全文获取类型
收费全文 | 87篇 |
免费 | 2篇 |
专业分类
化学工业 | 5篇 |
轻工业 | 2篇 |
无线电 | 33篇 |
一般工业技术 | 4篇 |
冶金工业 | 6篇 |
自动化技术 | 39篇 |
出版年
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2018年 | 2篇 |
2017年 | 4篇 |
2016年 | 2篇 |
2015年 | 2篇 |
2014年 | 3篇 |
2013年 | 7篇 |
2011年 | 1篇 |
2010年 | 3篇 |
2009年 | 3篇 |
2008年 | 5篇 |
2007年 | 3篇 |
2006年 | 3篇 |
2005年 | 4篇 |
2004年 | 3篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 6篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有89条查询结果,搜索用时 15 毫秒
21.
The interpretation of tracer experiments in closed circulating systems is studied from the viewpoint of applied probability theory. It is shown that basic quantities and characteristics of the system, such as mean round time and its variability as well as the average volumetric flow rate cannot be extracted from the tracer response even if two concentration histories — one at the injection site and one at an arbitrary location on the same flow path—are simultaneously recorded. The observed tracer responses are compatible with many feasible underlying round-time distributions (transport functions) and a many-one correspondence rather than a one-one correspondence between circulation time probability density and concentration history is shown to exist. This indeterminacy is inherent and stems from the recirculation within the system. A value that can be determined is the maximum flow consistent with the measurements; any value below this maximum leads to feasible round-time distribution functions. The theory presented in this study leads to estimation procedures—pertaining to maximum feasible flow—which are completely free of prior distribution assumptions. 相似文献
22.
Chor B. Fiat A. Naor M. Pinkas B. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2000,46(3):893-910
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are given to paying customers. If a pirate decoder is found, it is desirable to reveal the source of its decryption keys. We describe fully resilient schemes which can be used against any decoder which decrypts with nonnegligible probability. Since there is typically little demand for decoders which decrypt only a small fraction of the transmissions (even if it is nonnegligible), we further introduce threshold tracing schemes which can only be used against decoders which succeed in decryption with probability greater than some threshold. Threshold schemes are considerably more efficient than fully resilient schemes 相似文献
23.
24.
Zohar Naor 《Wireless Communications and Mobile Computing》2005,5(7):733-748
The issue of providing a mobile virtual private network (MVPN) service by a cellular network is addressed in this study. The main focus of this study is on two aspects of MVPN handling: a multicast transmission, and location management of the MVPN members. Virtual private networks (VPNs) already exist in wired networks. The growing number of mobile users increases the demand for mobile services. It is expected that future wireless networks will have to provide wireless internet services, and in particular, to support MVPNs. In order to maintain an MVPN service offering, the system must support an efficient information delivery to the MVPN members. In order to achieve this goal, the physical locations of the MVPN members must be known to the system. In this study, we present methods to efficiently route and transmit information to the MVPN members, without affecting the quality of the personal service provided to each and every MVPN member. It is shown that the wireless MVPN bandwidth requirement is significantly less than the equivalent bandwidth required by a wired VPN. The offered bandwidth utilization is significantly better than the efficiency of IP‐based multicast transmission in the Internet, and the proposed IP‐based multicast transmission in cellular networks. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
25.
This paper deals with approximating feedback sets in directed graphs. We consider two related problems: the weighted feedback vertex set (FVS) problem, and the weighted feedback edge set (FES) problem. In the {FVS} (resp. FES) problem, one is given a directed graph with weights (each of which is at least one) on the vertices (resp. edges), and is
asked to find a subset of vertices (resp. edges) with minimum total weight that intersects every directed cycle in the graph.
These problems are among the classical NP-hard problems and have many applications. We also consider a generalization of these
problems: subset-fvs and subset-fes, in which the feedback set has to intersect only a subset of the directed cycles in the graph. This subset consists of all
the cycles that go through a distinguished input subset of vertices and edges, denoted by X . This generalization is also NP-hard even when |X|=2 . We present approximation algorithms for the subset-fvs and subset-fes problems. The first algorithm we present achieves an approximation factor of O(log
2
|X|) . The second algorithm achieves an approximation factor of O(min{log τ
*
log log τ
*
, log n log log n)} , where τ
*
is the value of the optimum fractional solution of the problem at hand, and n is the number of vertices in the graph. We also define a multicut problem in a special type of directed networks which we
call circular networks, and show that the subset-fes and subset-fvs problems are equivalent to this multicut problem. Another contribution of our paper is a combinatorial algorithm that computes a (1+ɛ) approximation to the fractional optimal feedback vertex set. Computing the approximate solution is much simpler and more
efficient than general linear programming methods. All of our algorithms use this approximate solution.
