×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [16]
兰州大学 [13]
武汉大学 [12]
复旦大学上海医学院 [10]
西安交通大学 [9]
江苏大学 [9]
更多...
内容类型
期刊论文 [201]
会议论文 [12]
其他 [2]
会议 [1]
发表日期
2021 [7]
2020 [4]
2019 [21]
2018 [27]
2017 [18]
2016 [42]
更多...
学科主题
半导体材料 [3]
Engineerin... [2]
Materials ... [2]
Biophysics [1]
Chemistry,... [1]
Environmen... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共216条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
An improved method of assessing marine utilization impact to describe the man-land relationship for coastal management: a case study of the Laizhou Bay, China
期刊论文
ENVIRONMENTAL SCIENCE AND POLLUTION RESEARCH, 2022, 页码: 13
作者:
Liu, Baijing
;
Wu, Xiaoqing
;
Liu, Xin
;
Gong, Meng
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/07/26
Economic sector
Marine utilization
Impact
Linkage framework
Ecosystem
Laizhou Bay
Gender-Related Beliefs, Norms, and the Link With Green Consumption
期刊论文
FRONTIERS IN PSYCHOLOGY, 2021, 卷号: 12, 页码: 13
作者:
Zhao, Ziyue
;
Gong, Yuanchao
;
Li, Yang
;
Zhang, Linxiu
;
Sun, Yan
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/01/21
green consumption
gender difference
value behavior norm
environment
sustainable
pro-environmental behavior
Informal learning in nature education promotes ecological conservation behaviors of nature reserve employees-A preliminary study in China
期刊论文
GLOBAL ECOLOGY AND CONSERVATION, 2021, 卷号: 31, 页码: 10
作者:
Gong, Yuanchao
;
Li, Yang
;
Zhang, Linxiu
;
Sun, Yan
收藏
  |  
浏览/下载:68/0
  |  
提交时间:2021/11/12
Informal learning
Nature reserve employees
Ecological conservation behaviors
Environmental competence
Self-efficacy
Penetration of n = 2 resonant magnetic field perturbations in EAST
期刊论文
NUCLEAR FUSION, 2021, 卷号: 61
作者:
Ren, Jie
;
Sun, You-Wen
;
Wang, Hui-Hui
;
Gu, Shuai
;
Qian, Jin-Ping
收藏
  |  
浏览/下载:109/0
  |  
提交时间:2021/05/31
tokamak
field penetration
intrinsic error field
phasing scan
mode coupling
Penetration of n? =? 2 resonant magnetic field perturbations in EAST
期刊论文
Nuclear Fusion, 2021, 卷号: 61
作者:
Ren,Jie
;
Sun,You-Wen
;
Wang,Hui-Hui
;
Gu,Shuai
;
Qian,Jin-Ping
收藏
  |  
浏览/下载:77/0
  |  
提交时间:2021/05/24
tokamak
field penetration
intrinsic error field
phasing scan
mode coupling
Architecture of the mycobacterial succinate dehydrogenase with a membrane-embedded Rieske FeS cluster
期刊论文
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2021, 卷号: 118
作者:
Zhou, Xiaoting
;
Gao, Yan
;
Wang, Weiwei
;
Yang, Xiaolin
;
Yang, Xiuna
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2021/06/15
succinate dehydrogenase
Mycobacterium smegmatis
electron transport chain
cryoelectron microscopy
Development of a nanobody-based immunoassay for the sensitive detection of fibrinogen-like protein 1
期刊论文
ACTA PHARMACOLOGICA SINICA, 2021, 页码: 9
作者:
Zhang, Wan-ting
;
Liu, Ting-ting
;
Wu, Man
;
Chen, Xiao-chen
;
Han, Li
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2021/05/24
nanobody
FGL1
cancer immunology
diagnosis
immune checkpoint
Guidelines for the use and interpretation of assays for monitoring autophagy (4th edition)
期刊论文
AUTOPHAGY, 2021, 卷号: 17
作者:
Klionsky, Daniel J.
;
Abdel-Aziz, Amal Kamal
;
Abdelfatah, Sara
;
Abdellatif, Mahmoud
;
Abdoli, Asghar
收藏
  |  
浏览/下载:266/0
  |  
提交时间:2021/05/31
Autophagosome
cancer
flux
LC3
lysosome
macroautophagy
neurodegeneration
phagophore
stress
vacuole
Toroidal field and q(95) scalings on error field penetration in EAST
期刊论文
NUCLEAR FUSION, 2020, 卷号: 60
作者:
Wang, Hui-Hui
;
Sun, You-Wen
;
Shi, Tong-Hui
;
Gu, Shuai
;
Liu, Yue-Qiang
收藏
  |  
浏览/下载:93/0
  |  
提交时间:2020/11/30
error field
scaling
toroidal field
q(95)
EAST
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
©版权所有 ©2017 CSpace - Powered by
CSpace