提升了学生... Origin软件强大的数据处理及绘图能力有助于学生在大学物理实验中对数据进行分析、拟合和图像的绘制。以霍尔效应法测电螺线管轴向磁感应强度实验为例,介绍Origin软件的数据处理及拟合功能。结果表明,Origin软件的应用有效地提升了学生的绘图水平,降低了绘图误差,也为学生未来的学习和科研打下坚实的基础。 展开更多
关键词 origin 大学物理实验 霍尔效应 数据拟合
下载PDF
Geochemistry and origins of hydrogen-containing natural gases in deep Songliao Basin,China:Insights from continental scientific drilling 被引量:2
4
作者 Shuang-Biao Han Chao-Han Xiang +3 位作者 Xin Du Lin-Feng Xie Jie Huang Cheng-Shan Wang 《Petroleum Science》 SCIE EI CAS CSCD 2024年第2期741-751,共11页
The different reservoirs in deep Songliao Basin have non-homogeneous lithologies and include multiple layers with a high content of hydrogen gas.The gas composition and stable isotope characteristics vary significantl... The different reservoirs in deep Songliao Basin have non-homogeneous lithologies and include multiple layers with a high content of hydrogen gas.The gas composition and stable isotope characteristics vary significantly,but the origin analysis of different gas types has previously been weak.Based on the geochemical parameters of gas samples from different depths and the analysis of geological settings,this research covers the diverse origins of natural gas in different strata.The gas components are mainly methane with a small amount of C_(2+),and non-hydrocarbon gases,including nitrogen(N_(2)),hydrogen(H_(2)),carbon dioxide(CO_(2)),and helium(He).At greater depth,the carbon isotope of methane becomes heavier,and the hydrogen isotope points to a lacustrine sedimentary environment.With increasing depth,the origins of N_(2)and CO_(2)change gradually from a mixture of organic and inorganic to inorganic.The origins of hydrogen gas are complex and include organic sources,water radiolysis,water-rock(Fe^(2+)-containing minerals)reactions,and mantle-derived.The shales of Denglouku and Shahezi Formations,as source rocks,provide the premise for generation and occurrence of organic gas.Furthermore,the deep faults and fluid activities in Basement Formation control the generation and migration of mantle-derived gas.The discovery of a high content of H_(2)in study area not only reveals the organic and inorganic association of natural-gas generation,but also provides a scientific basis for the exploration of deep hydrogen-rich gas. 展开更多
关键词 Gas compositions Stable isotopes Gas origins Hydrogen gas Songliao Basin
下载PDF
Genetic dissection and origin of pleiotropic loci underlying multilevel fiber quality traits in upland cotton(Gossypium hirsutum L.) 被引量:1
5
作者 Hongge Li Shurong Tang +7 位作者 Zhen Peng Guoyong Fu Yinhua Jia Shoujun Wei Baojun Chen Muhammad Shahid Iqbal Shoupu He Xiongming Du 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第10期3250-3263,共14页
Cotton fiber quality is a persistent concern that determines planting benefits and the quality of finished textile products.However,the limitations of measurement instruments have hindered the accurate evaluation of s... Cotton fiber quality is a persistent concern that determines planting benefits and the quality of finished textile products.However,the limitations of measurement instruments have hindered the accurate evaluation of some important fiber characteristics such as fiber maturity,fineness,and neps,which in turn has impeded the genetic improvement and industrial utilization of cotton fiber.Here,12 single fiber quality traits were measured using Advanced Fiber Information System(AFIS)equipment among 383 accessions of upland cotton(Gossypium hirsutum L.).In addition,eight conventional fiber quality traits were assessed by the High Volume Instrument(HVI)System.Genome-wide association study(GWAS),linkage disequilibrium(LD)block genotyping and functional identification were conducted sequentially to uncover the associated elite loci and candidate genes of fiber quality traits.As a result,the previously reported pleiotropic locus FL_D11 regulating fiber length-related traits was identified in this study.More importantly,three novel pleiotropic loci(FM_A03,FF_A05,and FN_A07)regulating fiber maturity,fineness and neps,respectively,were detected based on AFIS traits.Numerous highly promising candidate genes were screened out by integrating RNA-seq and qRT-PCR analyses,including the reported GhKRP6 for fiber length,the newly identified GhMAP8 for maturity and GhDFR for fineness.The origin and evolutionary analysis of pleiotropic loci indicated that the selection pressure on FL_D11,FM_A03 and FF_A05 increased as the breeding period approached the present and the origins of FM_A03 and FF_A05 were traced back to cotton landraces.These findings reveal the genetic basis underlying fiber quality and provide insight into the genetic improvement and textile utilization of fiber in G.hirsutum. 展开更多
