首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   2篇
电工技术   1篇
化学工业   8篇
建筑科学   2篇
轻工业   4篇
无线电   26篇
一般工业技术   4篇
冶金工业   4篇
自动化技术   12篇
  2022年   2篇
  2021年   4篇
  2019年   3篇
  2018年   1篇
  2017年   2篇
  2016年   1篇
  2015年   2篇
  2014年   2篇
  2013年   3篇
  2012年   5篇
  2011年   1篇
  2010年   2篇
  2009年   2篇
  2008年   1篇
  2007年   1篇
  2006年   2篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   4篇
  2000年   2篇
  1999年   2篇
  1998年   1篇
  1997年   4篇
  1996年   1篇
  1995年   2篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1988年   1篇
排序方式: 共有61条查询结果,搜索用时 31 毫秒
1.
2.
The epidermal growth factor receptor (EGFR) family and its ligands serve as a switchboard for the regulation of multiple cellular processes. While it is clear that EGFR activity is essential for normal cardiac development, its function in the vasculature and its role in cardiovascular disease are only beginning to be elucidated. In the blood vessel, endothelial cells and smooth muscle cells are both a source and a target of EGF-like ligands. Activation of EGFR has been implicated in blood pressure regulation, endothelial dysfunction, neointimal hyperplasia, atherogenesis, and cardiac remodeling. Furthermore, increased circulating EGF-like ligands may mediate accelerated vascular disease associated with chronic inflammation. Although EGFR inhibitors are currently being used clinically for the treatment of cancer, additional studies are necessary to determine whether abrogation of EGFR signaling is a potential strategy for the treatment of cardiovascular disease.  相似文献   
3.
Burnishing is a profitable process of surface finishing due to its ability to be automated, which makes burnishing method more desirable than other finishing methods. To obtain high surface finish, non-stop operation is required for CNC machine and we can attain that by choosing a suitable trajectory of the finishing tool. In other words, burnishing paths should be multidirectional rather than monotonic, in order to cover uniformly the surface. Indeed, the burnishing force is also a key parameter of the burnishing process because it determines the degree of plastic deformation, and that makes determining the optimum burnishing force an essential step of the burnishing process a success. Therefore, we consider the strategy of ball burnishing path and the burnishing force as variable parameters in this study. In this paper, we propose a new strategy of burnishing tool path with trochoid cycles that achieves a multidirectional burnishing of the surface according to various patterns. Taking into consideration the optimum burnishing force, to improve flat surface finish of AL6061-O samples by reducing the surface roughness parameter (Rz). Experiments carried out on 3-axis milling machine show that the proposed trochoidal path is more effective than the conventional one.  相似文献   
4.
Asychronous transfer mode (ATM) networks are high‐speed networks with guaranteed quality of service. The main cause of congestion in ATM networks is over utilization of physical bandwidth. Unlike constant bit‐rate (CBR) traffic, the bandwidth reserved by variable bit‐rate (VBR) traffic is not fully utilized at all instances. Hence, this unused bandwidth is allocated to available bit‐rate (ABR) traffic. As the bandwidth used by VBR traffic changes, available bandwidth for ABR traffic varies; i.e., available bandwidth for ABR traffic is inversely proportional to the bandwidth used by the VBR traffic. Based on this fact, a rate‐based congestion control algorithm, Explicit Allowed Rate Algorithm (EARA), is presented in this paper. EARA is compared with Proportional Rate Control Algorithm (PRCA) and Explicit Rate Indication Congestion Avoidance Algorithm (ERICA), in both LAN and WAN environments. Simulations of all three algorithms are conducted under both congestion and fairness configurations with simultaneous generation of CBR, rt‐VBR, nrt‐VBR and ABR traffic. The results show that, with very small over‐head on the switch, EARA significantly decreases the required buffer space and improves the network throughput. Copyright © 1999 John Wiley & Sons, Ltd.  相似文献   
5.
