首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   692篇
  免费   36篇
  国内免费   6篇
电工技术   9篇
综合类   3篇
化学工业   125篇
金属工艺   10篇
机械仪表   26篇
建筑科学   17篇
矿业工程   1篇
能源动力   39篇
轻工业   67篇
水利工程   8篇
石油天然气   8篇
无线电   93篇
一般工业技术   154篇
冶金工业   16篇
原子能技术   9篇
自动化技术   149篇
  2024年   6篇
  2023年   29篇
  2022年   64篇
  2021年   78篇
  2020年   47篇
  2019年   63篇
  2018年   56篇
  2017年   57篇
  2016年   43篇
  2015年   19篇
  2014年   35篇
  2013年   50篇
  2012年   31篇
  2011年   33篇
  2010年   22篇
  2009年   15篇
  2008年   11篇
  2007年   10篇
  2006年   4篇
  2005年   6篇
  2004年   3篇
  2003年   6篇
  2002年   7篇
  2001年   4篇
  2000年   2篇
  1999年   2篇
  1998年   6篇
  1997年   9篇
  1996年   3篇
  1995年   4篇
  1994年   2篇
  1993年   1篇
  1992年   3篇
  1989年   1篇
  1987年   1篇
  1977年   1篇
排序方式: 共有734条查询结果,搜索用时 11 毫秒
1.
Vimentin, a type III intermediate filament protein, is found in most cells along with microfilaments and microtubules. It has been shown that the head domain folds back to associate with the rod domain and this association is essential for filament assembly. The N-terminally tagged vimentin has been widely used to label the cytoskeleton in live cell imaging. Although there is previous evidence that EGFP tagged vimentin fails to form filaments but is able to integrate into a pre-existing network, no study has systematically investigated or established a molecular basis for this observation. To determine whether a tag would affect de novo filament assembly, we used vimentin fused at the N-terminus with two different sized tags, AcGFP (239 residues, 27 kDa) and 3 × FLAG (22 residues; 2.4 kDa) to assemble into filaments in two vimentin-deficient epithelial cells, MCF-7 and A431. We showed that regardless of tag size, N-terminally tagged vimentin aggregated into globules with a significant proportion co-aligning with β-catenin at cell–cell junctions. However, the tagged vimentin aggregates could form filaments upon adding untagged vimentin at a ratio of 1:1 or when introduced into cells containing pre-existing filaments. The resultant filament network containing a mixture of tagged and untagged vimentin was less stable compared to that formed by only untagged vimentin. The data suggest that placing a tag at the N-terminus may create steric hinderance in case of a large tag (AcGFP) or electrostatic repulsion in case of highly charged tag (3 × FLAG) perhaps inducing a conformational change, which deleteriously affects the association between head and rod domains. Taken together our results shows that a free N-terminus is essential for filament assembly as N-terminally tagged vimentin is not only incapable of forming filaments, but it also destabilises when integrated into a pre-existing network.  相似文献   
2.
Structural and optoelectronic properties of BaThO3 cubic perovskite are calculated using all electrons full potential linearized augmented plane wave (FP-LAPW) method. Wide and direct band gap, 5.7 eV, of the compound predicts that it can be effectively used in UV based optoelectronic devices. Different characteristic peaks in the wide UV range emerges mainly due to the transition of electrons between valance band state O-p and conduction band states Ba-d, Ba-f, Th-f and Th-d.  相似文献   
3.
Traffic load balancing in data centers is an important requirement. Traffic dynamics and possibilities of changes in the topology (e.g., failures and asymmetries) make load balancing a challenging task. Existing end‐host–based schemes either employ the predominantly used ECN or combine it with RTT to get congestion information of paths. Both congestion signals, ECN and RTT, have limitations; ECN only tells whether the queue length is above or below a threshold value but does not inform about the extent of congestion; similarly, RTT in data center networks is on the scale of up to few hundreds of microseconds, and current data center operating systems lack fine‐grained microsecond‐level timers. Therefore, there is a need of a new congestion signal which should give accurate information of congestion along the path. Furthermore, in end‐host–based schemes, detecting asymmetries in the topology is challenging due to the inability to accurately measure RTT on the scale of microseconds. This paper presents QLLB, an end‐host–based, queue length–based load balancing scheme. QLLB employs a new queue length–based congestion signal that gives an exact measure of congestion along the paths. Furthermore, QLLB uses relative‐RTT to detect asymmetries in the topology. QLLB is implemented in ns‐3 and compared with ECMP, CONGA, and Hermes. The results show that QLLB significantly improves performance of short flows over the other schemes and performs within acceptable level, of CONGA and Hermes, for long flows. In addition, QLLB effectively detects asymmetric paths and performs better than Hermes under high loads.  相似文献   
4.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting...  相似文献   
5.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
6.