关键词 upland cotton single fiber quality pleiotropic loci candidate genes locus origin
下载PDF
Origin软件在声速的测量实验数据处理中的应用
6
作者 杨波 邢海波 王晨辰 《大学物理实验》 2024年第4期86-88,共3页
以大学物理实验中声速的测量为例,利用了Origin软件对实验测量所得的数据进行了线性拟合,并和传统的逐差法计算结果进行了比较,两种方法所得出的声速大小几乎吻合。结果表明,在实验教学中引入Origin软件对实验数据进行处理,操作更为方... 以大学物理实验中声速的测量为例,利用了Origin软件对实验测量所得的数据进行了线性拟合,并和传统的逐差法计算结果进行了比较,两种方法所得出的声速大小几乎吻合。结果表明,在实验教学中引入Origin软件对实验数据进行处理,操作更为方便快捷,并且能够有效提高实验效率和实验准确率,避免人为因素带来的误差。 展开更多
关键词 origin软件 声速的测量 逐差法 数据处理
下载PDF
Origin软件在“微生物学”实验教学中的应用——以细菌生长曲线的测定实验为例
7
作者 郭佳 唐雅丽 +1 位作者 雷腊梅 许德麟 《教育教学论坛》 2024年第11期21-24,共4页
针对高校本科“微生物学”实验教学中遇到的数据处理问题,以细菌生长曲线测定的实验为例,使用Origin 2022软件进行数据导入、数据计算、图形绘制及插入误差棒等操作,完成细菌生长曲线的绘制。结果表明,利用Origin软件可以快速对实验数... 针对高校本科“微生物学”实验教学中遇到的数据处理问题,以细菌生长曲线测定的实验为例,使用Origin 2022软件进行数据导入、数据计算、图形绘制及插入误差棒等操作,完成细菌生长曲线的绘制。结果表明,利用Origin软件可以快速对实验数据进行批量处理,操作简捷并可避免人工计算的误差,对实验得到的非线性数据通过软件可以拟合出美观的图形,将实验结果可视化。在教学中通过引入Origin软件,可以在讲授具体微生物知识的同时,让本科生掌握一款专业的数据分析处理软件,有助于培养本科生的数据处理能力,提高综合科研素养,为后续实验课程和科研工作的数据处理工作打好基础。 展开更多
关键词 微生物学实验 origin 数据处理 生长曲线 实验教学改革
下载PDF
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
8
作者 Zengxiang Li Yongchong Wu +3 位作者 Alanoud Al Mazroa Donghua Jiang Jianhua Wu Xishun Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期847-869,共23页
Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robus... Hidden capacity,concealment,security,and robustness are essential indicators of hiding algorithms.Currently,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the algorithms.In practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret image.An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms.In this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet transform.The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding network.During the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret image.These lowresolution secret images are combined using densemodules to obtain a high-quality secret image.The experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various attacks.The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical applications.In conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms.Its ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various applications.Further research and experimentation can explore the algorithm’s performance under different scenarios and expand its potential applications. 展开更多
关键词 Image hiding ROBUSTNESS wavelet transform dynamic region attention
下载PDF
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
9
作者 Nannan Wu Xianyi Chen +1 位作者 James Msughter Adeke Junjie Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第3期3001-3019,共19页
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks s... Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding.However,these approaches have some limitations.For example,a cover image lacks self-adaptability,information leakage,or weak concealment.To address these issues,this study proposes a universal and adaptable image-hiding method.First,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image domain.Second,to improve perceived human similarity,perceptual loss is incorporated into the training process.The experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality output.Furthermore,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at 0.0001.Moreover,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks. 展开更多
关键词 Deep image hiding attention mechanism privacy protection data security visual quality
下载PDF
Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding
10
作者 Kai Gao Chin-Chen Chang Chia-Chen Lin 《Computer Systems Science & Engineering》 2024年第3期813-833,共21页
Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity ... Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics,which allows us to hide sensitive data in image files.In this paper,we propose a novel high-fidelity reversible data hiding scheme.Based on the advantage of the multipredictor mechanism,we combine two effective prediction schemes to improve prediction accuracy.In addition,the multihistogram technique is utilized to further improve the image quality of the stego image.Moreover,a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram.Experimental results show that the quality of the stego image of our scheme outperforms state-of-the-art schemes in most cases. 展开更多
关键词 Data hiding multipredictor mechanism high-fidelity knapsack problem
下载PDF
Identification of S-RNase genotype and analysis of its origin and evolutionary patterns in Malus plants
11
作者 Zhao Liu Yuan Gao +10 位作者 Kun Wang Jianrong Feng Simiao Sun Xiang Lu Lin Wang Wen Tian Guangyi Wang Zichen Li Qingshan Li Lianwen Li Dajiang Wang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第4期1205-1221,共17页
Identification of the S genotype of Malus plants will greatly promote the discovery of new genes,the cultivation and production of apple,the breeding of new varieties,and the origin and evolution of self-incompatibili... Identification of the S genotype of Malus plants will greatly promote the discovery of new genes,the cultivation and production of apple,the breeding of new varieties,and the origin and evolution of self-incompatibility in Malus plants.In this experiment,88 Malus germplasm resources,such as Aihuahong,Xishuhaitang,and Reguanzi,were used as materials.Seven gene-specific primer combinations were used in the genotype identification.PCR amplification using leaf DNA produced a single S-RNase gene fragment in all materials.The results revealed that 70 of the identified materials obtained a complete S-RNase genotype,while only one S-RNase gene was found in 18 of them.Through homology comparison and analysis,13 S-RNase genotypes were obtained:S_(1)S_(2)(Aihuahong,etc.),S_(1)S_(28)(Xixian Haitang,etc.),S_(1)S_(51)(Hebei Pingdinghaitang),S_(1)S_(3)(Xiangyangcun Daguo,etc.),S_(2)S_(3)(Zhaiyehaitang,etc.),S_(3)S_(51)(Xishan 1),S_(3)S_(28)(Huangselihaerde,etc.),S_(2)S_(28)(Honghaitang,etc.),S_(4)S_(28)(Bo 11),S_(7)S_(28)(Jiuquan Shaguo),S_(10)S_e(Dongchengguan 13),S_(10)S_(21)(Dongxiangjiao)and S_(3)S_(51)(Xiongyue Haitang).Simultaneously,the frequency of the S gene in the tested materials was analyzed.The findings revealed that different S genes had varying frequencies in Malus resources,as well as varying frequencies between intraspecific and interspecific.S_(3) had the highest frequency of 68.18%,followed by S_(1)(42.04%).In addition,the phylogenetic tree and origin evolution analysis revealed that the S gene differentiation was completed prior to the formation of various apple species,that cultivated species also evolved new S genes,and that the S_(50) gene is the oldest S allele in Malus plants.The S_(1),S_(29),and S_(33) genes in apple-cultivated species,on the other hand,may have originated in M.sieversii,M.hupehensis,and M.kansuensis,respectively.In addition to M.sieversii,M.kansuensis and M.sikkimensis may have also played a role in the origin and evolution of some Chinese apples. 展开更多
关键词 MALUS S-RNase genotype SELF-INCOMPATIBILITY origin and evolution
下载PDF
Geographical origin identification of winter jujube(Ziziphus jujuba Dongzao')by using multi-element fingerprinting with chemometrics
12
作者 Xiabing Kong Qiusheng Chen +8 位作者 Min Xu Yihui Liu Xiaoming Li Lingxi Han Qiang Zhang Haoliang Wan Lu Liu Xubo Zhao Jiyun Nie 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第5期1749-1762,共14页
Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 16... Winter jujube(Ziziphus jujuba'Dongzao')is greatly appreciated by consumers for its excellent quality,but brand infringement frequently occurs in the market.Here,we first determined a total of 38 elements in 167 winter jujube samples from the main winter jujube producing areas of China by inductively coupled plasma mass spectrometer(ICP-MS).As a result,16 elements(Mg,K,Mn,Cu,Zn,Mo,Ba,Be,As,Se,Cd,Sb,Ce,Er,Tl,and Pb)exhibited significant differences in samples from different producing areas.Supervised linear discriminant analysis(LDA)and orthogonal projection to latent structures discriminant analysis(OPLS-DA)showed better performance in identifying the origin of samples than unsupervised principal component analysis(PCA).LDA and OPLS-DA had a mean identification accuracy of 87.84 and 94.64%in the testing set,respectively.By using the multilayer perceptron(MLP)and C5.0,the prediction accuracy of the models could reach 96.36 and 91.06%,respectively.Based on the above four chemometric methods,Cd,Tl,Mo and Se were selected as the main variables and principal markers for the origin identification of winter jujube.Overall,this study demonstrates that it is practical and precise to identify the origin of winter jujube through multi-element fingerprint analysis with chemometrics,and may also provide reference for establishing the origin traceability system of other fruits. 展开更多
关键词 winter jujube multi-element fingerprint analysis CHEMOMETRICS origin traceability
下载PDF
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
13
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
下载PDF
Management of retroperitoneal high-grade serous carcinoma of unknown origin:A case report
14
作者 Wen-Lin Hsieh Dah-Ching Ding 《World Journal of Clinical Cases》 SCIE 2024年第6期1190-1195,共6页
BACKGROUND Retroperitoneal high-grade serous carcinoma(HGSC)of unknown origin is a sporadic tumor that can originate from ovarian cancer.Herein,we report the case of a woman with retroperitoneal HGSC of unknown origin... BACKGROUND Retroperitoneal high-grade serous carcinoma(HGSC)of unknown origin is a sporadic tumor that can originate from ovarian cancer.Herein,we report the case of a woman with retroperitoneal HGSC of unknown origin and describe how she was diagnosed and treated.CASE SUMMARY A 71-year-old female presented with the tumor marker CA125 elevated to 1041.9 U/mL upon a regular health examination.Computed tomography revealed retroperitoneal lymph node enlargement.Subsequently,positron emission tomography scanning revealed lesions with increased F-18 fluorodeoxyglucose uptake at the nodes.As a result,she underwent laparoscopic lymph node resection,and pathology revealed metastatic adenocarcinoma with CK7(+),PAX8(+),WT1(+),PR(-),and p53 mutational loss of expression,indicating that the origin may be from the adnexa.The patient was admitted to our ward and underwent laparoscopic staging;however,the pathological results were negative.Under the suspicion of retroperitoneal HGSC of unknown origin,chemotherapy and targeted therapy were initiated.Tumor marker levels decreased after treatment.CONCLUSION We present a case of HGSC of unknown origin managed using retroperitoneal lymphadenectomy,staging surgery,chemotherapy,and targeted therapy. 展开更多
关键词 High-grade serous carcinoma RETROPERITONEUM origin CHEMOTHERAPY Lymph node Case report
下载PDF
Origin of the Dashuigou independent tellurium deposit at Qinghai–Xizang Plateau: constraints from the light stable isotopes C, O, and H
15
作者 Jianzhao Yin Yuhong Chao +2 位作者 Haoyu Yin Hongyun Shi Shoupu Xiang 《Acta Geochimica》 EI CAS CSCD 2024年第2期385-398,共14页
By studying the light isotopic compositions of carbon,oxygen,and hydrogen,combined with previous research results on the ore-forming source of the deposit,the authors try to uncover its metallogenic origin.The δ^(18)... By studying the light isotopic compositions of carbon,oxygen,and hydrogen,combined with previous research results on the ore-forming source of the deposit,the authors try to uncover its metallogenic origin.The δ^(18)O and δ^(13)C isotope signatures of dolomite samples vary between 10.2 and 13.0‰,and between−7.2 and−5.2‰,respectively,implying that the carbon derives from the upper mantle.δD and δ^(18) O of quartz,biotite,and muscovite from diff erent ore veins of the deposit vary between−82 and−59‰,and between 11.6 and 12.4‰,respectively,implying that the metallogenic solutions are mainly magmatic.According to the relevant research results of many isotope geologists,the fractionation degree of hydrogen isotopes increases as the depth to the Earth’s core increases,and the more diff erentiated the hydrogen isotopes are,the lower their values will be.In other words,mantle-derived solutions can have extremely low hydrogen isotope values.This means that the δD‰ value−134 of the pyrrhotite sample numbered SD-34 in this article may indicate mantle-derived oreforming fl uid of the deposit.The formation of the Dashuigou tellurium deposit occurred between 91.71 and 80.19 Ma. 展开更多
