期刊文献+
共找到3,300篇文章
< 1 2 165 >
每页显示 20 50 100
水丝蚓(Tubificid worms)扰动对磷在湖泊沉积物-水界面迁移的影响 被引量:35
1
作者 张雷 古小治 +4 位作者 王兆德 申秋实 范成新 钟继承 尹洪斌 《湖泊科学》 EI CAS CSCD 北大核心 2010年第5期666-674,共9页
为探讨水丝蚓(Tubificid worms)扰动对磷在湖泊沉积物-水界面间迁移的影响,选取太湖梅梁湾与大浦口两富营养化湖区为研究对象,通过室内培养实验,利用Rhizon间隙水采样器等技术,研究了水丝蚓扰动对太湖沉积物-水界面理化性质及溶解活性磷... 为探讨水丝蚓(Tubificid worms)扰动对磷在湖泊沉积物-水界面间迁移的影响,选取太湖梅梁湾与大浦口两富营养化湖区为研究对象,通过室内培养实验,利用Rhizon间隙水采样器等技术,研究了水丝蚓扰动对太湖沉积物-水界面理化性质及溶解活性磷(SRP)在界面通量的影响.结果表明水丝蚓扰动能够增大表层沉积物含水率、氧化还原电位,减小间隙水中Fe2+浓度.水丝蚓没有显著改变梅梁湾间隙水中SRP浓度,同时促进了梅梁湾沉积物中SRP向上覆水的释放;但水丝蚓显著减小了大浦口间隙水中SRP浓度,并抑制了大浦口沉积物中SRP向上覆水的释放.水丝蚓扰动对磷在沉积物-水界面间迁移的不同影响可能是由沉积物中Fe2+含量差异较大造成的. 展开更多
关键词 生物扰动 磷迁移 二价铁 太湖 水丝蚓 梅梁湾 大浦口
下载PDF
模拟Worms的游戏设计与实现
2
作者 陈英雪 王显德 《吉林化工学院学报》 CAS 2013年第1期64-69,共6页
本课题的目标是仿照Team17的Worms2D系列游戏产品,开发一款2D游戏,了解整个游戏开发流程,设计一款2D游戏引擎,封装了Direct3D9的部分图形绘制接口、图形控制接口、音效接口,并在此基础上实现一款2D射击游戏.
关键词 DIRECT 3D worm 接口
下载PDF
WORMS评分中滑膜炎症与膝骨性关节炎中医证型的关联性研究 被引量:14
3
作者 顾庾国 姜宏 《中国骨伤》 CAS CSCD 2019年第12期1108-1111,共4页
目的:探讨膝骨性关节炎性滑膜炎与膝骨关节炎中医证型的相关性。方法:自2015年1月至2018年6月,选取213例膝骨关节炎的患者,进行中医辨证分型,其MRI影像进行WORMS评分,同时做WORMS评分中滑膜炎和中医证型的相关性分析。结果:213例患者中... 目的:探讨膝骨性关节炎性滑膜炎与膝骨关节炎中医证型的相关性。方法:自2015年1月至2018年6月,选取213例膝骨关节炎的患者,进行中医辨证分型,其MRI影像进行WORMS评分,同时做WORMS评分中滑膜炎和中医证型的相关性分析。结果:213例患者中,风寒湿痹证25例(占11.7%),风湿热痹证84例(占39.4%),瘀血痹阻证43例(占20.2%),肝肾亏虚证61例(占28.6%);在WORMS评分中,滑膜炎评分为0分的12例(占5.6%),1分的60例(占28.2%),2分的50例(占23.5%),3分的91例(占42.7%);相关性分析中,差异有统计学意义,WORMS评分中滑膜炎3分组更容易发生在风湿热痹证中(χ^2=137.286,P=0.000)。结论:膝骨性关节炎滑膜炎患者临床上以风湿热痹型(39.4%,84/213)为主,这对于相关治疗有一定的指导意义。 展开更多
关键词 骨关节炎 滑膜炎 辨证分型 worms评分
下载PDF
New Localities and Palaeoscolecid Worms from the Cambrian(Stage 4,Series 2)Guanshan Biota in Kunming,Yunnan,South China 被引量:5
4
作者 LIU Jianni HAN Jian +5 位作者 LI Jinshu WU Yichen PENG Jie QI Nan YANG Yiyao LI Juan 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2016年第6期1939-1945,共7页
The Guanshan Biota from the Cambrian Stage 4 Wulongqing Formation is a typical Burgess-shale type Lagerst?tte that had witnessed the Cambrian explosion. Here we report two new localities of the Guanshan Biota, which ... The Guanshan Biota from the Cambrian Stage 4 Wulongqing Formation is a typical Burgess-shale type Lagerst?tte that had witnessed the Cambrian explosion. Here we report two new localities of the Guanshan Biota, which is located at Baimei village, south of Kunming and Xinglong village, Wuding County, Yunnan Province respectively. Both localities produce soft-body fossils and several new taxa, e.g. a new species of palaeoscolecidans (Palaeoscolex xinglongensis sp. nov.) reported herein. The comparative study of the new species with similar form not only indicates that there is a diversification of palaeoscolecid species in Guanshan Biota, but also strengthens the ties between the older Chengjiang Biota and the younger Kaili Biota (and also the coeval Burgess Shale community). Three paleoecological features, including high diversity, little disparity and richness of palaeoscolecid worms, are summarized as a case study to represent the differences between Guanshan and Chengjiang Biota. 展开更多
关键词 Guanshan Biota Chengjiang Biota palaeoscolecid worms Cambrian Explosion China
下载PDF
Instant Messaging Worms Propagation Simulation and Countermeasures 被引量:2
