期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Establishment of Microbial Limit Test Methods for Two Hospital Preparations
1
作者 Renhui YANG Yongmin CHEN +3 位作者 Yufen XIA Yongyue GAO Yuling LUO Xianmei XU 《Agricultural Biotechnology》 CAS 2023年第3期92-94,127,共4页
[Objectives] This study was conducted to establish microbial limit test methods for traditional Chinese medicine preparations Yunpi Granules and Bupi Qiangli Paste. [Methods] According to General Rules of Part IV of C... [Objectives] This study was conducted to establish microbial limit test methods for traditional Chinese medicine preparations Yunpi Granules and Bupi Qiangli Paste. [Methods] According to General Rules of Part IV of Chinese Pharmacopoeia, applicability tests were conducted on microbial limit test methods for the above two traditional Chinese medicine preparations by the plate method. [Results] The established methods showed recovery values in the range of 0.5-2.0 for both experimental strains, and the control bacteria could be detected in the experimental group, but not in the negative control group. [Conclusions] The microbial limit test methods were reliable for the two traditional Chinese medicine preparations and could be used for quality control. 展开更多
关键词 Yunpi Granules Bupi Qiangli Paste Microbial limit test Method applicability test
下载PDF
CORE-UNIFIED SOC TEST DATA COMPRESSION AND APPLICATION
2
作者 Yi Maoxiang Guo Xueying +2 位作者 Liang Huaguo Wang Wei Zhang Lei 《Journal of Electronics(China)》 2010年第1期79-87,共9页
The pattern run-length coding test data compression approach is extended by introducing don't care bit(x) propagation strategy into it.More than one core test sets for testing core-based System-on-Chip(SoC) are un... The pattern run-length coding test data compression approach is extended by introducing don't care bit(x) propagation strategy into it.More than one core test sets for testing core-based System-on-Chip(SoC) are unified into a single one,which is compressed by the extended coding technique.A reconfigurable scan test application mechanism is presented,in which test data for multiple cores are scanned and captured jointly to make SoC test application more efficient with low hardware overhead added.The proposed union test technique is applied to an academic SoC embedded by six large ISCAS'89 benchmarks,and to an ITC' 02 benchmark circuit.Experiment results show that compared with the existing schemes in which a core test set is compressed and applied independently of other cores,the proposed scheme can not only improve test data compression/decompression,but also reduce the redundant shift and capture cycles during scan testing,decreasing SoC test application time effectively. 展开更多
关键词 System-on-Chip(SoC) test application time Pattern run-length X-propagation Union test RECONFIGURATION
下载PDF
Wigner-Matrix-Based Normality Test and Application to Weak Signal Detection in SISO/SIMO Systems
3
作者 陈军 汪飞 周建江 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第12期1-4,共4页
Based on the asymptotic spectral distribution of Wigner matrices, a new normality test method is proposed via reforming the white noise sequence. In this work, the asymptotic cumulative distribution function (CDF) o... Based on the asymptotic spectral distribution of Wigner matrices, a new normality test method is proposed via reforming the white noise sequence. In this work, the asymptotic cumulative distribution function (CDF) of eigenvalues of the Wigner matrix is deduced. A numerical Kullback-Leibler divergence of the empiric-d spectral CDF based on test samples from the deduced asymptotic CDF is established, which is treated as the test statistic. For validating the superiority of our proposed normality test, we apply the method to weak SIPSK signal detection in the single-input single-output (SISO) system and the single-input multiple-output (SIMO) system. By comparing with other common normality tests and the existing signal detection methods, simulation results show that the proposed method is superior and robust. 展开更多
关键词 SIMO of is with CDF Wigner-Matrix-Based Normality test and Application to Weak Signal Detection in SISO/SIMO Systems SISO in
下载PDF
The application of nucleic acid testing (NAT) in blood screening in Shanghai
4
《中国输血杂志》 CAS CSCD 2001年第S1期282-284,共3页
关键词 ACID NAT in blood screening in Shanghai The application of nucleic acid testing
下载PDF
Genetic study on nines hort tandem repeat (STR) loci among Han population in southern China and their application of parentage tests
5
《中国输血杂志》 CAS CSCD 2001年第S1期364-,共1页
关键词 STR Genetic study on nines hort tandem repeat loci among Han population in southern China and their application of parentage tests
下载PDF
The application of microwave radiation in papain test
6
《中国输血杂志》 CAS CSCD 2001年第S1期379-,共1页
关键词 The application of microwave radiation in papain test
下载PDF
Application of multiplex STRs amplifi cation in paternity testing
7
《中国输血杂志》 CAS CSCD 2001年第S1期368-,共1页
关键词 Application of multiplex STRs amplifi cation in paternity testing
下载PDF
