全文获取类型
收费全文 | 75篇 |
免费 | 11篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 9篇 |
建筑科学 | 2篇 |
轻工业 | 2篇 |
无线电 | 11篇 |
一般工业技术 | 30篇 |
冶金工业 | 11篇 |
自动化技术 | 20篇 |
出版年
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 4篇 |
2019年 | 6篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 3篇 |
2015年 | 5篇 |
2014年 | 2篇 |
2012年 | 2篇 |
2011年 | 4篇 |
2010年 | 3篇 |
2008年 | 1篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2005年 | 1篇 |
2004年 | 1篇 |
2003年 | 1篇 |
2001年 | 1篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1981年 | 4篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1972年 | 1篇 |
1971年 | 2篇 |
1970年 | 1篇 |
1969年 | 2篇 |
1967年 | 1篇 |
排序方式: 共有86条查询结果,搜索用时 134 毫秒
1.
Avigail Stern Sigalit Aharon Tal Binyamin Abeer Karmi Dvir Rotem Lioz Etgar Danny Porath 《Advanced materials (Deerfield Beach, Fla.)》2020,32(12):1907812
Perovskite nanostructures have attracted much attention in recent years due to their suitability for a variety of applications such as photovoltaics, light-emitting diodes (LEDs), nanometer-size lasing, and more. These uses rely on the conductive properties of these nanostructures. However, electrical characterization of individual, thin perovskite nanowires has not yet been reported. Here, conductive atomic force microscopy characterization of individual cesium lead halide nanowires is presented. Clear differences are observed in the conductivity of nanowires containing only bromide and nanowires containing a mixture of bromide and iodide. The differences are attributed to a higher density of crystalline defects, deeper trap states, and higher inherent conductivity for nanowires with mixed bromide–iodide content. 相似文献
2.
Noncommensurate 2D interfaces hold great promise toward low friction and nanoelectromechanical applications. For identical constituents, the crystals interlock at specific rotational configurations leading to high barriers for slide. In contrast, nonidentical constituents comprising different lattice parameters should enable robust superlubricity for all rotational configurations. This is however not the case for gold–graphite interfaces, as both theory and experiments show scaling behavior of the sliding force as a function of the interface contact area. By simulating the sliding force for gold–graphite interfaces, this work shows that the origin for high force barriers at special angular configurations is a result of commensurability between the moiré structure and the contact geometry. Consequently, this paper suggests new geometries that can potentially overcome such commensurability effects to enable robust superlubricity. 相似文献
3.
Julia Stabinska Tom Cronenberg Hans-Jörg Wittsack Rotem Shlomo Lanzman Anja Müller-Lutz 《Magma (New York, N.Y.)》2017,30(5):505-516
Objectives
The goal of this study was to quantify CEST related parameters such as chemical exchange rate and fractional concentration of exchanging protons at a clinical 3T scanner. For this purpose, two CEST quantification approaches—the AREX metric (for ‘apparent exchange dependent relaxation’), and the AREX-based Ω-plot method were used. In addition, two different pulsed RF irradiation schemes, using Gaussian-shaped and spin-lock pulses, were compared.Materials and methods
Numerical simulations as well as MRI measurements in phantoms were performed. For simulations, the Bloch–McConnell equations were solved using a two-pool exchange model. MR experiments were performed on a clinical 3T MRI scanner using a cylindrical phantom filled with creatine solution at different pH values and different concentrations.Results
The validity of the Ω-plot method and the AREX approach using spin-lock preparation for determination of the quantitative CEST parameters was demonstrated. Especially promising results were achieved for the Ω-plot method when the spin-lock preparation was employed.Conclusion
Pulsed CEST at 3T could be used to quantify parameters such as exchange rate constants and concentrations of protons exchanging with free water. In the future this technique might be used to estimate the exchange rates and concentrations of biochemical substances in human tissues in vivo.4.
In High-Level Synthesis, Binary Synthesis is a method for synthesizing compiled applications for which the source code is
not available. One of the advantages of FPGAs over processors is the availability of multiple internal and external memory
banks. Binary synthesis tools use multiple memory banks if they are able to recover data-structures from the binary. In this
work we improve the recovery of data-structures by introducing dynamic memory analysis and combining it with improved static
memory analysis. We show that many applications can only be synthesized using dynamic memory analysis. We present two FPGA
based architectures for implementing the bound-checking and recovery for the synthesized code. Our experiments show that the
proposed technique accelerates the execution of applications which use multiple memory banks concurrently. We demonstrate
that many binary applications indeed benefit from this technique. 相似文献
5.
