首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   197篇
  免费   12篇
  国内免费   2篇
工业技术   211篇
  2024年   1篇
  2023年   3篇
  2022年   13篇
  2021年   26篇
  2020年   4篇
  2019年   14篇
  2018年   10篇
  2017年   8篇
  2016年   10篇
  2015年   6篇
  2014年   9篇
  2013年   13篇
  2012年   16篇
  2011年   16篇
  2010年   13篇
  2009年   9篇
  2008年   11篇
  2007年   5篇
  2006年   8篇
  2005年   4篇
  2004年   2篇
  2003年   4篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1998年   1篇
  1996年   1篇
排序方式: 共有211条查询结果,搜索用时 15 毫秒
1.
Quantitative cellular in vitro nanoparticle uptake measurements are possible with a large number of different techniques, however, all have their respective restrictions. Here, we demonstrate the application of synchrotron-based X-ray fluorescence imaging (XFI) on prostate tumor cells, which have internalized differently functionalized gold nanoparticles. Total nanoparticle uptake on the order of a few hundred picograms could be conveniently observed with microsamples consisting of only a few hundreds of cells. A comparison with mass spectroscopy quantification is provided, experimental results are both supported and sensitivity limits of this XFI approach extrapolated by Monte-Carlo simulations, yielding a minimum detectable nanoparticle mass of just 5 pg. This study demonstrates the high sensitivity level of XFI, allowing non-destructive uptake measurements with very small microsamples within just seconds of irradiation time.  相似文献   
2.
3.
In this paper, the identification of a class of nonlinear systems which admits input-output maps described by a finite degree Volterra series is considered. In actual fact, it appears that this class can model many important nonlinear multivariable processes not only in engineering, but also in biology, socio-economics, and ecology.To solve this identification problem, we propose a method based on local gradient search in a local parameterization of the state-space realization of finite degree Volterra series with infinite horizon. Using the local parameterization not only reduces the amount of the gradient calculations to the minimal value, but also overcomes the nonuniqueness problem of the optimal solution.Moreover, we propose a sequential projection method to provide an initial estimation of the parameters of finite degree Volterra series realization. This initial estimation is used to initialize the gradient search method.  相似文献   
4.
This article proposes to solve the problem of minimizing the total completion time in a two-machine permutation flowshop environment in which time delays between the machines are considered. For this purpose, an enumeration algorithm based on the branch-and-bound framework is developed, which includes new lower and upper bounds as well as dominance rules. The computational study shows that problems with up to 40 jobs can be solved in a reasonable amount of time.  相似文献   
5.
Microwave imaging for medical applications has been of interest for many years. A novel near-field microwave non-invasive testing and evaluation (NIT&E) technique utilizing tapered rectangular waveguide probes is presented for breast cancer detection. Near-field microwave NIT&E techniques can be a successful candidate for the detection of breast cancer because of their potential in dealing with materials of low conductivity (i.e. lossy dielectrics like the breast tissue). The physical basis for breast tumor detection with microwave imaging is the contrast in dielectric properties of normal and malignant breast tissues. A method adopting Fourier transform matching (FTM) technique and utilizing the reflection coefficient at the aperture of a tapered rectangular waveguide sensor radiating into a breast is described resulting in microwave images that indicate the presence of a tumor. These images demonstrate the feasibility of detecting breast tumors using this approach.  相似文献   
6.
Hidden Markov models (HMMs) have been successfully applied in many intrusion detection applications, including anomaly detection from sequences of operating system calls. In practice, anomaly detection systems (ADSs) based on HMMs typically generate false alarms because they are designed using limited amount of representative training data. Since new data may become available over time, an important feature of an ADS is the ability to accommodate newly acquired data incrementally, after it has originally been trained and deployed for operations. In this paper, a system based on the receiver operating characteristic (ROC) is proposed to efficiently adapt ensembles of HMMs (EoHMMs) in response to new data, according to a learn-and-combine approach. When a new block of training data becomes available, a pool of base HMMs is generated from the data using a different number of HMM states and random initializations. The responses from the newly trained HMMs are then combined to those of the previously trained HMMs in ROC space using a novel incremental Boolean combination (incrBC) technique. Finally, specialized algorithms for model management allow to select a diversified EoHMM from the pool, and adapt Boolean fusion functions and thresholds for improved performance, while it prunes redundant base HMMs. The proposed system is capable of changing the desired operating point during operations, and this point can be adjusted to changes in prior probabilities and costs of errors. Computer simulations conducted on synthetic and real-world host-based intrusion detection data indicate that the proposed system can achieve a significantly higher level of performance than when parameters of a single best HMM are estimated, at each learning stage, using reference batch and incremental learning techniques. It also outperforms the learn-and-combine approaches using static fusion functions (e.g., majority voting). Over time, the proposed ensemble selection algorithms form compact EoHMMs, while maintaining or improving system accuracy. Pruning allows to limit the pool size from increasing indefinitely, thereby reducing the storage space for accommodating HMMs parameters without negatively affecting the overall EoHMM performance. Although applied for HMM-based ADSs, the proposed approach is general and can be employed for a wide range of classifiers and detection applications.  相似文献   
7.
An experimental investigation was conducted to study the in-plane behavior of face shell mortar bedded unreinforced masonry (URM) wall assemblages retrofitted with fiber-reinforced polymer (FRP) laminates. Forty-two URM assemblages were tested under different stress conditions present in masonry shear and infill walls. Tests included prisms loaded in compression with different bed joint orientation (on/off-axis compression), diagonal tension specimens, and specimens loaded under joint shear. The behavior of each specimen type is discussed with emphasis on modes of failure, strength and deformation characteristics. Results showed that the application of FRP laminates on URM has a great influence on strength, postpeak behavior, as well as altering failure modes and maintaining the specimen integrity. The retrofitted specimens reached compressive strength of 1.62–5.64 times that of their unretrofitted counterparts, depending on the bed joint orientation, and joint shear strength increased by eightfold.  相似文献   
8.
Multimedia Tools and Applications - The involvement of medical imaging in medical procedures plays an important role in the diagnosis and planning of a therapeutic treatment. Computerized...  相似文献   
9.
With the rapid development in business transactions, especially in recent years, it has become necessary to develop different mechanisms to trace business user records in web server log in an efficient way. Online business transactions have increased, especially when the user or customer cannot obtain the required service. For example, with the spread of the epidemic Coronavirus (COVID-19) throughout the world, there is a dire need to rely more on online business processes. In order to improve the efficiency and performance of E-business structure, a web server log must be well utilized to have the ability to trace and record infinite user transactions. This paper proposes an event stream mechanism based on formula patterns to enhance business processes and record all user activities in a structured log file. Each user activity is recorded with a set of tracing parameters that can predict the behavior of the user in business operations. The experimental results are conducted by applying clustering-based classification algorithms on two different datasets; namely, Online Shoppers Purchasing Intention and Instacart Market Basket Analysis. The clustering process is used to group related objects into the same cluster, then the classification process measures the predicted classes of clustered objects. The experimental results record provable accuracy in predicting user preferences on both datasets.  相似文献   
10.
Multimedia Tools and Applications - Face detection by low-resolution image (LR) is one of the key aspects of Human-Computer Interaction(HCI). Due to the LR image, which has changes in pose,...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号