A SEQUENTIAL TESTING PROGRAM FOR PREDICTING AND IDENTIFICATING CARCINOGENS AND ITS APPLICATION
8
作者 周宗灿 方积乾 +2 位作者 王纪宪 傅娟龄 徐厚恩 《Chinese Journal of Cancer Research》 SCIE CAS CSCD 1992年第1期71-81,共11页
In this paper our studies about the sequential testing program for predicting and identificating carcinogens, sequential discriminant method and cost- effectiveness analysis are summarized. The analysis of our databas... In this paper our studies about the sequential testing program for predicting and identificating carcinogens, sequential discriminant method and cost- effectiveness analysis are summarized. The analysis of our database of carcinogeniclty and genotoxicity of chemicals demonstrates the uncertainty . of short- term tests ( STTs ) to predict carcinogens and the results of most routine STTs are statistically dependent. We recommend the sequential testing program combining STTs and carclnogenicity assay, the optimal STT batteries, the rules of the sequential discrimination and the preferal choices of STTs tor specific chemical class. For illustrative pmposes the carclnogenicity prediction of several sample chamicals is presented. The results of cost-effectiveness analysis suggest that this program has vast social-economic effectiveness. 展开更多
关键词 STT A SEQUENTIAL testING PROGRAM FOR PREDICTING AND IDENTIFICATING CARCINOGENS AND ITS APPLICATION MNT PRO test 加加
下载PDF
Changes in Chinese Standard for Ethanol Gasoline 被引量:2
9
作者 Zhang Xin Zhang Yongguang (Research Institute of Petroleum Processing, SINOPEC, Beijing 100083) 《China Petroleum Processing & Petrochemical Technology》 SCIE CAS 2006年第2期15-18,共4页
At the beginning of the tests on application of ethanol gasoline in 2001, Chinese government promulgated a national standard, GB 18351-2001 "Ethanol Gasoline for Motor Vehicles". The standard specifies three kinds o... At the beginning of the tests on application of ethanol gasoline in 2001, Chinese government promulgated a national standard, GB 18351-2001 "Ethanol Gasoline for Motor Vehicles". The standard specifies three kinds of ethanol gasoline, namely E10 (90 RON), E10 (93 RON) and E10 (95 RON). There were ethanol gasoline grades (90 RON and 93 RON) and conventional unleaded gasoline(97 RON) available in the areas where tests were carried out. Vehicle owners were worded about the harmful action of ethanol to their vehicles because of lack of knowledge regarding ethanol fuel, and they only refueled their cars with conventional 97 RON unleaded gasoline. This idea might cause unnecessary costs to customers and could bring about difficulty to the tests as well. Besides, some other technical questions emerged during the experimental application of ethanol gasoline, such as water content, ethanol content in gasoline, etc. Based on the experiences accumulated during the application tests, the national standard GB 18351-2001 "Ethanol Gasoline for Motor Vehicles" was revised. The revised edition is designated as GB 18351-2004. 展开更多
关键词 ethanol gasoline national standard application test motor vehicles
下载PDF
Hybrid Security Assessment Methodology for Web Applications 被引量:1
10
作者 Roddy A.Correa Juan Ramon Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio SiciliaMontalvo Manuel Sanchez Rubio A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第1期89-124,共36页
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessment... This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications.The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box,to carry out the security validation of a web application in an agile and precise way.The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks.Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage,so that the results generated in one phase are used as feed for the following phases in order to get an optimized global security analysis result.The methodology can be used as part of other more general methodologies that do not cover how to use static and dynamic analysis tools in the implementation and testing phases of a Secure Software Development Life Cycle(SSDLC).A practical application of the methodology to analyze the security of a real web application demonstrates its effectiveness by obtaining a better optimized vulnerability detection result against the true and false positive metrics.Dynamic analysis with manual checking is used to audit the results,24.6 per cent of security vulnerabilities reported by the static analysis has been checked and it allows to study which vulnerabilities can be directly exploited externally.This phase is very important because it permits that each reported vulnerability can be checked by a dynamic second tool to confirm whether a vulnerability is true or false positive and it allows to study which vulnerabilities can be directly exploited externally.Dynamic analysis finds six(6)additional critical vulnerabilities.Access control analysis finds other five(5)important vulnerabilities such as Insufficient Protected Passwords or Weak Password Policy and Excessive Authentication Attacks,two vulnerabilities that permit brute force attacks. 展开更多