5
作者 HU Huaping WEI Jianli 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期95-100,共6页
Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The in... Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation. 展开更多
关键词 instant messaging worms SIMULATION PROPAGATION worm detection and containment
下载PDF
Global dynamics of a novel multi-group model for computer worms 被引量:3
6
作者 巩永旺 宋玉蓉 蒋国平 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期56-62,共7页
In this paper, we study worm dynamics in computer networks composed of many autonomous systems. A novel multigroup SIQR (susceptible-infected-quarantined-removed) model is proposed for computer worms by explicitly c... In this paper, we study worm dynamics in computer networks composed of many autonomous systems. A novel multigroup SIQR (susceptible-infected-quarantined-removed) model is proposed for computer worms by explicitly considering anti-virus measures and the network infrastructure. Then, the basic reproduction number of worm R0 is derived and the global dynamics of the model are established. It is shown that if R0 is less than or equal to 1, the disease-free equilibrium is globally asymptotically stable and the worm dies out eventually, whereas, if R0 is greater than 1, one unique endemic equilibrium exists and it is globally asymptotically stable, thus the worm persists in the network. Finally, numerical simulations are given to illustrate the theoretical results. 展开更多
关键词 computer worm multi-group model Lyapunov function global dynamics
下载PDF
Simulating Greedy Propagation of P2P Worms 被引量:1
7
作者 Guo-Zheng Wu Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2010年第4期307-311,共5页
Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background o... Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network. 展开更多
关键词 Greedy propagation Internet worms peer-to-peer network peer-to-peer worms worms propagating.
下载PDF
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
8
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
下载PDF
Research in Computer Viruses and Worms
9
作者 Peng Guojun Zhang Huanguo Wang Lina 《China Communications》 SCIE CSCD 2007年第2期90-96,共7页
Viruses and worms have become so common that most computer users now accept them as a fact of life.This paper introduces the definitions and difference of the computer viruses and worms.Some main research problems abo... Viruses and worms have become so common that most computer users now accept them as a fact of life.This paper introduces the definitions and difference of the computer viruses and worms.Some main research problems about the computer viruses and worms in recent years are also summarized and discussed in detail.Finally the developing trend of the computer virus and worms is proposed. 展开更多
关键词 PROPAGATION DETECTION CONTAINMENT worms
下载PDF
Research and Development of P2P Worms
10
作者 Li You Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第3期202-210,共9页
With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as ... With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail. 展开更多
关键词 Index Terms---Peer-to-peer (P2P) P2P worm worm propagation model.