Received May 31, 1995; revised June 11, 1996, and October 9, 1996. 相似文献
26.
Naor MM Walker MD Van Brocklyn JR Tigyi G Parrill AL 《Journal of molecular graphics & modelling》2007,26(2):519-528
The dissociation constant for an ionizable ligand binding to a receptor is dependent on its charge and therefore on its environmentally-influenced pKa value. The pKa values of sphingosine 1-phosphate (S1P) were studied computationally in the context of the wild type S1P1 receptor and the following mutants: E3.29Q, E3.29A, and K5.38A. Calculated pKa values indicate that S1P binds to S1P1 and its site mutants with a total charge of -1, including a +1 charge on the ammonium group and a -2 charge on the phosphate group. The dissociation constant of S1P binding to these receptors was studied as well. The models of wild type and mutant proteins originated from an active receptor model that was developed previously. We used ab initio RHF/6-31+G(d) to optimize our models in aqueous solution, where the solvation energy derivatives are represented by conductor-like polarizable continuum model (C-PCM) and integral equation formalism polarizable continuum model (IEF-PCM). Calculation of the dissociation constant for each mutant was determined by reference to the experimental dissociation constant of the wild type receptor. The computed dissociation constants of the E3.29Q and E3.29A mutants are three to five orders of magnitude higher than those for the wild type receptor and K5.38A mutant, indicating vital contacts between the S1P phosphate group and the carboxylate group of E3.29. Computational dissociation constants for K5.38A, E3.29A, and E3.29Q mutants were compared with experimentally determined binding and activation data. No measurable binding of S1P to the E3.29A and E3.29Q mutants was observed, supporting the critical contacts observed computationally. These results validate the quantitative accuracy of the model. 相似文献
27.
28.
29.
Sarah Kraus Outhiriaradjou Benard Zvi Naor Rony Seger 《International journal of molecular sciences》2020,21(22)
The key participants in G-protein-coupled receptor (GPCR) signaling are the mitogen-activated protein kinase (MAPK) signaling cascades. The mechanisms involved in the activation of the above cascades by GPCRs are not fully elucidated. The prototypical GPCR is the receptor for gonadotropin-releasing hormone (GnRHR), which serves as a key regulator of the reproductive system. Here, we expressed GnRHR in COS7 cells and found that GnRHR transmits its signals to MAPKs mainly via Gαi and the EGF receptor, without the involvement of Hb-EGF or PKCs. The main pathway that leads to JNK activation downstream of the EGF receptor involves a sequential activation of c-Src and PI3K. ERK activation by GnRHR is mediated by the EGF receptor, which activates Ras either directly or via c-Src. Beside the main pathway, the dissociated Gβγ and β-arrestin may initiate additional (albeit minor) pathways that lead to MAPK activation in the transfected COS7 cells. The pathways detected are significantly different from those in other GnRHR-bearing cells, indicating that GnRH can utilize various signaling mechanisms for MAPK activation. The unique pathway elucidated here, in which c-Src and PI3K are sequentially activated downstream of the EGF receptor, may serve as a prototype of signaling mechanisms by GnRHR and additional GPCRs in various cell types. 相似文献
30.
Our goal is to design encryption schemes for mass distribution of data , which enable to (1) deter users from leaking their personal keys, (2) trace the identities of users whose keys were used to construct illegal decryption devices, and (3) revoke these keys as to render the devices dysfunctional. We start by designing an efficient revocation scheme, based on secret sharing. It can remove up to t parties, is secure against coalitions of up to t users, and is more efficient than previous schemes with the same properties. We then show how to enhance the revocation scheme with traitor tracing and self-enforcement properties. More precisely, how to construct schemes such that (1) each user’s personal key contains some sensitive information of that user (e.g., the user’s credit card number), in order to make users reluctant to disclose their keys. (2) An illegal decryption device discloses the identity of users that contributed keys to construct the device. And, (3) it is possible to revoke the keys of corrupt users. For the last point, it is important to be able to do so without publicly disclosing the sensitive information. 相似文献