关键词 Web applications security vulnerability WEAKNESS security analysis white box black box interactive application security testing static application security testing dynamic application security testing
下载PDF
Study on the Research and Application of Network Teaching Courseware in Aerobics in Colleges and Universities
11
作者 Xiangxin Meng Huanxiang Ding +1 位作者 Yongjun Zhao Xueqin Zhuang 《International English Education Research》 2014年第11期41-45,共5页
Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of a... Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of aerobics teaching in colleges and universities should be geared to the demands of the times, and explore new innovation and continual development. In this paper, using the research methods of documentation, courseware development, teaching experiment and mathematical statistics, we study on the making and application of college aerobics network teaching courseware. It is revealed that, with the combination of modem network technology and college aerobics teaching, the resulted college aerobics network teaching courseware is the important media to not only upgrades college aerobics teaching quality, but also help develop students' habits of doing physical exercise, and promote physical health. Therefore, this is meaningful and practical in promoting the education of college students in physical quality development. 展开更多
关键词 Colleges and Universities Aerobics the Network Teaching Courseware Prepare test Application
下载PDF
The Research and Application of ATM Testing 被引量:1
12
作者 CHEN Zhong ping directed by ZHOU Jiong pan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2001年第1期75-75,共1页
The advantage of ATM technology for statistically multiplexing network resources by different users invokes the competition of network resources. This competition has some damaging effects on message transmitting.\;Th... The advantage of ATM technology for statistically multiplexing network resources by different users invokes the competition of network resources. This competition has some damaging effects on message transmitting.\;The research for testing methods and technology of ATM is important for us to develop ATM networks, to promote their construction, to ensure that various ATM devices provided by different providers interoperate properly and to provide excellent services for telecommunication users.\;After discussing the abstract testing method of conformance testing and the abstract description of protocol testing, the thesis puts forward a kind of abstract testing configuration for ATM testing and a kind of abstract description method for testing case.\;From the angle of application, the thesis discusses the basic rules for ATM testing. After that, the thesis points out that the ATM testing must be made from the four aspects of normal testing, conformance testing, performance testing and interoperability testing. The general testing methods, general configuration and connection for ATM testing and the selection of ATM testing items are discussed, respectively, in the four aspects.\;Combined with the characteristics of the traffics supported by ATM systems, the thesis discusses several kinds of traffic models for conducting ATM testing. On the basis of studying various traffic models, the author classifies traffic models for ATM testing as three kinds: periodic traffic models, stochastic traffic models and manual traffic models. The parameters of describing traffic models and their calculating method are discussed in the thesis. A new kind of periodic cell sequence traffic model is proposed in this thesis. The periodic cell sequence traffic model has excellent linearly descending characteristics in the cell interval. The traffic models discussed in this thesis can be applied to various ATM testing cases.\;From the point of normal testing, physical layer testing, ATM layer testing, AAL layer testing, network management testing and signaling testing, the thesis studies and normalizes actual ATM testing cases, testing methods and testing steps. Various kinds of testing cases and relative testing purposes, testing steps, testing configurations, testing connections and testing judging rules are also discussed and normalized in the paper.\;In the end, the selecting method of testing duration for bit error rate testing studied in the thesis according to the bit error rate criterion has been determined to the systems under testing. The judging method to determine bit error rate of the systems under testing is given with the results of bit error rate testing that has been conducted in the determined time duration in the past. 展开更多
关键词 ATM ATM testing testing research testing application
原文传递
Scanning Hartmann test method and its application to lens aberration measurement 被引量:1
13
作者 刘丹 黄惠杰 +3 位作者 任冰强 曾爱军 闫岩 王向朝 《Chinese Optics Letters》 SCIE EI CAS CSCD 2006年第12期725-728,共4页
