![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
557 Result(s)
-
Article
Cleavage of territrems by alkaline hydrogen peroxide: Isolation and characterization of the aromatic moiety of territrems
The chemical reaction of cleavaging territrem B to give 3,4,5-trimethoxy benzoic acid by alkaline hydrogen peroxide was investigated. The method was applied for confirmation of the chemical structure of the ar...
-
Article
Effect of Rapid Thermal Processing on the Crystallization Properties of PbTiO3 Ferroelectric Thin Film
The fabrication methods of ferroelectric (FE) thin films have received special attention in recent years because of the needs of FE thin films integrated with semiconductor devices. Rapid thermal processing (R...
-
Article
Solid and liquid phase equilibria in mixtures of N, N-dimethylacetamide with chlorinated hydrocarbons
-
Article
Solid and liquid phase equilibria and solid-hydrate formation in binary mixtures of water with amines
Solid and liquid phase diagrams have been constructed for water+triethylamine, or+N, N-dimethylformamide (DMF) or+N, N-dimethlacetamide (DMA). Solid-hydrates form with the empirical formulae N(C2H5)3.3H2O, DMF.3H
-
Article
Intramolecular reaction of polymer coordinated cationic rhodium complex
A square planar rhodium complex from the copolymer of 2-pyridyl ethylene and other low-molecular-weight rhodium complexes with similar structure are reported. The experimental results of XPS and IR spectroscop...
-
Article
Clinical and experimental studies in treating infantile acute respiratory tract infection with Feiyan Chuansou Oral Liquid
-
Article
A complete sequence and comparative analysis of a SARS-associated virus (Isolate BJ01)
The genome sequence of the Severe Acute Respiratory Syndrome (SARS)-associated virus provides essential information for the identification of pathogen(s), exploration of etiology and evolution, interpretation ...
-
Article
On the 2k-th Power Mean of Inversion of L-functions with the Weight of the Gauss Sum
The main purpose of this paper is to use the estimate for character sums and the method of trigonometric sums to study the 2k-th power mean of the inversion of Dirichlet L-functions with the weight of the Gauss s...
-
Chapter and Conference Paper
Ontology Based Cooperative Intrusion Detection System
As malicious intrusions span sites more frequently, network security plays the vital role in internet. Intrusion detection system(IDS) is expected to provide powerful protection against malicious behaviors. Ho...
-
Article
The First Power Mean of the Inversion of L–Functions Weighted by Quadratic Gauss Sums
The main purpose of this paper is to use estimates for character sums and analytic methods to study the first power mean of the inversion of Dirichlet L–functions with the weight of general quadratic Gauss sums, ...
-
Article
On a Problem of D. H. Lehmer and General Kloosterman Sums
Let q ≥ 3 be an odd number, a be any fixed positive integer with (a, q) = 1. For each integer b with 1 ≤ b < q and (b, q) = 1, it is clear that there exists one and only one c with 0 < c < q such that bc ≡ a (mod...
-
Article
An Application of Exponential Sum Estimates
Let p be an odd prime and let δ be a fixed real number with 0<δ<2. For an integer a with 0<a<p, denote by ā the unique integer between 0 and p satisfying a ā≡1 (mod p). Further, let {x} denote the...
-
Chapter and Conference Paper
Building Intrusion Tolerant Software System for High Performance Grid Computing
The intrusion tolerant software system is a novel concept to high performance grid computing, and it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the in...
-
Chapter and Conference Paper
Ant Colony Search Algorithms for Optimal Packing Problem
Ant Colony optimization takes inspiration from the behavior of real ant colony to solve optimization problems. This paper presents a parallel model for ant colony to solve the optimal packing problem. The prob...
-
Chapter and Conference Paper
Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack
Distributed Denial-of-Service (DDoS) attacks misuse network resource and bring serious threats to the internet. Detecting DDoS at the source-end has many advantages over defense at the victim-end and intermedi...
-
Article
Some Identities Involving Certain Hardy Sums and Ramanujan Sum
The main purpose of this paper is, using the mean-value theorem of Dirichlet l-functions, to study the distribution properties of the hybrid mean value involving certain Hardy sums and Ramanujan sum, and give ...
-
Article
Deoxyribozymes inhibit the expression ofperiod1 genein vitro
To investigate the effect of two deoxyribozymes targetingperiod1 (per1) mRNAin vitro for exploring a novel gene therapy approach about circadian rhythm diseases, the specific deoxyribozymes targetingper1 were des...
-
Article
On a Problem of D. H. Lehmer
The main purpose of this paper is to use the Fourier expansion for character sums and the mean value theorem of Dirichlet L–functions to study the asymptotic property of the difference between a D. H. Lehmer n...
-
Chapter and Conference Paper
Incremental Learning Method for Unified Camera Calibration
The camera model could be approximated by a set of linear models defined on a set of local receptive fields regions. Camera calibration could then be a learning procedure to evolve the size and shape of every ...
-
Chapter and Conference Paper
A Constrained Ant Colony Algorithm for Image Registration
Ant Colony optimization takes inspiration from the behavior of real ant colony to solve optimization problems. We attach some constraints to ant colony model and present a parallel constrained ant colony model...