全文获取类型
收费全文 | 143篇 |
免费 | 1篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 19篇 |
金属工艺 | 2篇 |
机械仪表 | 1篇 |
建筑科学 | 16篇 |
能源动力 | 2篇 |
轻工业 | 5篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 25篇 |
一般工业技术 | 22篇 |
冶金工业 | 12篇 |
自动化技术 | 37篇 |
出版年
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 4篇 |
2020年 | 3篇 |
2019年 | 3篇 |
2018年 | 3篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 8篇 |
2014年 | 2篇 |
2013年 | 9篇 |
2012年 | 9篇 |
2011年 | 8篇 |
2010年 | 15篇 |
2009年 | 7篇 |
2008年 | 15篇 |
2007年 | 5篇 |
2006年 | 11篇 |
2005年 | 3篇 |
2004年 | 5篇 |
2003年 | 6篇 |
2002年 | 1篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1990年 | 1篇 |
1983年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有144条查询结果,搜索用时 12 毫秒
1.
2.
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
Eran Toch Yang Wang Lorrie Faith Cranor 《User Modeling and User-Adapted Interaction》2012,22(1-2):203-220
Personalization technologies offer powerful tools for enhancing the user experience in a wide variety of systems, but at the same time raise new privacy concerns. For example, systems that personalize advertisements according to the physical location of the user or according to the user??s friends?? search history, introduce new privacy risks that may discourage wide adoption of personalization technologies. This article analyzes the privacy risks associated with several current and prominent personalization trends, namely social-based personalization, behavioral profiling, and location-based personalization. We survey user attitudes towards privacy and personalization, as well as technologies that can help reduce privacy risks. We conclude with a discussion that frames risks and technical solutions in the intersection between personalization and privacy, as well as areas for further investigation. This frameworks can help designers and researchers to contextualize privacy challenges of solutions when designing personalization systems. 相似文献
3.
4.
Eran Briman 《中国电子商情》2010,(3):26-29
首先,为什么及什么时候必须使用DSP?我们可以先从应用的角度进行探讨。举个例说,手机通常需要至少2个DSP引擎,一个用于通信工作,另一个用于应用处理。在通信方面,通话一端的语音信号经数字化和压缩(DSP的一个典型功能),被调制为一个无线信号(另一个DSP32作),再通过无线基础设施发送到通话另一端,然后执行解调解压(也是DSP的功能)。 相似文献
5.
6.
Goren Y Davrath LR Pinhas I Toledo E Akselrod S 《IEEE transactions on bio-medical engineering》2006,53(1):35-42
Heart rate variability (HRV) is a major noninvasive technique for evaluating the autonomic nervous system (ANS). Use of time-frequency approach to analyze HRV allows investigating the ANS behavior from the power integrals, as a function of time, in both steady-state and non steady-state. Power integrals are examined mainly in the low-frequency and the high-frequency bands. Traditionally, constant boundaries are chosen to determine the frequency bands of interest. However, these ranges are individual, and can be strongly affected by physiologic conditions (body position, breathing frequency). In order to determine the dynamic boundaries of the frequency bands more accurately, especially during autonomic challenges, we developed an algorithm for the detection of individual time-dependent spectral boundaries (ITSB). The ITSB was tested on recordings from a series of standard autonomic maneuvers with rest periods between them, and the response to stand was compared to the known physiological response. A major advantage of the ITSB is the ability to reliably define the mid-frequency range, which provides the potential to investigate the physiologic importance of this range. 相似文献
7.
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a point-to-point network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization: It follows that, in case a third of the parties might be corrupted, broadcast is necessary for securely computing non-dominated functionalities (in which “small” subsets of the inputs cannot determine the output), including, as interesting special cases, the Boolean XOR and coin-flipping functionalities.
相似文献
- A symmetric n-party functionality can be securely computed facing \(n/3\le t<n/2\) corruptions (i.e., honest majority), if and only if it is \((n-2t)\) -dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output to some predetermined value.
- Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing \(t\ge n/2\) corruptions (i.e., no honest majority), if and only if it is 1-dominated and can be securely computed with broadcast.
8.
We report on the possibility of removing boron (in the form of boric acid) from water by electrochemical means. We explore capacitive de-ionization (CDI) processes in which local changes in pH near the surface of high-surface-area activated carbon fiber (ACF) electrodes during charging are utilized, in order to dissociate boric acid into borate ions which can be electro-adsorbed onto the positive electrode in the CDI cells. For this purpose, a special flow-through CDI cell was constructed in which the feed solution flows through the electrodes. Local pH changes near the carbon electrode surface were investigated using a MgCl2 solution probe in three- (with reference) and two-electrode cells, and described qualitatively. We show that, to a certain extent, boron can indeed be removed from water by CDI. 相似文献
9.
10.
Exploring the Effects of Glycosylation and Etherification of the Side Chains of the Anticancer Drug Mitoxantrone 下载免费PDF全文
Pazit Shaul Kfir B. Steinbuch Eran Blacher Prof. Reuven Stein Dr. Micha Fridman 《ChemMedChem》2015,10(9):1528-1538
Herein we report the synthesis and biological evaluation of symmetric and asymmetric analogues of the DNA intercalating drug mitoxantrone (MTX) in which the side chains of the parent drug were modified through glycosylation or methyl etherification. Several analogues with glycosylated side chains exhibited higher DNA affinity than the parent MTX. The most potent in vitro cytotoxicity was observed for MTX analogue 8 (1,4‐dimethoxy‐5,8‐bis[2‐(2‐methoxyethylamino)ethylamino]anthracene‐9,10‐dione) with methoxy ether containing side chains. Treatment of melanoma‐bearing mice with MTX or analogue 8 decreased the intraperitoneal tumor burden relative to untreated mice; the effect of 8 was less pronounced than that of MTX. In vitro metabolism assays of MTX with rabbit liver S9 fraction gave rise to several metabolites; almost no metabolites were detected for MTX analogue 8 . The results presented indicate that derivatization of the MTX side chain primary hydroxy groups may result in a significant improvement in DNA affinity and lower susceptibility to the formation of potentially toxic metabolites. 相似文献