期刊文献+
共找到611篇文章
< 1 2 31 >
每页显示 20 50 100
闽南义务教育阶段畲族女童的教育公平问题:基于bell hooks的批判课程视角
1
作者 杨黄琳 周旻 《黑龙江教师发展学院学报》 2024年第3期7-11,共5页
畲族是我国人口较少的少数民族之一,其整体受教育水平与我国倡导的教育目标仍有较大差距。具体表现为畲族女童在义务教育阶段长期面临不平等困境。鉴于此,分析闽南地区畲族女童的义务教育现状及其教育不平等问题。同时,以bell hooks的... 畲族是我国人口较少的少数民族之一,其整体受教育水平与我国倡导的教育目标仍有较大差距。具体表现为畲族女童在义务教育阶段长期面临不平等困境。鉴于此,分析闽南地区畲族女童的义务教育现状及其教育不平等问题。同时,以bell hooks的批判课程理论视角提出消除闽南地区畲族女童教育不平等问题的建议,即加大教育宣传以促进个体观念转变;重构校园课程以适应畲族发展需求;加强师资建设以增强批判教学意识。 展开更多
关键词 闽南 畲族女童 义务教育不平等问题 bell hooks 批判课程理论
下载PDF
基于C-Hooks的MasterCAM“刀具清单”功能开发 被引量:1
2
作者 田先亮 平书伟 李林 《机电工程技术》 2011年第3期24-25,55,共3页
分析了MasterCAM中参数信息的传递流程,介绍了C-Hooks的MasterCAM二次开发步骤。根据C-Hooks与MasterCAM的动态链接库通信要求,结合MFC与Windows直接通信的特点,给出利用MFC工具进行刀具清单C-Hooks开发的方法。
关键词 C—hooks MASTERCAM 开发 MFC
下载PDF
bell hooks: To Resist Misrepresentations of the Outlaw Culture
3
作者 黄春燕 《海外英语》 2012年第4X期3-5,共3页
The thesis summarizes bell hooks' stand and viewpoints as expressed in her book Outlaw Culture:Resisting Representations.In this collection,hooks argues that the outlaw culture,a culture of the marginalized groups... The thesis summarizes bell hooks' stand and viewpoints as expressed in her book Outlaw Culture:Resisting Representations.In this collection,hooks argues that the outlaw culture,a culture of the marginalized groups including black people and women,is either distorted or misinterpreted by the mainstream culture which is a white supremacist patriarchal one.Therefore,she calls for a resistance against the mainstream culture's misrepresentations of the outlaw culture. 展开更多
关键词 BELL hooks OUTLAW CULTURE RESIST REPRESENTATIONS t
下载PDF
Detecting Compromised Kernel Hooks with Support of Hardware Debugging Features 被引量:3
4
作者 Shi Wenchang Zhou HongWei +1 位作者 Yuan JinHui Liang Bin 《China Communications》 SCIE CSCD 2012年第10期78-90,共13页
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,... Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%. 展开更多
关键词 operating system kernel hook integrity HARDWARE control flow
下载PDF
OPKH: A Lightweight Online Approach to Protecting Kernel Hooks in Kernel Modules
5
作者 田东海 李轩涯 +1 位作者 胡昌振 闫怀志 《China Communications》 SCIE CSCD 2013年第11期15-23,共9页
Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in t... Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead. 展开更多
关键词 kernel hook virtualization tech-nology online patching
下载PDF
基于第三方库隔离的Python沙箱逃逸防御机制 被引量:1
6
作者 杨志鹏 王鹃 +1 位作者 马陈军 亢云峰 《信息网络安全》 CSCD 北大核心 2024年第5期682-693,共12页
