期刊文献+
共找到97篇文章
< 1 2 5 >
每页显示 20 50 100
GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT
1
作者 Wanwei Huang Huicong Yu +3 位作者 Jiawei Ren Kun Wang Yanbu Guo Lifeng Jin 《Computers, Materials & Continua》 2026年第1期2006-2029,共24页
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from... Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%. 展开更多
关键词 Industrial Internet of Things intrusion detection system feature selection whale optimization algorithm Gaussian mutation
在线阅读 下载PDF
A Framework for Systematic Classification of Assets for Security Testing 被引量:2
2
作者 Sadeeq Jan Omer Bin Tauqeer +5 位作者 Fazal Qudus Khan George Tsaramirsis Awais Ahmad Iftikhar Ahmad Imran Maqsood Niamat Ullah 《Computers, Materials & Continua》 SCIE EI 2021年第1期631-645,共15页
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such... Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them. 展开更多
关键词 SECURITY security testing PRIVACY asset classification
在线阅读 下载PDF
A Lightweight Authentication Protocol Scheme for RFID Security
3
作者 WEI Guoheng ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2013年第6期504-510,共7页
Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of exist... Lightweight and safety are two essential features for large-scale application of radio frequency identification (RFID) tags. Based on the analysis of potential safety problem of RFID and the characteristics of existing typical authentication protocol, a new low-cost RFID tags authentication protocol was proposed. The performance of the new protocol was analyzed. The results show that the protocol can resist replay attacks and concurrent attacks and has nontracking, authenticity, and service availability. In addition, the protocol can also reduce the storage of tags and computation burden to meet the application requirements of low-cost tags. 展开更多
关键词 low-cost tags radio frequency identification (RFID) security protocol AUTHENTICATION
原文传递
<i>Inmap-t</i>: Leveraging TTCN-3 to Test the Security Impact of Intra Network Elements
4
作者 Antonino Vitale Marc Dacier 《Journal of Computer and Communications》 2021年第6期174-190,共17页
This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i... This paper rejuvenates the notion of conformance testing in order to assess the security of networks. It leverages the Testing and Test Control Notation Version 3 (TTCN-3) by applying it to a redefined notion of <i>System under Test</i> (<i>SUT</i>). Instead of testing, as it is classically done, a software/firmware/ hardware element, an intangible object, namely the network, is tested in order to infer some of its security properties. After a brief introduction of TTCN-3 and Titan, its compilation and execution environment, a couple of use cases are provided to illustrate the feasibility of the approach. The pros and cons of using TTCN-3 to implement a scalable and flexible network testing environment are discussed. 展开更多
关键词 TTCN-3 Network Security Conformance Testing Deep Packet Inspection FIREWALL
在线阅读 下载PDF
High-Level Security Dimension Evaluation of Blockchain BaaS System and Key Technology
5
作者 Chen Wanfa Zheng Qing’an +2 位作者 Chen Shuzhen Fu Hongyi Chen Liang 《China Communications》 SCIE CSCD 2024年第6期176-191,共16页
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat... In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility. 展开更多
关键词 blockchain security consensus mechanis smart contract
在线阅读 下载PDF
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
6
作者 Yan Dong 《Journal of Computer and Communications》 2024年第3期101-106,共6页
The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, e... The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities. 展开更多
关键词 Intelligent Security System Higher Education Park Open Sharing
在线阅读 下载PDF
Research on SQL Injection Detection Technology Based on Content Matching and Deep Learning
7
作者 Yuqi Chen Guangjun Liang Qun Wang 《Computers, Materials & Continua》 2025年第7期1145-1167,共23页
Structured Query Language(SQL)injection attacks have become the most common means of attacking Web applications due to their simple implementation and high degree of harm.Traditional injection attack detection techniq... Structured Query Language(SQL)injection attacks have become the most common means of attacking Web applications due to their simple implementation and high degree of harm.Traditional injection attack detection techniques struggle to accurately identify various types of SQL injection attacks.This paper presents an enhanced SQL injection detection method that utilizes content matching technology to improve the accuracy and efficiency of detection.Features are extracted through content matching,effectively avoiding the loss of valid information,and an improved deep learning model is employed to enhance the detection effect of SQL injections.Considering that grammar parsing and word embedding may conceal key features and introduce noise,we propose training the transformed data vectors by preprocessing the data in the dataset and post-processing the word segmentation based on content matching.We optimized and adjusted the traditional Convolutional Neural Network(CNN)model,trained normal data,SQL injection data,and XSS data,and used these three deep learning models for attack detection.The experimental results show that the accuracy rate reaches 98.35%,achieving excellent detection results. 展开更多
