期刊文献+
共找到17,635篇文章
< 1 2 250 >
每页显示 20 50 100
Inclusive leadership and authenticity at work among South African professionals of colour:The role of psychological safety and gender
1
作者 Waseemah Patel Laura Lorente Felipe Bravo-Duarte 《Journal of Psychology in Africa》 2026年第1期89-95,共7页
This study examined the relationship between inclusive leadership and authenticity at work in racial minority groups of South Africa,taking into account the mediating role of psychological safety and the moderator rol... This study examined the relationship between inclusive leadership and authenticity at work in racial minority groups of South Africa,taking into account the mediating role of psychological safety and the moderator role of gender,in that relationship.The sample was composed of 94 employees predominantly working in the professional services sector from South Africa(41.5%females;mean age=37.1),who self-identified as racial minority groups(coloured/black/Indian).Results indicate that inclusive leadership has no direct effect on authenticity at work;however,psychological safety fully mediates this relationship.Regarding the moderation effect of gender,results showed that males are more likely to diminish their self-alienation(a specific component of authenticity at work)when levels of psychological safety are higher.These results are consistent with Social Identity Theory,which posits that individuals derive part of their self-concept from their membership in social groups.In contexts where inclusive leadership fosters psychological safety,individuals(particularly men in traditionally male-dominated work environments)may feel a stronger sense of belonging and group identity,which in turn enhances their willingness to express their authentic selves and reduces self-alienation.Practical implications for companies include the need to improve leadership styles to foster more of an inclusive and psychologically safe culture,where minority groups can be authentic and flourish. 展开更多
关键词 Inclusive leadership psychological safety authenticity at work minority groups GENDER
在线阅读 下载PDF
Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment
2
作者 Huihui Zhu Fei Tang +1 位作者 Chunhua Jin Ping Wang 《Computers, Materials & Continua》 2026年第4期648-666,共19页
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto... The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols. 展开更多
关键词 User authentication key establishment CLIENT-SERVER HETEROGENEOUS SECURITY
在线阅读 下载PDF
Design of Navigation Message Authentication for BDSBAS System
3
作者 Chen Xiao Tian Xiang +2 位作者 Luo Ruidan Liu Ting Wu Haitao 《China Communications》 2026年第1期189-203,共15页
The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a ri... The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a risk of spoofing attacks.To improve the anti-spoofing capability of the SBAS,European Union and the United States conduct research on navigation message authentication,and promote the standardization of SBAS message authentication.For the development of Beidou satellite-based augmentation system(BDSBAS),this paper proposes navigation message authentication based on the Chinese commercial cryptographic standards.Firstly,this paper expounds the architecture and principles of the SBAS message authentication,and then carries out the design of timed efficient streaming losstolerant authentication scheme(TESLA)and elliptic curve digital signature algorithm(ECDSA)authentication schemes based on Chinese commercial cryptographic standards,message arrangement and the design of over-the-air rekeying(OTAR)message.Finally,this paper conducts a theoretical analysis of the time between authentications(TBA)and maximum authentication latency(MAL)for L5 TESLA-I and L5 ECDSA-Q,and further simulates the reception time of OTAR message,TBA and MAL from the aspects of OTAR message weight and demodulation error rate.The simulation results can provide theoretical supports for the standardization of BDSBAS message authentication. 展开更多
