首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   164篇
  免费   8篇
电工技术   3篇
化学工业   12篇
机械仪表   1篇
建筑科学   6篇
矿业工程   1篇
能源动力   15篇
轻工业   9篇
无线电   17篇
一般工业技术   22篇
冶金工业   34篇
自动化技术   52篇
  2023年   3篇
  2022年   1篇
  2021年   5篇
  2020年   5篇
  2019年   3篇
  2018年   4篇
  2017年   5篇
  2016年   2篇
  2015年   4篇
  2014年   6篇
  2013年   9篇
  2012年   12篇
  2011年   11篇
  2010年   10篇
  2009年   4篇
  2008年   17篇
  2007年   3篇
  2006年   5篇
  2005年   2篇
  2004年   7篇
  2003年   8篇
  2002年   3篇
  2000年   1篇
  1999年   1篇
  1998年   12篇
  1997年   8篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1993年   4篇
  1992年   3篇
  1991年   1篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1981年   1篇
  1978年   1篇
  1976年   1篇
排序方式: 共有172条查询结果,搜索用时 46 毫秒
1.
Medical indications for in vitro fertilization and embryo transfer (IVF-ET) internationally and in Denmark are reviewed. Reports from large international centres document that tubal infertility, unexplained infertility, endometriosis and male infertility are equally good indications for IVF. Traditionally, tubal infertility has been the only medical indication qualifying for IVF treatment within the National Health Service in Denmark. Thus, in this country, couples with unexplained and male infertility and with endometriosis have to pay up to 25,000 D.Kr. per IVF-ET treatment in private fertility clinics. Since there is no scientific basis for this discrimination, it is urged that the present rules are changed, so that couples with unexplained and male infertility and endometriosis are also allowed IVF treatment free of charge in the public fertility clinics.  相似文献   
2.
Rapid development within the fields of both fragment-based drug discovery (FBDD) and medicinal targeting of RNA provides possibilities for combining technologies and methods in novel ways. This review provides an overview of fragment-based screening (FBS) against RNA targets, including a discussion of the most recently used screening and hit validation methods such as NMR spectroscopy, X-ray crystallography, and virtual screening methods. A discussion of fragment library design based on research from small-molecule RNA binders provides an overview on both the currently limited guidelines within RNA-targeting fragment library design, and future possibilities. Finally, future perspectives are provided on screening and hit validation methods not yet used in combination with both fragment screening and RNA targets.  相似文献   
3.
Runtime monitoring is an established technique to enforce a wide range of program safety and security properties. We present a formalization of monitoring and monitor inlining, for the Java Virtual Machine. Monitors are security automata given in a special-purpose monitor specification language, ConSpec. The automata operate on finite or infinite strings of calls to a fixed API, allowing local dependencies on parameter values and heap content. We use a two-level class file annotation scheme to characterize two key properties: (i) that the program is correct with respect to the monitor as a constraint on allowed program behavior, and (ii) that the program has a copy of the given monitor embedded into it. As the main application of these results we sketch a simple inlining algorithm and show how the two-level annotations can be completed to produce a fully annotated program which is valid in the standard sense of Floyd/Hoare logic. This establishes the mediation property that inlined programs are guaranteed to adhere to the intended policy. Furthermore, validity can be checked efficiently using a weakest precondition based annotation checker, thus preparing the ground for on-device checking of policy adherence in a proof-carrying code setting.  相似文献   
4.
In order to obtain high quality data, the correction of atmospheric perturbations acting upon land surface reflectance measurements recorded by a space-based sensor is an important topic within remote sensing. For many years the Second Simulation of the Satellite Signal in the Solar Spectrum (6S) radiative transfer model and the Simplified Method for Atmospheric Correction (SMAC) codes have been used for this atmospheric correction, but previous studies have shown that in a number of situations the quality of correction provided by the SMAC is low. This paper describes a method designed to improve the quality of the SMAC atmospheric correction algorithm through a slight increase in its computational complexity. Data gathered from the SEVIRI aboard Meteosat Second Generation (MSG) is used to validate the additions to SMAC, both by comparison to simulated data corrected using the highly accurate 6S method and by comparison to in-situ and 6S corrected SEVIRI data gathered for two field sites in Africa. The additions to the SMAC are found to greatly increase the quality of atmospheric correction performed, as well as broaden the range of atmospheric conditions under which the SMAC can be applied. When examining the Normalised Difference Vegetation Index (NDVI), the relative difference between SMAC and in-situ values decreases by 1.5% with the improvements in place. Similarly, the mean relative difference between SMAC and 6S reflectance values decreases by a mean of 13, 14.5 and 8.5% for Channels 1, 2 and 3 respectively. Furthermore, the processing speed of the SMAC is found to remain largely unaffected, with only a small increase in the time taken to process a full SEVIRI scene. Whilst the method described within this paper is only applicable to SEVIRI data, a similar approach can be applied to other data sources than SEVIRI, and should result in a similar accuracy improvement no matter which instrument supplies the original data.  相似文献   
5.
