全文获取类型
收费全文 | 59篇 |
免费 | 2篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 8篇 |
建筑科学 | 2篇 |
轻工业 | 4篇 |
无线电 | 26篇 |
一般工业技术 | 4篇 |
冶金工业 | 4篇 |
自动化技术 | 12篇 |
出版年
2022年 | 2篇 |
2021年 | 4篇 |
2019年 | 3篇 |
2018年 | 1篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2015年 | 2篇 |
2014年 | 2篇 |
2013年 | 3篇 |
2012年 | 5篇 |
2011年 | 1篇 |
2010年 | 2篇 |
2009年 | 2篇 |
2008年 | 1篇 |
2007年 | 1篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 2篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有61条查询结果,搜索用时 10 毫秒
1.
2.
Nader Makki Kristina W. Thiel Francis J. Miller Jr. 《International journal of molecular sciences》2013,14(10):20597-20613
The epidermal growth factor receptor (EGFR) family and its ligands serve as a switchboard for the regulation of multiple cellular processes. While it is clear that EGFR activity is essential for normal cardiac development, its function in the vasculature and its role in cardiovascular disease are only beginning to be elucidated. In the blood vessel, endothelial cells and smooth muscle cells are both a source and a target of EGF-like ligands. Activation of EGFR has been implicated in blood pressure regulation, endothelial dysfunction, neointimal hyperplasia, atherogenesis, and cardiac remodeling. Furthermore, increased circulating EGF-like ligands may mediate accelerated vascular disease associated with chronic inflammation. Although EGFR inhibitors are currently being used clinically for the treatment of cancer, additional studies are necessary to determine whether abrogation of EGFR signaling is a potential strategy for the treatment of cardiovascular disease. 相似文献
3.
Tirthankar?GhoshEmail author Niki?Pissinou Kami?Sam?Makki 《Mobile Networks and Applications》2005,10(6):985-995
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical
security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity.
This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper
we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from
the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best
of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts
that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes
in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive
simulation has been carried out to evaluate the design of our protocol.
Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00
and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557.
Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His
area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor
of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University.
Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the
University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University.
She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU.
Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at
Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded
by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network
Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems.
Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer
Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in
Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer
Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland
University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland
in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications,
and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical
program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number
of achievement awards. 相似文献
4.
Burnishing is a profitable process of surface finishing due to its ability to be automated, which makes burnishing method more desirable than other finishing methods. To obtain high surface finish, non-stop operation is required for CNC machine and we can attain that by choosing a suitable trajectory of the finishing tool. In other words, burnishing paths should be multidirectional rather than monotonic, in order to cover uniformly the surface. Indeed, the burnishing force is also a key parameter of the burnishing process because it determines the degree of plastic deformation, and that makes determining the optimum burnishing force an essential step of the burnishing process a success. Therefore, we consider the strategy of ball burnishing path and the burnishing force as variable parameters in this study. In this paper, we propose a new strategy of burnishing tool path with trochoid cycles that achieves a multidirectional burnishing of the surface according to various patterns. Taking into consideration the optimum burnishing force, to improve flat surface finish of AL6061-O samples by reducing the surface roughness parameter (Rz). Experiments carried out on 3-axis milling machine show that the proposed trochoidal path is more effective than the conventional one. 相似文献
5.
Asha Dinesh W. Melody Moh Kia Makki 《International Journal of Communication Systems》1999,12(4):249-279
Asychronous transfer mode (ATM) networks are high‐speed networks with guaranteed quality of service. The main cause of congestion in ATM networks is over utilization of physical bandwidth. Unlike constant bit‐rate (CBR) traffic, the bandwidth reserved by variable bit‐rate (VBR) traffic is not fully utilized at all instances. Hence, this unused bandwidth is allocated to available bit‐rate (ABR) traffic. As the bandwidth used by VBR traffic changes, available bandwidth for ABR traffic varies; i.e., available bandwidth for ABR traffic is inversely proportional to the bandwidth used by the VBR traffic. Based on this fact, a rate‐based congestion control algorithm, Explicit Allowed Rate Algorithm (EARA), is presented in this paper. EARA is compared with Proportional Rate Control Algorithm (PRCA) and Explicit Rate Indication Congestion Avoidance Algorithm (ERICA), in both LAN and WAN environments. Simulations of all three algorithms are conducted under both congestion and fairness configurations with simultaneous generation of CBR, rt‐VBR, nrt‐VBR and ABR traffic. The results show that, with very small over‐head on the switch, EARA significantly decreases the required buffer space and improves the network throughput. Copyright © 1999 John Wiley & Sons, Ltd. 相似文献
6.