关键词 Beidou satellite-based augmentation system ECDSA message authentication satellite navigation TESLA
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
4
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 authentICATION key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
IOTA-Based Authentication for IoT Devices in Satellite Networks
5
作者 D.Bernal O.Ledesma +1 位作者 P.Lamo J.Bermejo 《Computers, Materials & Continua》 2026年第1期1885-1923,共39页
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi... This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks. 展开更多
关键词 Satellite IoT decentralized authentication directed acyclic graph IOTA identity verifiable credentials
在线阅读 下载PDF
EARAS:An Efficient,Anonymous,and Robust Authentication Scheme for Smart Homes
6
作者 Muntaham Inaam Hashmi Muhammad Ayaz Khan +3 位作者 Khwaja Mansoor ul Hassan Suliman A.Alsuhibany Ainur Abduvalova Asfandyar Khan 《Computers, Materials & Continua》 2026年第3期780-797,共18页
Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share ... Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy. 展开更多
关键词 Smart home user authentication gateway node security IoT security privacy and security
在线阅读 下载PDF
回望“真实性”(authenticity)(上)——一个旅游研究的热点 被引量:80
7
作者 赵红梅 李庆雷 《旅游学刊》 CSSCI 2012年第4期11-20,共10页
麦坎内尔(MacCannell)掀起的"真实性"研究热已逾30年,其间,研究视角逐渐从"客观"转向"主观"。这既反映出真实性内涵的延展与变迁,亦凸显旅游主体—游客体验的重要性。然而,就研究者日渐褊狭的视域来看,... 麦坎内尔(MacCannell)掀起的"真实性"研究热已逾30年,其间,研究视角逐渐从"客观"转向"主观"。这既反映出真实性内涵的延展与变迁,亦凸显旅游主体—游客体验的重要性。然而,就研究者日渐褊狭的视域来看,旅游客体真实性对旅游体验真实性的影响从松散到几近断裂,旅游主体甚至以"悦纳万物"的信仰姿态视一切"存在"为真,从而收获真实的体验。客观真实与主观真实,究竟是谁决定或影响了谁?对此问题的探寻导致学界对旅游客体之"虚假"的重新界定和对旅游体验之"真实"的再度好奇,并因此形成旅游真实性研究的纷争局面。有鉴于此,对国内外真实性研究做一番缘起、视角、界定等方面的梳理和反思,或将对国内相关研究与应用有所裨益。 展开更多
关键词 真实性 旅游研究 价值
在线阅读 下载PDF
回望“真实性”(authenticity)(下)——一个旅游研究的热点 被引量:28
8
作者 赵红梅 董培海 《旅游学刊》 CSSCI 2012年第5期13-22,共10页
麦坎内尔掀起的"真实性"研究热已逾30年,其间,研究视角逐渐从"客观"转向"主观",这既反映出真实性内涵的延展与变迁,亦凸显旅游主体—游客体验的重要性。然而,就研究者日渐褊狭的视域来看,旅游客体真实性... 麦坎内尔掀起的"真实性"研究热已逾30年,其间,研究视角逐渐从"客观"转向"主观",这既反映出真实性内涵的延展与变迁,亦凸显旅游主体—游客体验的重要性。然而,就研究者日渐褊狭的视域来看,旅游客体真实性对旅游体验真实性的影响从松散到几近断裂,旅游主体甚至以"悦纳万物"的信仰姿态视一切"存在"为真,从而收获真实的体验。客观真实与主观真实,究竟是谁决定或影响了谁?对此问题的探寻导致学界对旅游客体之"虚假"的重新界定和对旅游体验之"真实"的再度好奇,并因此形成旅游真实性研究的纷争局面。有鉴于此,对国外真实性研究做一番缘起、视角、界定等方面的梳理和反思,或将对国内相关研究与应用有所裨益。 展开更多
关键词 真实性 旅游研究 价值
在线阅读 下载PDF
Optimization of SSR Reaction System for Identifying the Authenticity of Maize Hybrids 被引量:6
9
作者 岳静 朱志成 《Agricultural Science & Technology》 CAS 2011年第1期85-87,92,共4页
[Objective]The aim was to optimize SSR reaction system applied in the identification of authenticity of maize variety.[Method]The technical parameters of SSR including PCR reaction system,annealing temperature and ele... [Objective]The aim was to optimize SSR reaction system applied in the identification of authenticity of maize variety.[Method]The technical parameters of SSR including PCR reaction system,annealing temperature and electrophoresis time were optimized to identify 10 major maize varieties in Liaoning Province.