PaaS平台由于可提供Python服务成为目前较受欢迎的云服务。PaaS平台应用Python沙箱解决安全问题,同时允许用户使用Python C化模块以降低Python对性能的影响。然而,攻击者能够利用Python沙箱策略的漏洞进行逃逸,导致危害底层系统。现有的... PaaS平台由于可提供Python服务成为目前较受欢迎的云服务。PaaS平台应用Python沙箱解决安全问题,同时允许用户使用Python C化模块以降低Python对性能的影响。然而,攻击者能够利用Python沙箱策略的漏洞进行逃逸,导致危害底层系统。现有的Python沙箱大多在代码层进行防御,缺乏对Python C化模块的监管和防护。文章分析了Python C化模块的底层原理和Python沙箱逃逸的特点,针对沙箱逃逸后需要执行特定危险函数发起攻击的特征,提出一种基于第三方库隔离的Python沙箱逃逸防御机制,并实现了原型系统。该机制的原型系统利用GOT Hook技术对Python的C化模块导入行为和危险函数调用行为进行接管,在Python导入C化模块时,提前对该C化模块进行安全检查和隔离。另外,在Python调用危险函数时,对该函数的参数进行检查。实验结果表明,文章所提机制能够有效防御攻击者利用自定义的C化模块逃逸Python沙箱以及使用恶意参数调用危险函数。在正常使用时,文章所提机制的时间开销较低,平均时间开销小于5%。 展开更多
关键词 Python沙箱 第三方库隔离 沙箱逃逸防御机制 HOOK技术
下载PDF
A Survey on the Evolution of Bootkits Attack and Defense Techniques
7
作者 Yilin Zhou Guojun Peng +1 位作者 Zichuan Li Side Liu 《China Communications》 SCIE CSCD 2024年第1期102-130,共29页
According to the boot process of modern computer systems,whoever boots first will gain control first.Taking advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and... According to the boot process of modern computer systems,whoever boots first will gain control first.Taking advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and bypass security mechanisms in boot process.That makes bootkits difficult to detect or clean up thoroughly.With the improvement of security mechanisms and the emergence of UEFI,the attack and defense techniques for bootkits have constantly been evolving.We first introduce two boot modes of modern computer systems and present an attack model of bootkits by some sophistical samples.Then we discuss some classic attack techniques used by bootkits from their initial appearance to the present on two axes,including boot mode axis and attack phase axis.Next,we evaluate the race to the bottom of the system and the evolution process between bootkits and security mechanisms.At last,we present the possible future direction for bootkits in the context of continuous improvement of OS and firmware security mechanisms. 展开更多
关键词 BOOTKIT HOOK legacy BIOS security mechanisms UEFI
下载PDF
Inhibitory effect of active ingredients of Tripterygium wilfordii Hook.F.on human carboxylesterases
8
作者 LIANG Jiahong GONG Jiamin DU Zuo 《中国药理学与毒理学杂志》 CAS 北大核心 2024年第9期652-660,共9页
OBJECTIVE The inhibitory effect of active ingredients of Tripterygium wilfordii Hook.F.(TWHF)(celastrol,triptolide,triptonide,wilforlide A,wilforgine and wilforine)on human carboxylester⁃ase 1(CES1)and CES2 was detect... OBJECTIVE The inhibitory effect of active ingredients of Tripterygium wilfordii Hook.F.(TWHF)(celastrol,triptolide,triptonide,wilforlide A,wilforgine and wilforine)on human carboxylester⁃ase 1(CES1)and CES2 was detected to investigate the herb-drug interactions(HDIs)of TWHF.METHODS Human liver microsomes catalysed hydrolysis of 2-(2-benzoyl-3-methoxyphenyl)benzothi⁃azole(BMBT)and fluorescein diacetate(FD)were used as the probe reaction to phenotype the activity of CES1 and CES2,respectively.The residual activities