首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   87篇
  免费   14篇
电工技术   2篇
化学工业   5篇
建筑科学   1篇
能源动力   5篇
轻工业   5篇
无线电   39篇
一般工业技术   6篇
冶金工业   1篇
原子能技术   1篇
自动化技术   36篇
  2023年   3篇
  2022年   2篇
  2021年   2篇
  2020年   5篇
  2019年   9篇
  2018年   7篇
  2017年   6篇
  2016年   2篇
  2015年   5篇
  2014年   10篇
  2013年   4篇
  2012年   7篇
  2011年   5篇
  2010年   6篇
  2009年   2篇
  2008年   4篇
  2005年   2篇
  2002年   3篇
  1999年   2篇
  1998年   2篇
  1997年   4篇
  1995年   1篇
  1994年   4篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1989年   1篇
排序方式: 共有101条查询结果,搜索用时 218 毫秒
1.
Multimedia Tools and Applications - Emotions are spontaneous feelings that are accompanied by fluctuations in facial muscles, which leads to facial expressions. Categorization of these facial...  相似文献   
2.
Since computer networks play an important role in distributed computing environments, an application's performance depends heavily on the quality of service provided by the communication networks. To ensure a high performance, the characteristics of wide area networks, WANs, must be well understood. This paper presents methodologies to characterize WAN traffic based on real measurements from Bellcore's backbone network that connects remote sites using dedicated T1 links. This paper also suggests some workload models that can be used for wide area network sizing and performance evaluation studies. It is found that the inter-site traffic pattern depends on the time of the day and the day of the week. Furthermore, the traffic between two sites is found to be reasonably symmetric, except for those sites designated as back-up sites. The coefficient of variation is used as a measure for the traffic burstiness and it is found to be 1·5 degree during working hours. The methods presented here are easy to use and cost-effective.  相似文献   
3.
Cloud computing techniques take the form of distributed computing by utilizing multiple computers to execute computing simultaneously on the service side. To process the increasing quantity of multimedia data, numerous large-scale multimedia data storage computing techniques in the cloud computing have been developed. Of all the techniques, Hadoop plays a key role in the cloud computing. Hadoop, a computing cluster formed by low-priced hardware, can conduct the parallel computing of petabytes of multimedia data. Hadoop features high-reliability, high-efficiency, and high-scalability. The numerous large-scale multimedia data computing techniques include not only the key core techniques, Hadoop and MapReduce, but also the data collection techniques, such as File Transfer Protocol and Flume. In addition, distributed system configuration allocation, automatic installation, and monitoring platform building and management techniques are all included. As a result, only with the integration of all the techniques, a reliable large-scale multimedia data platform can be offered. In this paper, we introduce how cloud computing can make a breakthrough by proposing a multimedia social network dataset on Hadoop platform and implementing a prototype version. Detailed specifications and design issues are discussed as well. An important finding of this article is that we can save more time if we conduct the multimedia social networking analysis using Cloud Hadoop Platform rather than using a single computer. The advantages of cloud computing over the traditional data processing practices are fully demonstrated in this article. The applicable framework designs and the tools available for the large-scale data processing are also proposed. We show the experimental multimedia data including data sizes and processing time.  相似文献   
4.
Primitive routing protocols for ad-hoc networks are “power hungry” and can therefore consume considerable amount of the limited amount of battery power resident in the nodes. Thus, routing in ad-hoc networks is very much energy-constrained. Continuous drainage of energy degrades battery performance as well. If a battery is allowed to intermittently remain in an idle state, it recovers some of its lost charge due to the charge recovery effect, which, in turn, results in prolonged battery life.In this paper, we use the ideas of naturally occurring ants’ foraging behavior (Dorigo and Stuetzle, 2004) [1] and based on those ideas, we design an energy-aware routing protocol, which not only incorporates the effect of power consumption in routing a packet, but also exploits the multi-path transmission properties of ant swarms and, hence, increases the battery life of a node. The efficiency of the protocol with respect to some of the existing ones has been established through simulations. It has been observed that the energy consumed in the network, the energy per packet in the case of EAAR are 60% less compared to MMBCR and the packets lost is only around 12% of what we have in AODV, in mobility scenarios.  相似文献   
5.