关键词 SQL injection network security deep learning convolution neural network
在线阅读 下载PDF
Research and Implementation of Trusted Blockchain Core Technology Based on State Secret Algorithm
8
作者 Zheng Qingan Meng Jialin +2 位作者 Wu Junjie Li Jingtao Lin Haonan 《China Communications》 2025年第4期143-160,共18页
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system. 展开更多
关键词 access control authentication Hyperledger Fabric security audit state secret algorithm
在线阅读 下载PDF
一个证实数字签名方案的安全缺陷 被引量:18
9
作者 王贵林 卿斯汉 《软件学报》 EI CSCD 北大核心 2004年第5期752-756,共5页
与普通的数字签名不同,验证者要知道一个证实数字签名的有效性,必须得到一个称为证实者的第三方的合作与帮助.但除了签名者,其他任何人(包括证实者)都不能以签名者的名义产生有效的证实签名.同时,只要参与了验证,证实者就不能欺骗验证者... 与普通的数字签名不同,验证者要知道一个证实数字签名的有效性,必须得到一个称为证实者的第三方的合作与帮助.但除了签名者,其他任何人(包括证实者)都不能以签名者的名义产生有效的证实签名.同时,只要参与了验证,证实者就不能欺骗验证者.进一步地,在必要的时候,证实者还可以将证实签名转化为普通的数字签名,从而使得任何人都可以验证这些签名的有效性.王尚平等学者提出了一个基于DSA和RSA的证实数字签名方案,并认为他们的方案是安全而高效的.与现有的具体方案相比,他们的方案确实是高效的.但是,这一方案存在严重的安全缺陷,从而使得他们的尝试是不成功的. 展开更多
关键词 证实数字签名 不可否认签名 数字签名 信息安全
在线阅读 下载PDF
Hydraulic fracture initiation theory for a horizontal well in a coal seam 被引量:19
10
作者 Hou Bing Chen Mian +2 位作者 Wang Zheng Yuan Jianbo Liu Ming 《Petroleum Science》 SCIE CAS CSCD 2013年第2期219-225,共7页
A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experim... A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experimental results show that the coal seam in the study areas has a relatively low elastic modulus, high Poisson's ratio, high fragility and is easily broken and compressed. The coal seam is considered as a transversely isotropic medium, since the physical properties in the direction of bedding plane and orthogonal to the bedding plane vary markedly. Based on the generalized plane strain model, stress distribution for an arbitrarily orientated wellbore in the coal seam was determined. In a horizontal well, hydraulic fracturing was lbund to initiate in the coal seam mass due to tensile failure, or from cleats due to shear or tensile failure. For those coal seams with abundant natural cleats, hydraulic fracture initiation can be induced by any of these mechanisms. In this study, hydraulic fracture initiation criteria tbr a horizontal well in a coal seam were established. 展开更多
关键词 Hydraulic fracturing coal seam transversely isotropic fracture initiation CLEAT naturalfracture
原文传递
Selenium Supplementation Alleviates Autoimmune Thyroiditis by Regulating Expression of Th1/Th2 Cytokines 被引量:10
11
作者 TAN Long SANG Zhong Na +5 位作者 SHEN Jun WU Yun Tang YAO Zhai Xiao ZHANG Jin Xiang ZHAO Na ZHANG Wan Qi 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2013年第11期920-925,共6页
Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the ... Selenium (Se) is an essential trace element. Autoimmune thyroid diseases (AITD) are destructive inflammatory or anti-receptor autoimmune diseases characterized by reactivity to self-thyroid antigens. However, the effects of Se on the cytokines in AITD are still unclear. So we researched the role of Selenium (Se) and Thl/Th2 cytokine productions in the pathogenesis of autoimmune thyroid diseases (AITD). 展开更多
关键词 TH AITD Selenium Supplementation Alleviates Autoimmune Thyroiditis by Regulating Expression of Th1/Th2 Cytokines TPOAB FIGURE
暂未订购
The transformation of agriculture in China: Looking back and looking forward 被引量:22
12
作者 JIAO Xiao-qiang Nyamdavaa Mongol ZHANG Fu-suo 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2018年第4期755-764,共10页
China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly... China’s grain yield increased from 1 t hain 1961 to 6 t hain 2015, while successfully feeding not only its large population but also supplying agricultural products all over the world. These achievements were greatly supported by modern technology and distinct governmental policy. However, China’s grain production has been causing a number of problems mainly related to declining natural resources and a lack of environmental protection. Due to the growing population and changing dietary requirements, increasing food production must be achieved by increasing resource use efficiency while minimizing environmental costs. We propose two novel development pathways that can potentially sustain agricultural crop production in the next few decades:(i) enhancing nutrient use efficiency with zero increase in chemical fertilizer input until 2020 and(ii) concurrently increasing grain yield and nutrient use efficiency for sustainable intensification with integrated nutrient management after 2020. This paper provides a perspective on further agricultural developments and challenges, and useful knowledge of our valuable experiences for other developing countries. 展开更多
关键词 food security sustainable development AGRICULTURE grain production
在线阅读 下载PDF
Science and Technology Backyard: A novel approach to empower smallholder farmers for sustainable intensification of agriculture in China 被引量:20
13
