Pollen Morphology of Artemisia L. and Its Systematic Significance

来源 :武汉大学学报:自然科学英文版 | 被引量 : 0次 | 上传用户:cai2008
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The pollen of 57 species representing 7 sections of Artemisia was examined by light microscope and scanning microscope for the purpose to elucidate the systematic relationships of the genus. The examination indicates that the pollen grains present high co
其他文献
调查在空间、时间的分布 ofs 油上被进行在桤木(Aluns cremastogyne ) 和柏树的混合种植园的器官的母亲(SOM ){ Cupressus funebris )(MPAC ) ,它在中央四川盆(HACSB ) 的多山
对测量大负担应力到锚电缆线合适的传感器的开发在桥建设成为一项重要任务;维护。因此,光纤维传感器的一种新类型为锚电报(OFBFMAC ) 的力量测量在实验室光的纤维栅栏传感器中
Based on the study of visitors' individual spatial behaviors, a tourists' spatial behavior simulator (TSBS) to assess the carrying capacity of tourist r
非循环的芳香的聚酰胺啶衍生物的一个新系列啊并且包含啶戒指 i 的 newmacrocyclic 聚酰胺被 N~2, N~6 二度(2-aminoethyl ) pyridine-2, 6-dicarboxamide 或 N~2 的反应综合,有
We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active router
这篇论文首先与高概率为 5-roundAdvanced 加密标准(AES ) 论述一个不可能的微分性质。为 5 回合 AES 把分析方法基于性质和不可能的微分地窟,一个新方法为 cryptanalyzingthe
This paper proposes a C/S system model for K Java and PDA named Net-Wireless. It is a discussion and proposal on information security and solutions for K-Java h
Immune-based intrusion detection approaches are studied. The methods of constructing self set and generating mature detectors are researched and improved. A bin
贝叶斯的网络为推理和语义表示有一个强大的能力,它与定性分析和定量分析结合了,与优先的知识和观察数据,并且提供一个有效方法处理预言,分类并且聚类。第一,这篇论文给出贝叶斯的
To reveal the relationship between mitogen-activated protein kinase (MAPK) and tau phosphorylation, we used different concentration of PD98059, an inhibitor of