The prediction of propagation loss is a practical non-linear function approximation problem which linear regression or auto-regression models are limited in their ability to handle. However, some computational Intelligence techniques such as artificial neural networks (ANNs) and adaptive neuro-fuzzy inference systems (ANFISs) have been shown to have great ability to handle non-linear function approximation and prediction problems. In this study, the multiple layer perceptron neural network (MLP-NN), radial basis function neural network (RBF-NN) and an ANFIS network were trained using actual signal strength measurement taken at certain suburban areas of Bauchi metropolis, Nigeria. The trained networks were then used to predict propagation losses at the stated areas under differing conditions. The predictions were compared with the prediction accuracy of the popular Hata model. It was observed that ANFIS model gave a better fit in all cases having higher R2 values in each case and on average is more robust than MLP and RBF models as it generalises better to a different data.  相似文献   
7.
The mobile cloud computing (MCC) has enriched the quality of services that the clients access from remote cloud‐based servers. The growth in the number of wireless users for MCC has further augmented the requirement for a robust and efficient authenticated key agreement mechanism. Formerly, the users would access cloud services from various cloud‐based service providers and authenticate one another only after communicating with the trusted third party (TTP). This requirement for the clients to access the TTP during each mutual authentication session, in earlier schemes, contributes to the redundant latency overheads for the protocol. Recently, Tsai et al have presented a bilinear pairing based multi‐server authentication (MSA) protocol, to bypass the TTP, at least during mutual authentication. The scheme construction works fine, as far as the elimination of TTP involvement for authentication has been concerned. However, Tsai et al scheme has been found vulnerable to server spoofing attack and desynchronization attack, and lacks smart card‐based user verification, which renders the protocol inapt for practical implementation in different access networks. Hence, we have proposed an improved model designed with bilinear pairing operations, countering the identified threats as posed to Tsai scheme. Additionally, the proposed scheme is backed up by performance evaluation and formal security analysis.  相似文献   
8.

SDN enables a new networking paradigm probable to improve system efficiency where complex networks are easily managed and controlled. SDN allows network virtualization and advance programmability for customizing the behaviour of networking devices with user defined features even at run time. SDN separates network control and data planes. Intelligently controlled network management and operation, such that routing is eliminated from forwarding elements (switches) while shifting the routing logic in a centralized module named SDN Controller. Mininet is Linux based network emulator which is cost effective for implementing SDN having in built support of OpenFlow switches. This paper presents practical implementation of Mininet with ns-3 using Wi-Fi. Previous results reported in literature were limited upto 512 nodes in Mininet. Tests are conducted in Mininet by varying number of nodes in two distinct scenarios based on scalability and resource capabilities of the host system. We presented a low cost and reliable method allowing scalability with authenticity of results in real time environment. Simulation results show a marked improvement in time required for creating a topology designed for 3 nodes with powerful resources i.e. only 0.077 sec and 4.512 sec with limited resources, however with 2047 nodes required time is 1623.547 sec for powerful resources and 4615.115 sec with less capable resources respectively.

  相似文献   
9.
Wireless Networks - This research article presents an innovative approach based on analog network coding (ANC) in conjunction with space time block coding (STBC) which is termed as space time...  相似文献   
10.
This research examines route diversity as a fade mitigation technique in the presence of rain, for terrestrial microwave links. The improvement in availability due to diversity depends upon the complex spatio-temporal properties of rainfall. To produce a general model to predict the advantage due to route diversity it is necessary to be able to predict the correlation of rain attenuation on arbitrary pairs of microwave links. This is achieved by examination of a database of radar derived rain rate fields. Given a representative sample of rain field images, the joint rain attenuation statistics of arbitrary configurations of terrestrial links can be estimated. Existing rain field databases often yield very small numbers of high joint attenuation events. Consequently, estimates of the probability of joint high attenuation events derived from ratios of the number of occurrences can be highly inaccurate. This paper assumes that pairs of terrestrial microwave links have joint rain attenuation distributions that are bi-lognormally distributed. Four of the five distribution parameters can be estimated from ITU-R models. A maximum likelihood estimation (MLE) method is used to estimate the fifth parameter, i.e., the covariance or correlation. The predicted diversity statistics vary smoothly and yield plausible extrapolations into low probability situations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号