首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   147篇
  免费   5篇
电工技术   3篇
化学工业   23篇
金属工艺   1篇
机械仪表   3篇
建筑科学   5篇
能源动力   4篇
轻工业   9篇
无线电   23篇
一般工业技术   26篇
冶金工业   20篇
原子能技术   2篇
自动化技术   33篇
  2024年   1篇
  2023年   3篇
  2022年   1篇
  2021年   8篇
  2020年   2篇
  2019年   2篇
  2018年   5篇
  2017年   2篇
  2016年   8篇
  2015年   4篇
  2014年   13篇
  2013年   5篇
  2012年   8篇
  2011年   9篇
  2010年   5篇
  2009年   13篇
  2008年   7篇
  2007年   3篇
  2006年   4篇
  2005年   4篇
  2004年   3篇
  2003年   5篇
  2002年   1篇
  2001年   2篇
  1999年   1篇
  1998年   7篇
  1997年   3篇
  1996年   5篇
  1995年   2篇
  1994年   1篇
  1992年   1篇
  1991年   4篇
  1990年   3篇
  1989年   2篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1976年   1篇
  1974年   1篇
排序方式: 共有152条查询结果,搜索用时 31 毫秒
1.
Multicasting is becoming increasingly important in today's networks. In optical networks, optical splitters facilitate the multicasting of optical signals. By eliminating the transmission of redundant traffic over certain links, multicasting can improve network performance. However, in a wavelength-division multiplexed (WDM) optical network, the lack of wavelength conversion necessitates the establishment of a single multicast circuit (light-tree) on a single wavelength. On the other hand, establishing several unicast connections (lightpaths) to satisfy a multicast request, while requiring more capacity, is less constrained in terms of wavelength assignment. The objective of the paper is to evaluate the tradeoff between capacity and wavelength continuity in the context of optical multicasting. To this end, we develop accurate analytical models with moderate complexity for computing the blocking probability of multicast requests realized using light-trees, lightpaths, and combinations of light-trees and lightpaths. Numerical results indicate that a suitable combination of light-trees and lightpaths performs best when no wavelength conversion is present.  相似文献   
2.
HotSpot: a compact thermal modeling methodology for early-stage VLSI design   总被引:3,自引:0,他引:3  
This paper presents HotSpot-a modeling methodology for developing compact thermal models based on the popular stacked-layer packaging scheme in modern very large-scale integration systems. In addition to modeling silicon and packaging layers, HotSpot includes a high-level on-chip interconnect self-heating power and thermal model such that the thermal impacts on interconnects can also be considered during early design stages. The HotSpot compact thermal modeling approach is especially well suited for preregister transfer level (RTL) and presynthesis thermal analysis and is able to provide detailed static and transient temperature information across the die and the package, as it is also computationally efficient.  相似文献   
3.
Cloud storage is essential for managing user data to store and retrieve from the distributed data centre. The storage service is distributed as pay a service for accessing the size to collect the data. Due to the massive amount of data stored in the data centre containing similar information and file structures remaining in multi-copy, duplication leads to increase storage space. The potential deduplication system doesn’t make efficient data reduction because of inaccuracy in finding similar data analysis. It creates a complex nature to increase the storage consumption under cost. To resolve this problem, this paper proposes an efficient storage reduction called Hash-Indexing Block-based Deduplication (HIBD) based on Segmented Bind Linkage (SBL) Methods for reducing storage in a cloud environment. Initially, preprocessing is done using the sparse augmentation technique. Further, the preprocessed files are segmented into blocks to make Hash-Index. The block of the contents is compared with other files through Semantic Content Source Deduplication (SCSD), which identifies the similar content presence between the file. Based on the content presence count, the Distance Vector Weightage Correlation (DVWC) estimates the document similarity weight, and related files are grouped into a cluster. Finally, the segmented bind linkage compares the document to find duplicate content in the cluster using similarity weight based on the coefficient match case. This implementation helps identify the data redundancy efficiently and reduces the service cost in distributed cloud storage.  相似文献   
4.
