首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   72篇
  免费   0篇
化学工业   9篇
机械仪表   1篇
建筑科学   2篇
轻工业   9篇
无线电   2篇
一般工业技术   16篇
冶金工业   19篇
自动化技术   14篇
  2022年   4篇
  2019年   1篇
  2018年   1篇
  2016年   3篇
  2014年   3篇
  2013年   4篇
  2012年   2篇
  2011年   2篇
  2010年   2篇
  2009年   5篇
  2008年   6篇
  2007年   3篇
  2006年   1篇
  2005年   3篇
  2004年   1篇
  2003年   2篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   4篇
  1996年   2篇
  1995年   5篇
  1994年   5篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1985年   1篇
  1976年   1篇
  1975年   1篇
  1970年   1篇
排序方式: 共有72条查询结果,搜索用时 15 毫秒
1.
N-Acylphosphatidylserines have been isolated from intact and injured tissues, but the participation of such acidic phospholipids in membrane aggregation and fusion has not been demonstrated. We have synthesized N-stearoylphosphatidylserine (NSPS) and examined divalent-cation-induced aggregation of NSPS-liposomes, which leads to membrane destabilization and fusion. The purified lipid was characterized by its chromatographic and spectroscopic (infrared and 1H nuclear magnetic resonance) properties and by its chemical degradation pattern. Aggregation of unilamellar NSPS-liposomes was studied as a function of calcium and magnesium concentration. The ability of calcium and magnesium to induce vesicle aggregation is higher for phosphatidylserine (PS)-liposomes (threshold concentration 1.5 mM for calcium and 4.6 mM for magnesium) than for NSPS-liposomes (threshold concentration 2.8 mM for calcium and 6.6 mM for magnesium). The irreversibility of the aggregation reactions after adding EDTA suggests that vesicle fusion might occur in the presence of calcium and magnesium. Preliminary studies, based on mixing of both lipid and internal aqueous contents, show that fusion rather than aggregation of NSPS-liposomes occurs in the presence of calcium ions. The tendency of NSPS-liposomes to aggregate at higher cation concentrations than PS-liposomes suggests that N-acylation of phosphatidylserine protects the membrane against degenerative damage caused by aggregation and fusion.  相似文献   
2.
    
In secret sharing schemes a secret is distributed among a set of users ${mathcal{P}}In secret sharing schemes a secret is distributed among a set of users P{mathcal{P}} in such a way that only some sets, the authorized sets, can recover it. The family Γ of authorized sets is called the access structure. To design new cryptographic protocols, we introduce in this work the concept of extension of an access structure: given a monotone family G ì 2P{{it Gamma} subset 2^mathcal{P}} and a larger set P = P è[(P)tilde]{mathcal{P}^{prime} = mathcal{P} cup tilde{mathcal{P}}}, a monotone access structure G ì 2P{{it Gamma}^{prime}subset 2^{mathcal{P}^{prime}}} is an extension of Γ if the following two conditions are satisfied: (1) The set P{mathcal{P}} is a minimal subset of Γ′, i.e. P ? G{mathcal{P} in {it Gamma}^{prime}} and P - {Ri} ? G{mathcal{P} - {R_i}notin {it Gamma}^{prime}} for every Ri ? P{R_i in mathcal{P}}, (2) A subset A ì P{A subset mathcal{P}} is in Γ if and only if the subset A è[(P)tilde]{A cup tilde{mathcal{P}}} is in Γ′. As our first contribution, we give an explicit construction of an extension Γ′ of a vector space access structure Γ, and we prove that Γ′ is also a vector space access structure. Although the definition may seem a bit artificial at first, it is well motivated from a cryptographic point of view. Indeed, our second contribution is to show that the concept of extension of an access structure can be used to design encryption schemes with access structures that are chosen ad-hoc at the time of encryption. Specifically, we design and analyze a dynamic distributed encryption scheme and a ciphertext-policy attribute-based encryption scheme. In some cases, the new schemes enjoy better properties than existing ones.  相似文献   
3.
