The solar wind almost disappeared on May 11, 1999: the solar wind plasma density and dynamic pressure were less than 1cm−3 and 0.1 nPa respectively, while the interplanetary magnetic field was northward. The polar ionospheric data observed by the multi-instruments at Zhongshan Station in Antarctica on such special event day was compared with those of the control day (May 14). It was shown that geomagnetic activity was very quiet on May 11 at Zhongshan. The magnetic pulsation, which usually occurred at about magnetic noon, did not appear. The ionosphere was steady and stratified, and the F2 layer spread very little. The critical frequency of day-side F2 layer, f0F2, was larger than that of control day, and the peak of f0F2 appeared 2 hours earlier. The ionospheric drift velocity was less than usual. There were intensive auroral Es appearing at magnetic noon. All this indicates that the polar ionosphere was extremely quiet and geomagnetic field was much more dipolar on May 11. There were some signatures of auroral substorm before midnight, such as the negative deviation of the geomagnetic H component, accompanied with auroral Es and weak Pc3 pulsation.
Chemical investigation of the roots of the Vietnamese plant Tacca paxiana resulted in the isolation of five new steroidal compounds, taccalonolide R ( 6 ), S ( 7 ), T ( 8 ), U ( 9 ), and V ( 10 ). Their structures were established on the basis of NMR and mass‐spectral data. In addition, the five known taccalonolides A ( 1 ), B ( 2 ), E ( 3 ), K ( 4 ), and N ( 5 ) were also isolated and identified. 相似文献
Intramolecular electron spin exchange as a function of temperature and solvent viscosity and polarity has been studied by
X-band electron paramagnetic resonance (EPR) spectroscopy in two rigid nitroxide biradicals existing in one spatial conformation
only. Temperature variations of the isotropic hyperfine splitting constanta and exchange integral value |J/a| were measured from EPR spectra and subsequently analyzed. The interaction of polar solvent molecules with >N-O fragments
of nitroxide groups led to a slight decrease of the |J/a| value with the increase of temperatureT. In contrast, the interaction of polar solvent molecules with functional groups inside the bridge resulted in a noticeable
increase of |J/a| vs.T. In the last case, a coverse relationship between the values of |J/a| and the hyperfine splitting constanta has been observed for solvents with different polarity. 相似文献
The dendrite growth process of transparent NaBi(WO4)2 with small prandtl and high melting point was studied by using the in-situ observation system. According to the dynamic images and detailed information, there are two kinds of restriction effect on
the dendrite growth, the competition between arms and branches and the convection in the melt. The dendrite growth rate was
time dependent, and the rate of arm growth reached the maximum 5.8 mm/s in the diffusive-advective region and rapidly decreased
in the diffusive-convective region. The growth rate of branch had the same change trends as the arm’s. Based on the EPMA-EDS
data of solidification structure of quenched NaBi(WO4)2 melt, it was found that there were component differences from stoichiometric concentration in the melt near the interface
during the growth process.
Supported by the National Natural Science Foundation of China (Grant No. 50331040) and the Innovation Funds from Shanghai
Institute of Ceramics, Chinese Academy of Sciences (Grant No. SCX0623) 相似文献
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献