of CES1 and CES2 were detected by ultrahigh performance liquid chromatography(UPLC)after intervention with celastrol,triptolide,triptonide,wilforlide A,wilforgine and wilforine(100μmol·L^(-1)).Kinetics analysis,involving half inhibitory concentra⁃tion(IC_(50)),inhibition type and kinetic parameter(Ki),and in vitro-in vivo extrapolation(IVIVE),was carried out to predict the HDIs between these compounds and CES-metabolizing drugs.Molecular docking was performed to analyze the ligand-enzyme interaction.RESULTS Out of the six main con⁃stituents of TWHF,only celastrol exhibited strong inhibition towards both CES1 and CES2,with the inhibitory rates of 97.45%(P<0.05)and 95.62%(P<0.05),respectively.The IC_(50)was 9.95 and 4.02 mol·L^(-1),respectively,and the types of inhibition were all non-competitive inhibition.Based on the kinetics analysis,the Ki values were calculated to be 5.10 and 10.55μmol·L^(-1)for the inhibition of celastrol on CES1 and CES2,respectively.IVIVE indicated that celastrol might disturb the metabolic hydrolysis of clinical drugs in vivo by inhibiting CES1.Molecular docking results showed that hydrogen bonds and hydrophobic contacts contributed to the interaction of celastrol and CESs.CONCLUSION The inhibitory effect of celastrol on CES1 and CES2 might cause HDIs with clinical drugs hydrolysed by CESs. 展开更多
关键词 Tripterygium wilfordii Hook.F. CELASTROL CARBOXYLESTERASES enzyme inhibition
下载PDF
An Ancient Culture Fad Is Rising
9
作者 ZHANG XIAO 《China Today》 2024年第8期66-69,共4页
In recent years,a new trend has emerged where an interest in museums and archaeology has hooked young people,allowing them to appreciate China’s rich history and be culturally enlightened,while simultaneously contrib... In recent years,a new trend has emerged where an interest in museums and archaeology has hooked young people,allowing them to appreciate China’s rich history and be culturally enlightened,while simultaneously contributing to the spread of Chinese culture. 展开更多
关键词 ANCIENT HOOK MUSEUM
下载PDF
基于Hook技术方法实现Web应用业务异常检测研究
10
作者 王海光 安志新 +3 位作者 卢永頔 聂滢 刘望 张琳 《中国新通信》 2024年第10期35-38,共4页
近年来,随着Web应用的业务复杂度越来越高,应用系统所承载的数据越来越重要,目前大多数的应用安全防护设备均是针对Web攻击进行防护,对Web应用的业务异常检测没有很好的手段措施。本文通过Hook技术,在Web应用运行时代码调用过程中,对所... 近年来,随着Web应用的业务复杂度越来越高,应用系统所承载的数据越来越重要,目前大多数的应用安全防护设备均是针对Web攻击进行防护,对Web应用的业务异常检测没有很好的手段措施。本文通过Hook技术,在Web应用运行时代码调用过程中,对所使用的类进行全面监控,从而实现对Web应用业务中存在的异常问题的检测。 展开更多
关键词 HOOK技术 异常检测 代码调用 基线检查
下载PDF
Study on the Hook Effect in the Detection of Beta2-Microglobulin with Different Reagents in Fully Automated Biochemical Analyzers
11
作者 Meilin Lin Junyu Chen +4 位作者 Yingxue Mei Haige Zhao Wenxuan Cui Hailiang Zheng Shuxin Liang 《Journal of Clinical and Nursing Research》 2024年第6期77-85,共9页
