首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   75篇
  免费   11篇
电工技术   1篇
化学工业   9篇
建筑科学   2篇
轻工业   2篇
无线电   11篇
一般工业技术   30篇
冶金工业   11篇
自动化技术   20篇
  2022年   1篇
  2021年   1篇
  2020年   4篇
  2019年   6篇
  2018年   4篇
  2017年   3篇
  2016年   3篇
  2015年   5篇
  2014年   2篇
  2012年   2篇
  2011年   4篇
  2010年   3篇
  2008年   1篇
  2007年   3篇
  2006年   2篇
  2005年   1篇
  2004年   1篇
  2003年   1篇
  2001年   1篇
  1999年   2篇
  1998年   2篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1988年   2篇
  1987年   1篇
  1986年   4篇
  1985年   2篇
  1981年   4篇
  1976年   2篇
  1975年   2篇
  1974年   1篇
  1972年   1篇
  1971年   2篇
  1970年   1篇
  1969年   2篇
  1967年   1篇
排序方式: 共有86条查询结果,搜索用时 134 毫秒
1.
Perovskite nanostructures have attracted much attention in recent years due to their suitability for a variety of applications such as photovoltaics, light-emitting diodes (LEDs), nanometer-size lasing, and more. These uses rely on the conductive properties of these nanostructures. However, electrical characterization of individual, thin perovskite nanowires has not yet been reported. Here, conductive atomic force microscopy characterization of individual cesium lead halide nanowires is presented. Clear differences are observed in the conductivity of nanowires containing only bromide and nanowires containing a mixture of bromide and iodide. The differences are attributed to a higher density of crystalline defects, deeper trap states, and higher inherent conductivity for nanowires with mixed bromide–iodide content.  相似文献   
2.
Noncommensurate 2D interfaces hold great promise toward low friction and nanoelectromechanical applications. For identical constituents, the crystals interlock at specific rotational configurations leading to high barriers for slide. In contrast, nonidentical constituents comprising different lattice parameters should enable robust superlubricity for all rotational configurations. This is however not the case for gold–graphite interfaces, as both theory and experiments show scaling behavior of the sliding force as a function of the interface contact area. By simulating the sliding force for gold–graphite interfaces, this work shows that the origin for high force barriers at special angular configurations is a result of commensurability between the moiré structure and the contact geometry. Consequently, this paper suggests new geometries that can potentially overcome such commensurability effects to enable robust superlubricity.  相似文献   
3.

Objectives

The goal of this study was to quantify CEST related parameters such as chemical exchange rate and fractional concentration of exchanging protons at a clinical 3T scanner. For this purpose, two CEST quantification approaches—the AREX metric (for ‘apparent exchange dependent relaxation’), and the AREX-based Ω-plot method were used. In addition, two different pulsed RF irradiation schemes, using Gaussian-shaped and spin-lock pulses, were compared.

Materials and methods

Numerical simulations as well as MRI measurements in phantoms were performed. For simulations, the Bloch–McConnell equations were solved using a two-pool exchange model. MR experiments were performed on a clinical 3T MRI scanner using a cylindrical phantom filled with creatine solution at different pH values and different concentrations.

Results

The validity of the Ω-plot method and the AREX approach using spin-lock preparation for determination of the quantitative CEST parameters was demonstrated. Especially promising results were achieved for the Ω-plot method when the spin-lock preparation was employed.

