全文获取类型
收费全文 | 111篇 |
免费 | 6篇 |
专业分类
电工技术 | 6篇 |
化学工业 | 25篇 |
机械仪表 | 1篇 |
建筑科学 | 5篇 |
能源动力 | 1篇 |
轻工业 | 4篇 |
无线电 | 20篇 |
一般工业技术 | 20篇 |
冶金工业 | 4篇 |
原子能技术 | 1篇 |
自动化技术 | 30篇 |
出版年
2023年 | 2篇 |
2022年 | 2篇 |
2021年 | 3篇 |
2019年 | 1篇 |
2018年 | 4篇 |
2017年 | 6篇 |
2016年 | 5篇 |
2015年 | 7篇 |
2014年 | 4篇 |
2013年 | 8篇 |
2012年 | 7篇 |
2011年 | 7篇 |
2010年 | 5篇 |
2009年 | 6篇 |
2008年 | 5篇 |
2007年 | 5篇 |
2006年 | 2篇 |
2005年 | 3篇 |
2004年 | 1篇 |
2002年 | 2篇 |
2001年 | 1篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 5篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1981年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有117条查询结果,搜索用时 15 毫秒
1.
Dealing with discrepancies in data is still a big challenge in data integration systems. The problem occurs both during eliminating duplicates from semantic overlapping sources as well as during combining complementary data from different sources. Though using SQL operations like grouping and join seems to be a viable way, they fail if the attribute values of the potential duplicates or related tuples are not equal but only similar by certain criteria. As a solution to this problem, we present in this paper similarity-based variants of grouping and join operators. The extended grouping operator produces groups of similar tuples, the extended join combines tuples satisfying a given similarity condition. We describe the semantics of this operator, discuss efficient implementations for the edit distance similarity and present evaluation results. Finally, we give examples of application from the context of a data reconciliation project for looted art. 相似文献
2.
Rehana Yasmin Eike Ritter Guilin Wang 《International Journal of Information Security》2014,13(5):453-465
Designing efficient as well as secure cryptographic protocols for resource-constrained applications is a challenging task. In this paper, we formally analyze the security of an efficient one-pass authenticated key establishment protocol, the 1P-AKE protocol, which is primarily proposed for resource-constrained sensor nodes devices in wireless sensor networks (WSNs). In contrast to the existing identity-based one-pass key establishment protocols, the 1P-AKE protocol does not require any bilinear pairing computation in order to establish a key. This feature makes it really attractive for resource-constrained application environments, such as WSNs, where pairing computations are too expensive. We show that in the random oracle model, the 1P-AKE protocol is a secure authenticated one-pass key establishment protocol under the computational Diffie–Hellman assumption. The performance of the 1P-AKE protocol is also discussed and compared with the existing relevant protocols. 相似文献
3.
4.
Termeer M Oliván Bescós J Breeuwer M Vilanova A Gerritsen F Gröller ME Nagel E 《IEEE transactions on visualization and computer graphics》2008,14(6):1595-1602
Visually assessing the effect of the coronary artery anatomy on the perfusion of the heart muscle in patients with coronary artery disease remains a challenging task. We explore the feasibility of visualizing this effect on perfusion using a numerical approach. We perform a computational simulation of the way blood is perfused throughout the myocardium purely based on information from a three-dimensional anatomical tomographic scan. The results are subsequently visualized using both three-dimensional visualizations and bull's eye plots, partially inspired by approaches currently common in medical practice. Our approach results in a comprehensive visualization of the coronary anatomy that compares well to visualizations commonly used for other scanning technologies. We demonstrate techniques giving detailed insight in blood supply, coronary territories and feeding coronary arteries of a selected region. We demonstrate the advantages of our approach through visualizations that show information which commonly cannot be directly observed in scanning data, such as a separate visualization of the supply from each coronary artery. We thus show that the results of a computational simulation can be effectively visualized and facilitate visually correlating these results to for example perfusion data. 相似文献
5.
6.
Seung Geol Choi Dennis Hofheinz Eike Kiltz Dong Hoon Lee Moti Yung 《Information Processing Letters》2009,109(16):897-901
At CRYPTO 2004, Kurosawa and Desmedt presented a new hybrid encryption scheme that is chosen-ciphertext (CCA2) secure in the standard model. Until now it was unknown if the key encapsulation part of the Kurosawa-Desmedt scheme by itself is still CCA2-secure or not. In this note we answer this question to the negative, namely we present a simple CCA2 attack on the Kurosawa-Desmedt key encapsulation mechanism. Our attack further supports the design paradigm of Kurosawa and Desmedt to build CCA2-secure hybrid encryption from weak key encapsulation. 相似文献
7.