Individuals carrying cancer-predisposing germline mutations are known to be at a higher risk for cancers than those who do not carry them. This is also true of their biological relatives because they have a higher probability of being carriers of such mutant genes than unrelated individuals in the population. Further, there are now sufficient grounds for assuming that cancer-predisposed individuals may also be at a higher risk for cancers induced by ionizing radiation. In our earlier work, we examined the impact of this heterogeneity (with respect to cancer predisposition and radiosensitivity differentials) on risks of radiation-induced cancer at the population level. This paper is focused on the question of risks of radiation-induced cancer in relatives of cancer-predisposed individuals. Using an autosomal dominant model of cancer predisposition and radiosensitivity developed earlier and applying it to breast cancer risks associated with mutations in the BRCA1 gene, we show that: (1) The risk ratio (i.e. the ratio of risk of radiation-induced cancer in relatives to that in unrelated individuals) in the population increases with the degree of biological relatedness of the relative, being higher for close than for distant relatives; incomplete penetrance of the mutant gene "dilutes" this risk ratio. (2) The proportion of excess radiation-induced cancers in relatives (i.e. the attributable fraction) is higher than in unrelated individuals. (3) In relatives, the proportion of excess cancers due to radiosensitivity differentials alone depends on the strength of predisposition, the radiosensitivity differentials assumed, the radiation dose, the proportion of cancers due to predisposition, the mutant gene frequency and the penetrance of the mutant gene. This is in contrast to the situation for unrelated individuals, for whom the above-mentioned proportion is dependent on the first three but not on the last three of these factors. Further, even when the proportion of excess cancers is small, most of it is due to radiosensitivity differential alone both in unrelated individuals and in relatives. (4) For values of predisposition strength and radiosensitivity differential <10, even when the estimated frequency of a mutant BRCA1 gene is 0.0047 and the proportion of breast cancers due to these mutations is 38% (as is the case for Ashkenazi Jewish women under age 30), the increase in breast cancer risks is only marginal even for first-degree relatives. (5) These findings support the conclusion that increases in radiation risks to relatives (compared to those in unrelated individuals), to be detectable epidemiologically, will occur only when the mutant alleles are common and the strength of predisposition and radiosensitivity differentials are conjointly dramatic.  相似文献   
5.
Methods in object-oriented concurrent libraries often encapsulate internal synchronization details. As a result of information hiding, clients calling the library methods may cause thread safety violations by invoking methods in an unsafe manner. This is frequently a cause of deadlocks. Given a concurrent library, we present a technique for inferring interface contracts that specify permissible concurrent method calls and patterns of aliasing among method arguments. In this work, we focus on deriving contracts that guarantee deadlock-free execution for the methods in the library. The contracts also help client developers by documenting required assumptions about the library methods. Alternatively, the contracts can be statically enforced in the client code to detect potential deadlocks in the client. Our technique combines static analysis with a symbolic encoding scheme for tracking lock dependencies, allowing us to synthesize contracts using a SMT solver. Additionally, we investigate extensions of our technique to reason about deadlocks in libraries that employ signaling primitives such as wait-notify for cooperative synchronization. Our prototype tool analyzes over a million lines of code for some widely-used Java libraries within an hour, thus demonstrating its scalability and efficiency. Furthermore, the contracts inferred by our approach have been able to pinpoint real deadlocks in clients, i.e. deadlocks that have been a part of bug-reports filed by users and developers of client code.  相似文献   
6.
This paper presents a graphical technique to locate the center of curvature of the path traced by a coupler point of a planar, single-degree-of-freedom, geared seven-bar mechanism. Since this is an indeterminate mechanism then the pole for the instantaneous motion of the coupler link; i.e., the point coincident with the instantaneous center of zero velocity for this link, cannot be obtained from the Aronhold–Kennedy theorem. The graphical technique that is presented in the first part of the paper to locate the pole is believed to be an important contribution to the kinematics literature. The paper then focuses on the graphical technique to locate the center of curvature of the path traced by an arbitrary coupler point. The technique begins with replacing the seven-bar mechanism by a constrained five-bar linkage whose links are kinematically equivalent to the second-order properties of motion. Then three kinematic inversions are investigated and a four-bar linkage is obtained from each inversion. The motion of the coupler link of the final four-bar linkage is equivalent up to and including the second-order properties of motion of the coupler of the geared seven-bar. Then the center of curvature of the path traced by an arbitrary coupler point can be obtained from existing techniques, such as the Euler–Savary equation. An analytical method, referred to as the method of kinematic coefficients, is presented as an independent check of the graphical technique.  相似文献   
7.