[Result]The optimum PCR reaction system was:14.60 μl sterile ultrapure water,2.00 μl 10 × Buffer(Mg2+),1.20 μl dNTPs,0.20 μl Taq enzyme,0.50 μl each of the forward and reverse primers and1.00 μl DNA stock solution.Annealing temperature and electrophoresis time could greatly influence the results of PCR amplification.The optimal annealing temperature and electrophoresis time required for the ideal electrophoresis bands under the same conditions were different when different primers were used.[Conclusion]The system was feasible to be applied in rapid identification of authenticity of hybrid maize varieties. 展开更多
关键词 Maize(Zea mays L.) Simple sequence repeat Marker authenticity OPTIMIZATION
在线阅读 下载PDF
Empirical Research on Tourism Authenticity of Ancient Cultural City——A Case Study of Lijiang Ancient City in China
10
作者 王秀红 《Journal of Landscape Research》 2011年第8期74-76,85,共4页
On the basis of tourism authenticity theory and field investigation and analysis of Lijiang ancient city, the paper had explored tourists' tourism authenticity, and further revealed the inner relation between tour... On the basis of tourism authenticity theory and field investigation and analysis of Lijiang ancient city, the paper had explored tourists' tourism authenticity, and further revealed the inner relation between tourism authenticity and tourism motivation of ancient cultural cities. It was found that ancient cultural cities generally had the highest objective authenticity, followed by existential, constructive and post-modern authenticity. As for tourism motivation, motivation of knowledge function, of reward maximization, of punishment minimization, of self-esteem and of self-fulfillment presented to diminish progressively. Relationships between four types of tourism authenticity and five types of tourism motivations also varied from each other. It had enriched empirical quantitative research results of domestic tourism authenticity in theory, and provided application value for the research on realistic tourism market and planning activity based on tourists in practice. 展开更多
关键词 Lijiang ANCIENT city CULTURAL TOURISM MOTIVATION authenticity Empirical research
在线阅读 下载PDF
On Authenticity of IELTS Listening Module and Enlightenment on CET
11
作者 王婉华 《英语广场(学术研究)》 2012年第6期47-49,共3页
As to language testing researches,authenticity has always been the main concern.Based on the theories and previous researches of authenticity in language testing,this article studies the authenticity of listening modu... As to language testing researches,authenticity has always been the main concern.Based on the theories and previous researches of authenticity in language testing,this article studies the authenticity of listening module of IELTS from three perspectives-testing materials,testing tasks and testing situations.It is indicated that the materials in IELTS listening module cover a wide range of academic life,employing different English accents and natural pauses and hesitation;the testing tasks are authentic to satisfy test-takers' need in the future;the testing situations are close to the real life.From the implication of IELTS,some suggestions are put forward for CET from those three aspects mentioned. 展开更多
关键词 listening module IELTS CET authenticity
在线阅读 下载PDF
Authenticity in English Language Teaching
12
作者 程彩兰 叶慧 《黄冈职业技术学院学报》 2002年第3期95-97,共3页
Based on an analysis of the deficiency of the traditional ELT in authenticity, this paper puts forward some sug-gestions about how to make our ELT classroom more authentic.