Chloride and Indium‐Chloride‐Complex Inorganic Ligands for Efficient Stabilization of Nanocrystals in Solution and Doping of Nanocrystal Solids 下载免费PDF全文
Vladimir Sayevich Chris Guhrenz Maria Sin Volodymyr M. Dzhagan Alexander Weiz Daniel Kasemann Eike Brunner Michael Ruck Dietrich R. T. Zahn Karl Leo Nikolai Gaponik Alexander Eychmüller 《Advanced functional materials》2016,26(13):2163-2175
Here, the surface functionalization of CdSe and CdSe/CdS core/shell nanocrystals (NCs) with compact chloride and indium‐chloride‐complex ligands is reported. The ligands provide not only short interparticle distances but additionally control doping and passivation of surface trap states, leading to enhanced electronic coupling in NC‐based arrays. The solids based on these NCs show an excellent electronic transport behavior after heat treatment at the relatively low temperature of 190 °C. Indeed, the indium‐chlorido‐capped 4.5 nm CdSe NC based thin‐film field‐effect transistor reaches a saturation mobility of μ = 4.1 cm2 (V s)?1 accompanied by a low hysteresis, while retaining the typical features of strongly quantum confined semiconductor NCs. The capping with chloride ions preserves the high photoluminescence quantum yield ( ≈ 66%) of CdSe/CdS core/shell NCs even when the CdS shell is relatively thin (six monolayers). The simplicity of the chemical incorporation of chlorine and indium species via solution ligand exchange, the efficient electronic passivation of the NC surface, as well as their high stability as dispersions make these materials especially attractive for wide‐area solution‐processable fabrication of NC‐based devices. 相似文献
8.
In this paper, we consider finite labelled transition systems. We show that if such transition systems are deterministic,
persistent, and weakly periodic, then they can be decomposed in the following sense. There exists a finite set of label-disjoint
cycles such that any other cycle is Parikh-equivalent to a multiset of cycles from this set. 相似文献
9.
Eike H. Müller Rupert Ford Matthew C. Hort Lois Huggett Graham Riley David J. Thomson 《Computer Physics Communications》2013
The NAME Atmospheric Dispersion Model is a Lagrangian particle model used by the Met Office to predict the propagation and spread of pollutants in the atmosphere. The model is routinely used in emergency response applications, where it is important to obtain results as quickly as possible. This requirement for a short runtime and the increase in core number of commonly available CPUs, such as the Intel Xeon series, has motivated the parallelisation of NAME in the OpenMP shared memory framework. In this work we describe the implementation of this parallelisation strategy in NAME and discuss the performance of the model for different setups. Due to the independence of the model particles, the parallelisation of the main compute intensive loops is relatively straightforward. The random number generator for modelling sub-grid scale turbulent motion needs to be adapted to ensure that different particles use independent sets of random numbers. We find that on Intel Xeon X5680 CPUs the model shows very good strong scaling up to 12 cores in a realistic emergency response application for predicting the dispersion of volcanic ash in the North Atlantic airspace. We implemented a mechanism for asynchronous reading of meteorological data from disk and demonstrate how this can reduce the runtime if disk access plays a significant role in a model run. To explore the performance on different chip architectures we also ported the part of the code which is used for calculating the gamma dose from a cloud of radioactive particles to a graphics processing unit (GPU) using CUDA-C. We were able to demonstrate a significant speedup of around one order of magnitude relative to the serial CPU version. 相似文献
10.
Aminuddin A. Kayani Adam F. Chrimes Khashayar Khoshmanesh Vijay Sivan Eike Zeller Kourosh Kalantar-zadeh Arnan Mitchell 《Microfluidics and nanofluidics》2011,11(1):93-104
This work demonstrates an optofluidic system, where dielectrophoretically controlled suspended nanoparticles are used to manipulate
the properties of an optical waveguide. This optofluidic device is composed of a multimode polymeric rib waveguide and a microfluidic
channel as its upper cladding. This channel integrates dielectrophoretic (DEP) microelectrodes and is infiltrated with suspended
silica and tungsten trioxide nanoparticles. By applying electrical signals with various intensities and frequencies to the
DEP microelectrodes, the nanoparticles can be concentrated close to the waveguide surface significantly altering the optical
properties in this region. Depending on the particle refractive indices, concentrations, positions and dimensions, the light
remains confined or is scattered into the surrounding media in the microfluidic channel. 相似文献