In recent years, the within-host viral dynamics of dengue infections have been increasingly characterized, and the relationship between aspects of these dynamics and the manifestation of severe disease has been increasingly probed. Despite this progress, there are few mathematical models of within-host dengue dynamics, and the ones that exist focus primarily on the general role of immune cells in the clearance of infected cells, while neglecting other components of the immune response in limiting viraemia. Here, by considering a suite of mathematical within-host dengue models of increasing complexity, we aim to isolate the critical components of the innate and the adaptive immune response that suffice in the reproduction of several well-characterized features of primary and secondary dengue infections. By building up from a simple target cell limited model, we show that only the innate immune response is needed to recover the characteristic features of a primary symptomatic dengue infection, while a higher rate of viral infectivity (indicative of antibody-dependent enhancement) and infected cell clearance by T cells are further needed to recover the characteristic features of a secondary dengue infection. We show that these minimal models can reproduce the increased risk of disease associated with secondary heterologous infections that arises as a result of a cytokine storm, and, further, that they are consistent with virological indicators that predict the onset of severe disease, such as the magnitude of peak viraemia, time to peak viral load, and viral clearance rate. Finally, we show that the effectiveness of these virological indicators to predict the onset of severe disease depends on the contribution of T cells in fuelling the cytokine storm. 相似文献
6.
A new and more detailed analysis of the unidirectional algorithm of Chang and Roberts for distributed extrema finding on a ring is presented. This analysis shows that this simple algorithm, which is known to be average case optimal, compares very favorably with all the other known algorithms as it requires O(n log n) messages with probability tending to one. A bidirectional version of this algorithm is presented and is shown to dominate the unidirectional one in its average message complexity. Finally, both the unidirectional and the bidirectional algorithms are generalized to perform k selection in the ring, i.e., find the k largest labeled processors. 相似文献
7.
A closed-form expression is derived for the probability density function (pdf) of the beat noise created by homodyne and heterodyne interferometric crosstalk in optical communication systems employing directly modulated distributed feedback lasers at bit rates between 155 Mb/s and 2.5 Gb/s. Thermal chirp is shown to be the predominant chirp mechanism affecting homodyne-crosstalk-induced penalty at bit rates up to 2.5 Gb/s. Theoretical calculations of the crosstalk-induced power penalty are verified experimentally. 相似文献
8.
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a point-to-point network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization: It follows that, in case a third of the parties might be corrupted, broadcast is necessary for securely computing non-dominated functionalities (in which “small” subsets of the inputs cannot determine the output), including, as interesting special cases, the Boolean XOR and coin-flipping functionalities.
相似文献
- A symmetric n-party functionality can be securely computed facing \(n/3\le t<n/2\) corruptions (i.e., honest majority), if and only if it is \((n-2t)\) -dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output to some predetermined value.
- Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing \(t\ge n/2\) corruptions (i.e., no honest majority), if and only if it is 1-dominated and can be securely computed with broadcast.
9.
The first ply failure in composite laminates are studied by 3-D fracture mechanic approach. The fracture model is based on a crack embedded in one of the inner layers. Numerical results for the case of “angle ply” laminates are based on a general 3-D finite difference program.Stress intensity factors and fracture energy are evaluated by the 2-D and 3-D methods as well as by the stresses and energy balance. It was found that the method can be applied to 3-D problems while the method is not suitable for the numerical computation.The influence of geometrical properties of the crack and the layers on the various stress intensity factors is presented and discussed. Change in failure mechanism of the weakest ply was proved by experiments to fit with numerical results. It was found that the weakest layer is strengthened by the others, a fact which has been verified experimentally and hasn't been explained by other approaches. 相似文献
10.
This study examined the role of facial symmetry in the judgment of physical attractiveness. Four experiments investigated people's preference for either somewhat asymmetrical portraits or their symmetrical chimeric composites when presented simultaneously. Experiment 1 found a higher selection rate for symmetrical faces with neutral expression for portraits of old people, and Experiment 2 indicated this may be because symmetry serves as cue for youth in old age. In Experiments 3 and 4 participants examined portraits with emotional expressions. Experiment 3 found a higher selection rate for asymmetrical faces, and Experiment 4 indicated this may be because observers perceived them as more genuine and natural. This study suggests that the low degree of facial asymmetry found in normal people does not affect attractiveness ratings (except for old age), probably because observers are not tuned to perceive it. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献