NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1
zadetkov: 5
1.
  • Determination of Eu concent... Determination of Eu concentrations in coal, fly ash and sedimentary rocks using a cation exchange resin and inductively coupled plasma mass spectrometry (ICP-MS)
    Yan, Xiaoyun; Dai, Shifeng; Graham, Ian T. ... International journal of coal geology, 04/2018, Letnik: 191
    Journal Article
    Recenzirano

    Europium (Eu) in coal, coal combustion residues (e.g., fly ash), and sedimentary rocks in coal-bearing sequences has attracted much attention in recent years mainly because of its world-wide demand ...
Celotno besedilo
2.
  • New data on geology and ger... New data on geology and germanium mineralization in the Hunchun Basin, northeastern China
    Guo, Wenmu; Nechaev, Victor P.; Yan, Xiaoyun ... Ore geology reviews, April 2019, 2019-04-00, Letnik: 107
    Journal Article
    Recenzirano

    Comparison between the studied samples (including Dai et al., 2018, Guo et al., 2019) and their possible magmatic and metamorphic source rocks with the Al2O3/TiO2 vs. Sr/Y and La/Yb (modified after ...
Celotno besedilo
3.
  • Sender anonymity: Applying ... Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough
    Voundi Koe, Arthur Sandor; Ai, Shan; Huang, Pengfei ... Information sciences, August 2022, 2022-08-00, Letnik: 606
    Journal Article
    Recenzirano

    Over the last decade, there has been extensive research into the security and privacy of blockchain technology, from the use of ring signatures to ring confidential transactions. Although existing ...
Celotno besedilo
4.
  • ESM: Selfish mining under e... ESM: Selfish mining under ecological footprint
    Ai, Shan; Yang, Guoyu; Chen, Chang ... Information sciences, August 2022, 2022-08-00, Letnik: 606
    Journal Article
    Recenzirano

    By deviating from an honest mining strategy, attackers can obtain additional rewards through mining attacks. Selfish mining is the most well-known mining attack. It includes selfish mining (SM1), ...
Celotno besedilo
5.
Celotno besedilo

PDF

Nalaganje filtrov