In this study, we investigated the antifungal activity of lactose oxidase (LO) as a potential biopreservative in dairy products. Our study objectives were to screen antifungal activity of LO against common mold strains, to detect the minimum inhibitory level of LO against the same strains, and to understand how LO affects the pH and lactic acid bacteria (LAB) counts in set yogurt. Five mold strains (Penicillium chrysogenum, Penicillium citrinum, Penicillium commune, Penicillium decumbens, and Penicillium roqueforti) were used throughout study. These strains were previously isolated from dairy manufacturing plants. Throughout the study, yogurts were stored at 21 ± 2°C for 14 d. Antifungal activity of LO was screened using 2 enzyme levels (1.2 and 12 g/L LO) against selected strains on the surface of a miniature laboratory set-yogurt model. For all tested strains, no visible mold growth was detected on the surface of yogurts covered with LO compared with control yogurt without LO. The minimum inhibitory level of LO against each strain was further investigated using 4 enzyme levels (0.12, 0.48, 0.84, and 1.2 g/L LO) on the miniature laboratory set-yogurt model. We detected 0.84 g/L LO as the minimum level inhibiting visible hyphal growth across strains. The minimum inhibitory level of LO varied for each individual strain. To study the effect of LO on the pH of yogurt, miniature laboratory set-yogurt models were covered with different enzyme levels (0.12, 0.48, 0.84, 1.2, and 12 g/L LO). At d 14, a difference was detected comparing pH values of treatments to control with no LO. Commercial low-fat set yogurt was used to study the effect of LO on LAB survival when yogurt surface was covered with 0.84 g/L LO under the same experimental conditions. Control with no LO was included. At d 14, 3 levels of catalase were added (0, 0.01, and 0.1%) to each treatment. To enumerate LAB, homogenized samples were plated on de Man, Rogosa, and Sharpe agar and incubated. Yogurts with 0.84 g/L LO had lower LAB counts compared with control yogurts, and catalase level did not have a significant effect on LAB counts. Our results demonstrated potential antifungal efficacy of LO against common spoilage organisms in dairy products with residual lactose and relatively low pH. Manufacturers should establish efficacy of LO against mold strains of interest and determine the effects of LO on organoleptic properties and LAB survival in set yogurt. 相似文献
7.
Rhouzlane A Makki S Millet J Humbert P 《International journal of cosmetic science》2002,24(6):349-356
Nowadays, the determination of human skin microtopography is usually carried out by methods based on mechanical techniques (profilometry and surfometry), or founded on optical conception (shadowing method and profilometry). Negative skin replicas made of a silicone rubber material (Silflo((R))) or positive casts performed from an epoxy resin (Araldite((R))), are used to assess the skin microstructure. Skin surface microtopography is quantified by measuring furrows depths and spaces between them. An original application using confocal scanning laser microscope (CLSM) is described in this paper. The CLSM gives simultaneously images of the skin surface associated with quantitative measurements of the microtopography. With this apparatus, it is easy to achieve perfect skin replica images with assessment of its microstructure, before and after applications of topical medicines or cosmetic products to evaluate the skin surface restoration. It is worth to mention that it is indispensable to analyse the same skin surface (same plateaux and same furrows). For this reason, it is necessary to localize exactly and to replicate the same skin surface area (4 mm(2)) before and after the cosmetic use, whatever the extended period of the topical application. 相似文献
8.
Dynamic Power Supply Current Testing of CMOS SRAMs 总被引:1,自引:0,他引:1
We describe the design and implementation of a dynamic power supply current sensor which is used to detect SRAM faults such as disturb faults as well as logic cell faults. A formal study is presented to assess the parameters that influence the sensor design. The sensor detects faults by detecting abnormal levels of the power supply current. The sensor is embedded in the SRAM and offers on-chip detectability of faults. The sensor detects abnormal dynamic current levels that result from circuit defects. If two or more memory cells erroneously switch as a result of a write or read operation, the level of the dynamic power supply current is elevated. The sensor can detect this elevated value of the dynamic current. The dynamic power supply current sensor can supplement the observability associated with any test algorithm by using the sensor as a substitute for the read operations. This significantly reduces the test length and the additional observability enhances defect coverages. 相似文献
9.
This article presents a correlation between dynamic power supply current and pattern sensitive faults in SRAMs. It is shown that the dynamic power supply current provides a window for observing the internal switching behavior of the memory cells. Switching of the logic state of a memory cell results in a transient current pulse in the power supply rails. A new current-testable SRAM structure is presented which can be used to isolate normal current transients from those resulting from pattern sensitivity. The new structure differs from traditional SRAM structures only in the way that power is distributed to the cells. The new structure allows for very high coverages of disturb-type pattern sensitivity using a simple algorithm of length 5n where n is the number of cells. 相似文献
10.
Theerasak Thapngam Shui Yu Wanlei Zhou S. Kami Makki 《Peer-to-Peer Networking and Applications》2014,7(4):346-358
In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Service (DDoS) attack traffic from legitimated traffic regardless to various types of the attack packets and methods. Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission rates and packet forms to beat defense systems. These various attack strategies lead to defense systems requiring various detection methods in order to identify the attacks. Moreover, DDoS attacks can craft the traffics like flash crowd events and fly under the radar through the victim. We notice that DDoS attacks have features of repeatable patterns which are different from legitimate flash crowd traffics. In this paper, we propose a comparable detection methods based on the Pearson’s correlation coefficient. Our methods can extract the repeatable features from the packet arrivals in the DDoS traffics but not in flash crowd traffics. The extensive simulations were tested for the optimization of the detection methods. We then performed experiments with several datasets and our results affirm that the proposed methods can differentiate DDoS attacks from legitimate traffics. 相似文献