首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 187 毫秒
1.
In this paper, four recent advances and achievements of China in agricultural insect research, namely, on the genome of silkworm (Bombyx mori Linnaeus), on the geographical differentiation and regional migration of cotton bollworm (Helicoverpa armigera (Hübner)), on the standardized monitoring techniques for safety of honey bee (Apis mellifera Linnaeus) products, and on the virus transmission property of small brown planthopper (Laodelphax striatellus (Fallén)) as well as the interactions between vector and rice stripe virus (RSV), were reported. All of these researches are very important for controlling agricultural insect pests and the diseases they transmit, accelerating the molecular biological research of silkworm, and promoting the international trade of honey bee products. Most of these achievements mentioned above have got the national, provincial, ministerial or municipal awards on science and technology.  相似文献   

2.
信任链发现是信任管理的主要内容.由于在分布式环境中凭证分布于各个节点,并且对于相同或相似的请求现有的信任链发现算法需要大量重复的通信和计算开销进行凭证的搜集和验证,极大地影响了信任关系验证的效率.在分布式信任链发现算法的基础上,结合网络中的信任关系相对稳定的特点,基于缓存的原理实现了一个可扩展的层次式monitor机制用于保存信任链发现过程中产生的中间结果,并且采用订阅机制保证其有效性,从而有效避免对相似的信任关系验证而产生的重复通信和计算开销.实验表明,采用该机制的分布式信任链发现算法在信任关系相对稳定的情形下具有较高的效率.  相似文献   

3.
The economic importance of silkworm has moved biologists to explore various intricate mechanisms of the action of vertebrate hormones. The dietary administration of several vertebrate hormones and prostaglandins enhanced both developmental and metabolic processes of silkworm, Bombyx mori L. The main objective of sericulture research is to apply the results to achieve superior quality silk and greater output, to apply lab findings to achieve desirable ecenomic results.  相似文献   

4.
In nature, metal ions play a vital role in the function of protein and nucleic acid. It has been demonstrated that there are many kinds of metal ions in the gland of Bombyx mori (B. mori) silkworm, and their contents are different in different parts of silk gland[1]. These ions may promote the transition of gel to sol in the gland of silkworm when the silk fibroin (SF) goes forward to the spinneret. Many investigations have shown that K(I) and Ca(II) can induce the conformational transitio…  相似文献   

5.
Much attention has been paid to the natural mechanism of silkworm spinning due to the impressive mechanical properties of the natural fibers. In this work, we studied the effect of Cu(Ⅱ) ions on the secondary structure of Bombyx mori regenerated silk fibroin (SF) in dilute solution by circular dichroism (CD). The results indicate that a given amount of Cu(Ⅱ) induces the SF conformational transition from random coil to β-sheet, however, further addition of Cu(Ⅱ) is unfavorable for this conversion. Meanwhile, the conformational changes induced by Cu(Ⅱ) follow a nucleation-dependent aggregation mechanism, which is similar to that found in Prion protein (PrP) denaturation and Aβ-peptide aggregations, leading to the neurodegenerative disease. This work would help one understand further the natural spinning process of silkworm. Additionally, it would be significant for the study of the nervous system diseases, because silk fibroin, extracted in large amounts from Bombyx mori silkworm gland, could be a proper model to study PrP denaturation and Aβ-peptide aggregations.  相似文献   

6.
The long-arm and short-arm genes of fibroin light chain (L-chain) of silkworm, Bombyx Mori L., and the gene of human acidic fibroblast growth factor were cloned respectively and subsequently inserted into a transfer vector pVL 1392 used as a tool to target the L-chain region of the silkworm genome. Genomic DNA from their offsprings was extracted and the expected targeting was detected using polymerase chain reaction and DNA sequencing, as well as protein analysis. The results showed that positive events occurred and that the FGF gene was integrated into the L-chain locus through homologous recombination.  相似文献   

7.
VIEWS & NEWS311 Late Cenozoic tectonic deformation in the Tianshan Mountain and its foreland basins ZHANG Peizhen751 Position of South China in configuration of Neoproterozoic upercontinent ZHENG Yongfei983 Anarthropod sphinx XIAO ShuhaiPROGRESS647 The milestone of membrane protein research: Nobel Prize in Chemistry for 2003 ZHAO Wenlong & SUI Senfang754 Vertebrate radiations of the Jehol Biota and their environ- mental background ZHOU ZhongheREVIEWS 1 Liquid fragili…  相似文献   

8.
The intact open reading frame (ORF) of foot-and-mouth disease virus (FMDV) Asia I/XJ strain was am- plified by RT-PCR and inserted into the transfer vector pVL1393 to generate plasmid pVL-ORF. Bm-N cells were transfected with pVL-ORF and linearized Bm-BacPAK6 DNA, and the recombinant silkworm baculovirus Bm-ORF containing the full ORF of FMDV was obtained. The results of indirect im- munofluorescence assay (IFA) showed that Bm-ORF could be expressed efficiently in Bm-N cell. After inoculating the early 5th instar larvae of silkworm, the polyprotein of FMDV could be detected by sandwich ELISA and empty capsid-like particles could be observed under the electron microscope. Expression products from silkworm were used as the antigen to immunize the cattle. The specific an- tibody was induced in all vaccinated animals. The immunized cattle were challenged with the virulent FMDV Asia I/XJ strain, two of the four cattle were completely protected and clinical symptoms were alleviated and delayed in the others. The results suggest that this strategy might be used to develop the new subunit FMDV vaccine.  相似文献   