Objective:To investigate the hook effect in the detection of beta2-microglobulin(β2-MG)with different reagents as well as on two fully automated biochemical analyzers and their solutions.Methods:Using immunoturbidime... Objective:To investigate the hook effect in the detection of beta2-microglobulin(β2-MG)with different reagents as well as on two fully automated biochemical analyzers and their solutions.Methods:Using immunoturbidimetric assay forβ2-MG as the research object,β2-MG levels were detected by different concentration gradients ofβ2-microglobulin samples in Liedemann,Mack,and Myriad reagents of three manufacturers on two automatic biochemical analyzers,and the difference of the hook effect was comparatively analyzed.Results:Leadman reagent showed the hook effect on the Beckman AU5800 automated biochemistry analyzer,while both Maccura and Mindray reagents did not show the hook effect.After the experiments,we found the limit value of the pre-zone check of Leadman reagent,and changed the parameters of the instrument,when the limit value of the pre-zone check was reached,the instrument automatically diluted the specimen five times and then detected it again.After changing the parameters of the instrument,the correlation between the three methods of detecting samples of different concentrations was r>0.99.Conclusion:Before selecting the application of immunoturbidimetric reagents,we have to carry out the risk assessment of the hook effect and selectively set the parameters of the pre-zone check based on the highest concentration that may occur in the clinic;for the items that may have the hook effect,we have to selectively set the parameters of the pre-zone check when the ratio of average reaction rate and the immediate reaction rate is at the limit value,and the phenomenon of antigen excess may occur,the instrument will carry out automatic dilution before detection,so as to avoid the issuance of erroneous results of high-value samples due to the hook effect. 展开更多
关键词 Β2-MICROGLOBULIN Automatic biochemical analyzer Immunoturbidimetric assay Hook effect
下载PDF
HOOK上瘾模型在企业人力资源管理中的创新应用
12
作者 梁剑锋 黄靖嫦 李婷婷 《财富生活》 2024年第22期112-114,共3页
对于企业发展而言,人才是最重要的资源,它决定着企业的兴衰,企业要想获得有利的市场地位,离不开人才保障[1]。在当今快速发展的商业环境中,企业竞争日益激烈,人力资源成为企业最宝贵的资产之一。但是随着员工需求的多样化和个性化,传统... 对于企业发展而言,人才是最重要的资源,它决定着企业的兴衰,企业要想获得有利的市场地位,离不开人才保障[1]。在当今快速发展的商业环境中,企业竞争日益激烈,人力资源成为企业最宝贵的资产之一。但是随着员工需求的多样化和个性化,传统的人力资源管理方式已经难以满足现代企业的管理需求,所以探索新的管理方法,提高员工的工作效率和忠诚度,成为当前企业人力资源管理的重要课题。HOOK上瘾模型作为消费者行为学领域的经典理论,通过深入研究用户行为和心理,显著提升了用户黏性,其核心在于构建一种持续的用户参与和投入机制,既满足用户的个性化需求,又通过奖励和投入激发用户持续参与。将该模型引入企业人力资源管理,为管理者提供了新的思路,建立以员工为中心的人力资源管理体系,设计有效的触发因素、行动指令、奖励机制和投入方式,从而激发员工的积极性,提高工作效率。 展开更多
关键词 HOOK上瘾模型 人力资源管理
