首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   99篇
  免费   1篇
电工技术   3篇
化学工业   7篇
机械仪表   1篇
能源动力   1篇
轻工业   14篇
水利工程   1篇
无线电   18篇
一般工业技术   15篇
冶金工业   30篇
自动化技术   10篇
  2024年   2篇
  2022年   1篇
  2020年   3篇
  2018年   4篇
  2017年   1篇
  2016年   2篇
  2015年   1篇
  2014年   3篇
  2013年   5篇
  2012年   1篇
  2011年   5篇
  2010年   3篇
  2009年   6篇
  2008年   7篇
  2007年   2篇
  2006年   3篇
  2005年   5篇
  2003年   1篇
  2001年   2篇
  2000年   2篇
  1999年   3篇
  1998年   10篇
  1997年   8篇
  1996年   7篇
  1995年   1篇
  1994年   1篇
  1993年   4篇
  1991年   1篇
  1988年   1篇
  1985年   3篇
  1976年   2篇
排序方式: 共有100条查询结果,搜索用时 15 毫秒
1.
A fully Bayes approach is presented for analyzing product reliability during the development phase. Based on a Bayes version of the Barlow-Scheuer reliability-growth model, it is assumed that the product goes through a series of test/modification stages, where each product test yields attribute (pass-fail) data, and failure types are classified as fixable or nonfixable. Relevant information on both the failure probabilities and the reliability-growth process is used to motivate the prior joint distribution for the probability of each failure type over the specified range of testing. Results at a particular test-stage can be used to update the knowledge about the probability of each failure type (and thus product reliability) at the current test-stage as well as at subsequent test-stages, and at the end of the development phase. A relative ease of incorporation of prior information and a tractability of the posterior analysis are accomplished by using a Dirichlet distribution as the prior distribution for a transformation of the failure probabilities  相似文献   
2.
We present a formal approach to study the evolution of biological networks. We use the Beta Workbench and its BlenX language to model and simulate networks in connection with evolutionary algorithms. Mutations are done on the structure of BlenX programs and networks are selected at any generation by using a fitness function. The feasibility of the approach is illustrated with a simple example.  相似文献   
3.
Phosphorelays are extended two-component signalling systems found in diverse bacteria, lower eukaryotes and plants. Only few of these systems are characterized, and we still lack a full understanding of their signalling abilities. Here, we aim to achieve a global understanding of phosphorelay signalling and its dynamical properties. We develop a generic model, allowing us to systematically analyse response dynamics under different assumptions. Using this model, we find that the steady-state concentration of phosphorylated protein at the final layer of a phosphorelay is a linearly increasing, but eventually saturating function of the input. In contrast, the intermediate layers can display ultrasensitivity. We find that such ultrasensitivity is a direct result of the phosphorelay biochemistry; shuttling of a single phosphate group from the first to the last layer. The response dynamics of the phosphorelay results in tolerance of cross-talk, especially when it occurs as cross-deactivation. Further, it leads to a high signal-to-noise ratio for the final layer. We find that a relay length of four, which is most commonly observed, acts as a saturating point for these dynamic properties. These findings suggest that phosphorelays could act as a mechanism to reduce noise and effects of cross-talk on the final layer of the relay and enforce its input–response relation to be linear. In addition, our analysis suggests that middle layers of phosphorelays could embed thresholds. We discuss the consequence of these findings in relation to why cells might use phosphorelays along with enzymatic kinase cascades.  相似文献   
4.
A policy-based encryption scheme allows to encrypt a message according to a credential-based policy formalized as monotone Boolean expression written in standard normal form. The encryption is so that only the users having access to a qualified set of credentials for the policy are able to decrypt the message. In this paper, we first revisit the formal definition of policy-based encryption and describe a policy-based encryption scheme from bilinear pairings. Our scheme improves the one proposed in [W. Bagga and R. Molva. Policy-based cryptography and applications. In Proceedings of Financial Cryptography and Data Security (FC'05), volume 3570 of LNCS, pages 72–87. Springer-Verlag, 2005] in terms of ciphertext size, while at the same time preserving the computational efficiency. Then, we describe an application of policy-based encryption in the context of ad-hoc networks. More precisely, we show how the policy-based encryption primitive can be used to achieve a privacy-enhanced secure establishment of ad-hoc communities.  相似文献   
5.
In this article we investigate the impacts of interspacing and source polling policies on the cell‐loss rates in transmission of variable bit rate video sources over Asynchronous Transfer Mode networks. We present a mathematical model that finds the approximate optimal starting times of the video sources that minimize the congestion at the multiplexer. Combined with the approximate optimal source starting times, we propose a source ordering and polling policy for reducing the cell‐loss rates. The proposed policy is tested against alternative policies using simulation of pre‐recorded video data. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
6.