8.
The biosynthesis of silver nanoparticles (AgNps) has a wide range of applications, and here we develop a rapid synthesis using the leaf extract of Ipomea carnea. We demonstrated that 100?mL of a 1?mM silver nitrate solution was reduced to AgNps by 500?µL of I. carnea extract in 5?min and that one or more of the chemical constituents present in the extract acted as the reducing agent. Surface plasmon resonance peaks were observed from 410 to 440?nm for AgNps synthesised using the plant extract, and the peaks showed a characteristic blue shift with variation of pH from 2 to 8. Particle size analysis revealed the size of the AgNps to be from 30 to 130?nm, which was also confirmed by dynamic light scattering, atomic force microscopy and transmission electron microscopy. Additionally, the antibacterial effects of the AgNps were evaluated against selected human pathogens such as Staphylococcus aureus, Bacillus cereus, Bacillus subtilis, Klebsiella pneumoniae, Aeromonas hydrophila, Salmonella typhi, Proteus vulgaris and Pseudomonas aeruginosa. Finally, the AgNps were impregnated with a cellulose acetate membrane to form an antimycobacterial membrane. Antimycobacterial activity against a non-pathogenic Mycobacterium smegmatis showed that the AgNp-embedded membrane system has a zone of inhibition of 14?mm.  相似文献   
9.
Sintering studies were conducted using kaolin, metakaolin, zeolite 4A, and various synthetic mixtures of Al2O3 and SiO2 in the presence of Li2CO3 and LiCl as fluxing agents. Various compositions of the above were prepared, and conventional sintering studies were conducted at temperatures of 900°–1450°C with soaking periods of 1–3 h. Kaolin, metakaolin, and amorphized kaolin in the presence of Li2CO3 showed nucleation centers of β-spodumene as pink specks, whereas synthetic mixtures of Al2O3 and SiO2 failed to behave in the same manner. To determine whether the pink specks formed were color centers or F centers, the samples were subjected to UV, IR, and X-ray irradiation; however, the samples showed no tenebrescence properties. External addition of iron as an impurity in a nonlayered system also resulted in pink speck formation. This observation indicated that impurities present in the natural kaolin were the cause of this phenomenon. Moreover, the LiCl-based samples did not result in pink specks, even though the kaolinitic samples contained iron as an impurity. Therefore, although β-spodumene was formed in aluminosilicates in the presence of Li2CO3 and LiCl, the pink variety of β-spodumene (kunzite) formation occurred only in the presence of lithium-rich aluminosilicates and in the presence of iron as an impurity. The phase identification and microstructure were explained based on XRD, DTA, and SEM studies.  相似文献   
10.
In this study, nano-AlN particles were introduced into pure Mg matrix through the powder metallurgy technique incorporating microwave assisted two-directional sintering followed by hot extrusion. The effect of varying volume fraction of nano-AlN addition on the microstructural and mechanical properties of pure Mg was investigated. Microstructural characterisation revealed marginal grain refinement due to the fairly uniform distribution of AlN nano-particulates. X-ray diffraction results indicated basal texture weakening in Mg/0·2AlN composite. Tensile property measurements revealed an overall increase in strength properties and ductility. Among the developed composites, Mg/0·8AlN displayed superior strength (~30% improvement) and Mg/0·2AlN showed enhanced ductility (~80% enhancement). Under compressive loading, the developed Mg/AlN nanocomposite formulations exhibited improved strength properties without significant effect on compressibility.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号