全文获取类型
收费全文 | 30篇 |
免费 | 0篇 |
专业分类
化学工业 | 3篇 |
建筑科学 | 2篇 |
无线电 | 18篇 |
冶金工业 | 3篇 |
原子能技术 | 2篇 |
自动化技术 | 2篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2020年 | 1篇 |
2019年 | 1篇 |
2017年 | 1篇 |
2013年 | 1篇 |
2008年 | 1篇 |
2007年 | 1篇 |
2006年 | 1篇 |
2005年 | 1篇 |
2004年 | 2篇 |
2003年 | 4篇 |
2002年 | 1篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1986年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1971年 | 1篇 |
排序方式: 共有30条查询结果,搜索用时 0 毫秒
11.
Dr. Maria J. S. A. Silva Dr. Robin Vinck Youchao Wang Dr. Bruno Saubaméa Dr. Mickaël Tharaud Elena Dominguez-Jurado Dr. Johannes Karges Prof. Dr. Pedro M. P. Gois Prof. Dr. Gilles Gasser 《Chembiochem : a European journal of chemical biology》2023,24(4):e202200647
An increasing number of novel Ru(II) polypyridyl complexes have been successfully applied as photosensitizers (PSs) for photodynamic therapy (PDT). Despite recent advances in optimized PSs with refined photophysical properties, the lack of tumoral selectivity is often a major hurdle for their clinical development. Here, classical maleimide and versatile NHS-activated acrylamide strategies were employed to site-selectively conjugate a promising Ru(II) polypyridyl complex to the N-terminally Cys-modified Bombesin (BBN) targeting unit. Surprisingly, the decreased cell uptake of these novel Ru-BBN conjugates in cancer cells did not hamper the high phototoxic activity of the Ru-containing bioconjugates and even decreased the toxicity of the constructs in the absence of light irradiation. Overall, although deceiving in terms of selectivity, our new bioconjugates could still be useful for advanced cancer treatment due to their nontoxicity in the dark. 相似文献
12.
W. Vinck 《Nuclear Engineering and Design》1986,93(2-3)
At first the broad situation is analyzed with regard to the use — in safety analysis and the licensing process and decisions to be made — of probabilistic risk or safety assessment. The development of quantified objectives is noted, highlighting these can be quite different in nature and in status; the various types of objectives are illustrated.Because of the relation of the Seminar to the SMiRT-Conference, as a practical specific example of respective deterministic and probabilistic approaches, an application in structural mechanics is described: criteria for the resistance of the primary boundary against various types of degradation and loadings. 相似文献
13.
Jurgen Haring Vinck A.J.H. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(5):1251-1260
We discuss the decoding of error-correcting block codes over complex numbers for the transmission over impulsive noise channels. The encoder multiplies a vector of complex information symbols resulting from a modulation scheme, e.g., quadrature amplitude modulation (QAM), with a unitary generator matrix G. Choosing the inverse Fourier transform as G, the encoding procedure is similar to orthogonal frequency-division multiplex (OFDM) modulation. The maximum a posteriori (MAP) receiver is analyzed and a suboptimum decoder based on the turbo decoding principle is derived. Simulation results show the excellent performance of the iterative decoder. 相似文献
14.
Permutation coding for multi-user communication schemes that originate from the Fast Frequency Hopping/Multiple Frequency Shift Keying modulation is investigated. Each sender is either passive or sends some signal formed as the concatenation of M elementary signals having M different specified frequencies. There is also a jammer, who can introduce disturbances. A single disturbance is either sending the signal that contains all M frequencies at a certain time instant or sending some elementary signal at all time instants. Each receiver receives a vector of M sets, where a set at each time instant contains a fixed frequency if and only if the corresponding elementary signal was sent by either some sender or the jammer. The task of the receiver is to uniquely decode the message of his sender. We present regular constructions of permutation codes for this scheme given the following parameters: the number of frequencies, number of pairs (sender, receiver), number of messages per sender, and maximum number of disturbances of the jammer. 相似文献
15.
Alain Richard Ndjiongue Thokozani Shongwe Hendrik Christoffel Ferreira Telex M. N. Ngatched A. J. Han Vinck 《Telecommunication Systems》2017,64(1):173-192
This paper presents an efficient technique to map phase shift keying (PSK) signalling to colour shift keying (CSK) constellation, to establish a full link in hybrid systems involving the radio frequency (RF) and the visible spectrum. It fits in systems combining (first link) wireless communication technologies such as the wireless fidelity (WiFi) or wired communication technologies such as power line communications (PLC) to visible light communications (VLC) technology (second link). On the first link, PSK technique is used to convey the information, while, on the second link, a technique based on colour variation is deployed. WiFi standards targeted are those that employ PSK as sub-carrier modulation techniques (IEEE 802.11a/11g/11n). The PSK complex constellation observed at the output of the first link is converted into colours using the hue-saturation-value/intensity (HSV/I) colour models. The constant lighting required in VLC corresponds with the coordinate I of the HSI and the colour constraint is met by assigning adequate current intensities to the red-green-blue LEDs (RGB-LEDs) used. The design meets the requirements of CSK constellation design outlined in IEEE 802.15.7. The performance of the system is analysed through bit error rate curves obtained by simulations, for binary PSK (BPSK) and quadrature PSK (QPSK), 8PSK and 16PSK constellations. The results show that as the constellation size increases, the performance of the system decreases. 相似文献
16.