Password‐based two‐party authenticated key exchange (2PAKE) protocol enables two or more entities, who only share a low‐entropy password between them, to authenticate each other and establish a high‐entropy secret session key. Recently, Zheng et al. proposed a password‐based 2PAKE protocol based on bilinear pairings and claimed that their protocol is secure against the known security attacks. However, in this paper, we indicate that the protocol of Zheng et al. is insecure against the off‐line password guessing attack, which is a serious threat to such protocols. Consequently, we show that an attacker who obtained the users' password by applying the off‐line password guessing attack can easily obtain the secret session key. In addition, the protocol of Zheng et al. does not provide the forward secrecy of the session key. As a remedy, we also improve the protocol of Zheng et al. and prove the security of our enhanced protocol in the random oracle model. The simulation result shows that the execution time of our 2PAKE protocol is less compared with other existing protocols. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
6.
The specific aim of this study was to prepare polymeric inserts containing tetracycline that are intended for intraperiodontal pocket application. The inserts were prepared by a simple extrusion method and based on mixtures of polyvinyl alcohol, glyceryl behenate, xanthan gum, carrageenan, hydroxypropyl methylcellulose, and hyaluronic acid in addition to tetracycline HCL. The inserts were characterized regarding average weight, diameter, water content, and average tetracycline content. Zero‐order release kinetics of tetracycline were observed in case of three of the four batches of the prepared inserts with release profiles that were essentially similar. The release of the drug was incomplete in all cases. This was due, as shown by the equilibrium dialysis tests, to tetracycline binding by the polymers. However, the inserts performed more than 7 days drug sustained release which indicates promising results for local delivery of tetracycline for treatment of periodontal disease. © 2009 Wiley Periodicals, Inc. J Appl Polym Sci, 2010  相似文献   
7.
This study reports on the formulation of doxycycline HCL in an ion activated in situ gelling delivery system and its implications for the treatment of periodontal disease. The system is based on the use of alginate as the gelling agent and hydroxypropyl methylcellulose (HPMC) as a viscosity enhancing agent. The ion activated gelling mechanism in this system is based on the concept of interaction with the divalent calcium ions present in the gingival crevicular fluid (GCF). The gelling capacity of the prepared formulations was assessed visually and by investigating their rheological behavior upon mixing with human blood serum since it has the same composition as the GCF. The rheological behavior of all formulations was not affected by incorporation of the drug. In vitro release studies showed that the alginate/HPMC mixture, upon gelling after mixing with serum, can sustain the release of doxycycline HCL for an extended period of time which was more than 12 days. These results indicated that this system can be used as an in situ gelling local delivery system for the treatment of periodontal disease. © 2009 Wiley Periodicals, Inc. J Appl Polym Sci, 2010  相似文献   
8.
9.
A Carrier‐sense‐assisted adaptive learning MAC protocol for wireless LANs, capable of operating efficiently in bursty traffic wireless networks with unreliable channel feedback, is introduced. According to the proposed protocol, the mobile station that is granted permission to transmit is selected by means of learning automata. At each station, the learning automaton takes into account the network feedback information in order to update the choice probability of each mobile station. The proposed protocol utilizes carrier sensing in order to reduce the collisions that are caused by different decisions at the various mobile stations due to the unreliable channel feedback. Simulation results show satisfactory performance of the proposed protocol compared to similar MAC protocols. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
10.
This paper presents the results of an experimental study to investigate the behaviour of structurally damaged full-scale reinforced concrete beams retrofitted with CFRP laminates in shear or in flexure. The main variables considered were the internal reinforcement ratio, position of retrofitting and the length of CFRP. The experimental results, generally, indicate that beams retrofitted in shear and flexure by using CFRP laminates are structurally efficient and are restored to stiffness and strength values nearly equal to or greater than those of the control beams. It was found that the efficiency of the strengthening technique by CFRP in flexure varied depending on the length. The main failure mode in the experimental work was plate debonding in retrofitted beams.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号