期刊文献+
共找到149篇文章
< 1 2 8 >
每页显示 20 50 100
Efficient Protocol-Proving Algorithm Based on Improved Authentication Tests 被引量:1
1
作者 李谢华 杨树堂 +1 位作者 李建华 诸鸿文 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第1期9-17,共9页
A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the messag... A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the message reply attack. With exact causal dependency relations between messages in this model, the protocol-proving algorithm can avoid the state explosion caused by asynchronous. In order to get the straight proof of security protocols, three authentication theorems are exploited for evaluating the agreement and distinction properties. When the algorithm terminates, it outputs either the proof results or the potential flaws of the security protocol. The experiment shows that the protocol-proving algorithm can detect the type flaw attack on Neuman-Stubblebine protocol, and prove the correctness of NSL protocol by exploring only 10 states. 展开更多
关键词 protocol-proving algorithm improved authentication tests Neuman-Stubblebine protocol NSL protocol
在线阅读 下载PDF
A Novel Improved Artificial Bee Colony and Blockchain-Based Secure Clustering Routing Scheme for FANET 被引量:2
2
作者 Liang Zhao Muhammad Bin Saif +3 位作者 Ammar Hawbani Geyong Min Su Peng Na Lin 《China Communications》 SCIE CSCD 2021年第7期103-116,共14页
Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and ... Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and distributed nature,have posed a new challenge to develop a secure and ef-ficient routing scheme for FANET.To overcome these challenges,this paper proposes a novel cluster based secure routing scheme,which aims to solve the routing and data security problem of FANET.In this scheme,the optimal cluster head selection is based on residual energy,online time,reputation,blockchain transactions,mobility,and connectivity by using Improved Artificial Bee Colony Optimization(IABC).The proposed IABC utilizes two different search equations for employee bee and onlooker bee to enhance convergence rate and exploitation abilities.Further,a lightweight blockchain consensus algorithm,AI-Proof of Witness Consensus Algorithm(AI-PoWCA)is proposed,which utilizes the optimal cluster head for mining.In AI-PoWCA,the concept of the witness for block verification is also involved to make the proposed scheme resource efficient and highly resilient against 51%attack.Simulation results demonstrate that the proposed scheme outperforms its counterparts and achieves up to 90%packet delivery ratio,lowest end-to-end delay,highest throughput,resilience against security attacks,and superior in block processing time. 展开更多
关键词 improved artificial bee colony optimization optimal cluster head selection secure routing blockchain lightweight consensus protocol
在线阅读 下载PDF
Cryptanalysis and Improvement of the Multi-User QPCE Protocol with Semi-Honest Third Party 被引量:1
3
作者 昌燕 许春香 +5 位作者 张仕斌 王海春 闫丽丽 韩贵华 黄源源 盛志伟 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第1期1-5,共5页
In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third... In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack. 展开更多