作者 JIAO Xiao-qiang ZHANG Hong-yan +3 位作者 MA Wen-qi WANG Chong LI Xiao-lin ZHANG Fu-suo 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2019年第8期1657-1666,共10页
Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative tec... Sustainable feeding of the growing population in China without ecological destabilization is a grand challenge. In this populous country where agriculture is dominated by smallholder farming, developing innovative technology and translating scientific knowledge into action for smallholder farmers is a crucial step in addressing this challenge. Here, we present a novel approach for technology innovation and dissemination to achieve sustainable intensification in the fields of smallholder farmers. The Science and Technology Backyard(STB) is a hub in a rural area that links knowledge with practices to promote technology innovation and exchange. In this study, the framework and functions of STB are introduced, and the key implications for sustainable intensification across millions of smallholder farmers are explicitly stated:(i) develop innovative technology based on stated demands of farmers;(ii) disseminate technology by innovative social service models though combined top-down approaches with bottom-up measures to enable smallholders in rural areas. This paper provides a perspective on transformation of small-scale agriculture toward sustainable intensification in China and useful knowledge applicable to other developing countries. 展开更多
关键词 SMALLHOLDER FARMERS SUSTAINABLE INTENSIFICATION TECHNOLOGY innovation TECHNOLOGY transfer Science and TECHNOLOGY BACKYARD
在线阅读 下载PDF
A (2, 3) quantum threshold scheme based on Greenberger-Horne-Zeilinger state 被引量:2
14
作者 李渊 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第10期2875-2879,共5页
In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. T... In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. The proposed scheme involves two phases, i.e. a secret sharing phase and a secret phase. Detailed proofs show that the proposed scheme is of unconditional security. Since the secret is shared among three participants, the proposed scheme may be applied to quantum key distribution and secret sharing. 展开更多
关键词 quantum threshold controlled-not manipulation secret sharing GHZ state
原文传递
Characterization of Quantitative Trait Loci for Grain Minerals in Hexaploid Wheat (Triticum aestivum L.) 被引量:3
15
作者 SHI Rong-li TONG Yi-ping +2 位作者 JING Rui-lian ZHANG Fu-suo ZOU Chun-qin 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2013年第9期1512-1521,共10页
Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait lo... Wheat is an important source of essential minerals for human body. Breeding wheat with high grain mineral concentration thus benefits human health. The objective of present study was to identify quantitative trait loci (QTLs) controlling grain mineral concentration and to evaluate the relation between nitrogen (N) and other essential minerals in winter wheat. Wheat grains were harvested from field experiment which conducted in China and analyzed for this purpose. Forty-three QTLs controlling grain mineral concentration and nitrogen-related traits were detected by using a double haploid (DH) population derived from winter wheat varieties Hanxuan 10 and Lumai 14. Chromosomes 4D and 5A might be very important in controlling mineral status in wheat grains. Significant positive correlations were found between grain nitrogen concentration (GNC) and nutrients Fe, Mn, Cu, Mg concentrations (FeGC, MnGC, CuGC, MgGC). Flag leafN concentration at anthesis (FLNC) significantly and positively correlated with GNC, FeGC, MnGC, and CuGC. The study extended our knowledge on minerals in wheat grains and suggested which interactions between minerals should be considered in future breeding program. 展开更多
关键词 grain minerals nitrogen QTLS winter wheat
在线阅读 下载PDF
Incident Detection Method of Expressway Based on Traffic Flow Simulation Model 被引量:1
16
作者 Shu-Bin Li Tao Sun +1 位作者 Dan-Ni Cao Lin Zhang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2019年第4期468-474,共7页
The expressway traffc incidents have the characteristics of high harmful, strong destructive and refractory.Incident detection can guarantee smooth operation of the expressway, reduce traffc congestion and avoid secon... The expressway traffc incidents have the characteristics of high harmful, strong destructive and refractory.Incident detection can guarantee smooth operation of the expressway, reduce traffc congestion and avoid secondary accident by informing the accident, detection and treatment timely. In this paper, an incident detection method is proposed using the toll station data that takes into account the traffc ratio at the entrances and crossway in the network. The expressway traffc simulation model is improved and a simulation algorithm is established to describe the movement of the vehicles. A numerical example is experimented on the expressway network of Shandong province. The proposed method can effectively detect the expressway incidents, and dynamically estimate the traffc network states so as to provide advice for the highway management department. 展开更多
