首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   52篇
  免费   2篇
  国内免费   1篇
工业技术   55篇
  2022年   4篇
  2019年   1篇
  2018年   1篇
  2017年   2篇
  2016年   2篇
  2014年   2篇
  2013年   5篇
  2012年   1篇
  2011年   3篇
  2010年   2篇
  2009年   2篇
  2008年   1篇
  2007年   1篇
  2006年   3篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2001年   3篇
  1998年   4篇
  1997年   1篇
  1995年   3篇
  1993年   1篇
  1991年   1篇
  1988年   1篇
  1985年   1篇
  1983年   1篇
  1979年   1篇
  1976年   3篇
  1975年   1篇
排序方式: 共有55条查询结果,搜索用时 31 毫秒
1.
This review documents the uses of quantitative MS applied to colorectal cancer (CRC) proteomics for biomarker discovery and molecular pathway profiling. Investigators are adopting various labeling and label-free MS approaches to quantitate differential protein levels in cells, tumors, and plasma/serum. We comprehensively review recent uses of this technology to examine mouse models of CRC, CRC cell lines, their secretomes and subcellular fractions, CRC tumors, CRC patient plasma/serum, and stool samples. For biomarker discovery these approaches are uncovering proteins with potential diagnostic and prognostic utility, while in vitro cell culture experiments are characterizing proteomic and phosphoproteomic responses to disrupted signaling pathways due to mutations or to inhibition of drugable enzymes.  相似文献   
2.
3.
The magnitude of the temperature rate of change of the threshold current density (Jth) is examined with respect to Jth , for a variety of unstrained and strained, long wavelength multiple quantum-well (MQW) lasers. A strong correlation is found between these parameters, and a new relationship describing the Jth -T relationship for these lasers is arrived at in terms of two new essentially temperature and length independent constants. A third constant, Tmax, also appears which estimates the theoretical maximum operating temperature of the laser. It is proposed that these constants may prove to be more useful in characterizing the temperature sensitivity of semiconductor lasers than the conventional parameters T 0 and I0 which exhibit both a length and temperature dependence. Furthermore, an expression is found which relates the magnitude of Tmax to adjustable device structural and material parameters, such as: the cavity length, L; facet reflectivity, R; transparency current density, Jtr; and, the modal gain coefficient, β. It is revealed that a close examination of this relationship may provide new insight into the physics of semiconductor lasers as well as a means for optimizing device design to obtain a high maximum operating temperature in order to eliminate the need for thermoelectric coolers in device packaging. Finally, the measured Tmax, versus L characteristics of six different strained and unstrained MQW laser structures are presented  相似文献   
4.
Analysis of improved signcryption scheme with key privacy   总被引:1,自引:0,他引:1  
In this paper, we analyse the Yang-Wong-Deng signcryption scheme [G. Yang, D.S. Wong, X. Deng, Analysis and improvement of a signcryption scheme with key privacy, in: Information Security Conference—ISC'05, in: Lecture Notes in Comput. Sci., vol. 3650, Springer-Verlag, Berlin, 2005, pp. 218-232] proposed in ISC'05, which is the improvement and enhancement of the security of Libert-Quisquater signcryption scheme [B. Libert, J.J. Quisquater, Efficient signcryption with key privacy from gap Diffie-Hellman groups, in: Public Key Cryptography—PKC'04, in: Lecture Notes in Comput. Sci., vol. 2947, Springer-Verlag, Berlin, 2004, pp. 187-200]. Although Yang et al. [G. Yang, D.S. Wong, X. Deng, Analysis and improvement of a signcryption scheme with key privacy, in: Information Security Conference—ISC'05, in: Lecture Notes in Comput. Sci., vol. 3650, Springer-Verlag, Berlin, 2005, pp. 218-232] proved that their scheme is secure against adaptive chosen ciphertext attacks and achieves ciphertext anonymity (which is also called key privacy) in the random oracle model; we disprove all their claims and show that their scheme is not semantically secure and does not achieve ciphertext anonymity.  相似文献   
5.