Kuzntsov A.V. Han Vinck A.J. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1994,40(6):1866-1871
From an information-theoretical point of view the write once memory (WOM), the unidirectional memory (WUM), the write isolated memory (WIM), the memory with address faults (MAF), Blackwell's broadcast channel, and some other constrained memories and channels with an informed encoder can be considered as particular cases of the general defective channel (GDC) introduced by Kuznetsov (1983) as a generalization of a memory with defects. Using the concept of the GDC we consider a unified approach to the investigation of different types of natural and artificial channels with a finite number of states known to the encoder, but unknown to the decoder. To illustrate the usefulness of this approach we derive the capacities of the above-mentioned constrained memories (WOM, WUM, WIM, MAF) as corollaries of lower and upper bounds for the number of messages transmitted over the GDC 相似文献
17.
18.
Robin Vinck Laetitia Anvi Nguyen Mathilde Munier Lucie Caramelle Diana Karpman Julien Barbier Alain Pruvost Jean-Christophe Cintrat Daniel Gillet 《International journal of molecular sciences》2022,23(23)
A recently developed inhibitor of retrograde transport, namely Retro-2.1, proved to be a potent and broad-spectrum lead in vitro against intracellular pathogens, such as toxins, parasites, intracellular bacteria and viruses. To circumvent its low aqueous solubility, a formulation in poly(ethylene glycol)-block-poly(D,L)lactide micelle nanoparticles was developed. This formulation enabled the study of the pharmacokinetic parameters of Retro-2.1 in mice following intravenous and intraperitoneal injections, revealing a short blood circulation time, with an elimination half-life of 5 and 6.7 h, respectively. To explain the poor pharmacokinetic parameters, the metabolic stability of Retro-2.1 was studied in vitro and in vivo, revealing fast cytochrome-P-450-mediated metabolism into a less potent hydroxylated analogue. Subcutaneous injection of Retro-2.1 formulated in a biocompatible and bioresorbable polymer-based thermosensitive hydrogel allowed for sustained release of the drug, with an elimination half-life of 19 h, and better control of its metabolism. This study provides a guideline on how to administer this promising lead in vivo in order to study its efficacy. 相似文献
19.
Fang-Wei Fu Vinck A.J.H. Wei V.K. Yeung R.W. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(4):649-656
Write-unidirectional memories (WUMs) were introduced by Willems, Vinck, and Borden as an information-theoretic model for storing and updating information on a rewritable medium with the writing constraints: During the odd (resp., even) cycles of updating information, the encoder can only write 1's (resp., 0's) in selected bit positions of WUMs, and not change the contents of other positions. In this correspondence, motivated by the research works of Wolf, Wyner, Ziv, and Ko/spl uml/rner on write-once memories (WOMs), we study the problem of how to reuse a WUM for fixed T successive cycles with nonperiodic codes (i.e., all coding strategies are permitted for every cycle). For the situation where the encoder knows and the decoder does not know the previous content of the memory, we determine the zero-error capacity region, the average capacity, and the maximum total number of information bits stored in the WUM for fixed T successive cycles. Motivated by the research works of Heegard on WOMs with symmetric input noise, we introduce two models of WUMs with symmetric or asymmetric input noise. By using /spl epsiv/-error as performance criterion, we extend the above results for WUMs to the two models of WUMs with symmetric or asymmetric input noise. 相似文献
20.
Vinck H. Post K. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1989,35(4):902-906
The application of a combined test-error-correcting procedure is studied to improve the mean time to failure (MTTF) for degrading memory systems with defects. The degradation is characterized by the probability p that within a unit of time a memory cell changes from the operational state to the permanent defect state. Bounds are given on the MTTF and it is shown that, for memories with N words of k information bits, coding gives an improvement in MTTF proportional to (k /n ) N (d min-2)/(d min -1), where d min and (k /n ) are the minimum distance and the efficiency of the code used, respectively. Thus the time gain for a simple minimum-distance-3 is proportional to N -1. A memory word test is combined with a simple defect-matching code. This yields reliable operation with one defect in a word of length k +2 at a code efficiency k /(k +2) 相似文献