4.
The last years have witnessed a dramatic growth in the number as well as in the variety of distributed virtual environment systems. These systems allow multiple users, working on different client computers that are interconnected through different networks, to interact in a shared virtual world. One of the key issues in the design of scalable and cost-effective DVE systems is the partitioning problem. This problem consists of efficiently assigning the existing clients to the servers in the system and some techniques have been already proposed for solving it. This paper experimentally analyzes the correlation of the quality function proposed in the literature for solving the partitioning problem with the performance of DVE systems. Since the results show an absence of correlation, we also propose the experimental characterization of DVE systems. The results show that the reason for that absence of correlation is the nonlinear behavior of DVE systems with regard to the number of clients in the system. DVE systems reach saturation when any of the servers reaches 100 percent of CPU utilization. The system performance greatly decreases if this limit is exceeded in any server. Also, as a direct application of these results, we present a partitioning method that is targeted to keep all the servers in the system below a certain threshold value of CPU utilization, regardless of the amount of network traffic. Evaluation results show that the proposed partitioning method can improve DVE system performance, regardless of both the movement pattern of clients and the initial distribution of clients in the virtual world.  相似文献   
5.
Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs than would be possible with the high-end, shared memory computers that have been traditionally used for virtual reality purposes. This change in the design of virtual reality systems has caused some development environments oriented toward shared memory computing to require modifications to their internal architectures in order to support cluster computing. This is the case of VR Juggler, which is considered one of the most important virtual reality application development frameworks based on open source code.  相似文献   
6.
This paper presents the experimental analysis of mobile phones for Augmented Reality marker tracking, a core task that any CAR application must include. The results show that the most time consuming stage is the marker detection stage, followed by the image acquisition stage. Moreover, the rendering stage is decoupled on some devices, depending on the operative system used. This decoupling process allows avoiding low refresh rates, facilitating the collaborative work. However, the use of multicore devices does not significantly improve the performance provided by CAR applications. Finally, the results show that unless a poor network bandwidth makes the network to become the system bottleneck, the performance of CAR applications based on mobile phones will be limited by the detection stage. These results can be used as the basis for an efficient design of CAR systems and applications based on mobile phones.  相似文献   
7.
Crowd simulation requires both rendering visually plausible images and managing the behavior of autonomous agents. Therefore, these applications need an efficient design that allows them to simultaneously handle these two requirements. Although several proposals have focused on the software architectures for these systems, no proposals have focused on the computer systems supporting them.In this paper, we analyze the computer architectures used in the literature to support distributed virtual environments. Also, we propose a distributed computer architecture which is efficient enough to support simulations of thousand of autonomous agents. This proposal consists of a cluster of interconnected computers in order to improve flexibility and robustness, as well as a hierarchical software architecture that efficiently provides consistency. Performance evaluation results show that the trade-off between flexibility and consistency allows to efficiently manage thousands of autonomous agents. Therefore, this network-based system architecture can provide the required scalability for large-scale crowd simulations.  相似文献   
8.
9.
Infection produced by Entamoeba histolytica constitutes a clinical problem of great importance due to its frequence and serious complications. Age, diagnosis and clinical manifestations, phisic exploration, lab. procedures, proctosigmoidoscopy, radiology, complications, pathologic anatomy, statistical reports from the Ministry of Health and Social Asistence in addition we emphasize on the importance of an accurate and precocious diagnosis. We expose an effective terapeutic regimen for the different amibiasis states.  相似文献   
10.
Summary The complex 5-(C5H5)2Ti (1-OC(O)C6H5)2 was synthesized and activated with MA0 for ethylene polymerization. The resultant polymer is UHMW-PE with a viscosimetric molecular weight of Mv = 6.8 x 106 to 0.7 x 106 g/mol dependent on the temperature of the reaction. The effects of the Al/Ti molar ratio and temperature of the reaction on the catalytic activity and polymer properties were studied.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号