首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   1篇
化学工业   2篇
无线电   6篇
一般工业技术   1篇
冶金工业   2篇
自动化技术   8篇
  2022年   1篇
  2021年   2篇
  2015年   1篇
  2014年   1篇
  2013年   1篇
  2010年   3篇
  2009年   1篇
  2005年   1篇
  2003年   1篇
  2001年   1篇
  1997年   1篇
  1996年   1篇
  1995年   2篇
  1992年   2篇
排序方式: 共有19条查询结果,搜索用时 15 毫秒
1.
The involvement of functional ion channels in previously documented early responses of osteocytes and osteoblasts to mechanical strain in bone tissue was investigated in explants of rat ulnae by the use of ion channel blockers. Gadolinium chloride (a blocker of stretch/shear-sensitive cation channels) elevated basal prostaglandin (PG) E2 and prostacyclin (PGI2) release and osteocyte glucose-6-phosphate dehydrogenase (G6PD) activity, but was associated with a reduction in basal nitric oxide (NO) production. Gadolinium abolished loading-related increases in the release of PGI2 and NO and osteocyte G6PD activity. Gadolinium also reduced the loading-related release of PGE2 assumed to originate from osteoblasts and the magnitude of loading-related increases in G6PD activity in these cells. Nifedipine (a blocker of L-type voltage-dependent calcium channels) had no effect on basal levels of prostanoid or NO release, or G6PD activity in osteocytes or osteoblasts, and did not affect loading-related release of PGI2 or increase in osteocyte G6PD. However, nifedipine prevented loading-related increases in PGE2 and NO release and osteoblast G6PD activity. These results are consistent with osteocytes' response to bone loading requiring activatable ion channels sensitive to gadolinium, but not those sensitive to nifedipine. In osteoblasts, the early responses to bone loading appear to be associated with ion channels sensitive to gadolinium and nifedipine; however, the nifedipine-sensitive channels seem to have the dominant effect.  相似文献   
2.
Manual methods of large volume data storage, retrieval, and analysis are difficult, time consuming, and present numerous opportunities for calculation errors. We have designed and implemented a comprehensive computer-based system for performing these functions. Development of this system was necessary since left ventricular (LV) blood pressure and two regional LV wall thickness measurements were obtained during long-term extracorporeal biotelemetry of miniswine for 24-h periods. During a single recording period over 100,000 individual cardiac cycles were recorded on analog tape and later analysed for determination of global myocardial oxygen demand and regional myocardial function. In addition, custom designed software was developed to determine the extent and duration of myocardial dysfunction. Batch file commands enabled the customized software to operate without prompting by the user thus optimizing the time usage of the computer, and the computer based data acquisition and analysis system. Although this system was designed specifically for analysing cardiovascular hemodynamic variables, it is flexible and can be applied to other experimental applications.  相似文献   
3.
This paper proposes that the flocking behavior of birds can guide the design of a robust, scalable and self-adaptive congestion control protocol in the context of wireless sensor networks (WSNs). The proposed approach adopts a swarm intelligence paradigm inspired by the collective behavior of bird flocks. The main idea is to ‘guide’ packets (birds) to form flocks and flow towards the sink (global attractor), whilst trying to avoid congestion regions (obstacles). The direction of motion of a packet flock is influenced by repulsion and attraction forces between packets, as well as the field of view and the artificial magnetic field in the direction of the artificial magnetic pole (sink). The proposed approach is simple to implement at the individual node, involving minimal information exchange. In addition, it displays global self-1 properties and emergent behavior, achieved collectively without explicitly programming these properties into individual packets. Performance evaluations show the effectiveness of the proposed Flock-based Congestion Control (Flock-CC) mechanism in dynamically balancing the offered load by effectively exploiting available network resources and moving packets to the sink. Furthermore, Flock-CC provides graceful performance degradation in terms of packet delivery ratio, packet loss, delay and energy tax under low, high and extreme traffic loads. In addition, the proposed approach achieves robustness against failing nodes, scalability in different network sizes and outperforms typical conventional approaches.  相似文献   
4.
5.