关键词 of in it or IS on Cryptanalysis and improvement of the Multi-User QPCE protocol with Semi-Honest Third Party TP with
原文传递
Performance improvement of licklider transmission protocol in complex deep space networks based on parameter optimization
4
作者 Guo YU Zhenxing DONG Yan ZHU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2023年第5期406-420,共15页
A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified sce... A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans. 展开更多
关键词 Complex deep space networks File delivery time model Licklider Transmission protocol(LTP) Network Performance Network protocols Parameter optimization Performance improvement
原文传递
Accuracy of machine electrocardiogram interpretation and implementation of a de-prioritization protocol in the emergency department
5
作者 Adam K Stanley Isobel Sonksen +2 位作者 Henry Morgan Nicola Hilton Sukhbir Bhullar 《World Journal of Emergency Medicine》 2025年第5期486-487,共2页
Computer analysis of electrocardiograms(ECGs)was introduced more than 50 years ago,with the aim to improve efficiency and clinical workflow.[1,2]However,inaccuracies have been documented in the literature.[3,4]Researc... Computer analysis of electrocardiograms(ECGs)was introduced more than 50 years ago,with the aim to improve efficiency and clinical workflow.[1,2]However,inaccuracies have been documented in the literature.[3,4]Research indicates that emergency department(ED)clinician interruptions occur every 4-10 min,which is significantly more common than in other specialties.[5]This increases the cognitive load and error rates and impacts patient care and clinical effi ciency.[1,2,5]De-prioritization protocols have been introduced in certain centers in the United Kingdom(UK),removing the need for clinician ECG interpretation where ECGs have been interpreted as normal by the machine. 展开更多
关键词 cognitive load de prioritization protocol improve efficiency clinical workflow howeverinaccuracies computer analysis electrocardiograms ecgs computer analysis electrocardiograms machine electrocardiogram interpretation emergency department error rates
暂未订购
WSN中融合多跳路由和休眠机制的改进型LEACH-C协议
6
作者 吕振雷 吴丰 《内蒙古师范大学学报(自然科学汉文版)》 CAS 北大核心 2016年第6期825-829,共5页
无线传感器网络(WSN)中的LEACH-C路由协议性能严重依赖于基站位置,为此提出一种融合了多跳路由和智能休眠机制的改进型LEACH-C协议(LEACH-CMS).首先,利用LEACH-C协议选择簇头,并构建分簇结构;然后,通过蚁群算法(ACO)在考虑路由距离和簇... 无线传感器网络(WSN)中的LEACH-C路由协议性能严重依赖于基站位置,为此提出一种融合了多跳路由和智能休眠机制的改进型LEACH-C协议(LEACH-CMS).首先,利用LEACH-C协议选择簇头,并构建分簇结构;然后,通过蚁群算法(ACO)在考虑路由距离和簇头能量下,寻找簇头到基站的最优多跳路径,并传输数据到基站;最后,基站根据传输数据的质量,利用休眠机制使不重要地区的节点休眠,以此节约能耗.实验结果表明,LEACH-CMS比LEACH-C协议提高约35%的网络寿命和20%的延迟性能. 展开更多
关键词 无线传感器网络 改进型leach-c协议 多跳路由机制 休眠机制
在线阅读 下载PDF
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
7
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
IAGNES algorithm for protocol recognition
8
作者 Deng Lijun Tan Tiantian +1 位作者 Han Jingwen Tian Tian 《High Technology Letters》 EI CAS 2018年第4期408-416,共9页