下载PDF
Strength of plastic with various helical wheels meshed types of worms 被引量:2
11
作者 Makoto Nomura Takao Koide +2 位作者 Akio Ueda Yusuke Ishida Atsutaka Tamura 《材料与冶金学报》 CAS 北大核心 2015年第3期232-235,238,共5页
关键词 塑钢 涡轮 复合材料
下载PDF
An Immunization Strategy for Social Network Worms Based on Network Vertex Influence
12
作者 YANG Wei WANG Haibo YAO Yu 《China Communications》 SCIE CSCD 2015年第7期154-166,共13页
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i... Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms. 展开更多
关键词 social network worm immunization strategy network security worm propagation worm containment
下载PDF
Comparison of Two Pour-On Formulations of Ivermectin against Gastrointestinal Worms, Fleas and Lice in Naturally Infected Stray Dogs
13
作者 Froylán Ibarra-Velarde Yolanda Vera-Montenegro +2 位作者 Joaquín Ambía Medina Karla Sánchez-Peralta Pedro Ochoa Galván 《Pharmacology & Pharmacy》 2015年第3期177-184,共8页
The aim of the present study was to evaluate the efficacy of two commercial pour-on ivermectin formulations against intestinal parasites (IP), fleas and lice in naturally infested stray dogs. Eighteen crossbreed dogs ... The aim of the present study was to evaluate the efficacy of two commercial pour-on ivermectin formulations against intestinal parasites (IP), fleas and lice in naturally infested stray dogs. Eighteen crossbreed dogs with eggs of IP as well as adult fleas and lice were included in the trial. On day 0, the dogs were randomly divided into 3 groups of 6 animals each: a group receiving a single pour-on treatment with 0.5% ivermectin (500 mcg/kg), a group treated similarly with 0.2% iver-mectin (200 mg/kg), and a control group. Fecal and skin analyses were carried out on days 0, 7, 14, 21 and 28 to determine the reduction of eggs and the number of fleas and lice. Weight gain was also measured on day 28. On day 30, the dogs were humanely sacrificed in order to count adult IP. Efficacy was measured as the percentage of the reduction of eggs per gram fecal mass (EPGF), of adult IP, fleas and lice relative to the control group. For the eggs of IP, ivermectin at 0.5% showed an efficacy of 100% against ascarids and 79% against Ancylostoma caninum. ivermectin at 0.2% removed 90.2% of the ascarids and 50.4% of A. caninum. For adult IP, the efficacy of 0.5% iver-mectin against Toxocara canis and A. caninum was 100%, and for 0.2% ivermectin it was 62.4% and 76.4% for T. canis and A. caninum, respectively. Both compounds were 100% effective against lice and 96% and 71.1% efficacious against fleas, respectively. However, neither treatment was effective against Dypilidium caninum. Weight gain in treated dogs was statistically different from that of the controls (p < 0.05). We concluded that 0.5% pour-on ivermectin showed better efficacy than 0.2% pour-on ivermectin in the reduction of eggs and adult intestinal parasites and fleas;it was similarly efficacious against lice. 展开更多
关键词 IVERMECTIN Intestinal worms FLEAS and LICE Stray DOGS
下载PDF
Research on the Propagation Models and Defense Techniques of Internet Worms
