Zobrazeno 1 - 10
of 134
pro vyhledávání: '"Yiqi, Dai"'
Publikováno v:
Shipin Kexue, Vol 44, Iss 7, Pp 39-47 (2023)
In this study, the structure and antifreeze activity of surimi by-product protein hydrolysate (SBPH) were investigated, and the cryoprotective effect and mechanism on Streptococcus thermophilus were explored by measuring its growth performance, malon
Externí odkaz:
https://doaj.org/article/cf0eea5016a04b229722fd1e8e0947ac
Publikováno v:
Children, Vol 11, Iss 7, p 802 (2024)
Objective: This study examines the current status and variations in creativity between migrant and urban children, exploring the influencing factors affecting creativity. Methods: We selected children from local households in Hangzhou City and non-lo
Externí odkaz:
https://doaj.org/article/034d56683261402f81b1be56dbf8b07b
Publikováno v:
In Information Sciences 20 October 2014 282:401-413
Publikováno v:
Food research international (Ottawa, Ont.). 149
The low-resolution structure of casein (CN) clusters in sodium caseinate (NaCas) solution and its conformational dynamics were obtained by size-exclusion chromatography (SEC), analytical ultracentrifugation (AUC), small-angle X-ray scattering (SAXS),
Publikováno v:
In Information Sciences 2008 178(1):244-255
Publikováno v:
Bioresource technology. 254
To acquire microbial consortia with effectively precedent degradation of lignin, samples obtained from rotten trunks, rotten stumps and soil near it were screened and isolated after generations of subculture. The dynamic change illustrated that their
Publikováno v:
Journal of Software Engineering and Applications. :51-57
Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional mandatory access control (MAC) can only control whether the user can access the sensiti
Publikováno v:
The Journal of Supercomputing. 66:1243-1259
This paper presents the design and implementation features of Centralized Pervasive Computing Environment/Multilevel Security (CPCE/MLS), a multilevel security (MLS) system in pervasive computing environment deployed in Local area network (LAN) with
Publikováno v:
Science China Information Sciences. 55:1151-1161
Traditional secret sharing (SS) schemes can reconstruct the secret precisely, but have high com- putation complexity. Visual secret sharing (VSS) schemes use human visual system to reconstruct the secret without cryptographic computation, but have pi
Publikováno v:
SCIENTIA SINICA Informationis. 41:513-525
Traditional secret sharing (SS) schemes can reconstruct the secret precisely, but have high computa- tion complexity. Visual secret sharing (VSS) schemes use human visual system to reconstruct the secret without cryptographic computation, but have pi