In the process of protected protocol recognition,an improved AGglomerative NESting algorithm( IAGNES) with high adaptability is proposed,which is based on the AGglomerative NESting algorithm( AGNES),for the challengin... In the process of protected protocol recognition,an improved AGglomerative NESting algorithm( IAGNES) with high adaptability is proposed,which is based on the AGglomerative NESting algorithm( AGNES),for the challenging issue of how to obtain single protocol data frames from multiprotocol data frames. It can improve accuracy and efficiency by similarity between bit-stream data frames and clusters,extract clusters in the process of clustering. Every cluster obtained contains similarity evaluation index which is helpful to evaluation. More importantly,IAGNES algorithm can automatically recognize the number of cluster. Experiments on the data set published by Lincoln Laboratory shows that the algorithm can cluster the protocol data frames with high accuracy. 展开更多
关键词 improved AGglomerative NESTING algorithm(IAGNES) protocol RECOGNITION bit-stream
在线阅读 下载PDF
石油行业图像数据高效安全传输方法 被引量:1
9
作者 汤明 邹露 +3 位作者 何世明 谢玉森 周越淼 陈春钱 《深圳大学学报(理工版)》 北大核心 2025年第2期172-182,I0004-I0006,共14页
为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理... 为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理想解排序(technique for order preference by similarity to an ideal solution,TOPSIS)法对分解后的奇异值进行优选,在确保数据真实性的前提下用少量奇异值表征原始图像,进行图像压缩,降低数据大小,提高传输效率;提出多通道猫脸分割加密方法,分别对每个颜色通道的图像进行随机分割、随机加密和随机排序,解决了传统猫脸加密算法颜色通道线性相关度高,整体置乱度低的问题.结果表明:改进奇异值压缩技术在保证图像清晰的情况下仅利用15%的奇异值数据完成对图像的压缩,最大图像压缩比可达4.43,平均压缩后所占用的存储空间仅为原空间的26.29%,数据传输控制协议通信平均传输效率提高86.39%.在加密图像达到0相关的前提下,多通道猫脸分割加密算法加密图像在像素点处三通道颜色值完全不同,新方法颜色通道相关系数分别为0.20、0.22和0.25,对比传统猫脸加密方法,分别降低0.78、0.75和0.71.新方法加密效果好、难破解,可为石油行业数字化转型提供理论和技术支撑. 展开更多
关键词 石油天然气工业 图像数据 改进奇异值压缩 猫脸变换 熵权TOPSIS法 传输控制协议 数据安全
在线阅读 下载PDF
高低压成套设备与小三箱的物联网集成与远程监控 被引量:2
10
作者 李亮 薛特 张伟 《信息与电脑》 2025年第6期153-155,共3页
文章探讨了高低压设备通信协议适配优化后的性能增强效果,采用先进编码算法与分组交换技术提升了数据传输速率,构建通用协议转换平台增强了设备兼容性,增添校验机制及采用冗余传输技术提高了系统可靠性,有效提升了电力系统运行水平。
关键词 高低压设备 通信协议 性能提升 数据传输 系统可靠性
在线阅读 下载PDF
5G与6G网络中网络切片技术的协议优化与性能提升研究
11
作者 高红山 《移动信息》 2025年第6期85-87,共3页
文中旨在探讨5G与6G网络中网络切片技术的协议优化与性能提升问题.研究分析了当前网络切片技术的挑战与瓶颈,并提出了基于优化协议的资源管理、调度及切片间协同策略.优化的协议提升了网络切片的资源利用率,降低延迟并加强了切片间的隔... 文中旨在探讨5G与6G网络中网络切片技术的协议优化与性能提升问题.研究分析了当前网络切片技术的挑战与瓶颈,并提出了基于优化协议的资源管理、调度及切片间协同策略.优化的协议提升了网络切片的资源利用率,降低延迟并加强了切片间的隔离性.该研究提供了高效网络切片技术的实现理论支持与实践指导. 展开更多
关键词 网络切片 协议优化 性能提升 资源管理
在线阅读 下载PDF
新型豚鼠灌胃装置的建立及其对操作安全性的影响
12
作者 林步云 张青 《安徽医专学报》 2025年第6期75-78,共4页
目的:针对传统灌胃技术在豚鼠应用中存在的操作风险高、应激大及成功率低等问题,该研究旨在开发并系统评估一种可单人操作的改良灌胃系统,以提升其安全性、成功率和动物福利水平。方法:将40只健康成年雌性豚鼠随机分为传统组与改良组。... 目的:针对传统灌胃技术在豚鼠应用中存在的操作风险高、应激大及成功率低等问题,该研究旨在开发并系统评估一种可单人操作的改良灌胃系统,以提升其安全性、成功率和动物福利水平。方法:将40只健康成年雌性豚鼠随机分为传统组与改良组。传统组采用毛巾包裹人工保定与金属灌胃针进行操作;改良组则使用专用固定架保定,经开口板引导,采用F6硅胶管进行灌胃插管。在7天内进行3次操作,通过比较两组实验的操作成功率、损伤得分、体质量变化及死亡率等指标来综合评价两种方法的效果。结果:改良组的操作成功率(100%)显著高于传统组(70%)(P=0.020)。改良组的损伤得分中位数(0分)极显著低于传统组(1分)(P<0.0001)。实验结束后,改良组豚鼠体质量稳定增长,而传统组体质量则下降,组间差异具有显著统计学意义(P<0.0001)。此外,改良组无一例操作相关死亡(0%),传统组死亡率高达30%,组间差异显著。结论:该研究提出的改良灌胃系统能显著提高豚鼠灌胃的操作成功率,有效降低操作损伤与死亡率,为解决当前豚鼠研究中这一关键技术难题提供了一个安全、有效且易于推广的解决方案。 展开更多
关键词 豚鼠 灌胃技术 改良方案 操作损伤 动物福利 有效性 安全性
暂未订购
基于分布式动态规划的集群杀伤链生成与重构算法 被引量:1
13
作者 胡人杰 陈志伟 +3 位作者 王惠真 封雷 樊柯德 张罗庚 《指挥信息系统与技术》 2025年第4期45-53,共9页
