排序方式: 共有33条查询结果,搜索用时 15 毫秒
1.
B. Matuszczak 《Monatshefte für Chemie / Chemical Monthly》1996,127(12):1291-1303
Summary A series of N-acetyl--arylglycines (IIa,IIb) was prepared by acid-induced electrophilic -amidoalkylation reactions; compounds of typeIIb were transformed into the corresponding 3-acetylaminobenzo[b]furan-2(3H)ones (III) by treatment with acetic anhydride. It was found that most of these new compounds (lactones as well as open chain derivatives) undergo base induced oxidation in the presence of oxygen with the emission of visible light. Preliminary structure-activity relationships for these novel chemiluminescence class are proposed.
Lineare und cyclische N-Acetyl--aryl-glycine: Synthese und Chemilumineszenz-Untersuchungen
Zusammenfassung Eine Reihe von N-Acetyl--arylglycinen (IIa,IIb) konnte durch sauer induzierte elektrophile -Amidoalkylierung hergestellt werden; die Behandlung von Verbindungen des TypsIIb mit Acetanhydrid führte zu den entsprechenden 3-Acetylaminobenzo[b]furan-2(3H)onen (III). Es zeigt sich, daß die Mehrzahl dieser neuen Verbindungen (sowohl Lactone als auch offenkettige Derivate) bei basisch induzierter Oxidation mit (Luft-)Sauerstoff sichtbares Licht emittieren. Erste Struktur-Aktivitäts-Beziehungen für diese neue chemilumineszenzierende Klasse werden vorgeschlagen.相似文献
2.
3.
对网络处理器中多微引擎并行处理的两种编程模型进行分析,讨论了如何将数据包处理任务在多个微引擎之间进行分配,从而取得较高处理性能的一般性策略问题。在基于Intel公司生产的第二代网络处理器IXP2400的NAT-PT系统的开发过程中综合运用两种编程模型,较好的解决了数据包处理功能模块到各微引擎的映射问题。 相似文献
4.
5.
高速网络下实时、高效检测入侵行为是目前网络安全领域研究的热点和难点之一.文中利用网络处理器进行快速流量采集、无payload数据的预过滤和面向会话的动态负反馈负载均衡算法的分流转发,采用主机阵列分别进行带payload的数据包内容检测,研究并实现了一种基于网络处理器的并行入侵检测系统.实验测试验证了系统的有效性和可行性. 相似文献
6.
An investigation of finite-size scaling for systems with long-range interaction: The spherical model
A method is suggested for the derivation of finite-size corrections in the thermodynamic functions of systems with pair interaction potential decaying at large distancesr asr
–d –
, whered is the space dimensionality and>0. It allows for a unified treatment of short-range (=2) and long-range (<2) interaction. The asymptotic analysis is illustrated by the mean spherical model of general geometryL
d–d×
d
subject to periodic boundary conditions. The Fisher-Privman equation of state is generalized to arbitrary real values ofd, 0d. It is shown that the-expansion may be used to study the breakdown of standard finite-size scaling at the borderline dimensionalities. 相似文献
7.
8.
9.
文章分析了网络处理器IXP2850的并行处理和多线程的特性以及一些关键影响因素,提出了提高系统效率的解决方案:设计了一种硬件和软件相结合的外部数据读写锁机制,解决因多线程引起的数据冲突和实现复杂的问题,在系统吞吐量、最小时延的测试中与一般的读写锁相比,性能大幅提高。 相似文献
10.
Wu Zhijun Duan Haixin Li Xing 《电子科学学刊(英文版)》2006,23(1):148-153
An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%, drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP1200. 相似文献