关键词 authenticity ELT(English language teaching)
在线阅读 下载PDF
Application of Authenticity Theory on the Design of Listening Tests
13
作者 钟伟轩 《海外英语》 2011年第9X期199-199,201,共2页
The methods for designing listening comprehension tests appeared in recent years will be also reviewed.For each kind of testing method,no matter what its scale and how its importance,can influence teaching and learnin... The methods for designing listening comprehension tests appeared in recent years will be also reviewed.For each kind of testing method,no matter what its scale and how its importance,can influence teaching and learning in varied range.Therefore,to discuss how to use the principle of authenticity to improve and ensure the reliability and validity of test can create a positive effect on teaching and learning. 展开更多
关键词 TESTING THEORY LISTENING TEST authenticity
在线阅读 下载PDF
Authenticity Protection of Agricultural Landscapes in Rural Tourism Development 被引量:2
14
作者 SU Qiaolan 《Journal of Landscape Research》 2019年第3期59-62,66,共5页
With the rapid development of the economy, people’s living standards have been improved constantly. As people’s material life has been gradually improved, people pay more attention to the pursuit of high-quality spi... With the rapid development of the economy, people’s living standards have been improved constantly. As people’s material life has been gradually improved, people pay more attention to the pursuit of high-quality spiritual life, and the flourishing development of rural tourism just meets people’s pursuit about returning to nature that is far away from the hustle and bustle of the city, and about experiencing funny and quiet life in the countryside. The development of rural tourism relies on agricultural landscape resources, and the correct understanding and protection of the original value of agricultural landscape resources can effectively ensure the sustainable use of agricultural landscape resources. If land for agricultural landscape resource is occupied for developing blindly without reasonable planning and construction, it will lead to the distortion of the authentic value of agricultural landscape, which in turn affects the sustainable development of rural tourism. 展开更多
关键词 RURAL TOURISM AGRICULTURAL LANDSCAPE authenticity PROTECTION
在线阅读 下载PDF
Feasibility Study for Applying Spectral Imaging for Wheat Grain Authenticity Testing in Pasta 被引量:4
15
作者 Timothy Wilkes Gavin Nixon +3 位作者 Claire Bushell Adrian Waltho Amer Alroichdi Malcolm Burns 《Food and Nutrition Sciences》 2016年第5期355-361,共7页
Authentication of pasta is currently determined using molecular biology-based techniques focusing on DNA as the target analyte. Whilst proven to be effective, these approaches can be criticised as being destructive, t... Authentication of pasta is currently determined using molecular biology-based techniques focusing on DNA as the target analyte. Whilst proven to be effective, these approaches can be criticised as being destructive, time consuming, and requiring specialist instrument training. Advances in the field of multispectral imaging (MSI) and hyperspectral imaging (HSI) have facilitated the development of compact imaging platforms with the capability to rapidly differentiate a range of materials (inclusive of grains and seeds) based on surface colour, texture and chemical composition. This preliminary investigation evaluated the applicability of spectral imaging for identification and quantitation of durum wheat grain samples in relation to pasta authenticity. MSI and HSI were capable of rapidly distinguishing between durum wheat and adulterant common wheat cultivars and assigning percentage adulteration levels characterised by low biases and good repeatability estimates. The results demonstrated the potential for spectral imaging based seed/grain adulteration testing to augment existing standard molecular approaches for food authenticity testing. 展开更多
关键词 Spectral Imaging Multispectral Imaging Hyperspectral Imaging Durum Wheat authentication Rapid Non-Destructive Testing Food Adulteration
在线阅读 下载PDF
Methods for Controlling the Authenticity of Textual Information Transfer on the Basis of Statistical and Structural Redundancy 被引量:1
16
作者 Akmal R.Akhatov 《International Journal of Automation and computing》 EI 2012年第5期518-529,共12页
In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy ... In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization. 展开更多
关键词 authenticity data transfer text element structural and statistical redundancy probability of non-detected mistakes
原文传递
Distance decay of place attachment and perceived authenticity of mountain tourism destinations in China 被引量:3
17