关键词 Carbon oxygen and hydrogen isotopes origin Independent tellurium deposit The Qinghai–Xizang Plateau
下载PDF
Unroofing Technique for Anomalous Origin of the Left Coronary Artery from the Right Sinus of Valsalva: Report of a Case
16
作者 Keisuke Morimoto Futoshi Kobayashi +2 位作者 Hiromu Horie Yuki Sakaguchi Einosuke Mizuta 《World Journal of Cardiovascular Surgery》 2024年第6期69-77,共9页
Anomalous origin of the left coronary artery (AOLCA) from the right sinus of Valsalva constitutes a rare congenital coronary artery anomaly. Patients with an anomalous left main coronary artery face a significantly hi... Anomalous origin of the left coronary artery (AOLCA) from the right sinus of Valsalva constitutes a rare congenital coronary artery anomaly. Patients with an anomalous left main coronary artery face a significantly higher risk of sudden cardiac death compared to those with an anomalous right coronary artery. The anomalous coronary artery traversing between the ascending aorta and the pulmonary artery markedly heightens the risk of myocardial ischemia, arrhythmia, and sudden death. Symptomatic patients often exhibit a longer intramural course of the coronary artery, which may necessitate earlier intervention or influence the choice of surgical repair method. Surgical intervention is advocated for patients with this anomaly, even in the absence of symptoms. For anomalous aortic origin of a coronary artery from the opposite sinus of Valsalva with an intramural course, coronary unroofing is the preferred revascularization procedure. This report presents a case of AOLCA originating from the right sinus of Valsalva, treated surgically using the unroofing technique for the aortic intramural segment of the anomalous coronary artery traversing between the great vessels. The unroofing technique is recommended for treating AOLCA with an extensive intramural course that does not involve the commissure. 展开更多
关键词 Unroofing Technique Anomaly of Coronary Artery Anomalous origin of Left Coronary Artery
下载PDF
Millet Origin Identification Model Based on Near-infrared Spectroscopy
17
作者 Penghe LYU Dongfeng YANG 《Agricultural Biotechnology》 2024年第3期31-33,共3页
[Objectives]This study was conducted to clarify the difference of millet from different producing areas in near-infrared spectroscopy(NIRS)modeling.[Methods]Millet samples from six different regions were collected for... [Objectives]This study was conducted to clarify the difference of millet from different producing areas in near-infrared spectroscopy(NIRS)modeling.[Methods]Millet samples from six different regions were collected for NIRS analysis,and an origin identification model based on BP neural network was established.The competitive adaptive reweighted sampling(CARS)algorithm was used to extract characteristic wavelength variables,and a CARS-BP model was established on this basis.Finally,the CARS-BP model was compared with support vector machine(SVM),partial least squares discriminant analysis(PLS)and KNN models.[Results]The characteristic wavelengths were extracted by CARS,and the number of variables was reduced from 1845 to 130.The discrimination accuracy of the CARS-BP model for the samples from six producing areas reached 98.1%,which was better than SVM,PSL and KNN models.[Conclusions]NIRS can quickly and accurately identify the origin of millet,providing a new method and way for the origin identification and quality evaluation of millet. 展开更多
关键词 MILLET Identification of origin CARS-BP model NIR
下载PDF
Gibbon vocal communication provides insights into the origin and evolution of human music and language
18
作者 Zi-Di Wang Hai-Gang Ma Peng-Fei Fan 《Zoological Research(Diversity and Conservation)》 2024年第2期130-132,共3页