下载PDF
钩刀J在结肠病变内窥镜黏膜下剥离术治疗中的临床疗效及安全性研究 被引量:1
13
作者 舒磊 杨林 +2 位作者 刘嵩 刘怡 时昭红 《中国医学装备》 2023年第7期36-40,共5页
目的:探讨钩刀J(hook knife J)在结肠病变内窥镜黏膜下剥离术(ESD)治疗中的临床疗效及安全性。方法:选取医院收治的40例结肠侧向发育型肿瘤或腔内突起型腺瘤患者,按照随机数表法将其分为对照组和观察组,每组20例,对照组采用普通钩刀(hoo... 目的:探讨钩刀J(hook knife J)在结肠病变内窥镜黏膜下剥离术(ESD)治疗中的临床疗效及安全性。方法:选取医院收治的40例结肠侧向发育型肿瘤或腔内突起型腺瘤患者,按照随机数表法将其分为对照组和观察组,每组20例,对照组采用普通钩刀(hook knife)进行ESD治疗,观察组采用改进后的钩刀J进行ESD治疗。对比分析两组ESD治疗的手术成功率、手术时间以及内窥镜器械交换及电凝钳使用频次。结果:两组患者ESD治疗成功率均为100%,对照组中出现肌层穿孔并发症1例(占5%)。观察组手术时间和器械交换频次分别为(50.50±11.82)min和(12.40±2.66)次,均低于对照组,两组比较差异有统计学意义(t=5.013,t=11.189;P<0.05);观察组电凝钳使用频次为2(2,1)次,低于对照组的4(3,5)次,其差异有统计学意义(H=-4.691,P<0.05)。结论:使用钩刀J进行ESD治疗,除保留原刀型特性外,其兼容的注水功能能够提升ESD治疗有效性及安全性,并可提高ESD治疗的成功率。 展开更多
关键词 内窥镜黏膜下剥离术(ESD) 钩刀(hook knife) 注水功能钩刀 结肠腺瘤
下载PDF
Service Worker技术在WebVPN实践中的应用
14
作者 谢智敏 王婷 郭倩玲 《现代信息科技》 2023年第22期63-68,72,共7页
文章讨论了一种新的基于浏览器远程访问网络资源的技术——ServiceWorker,以解决传统基于服务器端WebVPN存在的问题。WebVPN是一种主流远程访问网络资源的方式,但是传统WebVPN技术存在难以处理动态URL和跨域访问,以及服务器CPU占用高等... 文章讨论了一种新的基于浏览器远程访问网络资源的技术——ServiceWorker,以解决传统基于服务器端WebVPN存在的问题。WebVPN是一种主流远程访问网络资源的方式,但是传统WebVPN技术存在难以处理动态URL和跨域访问,以及服务器CPU占用高等问题。为了解决这些问题,文章详细介绍了ServiceWorker技术的基本原理,以及如何使用ServiceWorker技术解决动态URL问题。同时,文章还详细给出了解决方案的示例代码,帮助读者更好地理解ServiceWorker技术的实际应用。在WebVPN实践中,ServiceWorker技术的应用有效地提升了远程访问网络资源的速度和用户体验,该技术有望成为WebVPN领域的一项重要技术。 展开更多
关键词 Service Worker HOOK技术 WebVPN 动态URL CPU占用
下载PDF
A novel binary effective medium model to describe the prepeak stressstrain relationship of combined bodies of rock-like material and rock 被引量:2
15
作者 Tienan Wang Yue Zhai +2 位作者 Huan Gao Yubai Li Ruifeng Zhao 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2023年第5期601-616,共16页
Combined bodies of rock-like material and rock are widely encountered in geotechnical engineering,such as tunnels and mines.The existing theoretical models describing the stress-strain relationship of a combined body ... Combined bodies of rock-like material and rock are widely encountered in geotechnical engineering,such as tunnels and mines.The existing theoretical models describing the stress-strain relationship of a combined body lack a binary feature.Based on effective medium theory,this paper presents the governing equation of the“elastic modulus”for combined and single bodies under triaxial compressive tests.A binary effective medium model is then established.Based on the compressive experiment of concretegranite combined bodies,the feasibility of determining the stress threshold based on crack axial strain is discussed,and the model is verified.The model is further extended to coal-rock combined bodies of more diverse types,and the variation laws of the compressive mechanical parameters are then discussed.The results show that the