首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   679篇
  免费   64篇
  国内免费   3篇
电工技术   12篇
综合类   4篇
化学工业   132篇
金属工艺   7篇
机械仪表   18篇
建筑科学   11篇
矿业工程   2篇
能源动力   39篇
轻工业   103篇
水利工程   9篇
石油天然气   6篇
无线电   74篇
一般工业技术   170篇
冶金工业   10篇
原子能技术   7篇
自动化技术   142篇
  2024年   11篇
  2023年   30篇
  2022年   83篇
  2021年   103篇
  2020年   61篇
  2019年   62篇
  2018年   60篇
  2017年   63篇
  2016年   30篇
  2015年   20篇
  2014年   42篇
  2013年   41篇
  2012年   31篇
  2011年   28篇
  2010年   17篇
  2009年   11篇
  2008年   5篇
  2007年   6篇
  2006年   4篇
  2005年   6篇
  2004年   2篇
  2003年   5篇
  2001年   2篇
  2000年   2篇
  1999年   3篇
  1998年   3篇
  1997年   5篇
  1996年   4篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1989年   1篇
  1987年   1篇
  1977年   1篇
排序方式: 共有746条查询结果,搜索用时 15 毫秒
1.
Vimentin, a type III intermediate filament protein, is found in most cells along with microfilaments and microtubules. It has been shown that the head domain folds back to associate with the rod domain and this association is essential for filament assembly. The N-terminally tagged vimentin has been widely used to label the cytoskeleton in live cell imaging. Although there is previous evidence that EGFP tagged vimentin fails to form filaments but is able to integrate into a pre-existing network, no study has systematically investigated or established a molecular basis for this observation. To determine whether a tag would affect de novo filament assembly, we used vimentin fused at the N-terminus with two different sized tags, AcGFP (239 residues, 27 kDa) and 3 × FLAG (22 residues; 2.4 kDa) to assemble into filaments in two vimentin-deficient epithelial cells, MCF-7 and A431. We showed that regardless of tag size, N-terminally tagged vimentin aggregated into globules with a significant proportion co-aligning with β-catenin at cell–cell junctions. However, the tagged vimentin aggregates could form filaments upon adding untagged vimentin at a ratio of 1:1 or when introduced into cells containing pre-existing filaments. The resultant filament network containing a mixture of tagged and untagged vimentin was less stable compared to that formed by only untagged vimentin. The data suggest that placing a tag at the N-terminus may create steric hinderance in case of a large tag (AcGFP) or electrostatic repulsion in case of highly charged tag (3 × FLAG) perhaps inducing a conformational change, which deleteriously affects the association between head and rod domains. Taken together our results shows that a free N-terminus is essential for filament assembly as N-terminally tagged vimentin is not only incapable of forming filaments, but it also destabilises when integrated into a pre-existing network.  相似文献   
2.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting...  相似文献   
3.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
4.
The prediction of propagation loss is a practical non-linear function approximation problem which linear regression or auto-regression models are limited in their ability to handle. However, some computational Intelligence techniques such as artificial neural networks (ANNs) and adaptive neuro-fuzzy inference systems (ANFISs) have been shown to have great ability to handle non-linear function approximation and prediction problems. In this study, the multiple layer perceptron neural network (MLP-NN), radial basis function neural network (RBF-NN) and an ANFIS network were trained using actual signal strength measurement taken at certain suburban areas of Bauchi metropolis, Nigeria. The trained networks were then used to predict propagation losses at the stated areas under differing conditions. The predictions were compared with the prediction accuracy of the popular Hata model. It was observed that ANFIS model gave a better fit in all cases having higher R2 values in each case and on average is more robust than MLP and RBF models as it generalises better to a different data.  相似文献   
5.
The mobile cloud computing (MCC) has enriched the quality of services that the clients access from remote cloud‐based servers. The growth in the number of wireless users for MCC has further augmented the requirement for a robust and efficient authenticated key agreement mechanism. Formerly, the users would access cloud services from various cloud‐based service providers and authenticate one another only after communicating with the trusted third party (TTP). This requirement for the clients to access the TTP during each mutual authentication session, in earlier schemes, contributes to the redundant latency overheads for the protocol. Recently, Tsai et al have presented a bilinear pairing based multi‐server authentication (MSA) protocol, to bypass the TTP, at least during mutual authentication. The scheme construction works fine, as far as the elimination of TTP involvement for authentication has been concerned. However, Tsai et al scheme has been found vulnerable to server spoofing attack and desynchronization attack, and lacks smart card‐based user verification, which renders the protocol inapt for practical implementation in different access networks. Hence, we have proposed an improved model designed with bilinear pairing operations, countering the identified threats as posed to Tsai scheme. Additionally, the proposed scheme is backed up by performance evaluation and formal security analysis.  相似文献   
6.