9.
10.
提出采用二型模糊逻辑系统来建立信任评价机制.二型模糊集合是三维的,它是一型模糊集合的扩展,引入了新的一维数据来表示成员关系的级别,为描述和处理信任的不确定性提供了更大的灵活性.建立了基于二型模糊逻辑的信任评估控制规则,实现信任评价奖惩机制,从而建立了自适应的信任评价体系.  相似文献   

11.
不完全信息的自动信任协商中存在如披露最少证书获得对方最大信任、协商效率等优化问题.利用博弈分析信任协商过程中的协商方的收益,给出权衡资源比重方法,量化了信任协商的计算过程,提出基于动态阈值的信任协商建立方法.动态阈值具有随证书披露与信息完整而进行自主变化的能力,可以减少协商过程的隐私披露.样例分析和仿真试验表明:使用动态阈值方法可以限制证书披露的数量,提高不完全信息下信任建立的效率.  相似文献   

12.
本文分析了传统访问控制模型的缺陷,提出基于信任管理系统的分布式访问控制机制,论述了信任管理系统的概念,讨论了用证书来解决分布式环境下的访问控制,并给出了访问控制策略的管理方法。  相似文献   

13.
资源限制信任协商   总被引:6,自引:2,他引:4  
提出了资源限制信任协商方法.陌生的双方在建立信任关系时,仅仅交换一次信任书,随后多次交换对称密钥,直到协商完成或者失败.在资源限制信任协商过程中,用Hash函数验证信任书中的属性,用对称密码保护敏感属性.敏感属性是在自己的控制下逐步显示给对方的.资源限制信任协商避免了传统信任协商中双方多次交换信任书,以及多次验证信任书和策略的一致性检验所带来的大量公钥密码操作负担.同时也避免了传统信任协商中双方必须存储多个信任书的问题.因此资源限制信任协商比较适合在计算能力有限的移动设备之间建立信任关系.由于双方交互的信任书是保密的,因此资源限制信任协商能防止传统信任协商存在的中间人攻击问题.  相似文献   

14.
一种可扩展的反馈信任信息聚合算法   总被引:1,自引:0,他引:1  
针对现有的动态信任聚合算法中利用基于信任链的广播方式进行反馈信任信息搜索而导致的系统运算收敛慢、可扩展性差等问题,建立了直接信任树(DTT)的概念,并基于DTT提出了一种新的可扩展的反馈信任信息聚合算法.根据节点之间的直接信任关系构建DTT,然后利用DTT进行反馈信任信息搜索,同时引入质量因子和距离因子两个参数来自动调节聚合计算的规模.仿真实验表明,算法能够显著提高反馈信任信息聚合计算的收敛性,具有较好的恶意反馈行为检测能力,在恶意节点比率增大时,算法也表现出较强的稳健性.  相似文献   

15.
Until now, there are numerous protocols that can achieve privacy-preserving trust negotiation between two parties involved, but there is no effective privacy-preserving trust negotiation schemes proposed between multi-users. In this paper, a privacy-preserving trust negotiation scheme with multi-parties is proposed, which can protect their credentials and access control policies during the procedure for establishing the trust between multi-strangers, and its privacy-preserving ability also is proved. These works extend the trust negotiation mechanism to multi-users, which can be thought as a substantial extension of the state-of-the-art in privacy-preserving trust negotiations between two parties involved.  相似文献   

16.
网格环境中的信任问题是当前网格研究的一个热点问题,为了解决网格环境的动态性和不确定性带来的安全问题,本文提出了一种新的信任模型来处理网格环境中实体之间的信任关系,该模型对域内信任关系和域间信任关系分别采取不同的方法进行处理。实验和分析结果表明,与以往的信任模型相比,这种信任模型能更加精确地评估实体之间的信任关系,从而能更加有效地解决网格环境中存在的安全问题。  相似文献   

17.
基于通信历史相关性的P2P网络分布式信任模型   总被引:1,自引:0,他引:1  
提出了一种新的P2P分布式信任模型NBRTrust.在节点通信历史分布式存储基础上构造了节点局部信任度评价分布式存储网-βlist,通过分布式计算节点信任评价行为的相关度,得到以节点相关度为因子的全局信任模型NBRTrust,用于评估节点的可信程度;定义了模型的数学表述和分布式计算方法,设计了基于NBRTrust信任模型的P2P通信模型.仿真分析表明,相比纯粹的局部信任模型和全局信任模型,NBRTrust信任模型更客观,能够有效抵御单个恶意节点和团队恶意节点的欺骗行为,是一种有效的信任模型.  相似文献   

18.
如何有效地发现网格的计算资源和存储资源是影响网格性能的重要因素,已有的资源查找方法难以适应网格规格.利用网格结点之间存在的信任关系构建资源信任网络,并给出了信任网络构建的原理和方法.将主动发现和被动发现相结合,应用小世界原理,获得了优化的时间复杂度,发送了网格资源发现性能.分析表明,该模型在网格环境中具有良好的效果,是一种可靠、安全的方法.  相似文献   

19.
在网络安全领域,可信被定义为一个实体期望另外一个实体执行某个特定动作的可能性大小。为了加强网络的安全性,允许某个结点去评估其他结点的可信性是非常重要的。本文主要讨论的是对可信事件的推荐评估。首先介绍了可信的相关概念和特性;接着,网络被抽象成一个有向图,在该图中,顶点代表实体或用户,边被看成可信关系,这样,评估过程可以看成是在有向图当中寻找最短路径问题,通过对影响推荐信任的因素分析,得到间接信任计算公式,为每个结点建立一个二叉推荐树,用来存储该结点能够推荐的结点以及这些结点推荐信任值,并在每个周期后动态地调整和整理该二叉推荐树;最后,对该模型的有效性进行了分析。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号