In this study, we investigated the antifungal activity of lactose oxidase (LO) as a potential biopreservative in dairy products. Our study objectives were to screen antifungal activity of LO against common mold strains, to detect the minimum inhibitory level of LO against the same strains, and to understand how LO affects the pH and lactic acid bacteria (LAB) counts in set yogurt. Five mold strains (Penicillium chrysogenum, Penicillium citrinumPenicillium communePenicillium decumbens, and Penicillium roqueforti) were used throughout study. These strains were previously isolated from dairy manufacturing plants. Throughout the study, yogurts were stored at 21 ± 2°C for 14 d. Antifungal activity of LO was screened using 2 enzyme levels (1.2 and 12 g/L LO) against selected strains on the surface of a miniature laboratory set-yogurt model. For all tested strains, no visible mold growth was detected on the surface of yogurts covered with LO compared with control yogurt without LO. The minimum inhibitory level of LO against each strain was further investigated using 4 enzyme levels (0.12, 0.48, 0.84, and 1.2 g/L LO) on the miniature laboratory set-yogurt model. We detected 0.84 g/L LO as the minimum level inhibiting visible hyphal growth across strains. The minimum inhibitory level of LO varied for each individual strain. To study the effect of LO on the pH of yogurt, miniature laboratory set-yogurt models were covered with different enzyme levels (0.12, 0.48, 0.84, 1.2, and 12 g/L LO). At d 14, a difference was detected comparing pH values of treatments to control with no LO. Commercial low-fat set yogurt was used to study the effect of LO on LAB survival when yogurt surface was covered with 0.84 g/L LO under the same experimental conditions. Control with no LO was included. At d 14, 3 levels of catalase were added (0, 0.01, and 0.1%) to each treatment. To enumerate LAB, homogenized samples were plated on de Man, Rogosa, and Sharpe agar and incubated. Yogurts with 0.84 g/L LO had lower LAB counts compared with control yogurts, and catalase level did not have a significant effect on LAB counts. Our results demonstrated potential antifungal efficacy of LO against common spoilage organisms in dairy products with residual lactose and relatively low pH. Manufacturers should establish efficacy of LO against mold strains of interest and determine the effects of LO on organoleptic properties and LAB survival in set yogurt.  相似文献   
6.
Nowadays, the determination of human skin microtopography is usually carried out by methods based on mechanical techniques (profilometry and surfometry), or founded on optical conception (shadowing method and profilometry). Negative skin replicas made of a silicone rubber material (Silflo((R))) or positive casts performed from an epoxy resin (Araldite((R))), are used to assess the skin microstructure. Skin surface microtopography is quantified by measuring furrows depths and spaces between them. An original application using confocal scanning laser microscope (CLSM) is described in this paper. The CLSM gives simultaneously images of the skin surface associated with quantitative measurements of the microtopography. With this apparatus, it is easy to achieve perfect skin replica images with assessment of its microstructure, before and after applications of topical medicines or cosmetic products to evaluate the skin surface restoration. It is worth to mention that it is indispensable to analyse the same skin surface (same plateaux and same furrows). For this reason, it is necessary to localize exactly and to replicate the same skin surface area (4 mm(2)) before and after the cosmetic use, whatever the extended period of the topical application.  相似文献   
7.
Dynamic Power Supply Current Testing of CMOS SRAMs   总被引:1,自引:0,他引:1  
We describe the design and implementation of a dynamic power supply current sensor which is used to detect SRAM faults such as disturb faults as well as logic cell faults. A formal study is presented to assess the parameters that influence the sensor design. The sensor detects faults by detecting abnormal levels of the power supply current. The sensor is embedded in the SRAM and offers on-chip detectability of faults. The sensor detects abnormal dynamic current levels that result from circuit defects. If two or more memory cells erroneously switch as a result of a write or read operation, the level of the dynamic power supply current is elevated. The sensor can detect this elevated value of the dynamic current. The dynamic power supply current sensor can supplement the observability associated with any test algorithm by using the sensor as a substitute for the read operations. This significantly reduces the test length and the additional observability enhances defect coverages.  相似文献   
8.
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive simulation has been carried out to evaluate the design of our protocol. Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00 and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557. Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University. Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University. She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU. Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems. Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications, and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number of achievement awards.  相似文献   
9.
This article presents a correlation between dynamic power supply current and pattern sensitive faults in SRAMs. It is shown that the dynamic power supply current provides a window for observing the internal switching behavior of the memory cells. Switching of the logic state of a memory cell results in a transient current pulse in the power supply rails. A new current-testable SRAM structure is presented which can be used to isolate normal current transients from those resulting from pattern sensitivity. The new structure differs from traditional SRAM structures only in the way that power is distributed to the cells. The new structure allows for very high coverages of disturb-type pattern sensitivity using a simple algorithm of length 5n where n is the number of cells.  相似文献   
10.
In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Service (DDoS) attack traffic from legitimated traffic regardless to various types of the attack packets and methods. Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission rates and packet forms to beat defense systems. These various attack strategies lead to defense systems requiring various detection methods in order to identify the attacks. Moreover, DDoS attacks can craft the traffics like flash crowd events and fly under the radar through the victim. We notice that DDoS attacks have features of repeatable patterns which are different from legitimate flash crowd traffics. In this paper, we propose a comparable detection methods based on the Pearson’s correlation coefficient. Our methods can extract the repeatable features from the packet arrivals in the DDoS traffics but not in flash crowd traffics. The extensive simulations were tested for the optimization of the detection methods. We then performed experiments with several datasets and our results affirm that the proposed methods can differentiate DDoS attacks from legitimate traffics.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号