Service Composition Issues in Pervasive Computing   总被引:2,自引:0,他引:2  
Providing new services by combining existing ones—or service composition—is an idea pervading pervasive computing. Pervasive computing technologies seek to concurrently exhibit context awareness, manage contingencies, leverage device heterogeneity, and empower users. These four goals prompt service-composition-mechanism design requirements that are unique to pervasive computing. This article catalogs service composition mechanisms and describes their variation points, which indicate how well the resulting compositions meet the four goals.  相似文献   
6.
We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in L.  相似文献   
7.
We present a new algorithm for maximum likelihood convolutive independent component analysis (ICA) in which components are unmixed using stable autoregressive filters determined implicitly by estimating a convolutive model of the mixing process. By introducing a convolutive mixing model for the components, we show how the order of the filters in the model can be correctly detected using Bayesian model selection. We demonstrate a framework for deconvolving a subspace of independent components in electroencephalography (EEG). Initial results suggest that in some cases, convolutive mixing may be a more realistic model for EEG signals than the instantaneous ICA model.  相似文献   
8.
Research on cross-modal performance in nonhuman primates is limited to a small number of sensory modalities and testing methods. To broaden the scope of this research, the authors tested capuchin monkeys (Cebus apella) for a seldom-studied cross-modal capacity in nonhuman primates, auditory-visual recognition. Monkeys were simultaneously played 2 video recordings of a face producing different vocalizations and a sound recording of 1 of the vocalizations. Stimulus sets varied from naturally occurring conspecific vocalizations to experimentally controlled human speech stimuli. The authors found that monkeys preferred to view face recordings that matched presented vocal stimuli. Their preference did not differ significantly across stimulus species or other stimulus features. However, the reliability of the latter set of results may have been limited by sample size. From these results, the authors concluded that capuchin monkeys exhibit auditory-visual cross-modal perception of conspecific vocalizations. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
9.
Region-Based Memory Management   总被引:1,自引:0,他引:1  
This paper describes a memory management discipline for programs that perform dynamic memory allocation and de-allocation. At runtime, all values are put intoregions. The store consists of a stack of regions. All points of region allocation and de-allocation are inferred automatically, using a type and effect based program analysis. The scheme does not assume the presence of a garbage collector. The scheme was first presented in 1994 (M. Tofte and J.-P. Talpin,in“Proceedings of the 21st ACM SIGPLAN–SIGACT Symposium on Principles of Programming Languages,” pp. 188–201); subsequently, it has been tested in The ML Kit with Regions, a region-based, garbage-collection free implementation of the Standard ML Core language, which includes recursive datatypes, higher-order functions and updatable references L. Birkedal, M. Tofte, and M. Vejlstrup, (1996),in“Proceedings of the 23 rd ACM SIGPLAN–SIGACT Symposium on Principles of Programming Languages,” pp. 171–183. This paper defines a region-based dynamic semantics for a skeletal programming language extracted from Standard ML. We present the inference system which specifies where regions can be allocated and de-allocated and a detailed proof that the system is sound with respect to a standard semantics. We conclude by giving some advice on how to write programs that run well on a stack of regions, based on practical experience with the ML Kit.  相似文献   
10.
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services. Given a dependency specification, stating how API methods can produce and consume secret information, we propose an information flow property based on the idea of invariance under perturbation, relating observable changes in output to corresponding changes in input. Besides the information flow condition itself, the main contributions of the paper are results relating the admissibility property to a direct flow property in the special case of programs which branch on secrets only in cases permitted by the dependency rules. These results are used to derive an unwinding theorem, reducing a behavioural correctness check (strong bisimulation) to an invariant.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号