作者 XIAO Xiao ZHANG Jie +4 位作者 LU Jun-yu LI Li XU Yan-qing ZHANG Hong-lei Geoffrey KRIUNGU 《Journal of Mountain Science》 SCIE CSCD 2021年第1期194-204,共11页
Place attachment has been a research focus in the fields of park and recreation management.Place attachment plays an important role in promoting sustainable development of parks and mountain tourism destination,howeve... Place attachment has been a research focus in the fields of park and recreation management.Place attachment plays an important role in promoting sustainable development of parks and mountain tourism destination,however,there are limited studies that identified the spatial patterns of place attachment,especially in the context of mountain tourism destinations in China.Also,the geospatial spectrum of visitors is usually broad,examining the multivariate relationships among spatial proximity,perceived authenticity,and place attachment are essential for mountain tourism destinations to promote destination image and strengthen emotional bonding with targeted visitor groups.In this study,we selected an iconic and highly visited park,Jiuzhai Valley National Park in China,as our study site and conducted an on-site visitor survey to collect 557 samples.Study uses factor analysis and the structure equation model to analyze the relationship among spatial proximity,perceived authenticity,and place attachment.Results validate the two-dimension structure of place attachment and perceived authenticity.Study findings suggest that spatial proximity has significant impacts on existential authenticity and place identity,but has no significant impacts on place dependence.Perceived authenticity has a positive impact on place attachment.Study results advance the theories of place attachment and provide effective strategies to enhance emotional attachment between visitors and mountain tourism destinations. 展开更多
关键词 Place attachment Perceived authenticity Spatial proximity Mountain tourism destination National park Visitor experience
原文传递
Geographical authenticity evaluation of Mentha haplocalyx by LIBS coupled with multivariate analyzes 被引量:4
18
作者 Xiaona LIU Xiaoqing CHE +4 位作者 Kunyu LI Xibo WANG Zhaozhou LIN Zhisheng WU Qiusheng ZHENG 《Plasma Science and Technology》 SCIE EI CAS CSCD 2020年第7期44-50,共7页
Mentha haplocalyx(mint)is a significant traditional Chinese medicine(TCM)listed in the Catalogue of’Medicinal and Food Homology’,therefore,its geographical origins(GOs)are critical to the medicinal and food value.La... Mentha haplocalyx(mint)is a significant traditional Chinese medicine(TCM)listed in the Catalogue of’Medicinal and Food Homology’,therefore,its geographical origins(GOs)are critical to the medicinal and food value.Laser-induced breakdown spectroscopy(LIBS)is an advanced analytical technique for GOs certification,due to the fast multi-elemental analysis requiring minimal sample pretreatment.In this study,LIBS data of sampled mint from five GOs were investigated by LIBS coupled with multivariate statistical analyzes.The spectral data was analyzed by two chemometric algorithms,i.e.principal component analysis(PCA)and least squares support vector machines(LS-SVM).Specifically,the performance of LS-SVM with least kernel and radial basis function(RBF)kernel was explored in sensitivity and robustness tests.Both LS-SVM algorithms exhibited excellent performance of classification in sensitive test and good performance(a little inferior)in robustness test.Generally,LS-SVM with linear kernel equally outperformed LS-SVM based on RBF kernel.The result indicated the potential for future applications in herbs and food,especially for in situ GOs applications of TCM authenticity rapidly. 展开更多
关键词 laser-induced breakdown spectroscopy Mentha haplocalyx geographical origin least squares support vector machines herb authenticity
暂未订购
本真性(Authenticity) 被引量:41
19
作者 瑞吉娜.本迪克丝 李扬 《民间文化论坛》 2006年第4期102-103,共2页
关键词 本真性 authenticity 伪民俗 民间叙事 卡勒瓦拉 艺术品市场 手工制品 克丝 民俗研究
在线阅读 下载PDF
Authenticity in business English assessment
20
作者 薄慧民 《Sino-US English Teaching》 2008年第1期40-44,共5页
Authenticity is an important issue in language testing. Business English (BE) assessment should focus more on authenticity in order to reflect the characteristics and changing teaching methods of BE. This paper expl... Authenticity is an important issue in language testing. Business English (BE) assessment should focus more on authenticity in order to reflect the characteristics and changing teaching methods of BE. This paper explores the idea of authenticity and uses real examples to show how to set criteria, and how to design authentic tasks to achieve authentic BE assessment. 展开更多
关键词 authenticity Business English ASSESSMENT TASKS
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部