14
作者 Tian-Yun Huang 《Journal of Electronic Science and Technology of China》 2008年第1期32-38,共7页
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give... Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out. 展开更多
关键词 Defense system Internet worm network security propagation model
下载PDF
Fasciola worm and egg-derived antigens:Exploring their diagnostic potential for urogenital schistosomiasis in resource-limited endemic regions
15
作者 Adedayo Adesida Tajudeen Oriade +7 位作者 Kabirat Sulaiman Funmilayo Afolayan Timothy Auta Ibikunle Akanbi Mercy Aladegboye Roseangela Nwuba Alexander Odaibo Oyetunde Oyeyemi 《Asian Pacific Journal of Tropical Medicine》 SCIE CAS 2024年第11期501-507,I0029,共8页
Objective:To evaluate the immunodiagnostic potential of crude Fasciola gigantica-worm(FWA)and egg antigen(FEA)in detecting anti-Schistosoma(S.)haematobium antibodies in sera and urine samples.Methods:This is a cross-s... Objective:To evaluate the immunodiagnostic potential of crude Fasciola gigantica-worm(FWA)and egg antigen(FEA)in detecting anti-Schistosoma(S.)haematobium antibodies in sera and urine samples.Methods:This is a cross-sectional diagnostic study.Employing an indirect ELISA,antibodies against these antigens were assessed in samples from infected and non-infected individuals in both schistosomiasis endemic(NE)and non-endemic(NNE)areas,using microscopy as the diagnostic standard.Results:FWA-sera exhibited excellent diagnostic accuracy with an area under the curve(AUC)of 0.957,a sensitivity of 93.75%,and a specificity of 85.42%for discriminating between infected and non-infected individuals in non-endemic areas.FWA-urine also demonstrated robust performance,achieving AUC>0.95,sensitivity>97.0%,and specificity>85.0%in both NE and NNE categories.Notably,S.haematobium-specific antibody levels against FWA were significantly elevated in infected individuals in both endemic and non-endemic areas.FEA-sera exhibited outstanding diagnostic performance with sensitivity exceeding 90%and an AUC of 0.968 in non-endemic samples but not in FEA-urine.Conclusions:FWA-based ELISAs,applicable to both sera and urine,emerge as promising tools for S.haematobium diagnosis in resource-limited settings,offering advantages of high sensitivity and specificity with shared antigens with Fasciola.The superior diagnostic metrics of urine samples suggest their potential as a non-invasive biological sample for diagnostic purposes. 展开更多
关键词 Schistosoma haematobium Non-invasive worm antigen ELISA Immuno-diagnosis
下载PDF
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
16
作者 Yuling Chen Xiong Yang +2 位作者 Tao Li Yi Ren Yangyang Long 《Digital Communications and Networks》 SCIE CSCD 2024年第2期265-272,共8页
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For... Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network. 展开更多
关键词 Wireless Sensor Network(WSN) Node authentication Blockchain TANGLE worm detection
下载PDF
侧链含有不同电子受体的聚咔唑衍生物的合成及其WORM型存储性能 被引量:1
17
作者 刘柳 程庆 +2 位作者 樊菲 张斌 陈彧 《功能高分子学报》 CAS CSCD 北大核心 2016年第2期163-171,181,共10页