针对集群杀伤链研究在实时性和作战实体协同方面的不足,提出了一种基于分布式动态规划的杀伤链动态生成与重构算法。首先,给出了一种基于动态规划的集群杀伤链生成框架,将杀伤链生成问题视为一个多阶段决策过程,利用动态规划的分治策略... 针对集群杀伤链研究在实时性和作战实体协同方面的不足,提出了一种基于分布式动态规划的杀伤链动态生成与重构算法。首先,给出了一种基于动态规划的集群杀伤链生成框架,将杀伤链生成问题视为一个多阶段决策过程,利用动态规划的分治策略,有效解决了具有最优子结构和带耦合约束子问题的复杂优化问题;然后,通过解决集群复杂多对多任务分配问题,并考虑临机任务以及节点失效等重构情况,设计了一种基于改进合同网协议的集群杀伤链生成与重构算法,使得分配算法可及时有效地处理复杂任务重构情况;最后,以200个要素的集群协同防空任务为例,验证了该算法在提高杀伤链生成速度和作战效能方面的有效性,进而为集群杀伤链动态生成与重构提供了新的技术支撑,提升其决策效率与作战效能。 展开更多
关键词 动态规划 分布式 改进合同网协议 杀伤链生成与重构
在线阅读 下载PDF
Improved algorithm of cluster-based routing protocols for agricultural wireless multimedia sensor networks
14
作者 Zhang Fu Liu Hongmei +3 位作者 Wang Jun Qiu Zhaomei Mao Pengjun Zhang Yakun 《International Journal of Agricultural and Biological Engineering》 SCIE EI CAS 2016年第4期132-140,共9页
Low Energy Adaptive Clustering Hierarchy(LEACH)is a routing algorithm in agricultural wireless multimedia sensor networks(WMSNs)that includes two kinds of improved protocol,LEACH_D and LEACH_E.In this study,obstacles ... Low Energy Adaptive Clustering Hierarchy(LEACH)is a routing algorithm in agricultural wireless multimedia sensor networks(WMSNs)that includes two kinds of improved protocol,LEACH_D and LEACH_E.In this study,obstacles were overcome in widely used protocols.An improved algorithm was proposed to solve existing problems,such as energy source restriction,communication distance,and energy of the nodes.The optimal number of clusters was calculated by the first-order radio model of the improved algorithm to determine the percentage of the cluster heads in the network.High energy and the near sink nodes were chosen as cluster heads based on the residual energy of the nodes and the distance between the nodes to the sink node.At the same time,the K-means clustering analysis method was used for equally assigning the nodes to several clusters in the network.Both simulation and the verification results showed that the survival number of the proposed algorithm LEACH-ED increased by 66%.Moreover,the network load was high and network lifetime was longer.The mathematical model between the average voltage of nodes(y)and the running time(x)was concluded in the equation y=−0.0643x+4.3694,and the correlation coefficient was R2=0.9977.The research results can provide a foundation and method for the design and simulation of the routing algorithm in agricultural WMSNs. 展开更多
关键词 wireless sensor networks routing protocol LEACH algorithm improved algorithm cluster head K-means clustering
原文传递
An improved evaporation rate water cycle algorithm for energy-efficient routing protocol in WSNs
15
作者 Vimala Dayalan Manikandan Kuppusamy 《International Journal of Intelligent Computing and Cybernetics》 EI 2023年第1期30-45,共16页
Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance... Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance in improving the energy efficiency of WSNs.The proposed technique mainly analyzes the clustering problem of WSNs when huge tasks are performed.Design/methodology/approach-This proposed improved ER-WC algorithm is used for analyzing various factors such as network cluster-head(CH)energy,CH location and CH density in improved ER-WCA.The proposed study will solve the energy efficiency and improve network throughput in WSNs.Findings-This proposed work provides optimal clustering