SDN enables a new networking paradigm probable to improve system efficiency where complex networks are easily managed and controlled. SDN allows network virtualization and advance programmability for customizing the behaviour of networking devices with user defined features even at run time. SDN separates network control and data planes. Intelligently controlled network management and operation, such that routing is eliminated from forwarding elements (switches) while shifting the routing logic in a centralized module named SDN Controller. Mininet is Linux based network emulator which is cost effective for implementing SDN having in built support of OpenFlow switches. This paper presents practical implementation of Mininet with ns-3 using Wi-Fi. Previous results reported in literature were limited upto 512 nodes in Mininet. Tests are conducted in Mininet by varying number of nodes in two distinct scenarios based on scalability and resource capabilities of the host system. We presented a low cost and reliable method allowing scalability with authenticity of results in real time environment. Simulation results show a marked improvement in time required for creating a topology designed for 3 nodes with powerful resources i.e. only 0.077 sec and 4.512 sec with limited resources, however with 2047 nodes required time is 1623.547 sec for powerful resources and 4615.115 sec with less capable resources respectively.

  相似文献   
7.
ABSTRACT

Outdoor positioning systems based on the Global Navigation Satellite System have several shortcomings that have deemed their use for indoor positioning impractical. Location fingerprinting, which utilizes machine learning, has emerged as a viable method and solution for indoor positioning due to its simple concept and accurate performance. In the past, shallow learning algorithms were traditionally used in location fingerprinting. Recently, the research community started utilizing deep learning methods for fingerprinting after witnessing the great success and superiority these methods have over traditional/shallow machine learning algorithms. This paper provides a comprehensive review of deep learning methods in indoor positioning. First, the advantages and disadvantages of various fingerprint types for indoor positioning are discussed. The solutions proposed in the literature are then analyzed, categorized, and compared against various performance evaluation metrics. Since data is key in fingerprinting, a detailed review of publicly available indoor positioning datasets is presented. While incorporating deep learning into fingerprinting has resulted in significant improvements, doing so, has also introduced new challenges. These challenges along with the common implementation pitfalls are discussed. Finally, the paper is concluded with some remarks as well as future research trends.  相似文献   
8.
Wireless Networks - This research article presents an innovative approach based on analog network coding (ANC) in conjunction with space time block coding (STBC) which is termed as space time...  相似文献   
9.
This research examines route diversity as a fade mitigation technique in the presence of rain, for terrestrial microwave links. The improvement in availability due to diversity depends upon the complex spatio-temporal properties of rainfall. To produce a general model to predict the advantage due to route diversity it is necessary to be able to predict the correlation of rain attenuation on arbitrary pairs of microwave links. This is achieved by examination of a database of radar derived rain rate fields. Given a representative sample of rain field images, the joint rain attenuation statistics of arbitrary configurations of terrestrial links can be estimated. Existing rain field databases often yield very small numbers of high joint attenuation events. Consequently, estimates of the probability of joint high attenuation events derived from ratios of the number of occurrences can be highly inaccurate. This paper assumes that pairs of terrestrial microwave links have joint rain attenuation distributions that are bi-lognormally distributed. Four of the five distribution parameters can be estimated from ITU-R models. A maximum likelihood estimation (MLE) method is used to estimate the fifth parameter, i.e., the covariance or correlation. The predicted diversity statistics vary smoothly and yield plausible extrapolations into low probability situations.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号