关键词 EXPRESSWAY traffc flow simulation model incident detection network state estimation
原文传递
An Improved Q-RRT^(*) Algorithm Based on Virtual Light 被引量:2
17
作者 Chengchen Zhuge Qun Wang +1 位作者 Jiayin Liu Lingxiang Yao 《Computer Systems Science & Engineering》 SCIE EI 2021年第10期107-119,共13页
The Rapidly-exploring Random Tree(RRT)algorithm is an efficient path-planning algorithm based on random sampling.The RRT^(*)algorithm is a variant of the RRT algorithm that can achieve convergence to the optimal solut... The Rapidly-exploring Random Tree(RRT)algorithm is an efficient path-planning algorithm based on random sampling.The RRT^(*)algorithm is a variant of the RRT algorithm that can achieve convergence to the optimal solution.However,it has been proven to take an infinite time to do so.An improved Quick-RRT^(*)(Q-RRT^(*))algorithm based on a virtual light source is proposed in this paper to overcome this problem.The virtual light-based Q-RRT^(*)(LQRRT^(*))takes advantage of the heuristic information generated by the virtual light on the map.In this way,the tree can find the initial solution quickly.Next,the LQRRT^(*)algorithm combines the heuristic information with the optimization capability of the Q-RRT^(*)algorithm to find the approximate optimal solution.LQRRT^(*)further optimizes the sampling space compared with the Q-RRT^(*)algorithm and improves the sampling efficiency.The efficiency of the algorithm is verified by comparison experiments in different simulation environments.The results show that the proposed algorithm can converge to the approximate optimal solution in less time and with lower memory consumption. 展开更多
关键词 Path planning RRT^(*) Q-RRT^(*) LQ-RRT^(*) virtual light
在线阅读 下载PDF
Four-Party Quantum Broadcast Scheme Based on Aharonov State 被引量:1
18
作者 LI Yuan ZENG Gui-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第8期371-374,共4页
In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes pro... In this paper,we propose a solution based on four-qubit Aharonov state to an old problem by using the property of congruence.The proposed scheme may realize the broadcast among four participants,therefore,it makes progress to the three-party broadcast realized previously.Using pairwise quantum channels and entangled qubits,the detection between these players also can be accomplished.Finally,the feasibility of the protocol and the analysis of security are illustrated. 展开更多
关键词 broadcast scheme Aharonov state liar detection problem CONGRUENCE
在线阅读 下载PDF
The Simulation of Rumor’S Spreading and Controlling in Micro-Blog Users’ Network 被引量:3
19
作者 Peng Chen Nan Gao 《Journal of Software Engineering and Applications》 2013年第3期102-105,共4页
In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the pr... In this work, a rumor’s spreading and controlling in a directed Micro-blog user network being consisted with 580 000 nodes are simulated. By defining some authority nodes that release anti-rumor information as the prevention strategy, the effect of the nodes’ role in network on rumor’s suppression is studied. The findings show that rumor will be spread out fast and reach a stable level within limited steps. The suppression of rumor is more predominated by the intervening opportunity, the earlier the intervention strategy was implemented, the better the rumor’s controlling could be achieved. The controlling effect is less relevant with the role of the authority nodes in network. 展开更多
关键词 COMPONENT RUMOR Micro-Blog NETWORK SIMULATION
暂未订购
Responses of Aerobic Rice (Oryza sativa L.) to Iron Deficiency 被引量:1
20
作者 SHI Rong-li HAO Hong-mei +3 位作者 FAN Xiao-yun Md Rezaul Karim ZHANG Fu-SUO ZOU Chun-qin 《Journal of Integrative Agriculture》 SCIE CSCD 2012年第6期938-945,共8页
Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the pro... Aerobic rice has the advantage of saving water. Most published work has focused on improving its yield, while few reported on its micronutrient status. In fact, Fe deficiency is a common nutritional problem in the production of aerobic rice. Short- term hydroponic culture experiments were conducted to study the response of aerobic rice to Fe deficiency and the effect of root exudates from Fe-deficient wheat on its Fe uptake ability. The results indicate that the amount of phytosiderophores (PS) released from aerobic rice did not increase under Fe deficient conditions. The Fe(III) reducing capacity of Fe-deficient aerobic rice did not increase and the solution pH did not decrease significantly. What's more, no obvious swelling was observed in the root tips. Aerobic rice did not show special responses to improve their Fe nutrition under Fe deficiency as both strategy I and II plants though they were very sensitive to Fe deficiency. This may be a reason which causes Fe deficiency problem in aerobic rice. However, root exudates from Fe-deficient wheat (PSw) could improve its Fe nutrition in the presence of insoluble Fe(OH)3. This suggests that aerobic rice could utilize Fe activated by PSw. 展开更多
关键词 aerobic rice Fe(III)-reduction iron nutrition phytosiderophore release root tip swelling
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部