期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于Ti_(3)C_(2)T_(X)纳米片的高柔性导电棉织物的制备与表征 被引量:6
1
作者 张露 包丽 +4 位作者 赵兵 祁宁 黄小萃 柴文波 黄紫娟 《印染》 CAS 北大核心 2022年第5期11-15,共5页
将5 mg/mL Ti_(3)C_(2)T_(X)纳米片通过反复浸涂的方法整理到聚乙烯亚胺(PEI)改性棉织物的表面,制备了一种高柔性导电P-MXene棉织物。研究表明,Ti_(3)C_(2)T_(X)纳米片在棉织物表面均匀成膜,Ti、F、Cl三种元素被成功引入棉织物的表面。P... 将5 mg/mL Ti_(3)C_(2)T_(X)纳米片通过反复浸涂的方法整理到聚乙烯亚胺(PEI)改性棉织物的表面,制备了一种高柔性导电P-MXene棉织物。研究表明,Ti_(3)C_(2)T_(X)纳米片在棉织物表面均匀成膜,Ti、F、Cl三种元素被成功引入棉织物的表面。P-MXene棉织物经历1 000次的大角度弯折和180 min超声波处理,方阻变化不大,具有优异的柔性和耐超声水洗性能。 展开更多
关键词 导电整理 聚乙烯亚胺 MXene 柔性 棉织物
下载PDF
Treatment of Chinese Traditional Medicine Wastewater by Photosynthetic Bacteria
2
作者 WANGYou-zhi WANGFeng-jun baoli 《Journal of Northeast Agricultural University(English Edition)》 CAS 2005年第1期37-41,共5页
The influence factors treating wastewater of Chinese traditional medicine extraction by photosynthetic bacteria are tested and discussed. The results indicate that the method of photosynthetic bacteria can eliminate C... The influence factors treating wastewater of Chinese traditional medicine extraction by photosynthetic bacteria are tested and discussed. The results indicate that the method of photosynthetic bacteria can eliminate COD and BOD from wastewater in high efficiency. And it also has high load shock resistance. On the conditions of slight aerobic and semi-darkness, treating wastewater of Chinese traditional medicine extraction, the method has better efficiency to eliminate COD and BOD from the wastewater than those by anaerobic illumination and aerobic darkness treatments. After pretreatment of hydrolytic acidization, the removal rate of COD in the wastewater reached more than 85 %, and that rate of BOD reached more than 90% in the treating system of photosynthetic bacteria. It may be more feasible and advantageous than traditional anaerobic biological process to treat organic wastewater using PSB system. 展开更多
关键词 photosynthetic bacteria wastewater of Chinese traditional medicine extraction
下载PDF
Distributed Oblivious Function Evaluation and Its Applications 被引量:2
3
作者 Hong-DaLi XiongYang +1 位作者 Deng-GuoFeng baoli 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期942-947,共6页
This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a functionf(x), and the other party (Bob) with an input α wants to learnf(α) in an oblivious way with the h... This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a functionf(x), and the other party (Bob) with an input α wants to learnf(α) in an oblivious way with the help of a set of servers. What Alice should do is to share her secret functionf(x) among the servers. Bob obtains what he should get by interacting with the servers. This paper proposes the model and security requirements for DOFE and analyzes three distributed oblivious polynomial evaluation protocols presented in the paper. Keywords oblivious function evaluation - oblivious polynomial evaluation - secure multiparty computation - distributed - information security The research is supported by the National Basic Research 973 Program of China under Grant No. 1999035802 and the National Natural Science Foundation of China under Grant No.60273029.Hong-Da Li was born in 1960. He received the Ph.D. degree from Northwestern Polytechnical University in 2001. His current research interests are cryptology and cryptographic protocol.Xiong Yang received the B.S. degree in mathematics from Yan'an University, China, in 1984. He is an associate professor in College of Economy and Trade at South China University of Tropical Agriculture. His research interest is information security.Deng-Guo Feng was born in 1963. He is now a Ph.D. supervisor. His research interests focus on information security.Bao Li was born in 1965. He received the Ph.D. degree in cryptography in 1995 from Xidian University. His research interests include cryptographic protocols and public key cryptosystems. 展开更多
关键词 oblivious function evaluation oblivious polynomial evaluation secure multiparty computation DISTRIBUTED information security
原文传递
分布式不经意函数求值及其应用
4
作者 Hong-DaLi XiongYang +1 位作者 Deng-GuoFeng baoli 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期107-107,共1页
双方的不经意函数求值(OFE,Oblivious Function Evaluation)是多方安全计算的一种特殊情况:两个参与方,Alice和Bob,分别拥有函数f(x)和数α,他们想以不经意的方式计算f(α),使Bob在不泄露α的情况下得到函数值f(α),而且除f(α)... 双方的不经意函数求值(OFE,Oblivious Function Evaluation)是多方安全计算的一种特殊情况:两个参与方,Alice和Bob,分别拥有函数f(x)和数α,他们想以不经意的方式计算f(α),使Bob在不泄露α的情况下得到函数值f(α),而且除f(α)外,他没有得到关于f(α)的其他信息。 展开更多
关键词 不经意函数求值 分布式 信息论 多方安全计算
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部