Humans across cultures convey feelings and thoughts through music.Despite its ubiquity,the origins and evolution of music remain enigmatic.Archaeological evidence has traced the history of music back at least 40000 ye... Humans across cultures convey feelings and thoughts through music.Despite its ubiquity,the origins and evolution of music remain enigmatic.Archaeological evidence has traced the history of music back at least 40000 years ago based on prehistoric bone flutes(Fitch,2006).Comparative studies have also explored earlier histories by identifying common musical features between animals and humans(Fitch,2006).For example,songbirds exhibit categorical rhythms similar to human music(Roeske et al.,2020),and humans can recognize emotional arousal in signals across all classes of terrestrial vertebrates(Filippi et al.,2017).These findings,while surprising,align with the longstanding human perception of animal signals as music(Gray et al.,2001).The universality of music and its features intensifies the fundamental question posed by Darwin(1871):how has a behavior that is energetically costly and seemingly non-adaptive evolved to become so widespread?This question can be further divided into two sub-questions(Savage et al.,2021):(1)how do musical features contribute to the production or expressive power of music(i.e.,mechanisms),and(2)how does music benefit performers in terms of survival,reproductions,or other aspects(i.e.,functions). 展开更多
关键词 COMMUNICATION origin evolution
下载PDF
Research on the origin and evolution of technical management regulations for railway
19
作者 Lei Tian Yuming Sun Yonggang Jia 《Railway Sciences》 2024年第6期779-787,共9页
Purpose–To facilitate technical managers and field workers to master and understand the provisions of Technical Management Regulations for Railway more accurately,so as to better serve the comprehensive revision of t... Purpose–To facilitate technical managers and field workers to master and understand the provisions of Technical Management Regulations for Railway more accurately,so as to better serve the comprehensive revision of the Regulations,this paper carries out the research on the traceability and evolution of the provisions of the Regulations.Design/methodology/approach–This paper studies and analyzes the evolution of the 11th edition of the Regulations by analyzing the relevance of clauses and summarizes the historical background of the development of calendar editions of the Regulations.The basic research on the traceability and evolution of the Regulations is carried out from four aspects:the continuity of the development of the Regulations,the authority of contents,the relevance of clauses and the richness of historical materials.Findings–From the first edition of the Regulations issued by the former Ministry of Railways in 1950 to the 11th edition,there have been ten comprehensive revisions.There is a strong correlation and continuity between the calendar editions of the Regulations in terms of chapter structure and clauses.Studying the context of the terms of the Regulations is an important way to understand and master the current clauses of the Regulations.Originality/value–Through the research on the traceability and evolution of the clauses of the Regulations,one is to explore the context of the development of railway technical equipment in China,the other is to clarify the historical background when the provisions were formulated and the third is to trace the development and evolution of the provisions.The revision of the Regulations is based on an accurate grasp of the context of the provisions,which can effectively judge the possible security risks caused by the revision of the provisions and avoid the possible risks in field implementation from the source. 展开更多
关键词 Technical management regulations for railway origin and evolution REVISION Technical regulation Organization of train operation
下载PDF
最小二乘法和Origin软件在牛顿第二运动定律验证实验的数据处理中的应用
20
作者 胡丹 尚宏伟 +1 位作者 李亚琴 杨癸 《佳木斯大学学报(自然科学版)》 CAS 2024年第1期173-176,共4页
用最小二乘法和Origin软件分别对牛顿第二运动定律验证实验的实验数据进行处理。计算结果表明,Origin软件在处理实验数据方面具有快速、灵活、便捷等优势,避免了因人为因素所造成的误差,因而在实验数据处理中具有广泛的应用前景。
关键词 最小二乘法 origin软件 牛顿第二运动定律
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部