fitting accuracy of the model with the experimental curves of the concretegranite combined bodies and various types of coal-rock combined bodies are over 95%.The crack axial strain method can replace the crack volumetric strain method,which clarifies the physical meanings of the model parameters.The variation laws of matrix parameters and crack parameters are discussed in depth and are expected to be more widely used in geotechnical engineering. 展开更多
关键词 Combined body stress-strain relationship Hooke’s law Effective medium theory Stress threshold determination
下载PDF
基于KylinOS平台进程监控审计关键技术的实现 被引量:1
16
作者 王飞平 郑秀琴 《长江信息通信》 2023年第12期149-152,共4页
Linux内核是Kylin OS内核的基础,目前支持KylinOS进程生命周期监控与审计的产品还比较少,尤其是针对KylinOS Kernel层轻量级的进程生命周期的监控与审计。在入侵检测的过程中,新进程的创建监控是必不可少的一点,因为攻击者的绝大多数攻... Linux内核是Kylin OS内核的基础,目前支持KylinOS进程生命周期监控与审计的产品还比较少,尤其是针对KylinOS Kernel层轻量级的进程生命周期的监控与审计。在入侵检测的过程中,新进程的创建监控是必不可少的一点,因为攻击者的绝大多数攻击行为都是以进程的方式呈现,所以实时获取新进程创建的信息能帮助安全管理员快速地定位攻击行为。恶意进程、影子进程等的启动造成服务器等内网信息泄露事件屡见不鲜,因此在传统Linux平台上一般都是利用sopreload的机制覆盖libc.so中的execve等函数来监控第三方进程的创建,该方法允许定义优先加载的动态链接库,方便使用者有选择地载入不同动态链接库中的相同函数,只需要替换、覆盖execve应用层面的函数即可。该方式带来实现便利的同时,也产生了很多安全漏洞,如:1)无法监控静态链接的程序;2)易被攻击者绕过,通过int 80h绕过libc直接进行系统调用等;3)易被攻击者通过修改/etc/ld.so.preload使so preload机制失效。文章从系统调用入手,提出了一种基于inline hook内核系统调用的进程监控方案。该方案通过修改操作系统内核的sys_call_table对应的函数地址,实现内核系统调用劫持,在自定义的调用函数中完成进程创建的监控。分析及实验结果表明,该方法能对新进程创建有较好的监控与审计。 展开更多
关键词 inline hook 系统调用 Kprobe 进程监控
下载PDF
HOOK1在结直肠癌中的表达及其临床意义
17
作者 闫文卿 刘雅新 +6 位作者 韩微 周彩婷 马怡君 吴艳 严雪冰 茅静贤 王磊 《诊断病理学杂志》 2023年第5期442-446,450,共6页
目的探讨HOOK1在结直肠癌中的表达水平及其与患者临床病理特征的关系。方法结合前期生信分析结果,运用GEPIA数据库预测HOOK1在结直肠癌组织和正常结直肠组织中的表达差异及其对预后的影响。收集2021-10—2022-10在扬州大学附属医院行手... 目的探讨HOOK1在结直肠癌中的表达水平及其与患者临床病理特征的关系。方法结合前期生信分析结果,运用GEPIA数据库预测HOOK1在结直肠癌组织和正常结直肠组织中的表达差异及其对预后的影响。收集2021-10—2022-10在扬州大学附属医院行手术治疗的93例结直肠癌患者的癌组织及对应的癌旁组织标本,通过免疫组化方法检测结直肠癌组织及癌旁组织中HOOK1蛋白的表达量,分析其在结直肠癌中的表达水平及其与患者临床病理特征的关系。结果数据库预测结果显示,HOOK1在结直肠癌组织中的表达水平较正常结直肠组织显著升高,且HOOK1高表达组患者的生存率高于低表达组患者(P<0.05)。免疫组化染色结果提示,HOOK1主要表达于细胞质,在结直肠癌组织中的表达显著高于癌旁组织,差异有统计学意义(P<0.001);HOOK1在不同年龄、性别、发生部位、肿瘤大小、TNM分期、脉管侵犯及神经侵犯患者中表达差异无统计学意义(P>0.05);结直肠癌中HOOK1表达与肿瘤浸润深度、淋巴结转移、分化程度密切相关,差异有统计学意义(P<0.05)。结论HOOK1在结直肠癌组织中呈高表达,且HOOK1高表达的患者总体预后较好,提示HOOK1可作为结直肠癌诊疗的一项潜在肿瘤标记物。 展开更多
关键词 结直肠癌 HOOK1 肿瘤标记物 临床病理特征
下载PDF
藤苦参组培快繁技术
18
作者 肖明 胡琦敏 +4 位作者 庞晓云 陈晓艺 谭安蔷 李清平 罗宇东 《中南农业科技》 2023年第3期246-248,共3页
以藤苦参(Streptocaulon griffithii Hook.f.)种子为试验材料,在种子繁殖基础上开展组培繁殖,探索不同植物生长调节剂对藤苦参无菌苗不定芽增殖、生根等的影响。结果表明,最适合藤苦参种子萌发的培养基为MS+1.0 mg/L 6-BA+0.5 mg/L NAA+... 以藤苦参(Streptocaulon griffithii Hook.f.)种子为试验材料,在种子繁殖基础上开展组培繁殖,探索不同植物生长调节剂对藤苦参无菌苗不定芽增殖、生根等的影响。结果表明,最适合藤苦参种子萌发的培养基为MS+1.0 mg/L 6-BA+0.5 mg/L NAA+1 g/L活性炭或MS+1.5 mg/L 6-BA+0.5 mg/L NAA+1 g/L活性炭;适合藤苦参丛生芽分化的培养基为MS+3.0 mg/L 6-BA+0.5 mg/L NAA。以种子为外植体,筛选其组织培养各阶段培养基配方,建立藤苦参组培快繁技术,以期为藤苦参资源保护利用奠定基础。 展开更多
