2018
DOI: 10.1360/n972018-00155
|View full text |Cite
|
Sign up to set email alerts
|

Controls on vertical nutrient distributions in the Sansha Yongle Blue Hole, South China Sea

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(31 citation statements)
references
References 0 publications
0
31
0
Order By: Relevance
“…The formation of the liquid film / zone, Fig. 1, in this condition, is analogous / similar to a liquid film formation at the migrating interface created between primary and peritectic phases, [19].…”
Section: Discussionmentioning
confidence: 53%
“…The formation of the liquid film / zone, Fig. 1, in this condition, is analogous / similar to a liquid film formation at the migrating interface created between primary and peritectic phases, [19].…”
Section: Discussionmentioning
confidence: 53%
“…Environmental parameters (pH, salinity, temperature, dissolved oxygen concentration and turbidity) of each layer were recorded with an Alec ASTD102 self-contained CTD (ALEC Electronics Co. LTD, Japan) and an AAQ171 Real-time profiler (JFE Advantech, Japan) in situ. The silicate, phosphate, nitrate, nitrite, and ammonium concentrations were cited from Yao s group [19].…”
Section: Determination Of Environmental Parametersmentioning
confidence: 99%
“…In this regard, it should be mentioned that all the existing QSDC [3][4][5][6][7][8][9][10][11] and QD protocols [12][13][14][15][16][17][18]) analyze the security issues showing the robustness against some specific type of attacks. For example, the security of a protocol is shown against Intercept and Resend Attack, Disturbance Attack or Modification Attack, Entanglement Measure Attack, Man-in the Middle Attack etc.…”
Section: Security Analysis Of the Proposed Protocolmentioning
confidence: 99%
“…The first generation QSDC protocols [3][4][5][6][7][8][9][10][11] considered one direction, i.e., the classical bits were communicated from Alice to Bob. The subsequent work of [12] proposed bidirectional QSDC where secret messages can flow in both the directions, i.e., from Alice to Bob as well as from Bob to Alice.…”
Section: Introductionmentioning
confidence: 99%