6.
Since the first practical and secure public-key encryption scheme without random oracles proposed by Cramer and Shoup in 1998, Cramer–Shoup’s scheme and its variants remained the only practical and secure public-key encryption scheme without random oracles until 2004. In 2004, Canetti et al. proposed a generic transformation from a selective identity-based encryption scheme to a public-key encryption by adding a one-time strongly signature scheme. Since then, some transformation techniques from a selective identity-based encryption scheme to a public-key encryption have been proposed to enhance the computational efficiency, for example, Boneh–Katz’s construction and Boyen–Mei–Waters’ scheme. These transformations have either traded-off the publicly verifiable properties or tightness of security reduction. In 2007, Zhang proposed another generic transformation by adding Chameleon hash functions. In this paper, we introduce another technique from the Boneh–Boyen’s selective identity-based encryption scheme to a public-key encryption which is publicly verifiable and is slightly more efficient than Zhang’s transformation. The proposed public-key encryption scheme is based on the decisional bilinear Diffie–Hellman assumption and the target collision resistant hash functions.  相似文献   
7.
Problems have occurred with dykes constructed on the Lisan Marl to retain brine pumped from the Dead Sea, which is chemically processed to produce potash. In this study the engineering behavior, collapse potential and compressibility of the Lisan Marl were assessed by undertaking laboratory tests with both natural, distilled water and brine as the media. The results showed that the liquid limit and fine particles increased when the soil was mixed with fresh/distilled water compared with brine water. The soil can be classified as highly compressible with a low undrained shear strength. In terms of collapsibility, the soil could be classified as slightly collapsible upon inundation with distilled water and moderately collapsible when soaked in Dead Sea brine. The results are important when determining the height and nature of the dykes.   相似文献   
8.
A secure and efficient conference scheme for mobile communications   总被引:3,自引:0,他引:3  
A growing application area in mobile communications is mobile teleconferencing, in which a group of mobile users collaborate in an interactive procedure, such as a board meeting, a task force, a scientific discussion, or even a virtual classroom. Wireless communications transmit conversations via radio, making them more susceptible to eavesdropping and unauthorized access than are conversations carried via wires. Therefore, it is crucial to ensure confidentiality and authenticity in mobile teleconferencing. When deploying secure services in mobile teleconferences, it has to be taken into account that the mobility of users is usually built on portable devices with limited computing capability. A secure conference scheme for mobile communications needs to be executed efficiently on portable devices. We propose a new secure and efficient conference scheme for mobile communications. Based on a modular square root technique, this scheme is secure against eavesdropping, impersonating, and tracking attacks and allows a participant to join or quit a mobile teleconference dynamically. In addition, the scheme is particularly efficient on the mobile user's portable device because the mobile user needs to perform only single modular multiplication plus encryptions and decryptions of a secret key cryptosystem.  相似文献   
9.
10.

In order to have a proper design and analysis for the column of stone in the soft clay soil, it is essential to develop an accurate prediction model for the settlement behavior of the stone column. In the current research, to predict the behavior in the settlement of stone column a support vector machine (SVM) method is developed and examined. In addition, the proposed model has been compared with the existing reference settlement prediction model that using the monitored field data. As SVM mathematical procedure has resilient and robust generalization aptitude and ensures searching for global minima for particular training data as well. Therefore, the potential that support vector regression might perform efficiently to predict the ground soft clay settlement is relatively valuable. As a result, in this study, comparison of two different developed types of SVM method is carried out. Generally, significant reduction in the relative error (RE%) and root mean square error has been achieved. Utilizing nu-SVM-type model through tenfold cross-validation procedure could achieve outstanding performance accuracy level with RE% less than 2% and CR = 0.9987. The study demonstrates high potential for applying SVM in detecting the settlement behavior of SC prediction and ascertains that SVM could be effectively used for settlement stone columns analysis.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号