关键词 藤苦参(Streptocaulon griffithii Hook.f.) 种子 组织培养 浓度 萌发率 快繁技术
下载PDF
青藏高原种植业碳排放量测度——以青海省青稞种植业为例
19
作者 丁亚男 丁生喜 《湖北农业科学》 2023年第10期45-50,共6页
为研究青藏高原种植业碳排放量测度问题,以青海省青稞(Hordeum vulgare L.var.nudum Hook.f.)种植业产生的碳排放量、碳排放强度、碳成本为测算目标进行测定。通过对青海省1997—2019年的碳排放总量和农业碳排放量现状进行分析,发现青... 为研究青藏高原种植业碳排放量测度问题,以青海省青稞(Hordeum vulgare L.var.nudum Hook.f.)种植业产生的碳排放量、碳排放强度、碳成本为测算目标进行测定。通过对青海省1997—2019年的碳排放总量和农业碳排放量现状进行分析,发现青海省碳排放总量仍居高不下,农业碳排放量也始终处于较高水平。基于1997—2019年青海省农业碳排放数据,使用Matlab软件中GUI工具箱搭建非线性次回归神经网络模型,并使用神经网络时序工具对青海省农业2020—2026年碳排放进行多步预测,结果显示2020—2026年青海省农业碳排放量仍呈高位波动增长的趋势,迫切需要开展“双碳”减排。依据青稞种植业碳排放来源,建立了农用柴油、人工、化肥、农药、农膜、N2O排放6个测算指标。并基于2015—2020年各测算指标的数据建立IPCC清单估算模型,最终测得青海省青稞种植业2015—2020年碳排放总量、碳排放强度和碳成本,结果显示,2015—2020年青海省青稞种植业碳排放总量并未随着青稞种植面积的增大而出现大幅度增长,而青稞种植业碳排放强度和碳成本随着青稞种植面积的增大而有所降低。 展开更多
关键词 碳排放 青稞(Hordeum vulgare L.var.nudum Hook.f.)种植业 IPCC清单估算 非线性次回归神经网络 多步预测 青藏高原 青海省
下载PDF
“Capsule drape wrap”——a new technology for iridoschisis management during phacoemulsification
20
作者 Hui Chen Wan Chen +1 位作者 Yong-Bin Lin Wei-Rong Chen 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2023年第6期984-987,共4页
·AIM: To introduce a new technique for iridoschisis management during phacoemulsification: “capsule drape wrap”.·METHODS: “Capsule drape wrap” technique was used for an 80-year-old man with idiopathic ir... ·AIM: To introduce a new technique for iridoschisis management during phacoemulsification: “capsule drape wrap”.·METHODS: “Capsule drape wrap” technique was used for an 80-year-old man with idiopathic iridoschisis in the right eye during phacoemulsification. The inserted flexible nylon iris hooks to hold anterior capsule in place, the margin of the anterior capsule could act as drape wrap, tracking the fibrillary iris strands firmly from free floating and stabilizing the capsular bags simultaneously. ·RESULTS: The eye with iridoschisis was successfully treated. Iris fibrils remained immobile during the procedure, and despite the severity of iridoschisis, there were no intraoperative complications such as tear of the iris, hyphema, iris prolapse, loss of mydriasis, or rupture of the posterior lens capsule during phacoemulsification. The bestcorrected visual acuity was increased by 0.1(log MAR) 6mo after the surgery.·CONCLUSION: “Capsule drape wrap” for iridoschisis is easily manageable, prevents further disruption to the loose iris fibers and ensures the stability of capsule–iris complex simultaneously, consequently minimizing the risk of surgical complications in phacoemulsification. 展开更多
关键词 “capsule drape wrap”technique iridoschisis management iris hook PHACOEMULSIFICATION
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部