Conclusion

Pulsed CEST at 3T could be used to quantify parameters such as exchange rate constants and concentrations of protons exchanging with free water. In the future this technique might be used to estimate the exchange rates and concentrations of biochemical substances in human tissues in vivo.
  相似文献   
4.
In High-Level Synthesis, Binary Synthesis is a method for synthesizing compiled applications for which the source code is not available. One of the advantages of FPGAs over processors is the availability of multiple internal and external memory banks. Binary synthesis tools use multiple memory banks if they are able to recover data-structures from the binary. In this work we improve the recovery of data-structures by introducing dynamic memory analysis and combining it with improved static memory analysis. We show that many applications can only be synthesized using dynamic memory analysis. We present two FPGA based architectures for implementing the bound-checking and recovery for the synthesized code. Our experiments show that the proposed technique accelerates the execution of applications which use multiple memory banks concurrently. We demonstrate that many binary applications indeed benefit from this technique.  相似文献   
5.
In recent years, the within-host viral dynamics of dengue infections have been increasingly characterized, and the relationship between aspects of these dynamics and the manifestation of severe disease has been increasingly probed. Despite this progress, there are few mathematical models of within-host dengue dynamics, and the ones that exist focus primarily on the general role of immune cells in the clearance of infected cells, while neglecting other components of the immune response in limiting viraemia. Here, by considering a suite of mathematical within-host dengue models of increasing complexity, we aim to isolate the critical components of the innate and the adaptive immune response that suffice in the reproduction of several well-characterized features of primary and secondary dengue infections. By building up from a simple target cell limited model, we show that only the innate immune response is needed to recover the characteristic features of a primary symptomatic dengue infection, while a higher rate of viral infectivity (indicative of antibody-dependent enhancement) and infected cell clearance by T cells are further needed to recover the characteristic features of a secondary dengue infection. We show that these minimal models can reproduce the increased risk of disease associated with secondary heterologous infections that arises as a result of a cytokine storm, and, further, that they are consistent with virological indicators that predict the onset of severe disease, such as the magnitude of peak viraemia, time to peak viral load, and viral clearance rate. Finally, we show that the effectiveness of these virological indicators to predict the onset of severe disease depends on the contribution of T cells in fuelling the cytokine storm.  相似文献   
6.
A new and more detailed analysis of the unidirectional algorithm of Chang and Roberts for distributed extrema finding on a ring is presented. This analysis shows that this simple algorithm, which is known to be average case optimal, compares very favorably with all the other known algorithms as it requires O(n log n) messages with probability tending to one. A bidirectional version of this algorithm is presented and is shown to dominate the unidirectional one in its average message complexity. Finally, both the unidirectional and the bidirectional algorithms are generalized to perform k selection in the ring, i.e., find the k largest labeled processors.  相似文献   
7.
A closed-form expression is derived for the probability density function (pdf) of the beat noise created by homodyne and heterodyne interferometric crosstalk in optical communication systems employing directly modulated distributed feedback lasers at bit rates between 155 Mb/s and 2.5 Gb/s. Thermal chirp is shown to be the predominant chirp mechanism affecting homodyne-crosstalk-induced penalty at bit rates up to 2.5 Gb/s. Theoretical calculations of the crosstalk-induced power penalty are verified experimentally.  相似文献   
8.
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a point-to-point network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization:
  • A symmetric n-party functionality can be securely computed facing \(n/3\le t<n/2\) corruptions (i.e., honest majority), if and only if it is \((n-2t)\) -dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output to some predetermined value.
  • Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing \(t\ge n/2\) corruptions (i.e., no honest majority), if and only if it is 1-dominated and can be securely computed with broadcast.
It follows that, in case a third of the parties might be corrupted, broadcast is necessary for securely computing non-dominated functionalities (in which “small” subsets of the inputs cannot determine the output), including, as interesting special cases, the Boolean XOR and coin-flipping functionalities.
  相似文献   
9.
The first ply failure in composite laminates are studied by 3-D fracture mechanic approach. The fracture model is based on a crack embedded in one of the inner layers. Numerical results for the case of “angle ply” laminates are based on a general 3-D finite difference program.Stress intensity factors and fracture energy are evaluated by the J-integral 2-D and 3-D methods as well as by the stresses and energy balance. It was found that the J(2-D) method can be applied to 3-D problems while the J(3-D) method is not suitable for the numerical computation.The influence of geometrical properties of the crack and the layers on the various stress intensity factors is presented and discussed. Change in failure mechanism of the weakest ply was proved by experiments to fit with numerical results. It was found that the weakest layer is strengthened by the others, a fact which has been verified experimentally and hasn't been explained by other approaches.  相似文献   
10.
This study examined the role of facial symmetry in the judgment of physical attractiveness. Four experiments investigated people's preference for either somewhat asymmetrical portraits or their symmetrical chimeric composites when presented simultaneously. Experiment 1 found a higher selection rate for symmetrical faces with neutral expression for portraits of old people, and Experiment 2 indicated this may be because symmetry serves as cue for youth in old age. In Experiments 3 and 4 participants examined portraits with emotional expressions. Experiment 3 found a higher selection rate for asymmetrical faces, and Experiment 4 indicated this may be because observers perceived them as more genuine and natural. This study suggests that the low degree of facial asymmetry found in normal people does not affect attractiveness ratings (except for old age), probably because observers are not tuned to perceive it. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号