A scanning Hartmann test method is proposed and its measurement principle is described. The scanning Hartmann test setup is formed by modifying the Hartmann screen of the conventional Hartmann test setup. With the rot... A scanning Hartmann test method is proposed and its measurement principle is described. The scanning Hartmann test setup is formed by modifying the Hartmann screen of the conventional Hartmann test setup. With the rotation of the scanning Hartmann screen and the improved hole arrangement, the whole information of the lens to be tested in the full aperture can be obtained. The measurement accuracy of the aberration is improved and the local error of the lens can be got. In the method, no change of the Hartmann screen is needed for measuring the lenses of different aperture sizes. Experimental results of aberration measurements of two lenses are given to verify the usefulness of the setup. 展开更多
关键词 test Scanning Hartmann test method and its application to lens aberration measurement
原文传递
Application of the digital matched-filter technique to ultrasonic non-destructive testing
14
作者 SIUG.G 《Chinese Journal of Acoustics》 1992年第2期124-130,共7页
Acoustic-pulse compression is obtained in systems with different timebandwidth products by applying the digital matched-filter technique to ultrasonic non-destructive testing. The signal is linearly frequency -modulat... Acoustic-pulse compression is obtained in systems with different timebandwidth products by applying the digital matched-filter technique to ultrasonic non-destructive testing. The signal is linearly frequency -modulated (LFM) pulse and the digitized electrical-excitation signal itself is used as a digital matched filter. Experimental results are in good agreement with theory. Suppressions of side lobes achieve -41.9 dB and -41.5 dB for the Hamming and Gaussian weighted signals respectively. It shows that the application of the digital matched-filter technique improves the performances of a ultrasonic testing system explicitly. 展开更多
关键词 Application of the digital matched-filter technique to ultrasonic non-destructive testing LFM
原文传递
Sifu-a cybersecurity awareness platform with challenge assessment and intelligent coach
15
作者 Tiago Espinha Gasiba Ulrike Lechner Maria Pinto-Albuquerque 《Cybersecurity》 CSCD 2020年第1期333-355,共23页
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the soft... Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed in critical infrastructures.Therefore,several industrial standards mandate secure coding guidelines and industrial software developers’training,as software quality is a significant contributor to secure software.CyberSecurity Challenges(CSC)form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry.These cybersecurity awareness events have been used with success in industrial environments.However,until now,these coached events took place on-site.In the present work,we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online.The introduced cybersecurity awareness platform,which the authors call Sifu,performs automatic assessment of challenges in compliance to secure coding guidelines,and uses an artificial intelligence method to provide players with solution-guiding hints.Furthermore,due to its characteristics,the Sifu platform allows for remote(online)learning,in times of social distancing.The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events.We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding. 展开更多
关键词 CYBERSECURITY AWARENESS Training Artificial intelligence Serious games Secure coding Static application security testing Capture-the-flag Software development in industry
原文传递
Sifu-a cybersecurity awareness platform with challenge assessment and intelligent coach
16
作者 Tiago Espinha Gasiba Ulrike Lechner Maria Pinto-Albuquerque 《Cybersecurity》 2018年第1期945-967,共23页
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the soft... Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the software is deployed in critical infrastructures.Therefore,several industrial standards mandate secure coding guidelines and industrial software developers’training,as software quality is a significant contributor to secure software.CyberSecurity Challenges(CSC)form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry.These cybersecurity awareness events have been used with success in industrial environments.However,until now,these coached events took place on-site.In the present work,we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online.The introduced cybersecurity awareness platform,which the authors call Sifu,performs automatic assessment of challenges in compliance to secure coding guidelines,and uses an artificial intelligence method to provide players with solution-guiding hints.Furthermore,due to its characteristics,the Sifu platform allows for remote(online)learning,in times of social distancing.The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events.We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding. 展开更多
关键词 CYBERSECURITY AWARENESS Training Artificial intelligence Serious games Secure coding Static application security testing Capture-the-flag Software development in industry
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部