利用Suzuki偶联反应合成了3种侧链含有不同电子受体的可溶性D-A型聚咔唑衍生物:聚[(9-(2-己基葵基)-9 H-咔唑)-(9-(4-硝基苯基)-9 H-咔唑)](PCz-NO2)、聚[(9-(2-己基葵基)-9 H-咔唑)-(4-(9 H-咔唑-9-基)苯甲醛)](PC... 利用Suzuki偶联反应合成了3种侧链含有不同电子受体的可溶性D-A型聚咔唑衍生物:聚[(9-(2-己基葵基)-9 H-咔唑)-(9-(4-硝基苯基)-9 H-咔唑)](PCz-NO2)、聚[(9-(2-己基葵基)-9 H-咔唑)-(4-(9 H-咔唑-9-基)苯甲醛)](PCz-CHO)和聚[(9-(2-己基葵基)-9 H-咔唑)-(4-(9 H-咔唑-9-基)苯甲腈)](PCz-CN)。基于这3种聚合物的存储器件(器件结构:Al(200nm)/高分子(90nm)/氧化铟锡(ITO)均表现出典型的电双稳电子开关效应和非易失性一次写入多次读出(WORM)型存储性能。随着共轭聚合物光学带隙的增加[2.26eV(PCz-NO2)→2.79eV(PCzCHO)→3.20eV(PCz-CN)],相应器件的启动阈值电压逐渐增大(-1.70V→-1.81V→-1.89V);而电流开关比(ON/OFF)则依次减小(6.63×10^4→4.08×10^4→5.68×10^3)。含氰基的聚咔唑衍生物需要的开启电压最大,展现出来的电流开关比在3种聚合物中则最小。 展开更多
关键词 聚咔唑 D-A型共轭聚合物 worm型存储器件 阈值电压 电流开关比
下载PDF
WORM存储技术及其在医院中的应用 被引量:3
18
作者 徐浩 辛海燕 楚宏硕 《医疗设备信息》 2006年第8期25-28,34,共5页
本文简要介绍了WORM存储技术的基本概念,指出了基于光盘、磁带和磁盘的WORM技术的实现方法和各自的优缺点,讨论了医疗信息的特征和在医院信息化建设中应用WORM存储技术的必要性和迫切性,并给出了在医院中运用WORM技术的设计方案和应注... 本文简要介绍了WORM存储技术的基本概念,指出了基于光盘、磁带和磁盘的WORM技术的实现方法和各自的优缺点,讨论了医疗信息的特征和在医院信息化建设中应用WORM存储技术的必要性和迫切性,并给出了在医院中运用WORM技术的设计方案和应注意的问题。 展开更多
关键词 worm 存储 光盘 磁带 磁盘 医疗信息 医院信息化
下载PDF
Contact Toxicity and Antifeedant Activity of Aconitum flavum Extract against Cabbage Worm
19
作者 梁永锋 刘立红 +1 位作者 刘世巍 丁建海 《Plant Diseases and Pests》 CAS 2010年第6期58-60,72,共4页
[ Objective] The paper was to study the contact toxicity and antifeedant activity of Aconitum flavum against cabbage worm. [ Method ] In- sect dipping method was adopted to determine the contact toxicity of the extrac... [ Objective] The paper was to study the contact toxicity and antifeedant activity of Aconitum flavum against cabbage worm. [ Method ] In- sect dipping method was adopted to determine the contact toxicity of the extracts of A. fiavum extracted from five polar solvents including ethanol, petroleum ether, ether, ethyl acetate, n-butanol and water; leaf dish method was adopted to determine the antifeedant activities of five solvent ex- tracts including ethanol, petroleum ether, ether, ethyl acetate, n-butanol and water against cabbage worm, [ Result] Extracts of A. flavum had high contact toxicity against cabbage worm. When the concentration was 100.00 mg/ml, the corrected mortality at 48 h roached 97.24%, and the insec- ticidal activities of five solvent extracts against cabbage worm in sequence were water 〉 n-butanol 〉 ethyl acetate 〉 ether 〉 petroleum ether, the cor- rected mortality of water extract at 48 h was 95.87% ; the antifeedant activities of five solvent extracts in sequence were water 〉 n-butanol 〉 ethyl ac- etate 〉 ether 〉 petroleum ether. [ Conclusion] Extracts of A. flavum had strong contact toxicity and antifeedant activity against cabbage worm, and the active ingredients with contact toxicity and antifeedant activity might be a kind of polar compound. 展开更多
关键词 Aconitum flavum EXTRACT Cabbage worm Contact toxicity Antifeedant activity
下载PDF
一种WORM光盘文件存储系统的设计
20
作者 杨建东 布鲁诺.瑞斯曼 裴先登 《小型微型计算机系统》 CSCD 北大核心 1996年第3期47-51,共5页
本文讨论了WORM光盘构成文件存储系统时由于写一次特性引起的各种处理方式。给出了一种存档后备式文件系统的设计。详细说明了其层次结构、文卷结构、文件结构,以及用户界面、层内部界面等设计。同时给出了速度及可靠性的设计考虑。
关键词 worm光盘 文件存储系统 设计 光盘存储器
下载PDF
上一页 1 2 165 下一页 到第
使用帮助 返回顶部