The response of a Goto pair, based on small-size Josephson junctions, to voltage jumps has been studied within the framework of a resistive model. An analytical formula for the time of establishment of the transfer characteristic is obtained and the corresponding estimates are calculated.  相似文献   
7.
Left main coronary artery (LM) stenting has only been reported in bail-out situations or absolute contraindications so surgery. The authors report the immediate and midterm results of primary Palmaz-Schatz stent implantation in two young patients without contraindication to surgery. The first patient, 58 year-old, was admitted for unstable angina in October 1994. Coronary angiography showed an isolated severe ostial lesion of the LM. After conferring with the surgical team which remained on stand-by, angioplasty and stent implantation were performed with excellent results, no complications and no restenosis on angiographic controls at 3 and 12 months. The patient remained asymptomatic 24 months later. The second patient, 38 year-old, was admitted in June 1995 for unstable angina, and coronary angiography showed a severe isolated stenosis in the middle of a long and wide LM. Primary coronary stenting was also performed with excellent results, no complication and no restenosis on angiographic controls at 4 and 8 months. This patient was still asymptomatic 16 months after stenting. These excellent immediate and medium-term results are encouraging and suggest that this form of treatment might be extended to patients with an isolated whether primary LM stent implantation could become a suitable alternative to surgery in the future.  相似文献   
8.
Protection of the hypertrophied myocardium during heart surgery is still a controversial matter. We prospectively studied 3 currently available preservation techniques in 60 patients operated on for isolated aortic stenosis. Patients were randomly assigned to one of the following groups: CWB: continuous warm blood cardioplegia ICB: intermittent cold blood with warm blood controlled reperfusion Cryst: intermittent cold crystalloid cardioplegia (SLF11, Biosédra Laboratory, Vernon, France). All groups were matched for age, ejection fraction, NYHA class, aortic valve surface, and operative risk score. There were no deaths. No statistically significant difference was found among the groups in terms of ventilatory support time, ICU stay time, hospitalization or atrial fibrillation occurrence. Blood gases in the coronary sinus at the time of clamp release showed deep acidosis with crystalloid cardioplegia (pH = 7.11 vs 7.39 for CWB and 7.38 for UCB, p < 0.0001) associated with a higher lactate production than in the other groups (1.3 mmol vs 0.5 for CWB and 0.58 for ICB, p < 0.0001). Acidosis was corrected at the end of bypass with no significant differences among groups. CK-MB samples were taken on arrival in ICU, then 6 and 24 hours later. These samples showed much higher levels with cold blood (H6: 70 mcg/l vs 33 for CWB and 45 for Cryst, p = 0.0019). Although the 3 types of cardioplegia may be safely used for isolated aortic stenosis surgery, continuous warm blood cardioplegia appears to be the best choice.  相似文献   
9.
This study concerns the fatigue behavior of a C/Peek hip implant. It is now well-established that the extent of bone loss around a total hip arthroplasty stem is related to stress shielding process. Due to a modulus mismatch between the bone and the implant material, the load transfer to the stem decreases the mechanical stimulus needed by the bone to maintain its structure. Because of its low modulus of elasticity and its good resistance to fatigue in aeronautical applications, the Fiber Carbon/Peek composite could potentially replace some of the metal alloys used in hip stem implant. After a literature survey on biomechanical performances of some fiber carbon composites, including AS4/Peek, experimental quasi-static and fatigue compression tests have been performed on AS4/Peek hip implants. The structural and mechanical characterization of the injection moulded composite material has been realized. The prosthesis compression and fatigue behaviour have been studied with a joint-stimulating apparatus immersed in a physiological solution temperature controlled. Instead of the low specimen homogeneity, no fatigue damage has been revealed either by X-ray observations of stiffness measurements, till ten millions of cycles. The quasi-static compressive fracture morphology has been analyzed by S.E.M. and have shown a good fiber matrix bonding. This mechanical results would suggest that AS4/Peek hip stem are worthy of further investigation as implantable prostheses.  相似文献   
10.
The monitoring of the quality of service in digital television networks needs instruments to assess automatically the perceived quality of audio and video components of an MPEG2 signal. In order to improve the knowledge of the impact of the impairments on the final service, and to validate the algorithms that will be implemented in the quality evaluation instruments, a general simulation chain has been designed and developed. This paper presents the simulations performed as well as the analysis and the synthesis of the obtained results  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号