排序方式: 共有3条查询结果,搜索用时 0 毫秒
1
1.
2.
Tomoyuki Suzuki Yuko Kamiya Kohei Oikawa Itoko Nonaka Takumi Shinkai Fuminori Terada Taketo Obitsu 《Animal Science Journal》2021,92(1):e13637
The aim of this study was to develop prediction equations for methane (CH4) emissions from lactating cows using the CH4/carbon dioxide (CO2) ratio in the breath measured in the automatic milking system (AMS) and to evaluate the predicted values and factors affecting the CH4/CO2 ratio. The model development was conducted using a dataset determined in respiration chambers or head boxes (n = 121). Then, gas measurements in the AMS as well as in the head box were carried out with six lactating cows fed one of three different levels of neutral detergent fiber (NDF) content, following a 3 × 3 Latin square experimental design. The obtained equation that is suitable for practical use on farms to predict CH4 was CH4 (L/day) = −507 + 0.536 live weight (kg) + 8.76 energy-corrected milk (kg/day) + 5,029 CH4/CO2 (adjusted R2 = 0.83; root mean square error = 40.8 L/day). Results showed that the predicted values correlated positively with the observed values, the determined CH4/CO2 ratio increased with increasing dietary NDF content, and the detected eructation rate was in the normal range. On the other hand, the CH4/CO2 ratio was affected by the time interval between measurement and last eating before the measurement. 相似文献
3.
ZHANG Liang 《保鲜与加工》2002,(6):152-154
Illegal traffics on network can be actively detected by network security monitor An advanced system is given which can capture network data stream and intercept malicious attack, so as to alarm or take response action in real-time. The system is composed by sniffer, monitor control center, remote management unit,etc. Attack activities under surveillance can be distinguished by two methods,which are rule based method and statistics based method. Intrusion recognition by sniffer is the key technology of the system. In addition, dilemma between real-time data stream and high inquiry speed, as well as dynamic addition of attack rules contributes to the main concern of system design. Backdoor of The system can be self detected, while intelligent analysis and bi-directional surveillance ability has also been implemented. With all these advance features, the system is presented not only as a strong assistant to traditional network security products, but also an important tool for counter-fighting with rampant network intrusion nowadays. 相似文献
1