method for Fuzzy C-means(FCM)where efficiency is improved in WSNs.Empirical evaluations are conducted to find network lifespan,network throughput,total network residual energy and network stabilization.Research limitations/implications-The proposed improved ER-WC algorithm has some implications when different energy levels of node are used in WSNs.Practical implications-This research work analyzes the nodes’energy and throughput by selecting correct CHs in intra-cluster communication.It can possibly analyze the factors such as CH location,network CH energy and CH density.Originality/value-This proposed research work proves to be performing better for improving the network throughput and increases energy efficiency for WSNs. 展开更多
关键词 WSNS improved ER-WCA Energy efficiency Routing protocol PCM Fuzzy C-Means Paper type Research paper
在线阅读 下载PDF
基于SDN控制器的拓扑发现协议改进策略研究
16
作者 陈思彤 《移动信息》 2025年第5期300-302,共3页
文中围绕SDN网络拓扑发现展开了研究。首先,阐述了SDN架构及现有拓扑发现协议的不足。然后,提出了改进策略,如多信息源融合机制、引入机器学习算法、改进消息交互机制,并从复杂度分析和正确性与完整性证明两方面对改进策略进行了理论分... 文中围绕SDN网络拓扑发现展开了研究。首先,阐述了SDN架构及现有拓扑发现协议的不足。然后,提出了改进策略,如多信息源融合机制、引入机器学习算法、改进消息交互机制,并从复杂度分析和正确性与完整性证明两方面对改进策略进行了理论分析。结果表明,该改进策略能有效提升拓扑发现的性能。 展开更多
关键词 SDN 拓扑发现协议 改进策略 复杂度分析
在线阅读 下载PDF
基于进化计算的Java通信协议栈优化算法研究
17
作者 卢佳明 《移动信息》 2025年第8期17-19,共3页
在通信技术迅速发展的背景下,Java通信协议栈在数据传输中扮演着关键角色。文中利用进化计算技术对Java通信协议栈进行优化,旨在通过智能算法改进协议栈的性能。研究结果显示,所提优化方法能显著提高数据处理速度和传输效率,为通信协议... 在通信技术迅速发展的背景下,Java通信协议栈在数据传输中扮演着关键角色。文中利用进化计算技术对Java通信协议栈进行优化,旨在通过智能算法改进协议栈的性能。研究结果显示,所提优化方法能显著提高数据处理速度和传输效率,为通信协议栈的性能提升提供了新的技术路径。 展开更多
关键词 进化计算 Java通信协议栈 优化算法 性能提升
在线阅读 下载PDF
基于领导跟随策略的一致性编队避障控制研究
18
作者 朱许 王正宁 +3 位作者 章胜 匡育衡 张博涵 黄江涛 《航空工程进展》 2025年第5期28-41,共14页
避障飞行是复杂环境中无人机集群编队飞行需要解决的重要问题。为实现无人机集群编队高效可靠的避障飞行,基于分布式领导跟随一致性控制策略,将无人机集群分为负责路径规划的领导者和负责编队控制的跟随者;针对包含动态障碍物的复杂环境... 避障飞行是复杂环境中无人机集群编队飞行需要解决的重要问题。为实现无人机集群编队高效可靠的避障飞行,基于分布式领导跟随一致性控制策略,将无人机集群分为负责路径规划的领导者和负责编队控制的跟随者;针对包含动态障碍物的复杂环境,提出一种改进RRT*路径规划算法,为无人机集群提供实时规划路径;基于反步控制方法,将编队一致性协议作为误差,发展根据周围环境动态调整编队队形间距的分布式编队飞行控制律。通过构建三种不同复杂度的障碍物环境对编队避障算法进行验证,结果表明:本文方法能够依据环境变化快速生成可行的编队飞行路径,实现无人机集群可变间距编队飞行的精准控制,达到无人机集群编队高效避障的目的。 展开更多
关键词 无人机集群 编队避障 领导跟随策略 改进RRT*算法 一致性协议 反步法
在线阅读 下载PDF
植物石蜡制片中透明和脱蜡技术的改良 被引量:57
19
作者 杨虎彪 李晓霞 罗丽娟 《植物学报》 CAS CSCD 北大核心 2009年第2期230-235,共6页
石蜡切片是植物科学研究领域中一项重要的实验技术,为组织学的发展做出了卓越贡献。制片过程中采用不同试剂和处理程序对切片质量有较大的影响。该文针对常规石蜡切片方法在操作步骤上存在的繁琐及试剂安全性等问题,摸索出改进方法。实... 石蜡切片是植物科学研究领域中一项重要的实验技术,为组织学的发展做出了卓越贡献。制片过程中采用不同试剂和处理程序对切片质量有较大的影响。该文针对常规石蜡切片方法在操作步骤上存在的繁琐及试剂安全性等问题,摸索出改进方法。实验结果表明,采用histolene(C1OH16)、环保透明剂van-clear、正丁醇(n-butanol)和松节油(oil of turpentine)代替二甲苯(xylene),可避免二甲苯的毒性危害;同时精简了传统石蜡切片的操作程序,缩短了实验周期并提高了制片质量。 展开更多
关键词 改良方案 石蜡切片 植物组织学
在线阅读 下载PDF
一种提取植物基因组DNA的方法--改良尿素法 被引量:26
20
作者 曹文波 郑璐璐 谢文海 《华中师范大学学报(自然科学版)》 CAS CSCD 2008年第3期448-451,共4页
介绍了一种从玉米和水稻叶片中提取高质量基因组DNA的改良尿素法.与其他常用方法如CTAB法、SDS法等相比,这种改良方法具有产率高、快速省时、可常温操作、成本耗用低等优点.结果证明,采用这种改良方法获得的基因组DNA纯度高、浓度大,适... 介绍了一种从玉米和水稻叶片中提取高质量基因组DNA的改良尿素法.与其他常用方法如CTAB法、SDS法等相比,这种改良方法具有产率高、快速省时、可常温操作、成本耗用低等优点.结果证明,采用这种改良方法获得的基因组DNA纯度高、浓度大,适合用于限制性内切酶的酶切反应、基于PCR基础上的遗传多样性分析、基于传统的Southern杂交的遗传图谱分析以及其他下游分子生物学研究,是一种适于植物基因组DNA制备方法,值得推广的.并针对基因组制备过程中经常出现的难题,分析了产生的原因,提出了具体解决办法. 展开更多
关键词 基因组DNA提取 改良尿素法 浓度和纯度
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部