The use of the Internet for time-sensitive services, such as voice and video applications, requires a predictable quality of service. The TCP/IP differentiated services (Diff-Serv) architecture was introduced to achieve such performance. Network congestion control, however, still remains a critical and high priority issue. A number of researchers are looking at alternative schemes such as random early detection (RED) and its variants to handle congestion. In this paper we present the results of a fuzzy logic control approach to the implementation of RED – Fuzzy-RED. We believe that with fuzzy logic we are able to use linguistic knowledge to implement better understood nonlinear probability discard functions, achieve better differentiation for packet discarding behaviors for aggregated flows, and so provide better quality of service to different kinds of traffic whilst maintaining high utilization.  相似文献   
6.
7.
The interfascicular matrix (IFM) binds tendon fascicles and contains a population of morphologically distinct cells. However, the role of IFM-localised cell populations in tendon repair remains to be determined. The basement membrane protein laminin-α4 also localises to the IFM. Laminin-α4 is a ligand for several cell surface receptors, including CD146, a marker of pericyte and progenitor cells. We used a needle injury model in the rat Achilles tendon to test the hypothesis that the IFM is a niche for CD146+ cells that are mobilised in response to tendon damage. We also aimed to establish how expression patterns of circulating non-coding RNAs alter with tendon injury and identify potential RNA-based markers of tendon disease. The results demonstrate the formation of a focal lesion at the injury site, which increased in size and cellularity for up to 21 days post injury. In healthy tendon, CD146+ cells localised to the IFM, compared with injury, where CD146+ cells migrated towards the lesion at days 4 and 7, and populated the lesion 21 days post injury. This was accompanied by increased laminin-α4, suggesting that laminin-α4 facilitates CD146+ cell recruitment at injury sites. We also identified a panel of circulating microRNAs that are dysregulated with tendon injury. We propose that the IFM cell niche mediates the intrinsic response to injury, whereby an injury stimulus induces CD146+ cell migration. Further work is required to fully characterise CD146+ subpopulations within the IFM and establish their precise roles during tendon healing.  相似文献   
8.
Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on the network’s type and protocol’s operation. Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have not been designed with security requirements in mind. However, taking into consideration that WSN applications need to support critical infrastructures (i.e., military, healthcare, environmental, etc.), security becomes an issue. And since these infrastructures are highly depended on the availability of resources, focus has especially been given to support a secure, resilient and reliable environment, with multipath routing being one of the added functionalities. The need for security in sensitive WSN application has lead researchers to design secure multipath routing protocols from the beginning or design security extensions for existing protocols. This paper surveys the current state-of-the-art of secure multipath routing protocols in WSNs, classifies the protocols in categories according to their security-related operational objectives, defines a new threat model in the routing procedure and identifies open research issues in the area.  相似文献   
9.
We describe the fuzzy explicit fate marking (FERM) traffic flow control algorithm for a class of best effort service, known as available bit rate (ABR), proposed by the ATM Forum. FERM is an explicit rate marking scheme in which an explicit rate is calculated at the asynchronous transfer mode (ATM) switch and sent back to the ABR traffic sources encapsulated within resource management (RM) cells. The flow rate is calculated by the fuzzy congestion control (FCC) module by monitoring the average ABR queue length and its rate of change, then by using a set of linguistic rules. We use simulation to compare the steady-state and transient performance of FERM with EPRCA (a current favourite by the ATM Forum) in the presence of high priority variable bit rate (VBR) video and constant bit rate (CBR) in both a local-area network (LAN) and a wide-area network (WAN) environment. Our experiments show that FERM exhibits a robust behavior, even under extreme network loading conditions, and ensures fair share of the bandwidth for all virtual channels (VCs) regardless of the number of hops they traverse. Additionally, FERM controls congestion substantially better than EPRCA, offers faster transient response, leads to lower end-to-end delay and better network utilization  相似文献   
10.
This letter proposes an adaptive wireless push system for wireless data broadcasting environments, where multiple channels are available for broadcasting data from a broadcast server to a large number of mobile clients. We address the general case where the client demands are not dependent on client locations. The efficiency of the proposed system lies in the fact that it offers significant performance improvements to the system clients with the need of only one receiver at each client device. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号