首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58篇
  免费   0篇
工业技术   58篇
  2023年   5篇
  2022年   17篇
  2021年   7篇
  1999年   1篇
  1998年   8篇
  1997年   4篇
  1996年   3篇
  1995年   3篇
  1994年   4篇
  1993年   3篇
  1977年   1篇
  1976年   2篇
排序方式: 共有58条查询结果,搜索用时 15 毫秒
1.
The 3D Underwater Sensor Network (USNs) has become the most optimistic medium for tracking and monitoring underwater environment. Energy and collision are two most critical factors in USNs for both sparse and dense regions. Due to harsh ocean environment, it is a challenge to design a reliable energy efficient with collision free protocol. Diversity in link qualities may cause collision and frequent communication lead to energy loss; that effects the network performance. To overcome these challenges a novel protocol Forwarder Selection Energy Efficient Routing (FSE2R) is proposed. Our proposal’s key idea is based on computation of node distance from the sink, Residual Energy (RE) of each node and Signal to Interference Noise Ratio (SINR). The node distance from sink and RE is computed for reliable forwarder node selection and SINR is used for analysis of collision. The novel proposal compares with existing protocols like H2AB, DEEP, and E2LR to achieve Quality of Service (QoS) in terms of throughput, packet delivery ratio and energy consumption. The comparative analysis shows that FSE2R gives on an average 30% less energy consumption, 24.62% better PDR and 48.31% less end-to-end delay compared to other protocols.  相似文献   
2.
Twitter is a radiant platform with a quick and effective technique to analyze users’ perceptions of activities on social media. Many researchers and industry experts show their attention to Twitter sentiment analysis to recognize the stakeholder group. The sentiment analysis needs an advanced level of approaches including adoption to encompass data sentiment analysis and various machine learning tools. An assessment of sentiment analysis in multiple fields that affect their elevations among the people in real-time by using Naive Bayes and Support Vector Machine (SVM). This paper focused on analysing the distinguished sentiment techniques in tweets behaviour datasets for various spheres such as healthcare, behaviour estimation, etc. In addition, the results in this work explore and validate the statistical machine learning classifiers that provide the accuracy percentages attained in terms of positive, negative and neutral tweets. In this work, we obligated Twitter Application Programming Interface (API) account and programmed in python for sentiment analysis approach for the computational measure of user’s perceptions that extract a massive number of tweets and provide market value to the Twitter account proprietor. To distinguish the results in terms of the performance evaluation, an error analysis investigates the features of various stakeholders comprising social media analytics researchers, Natural Language Processing (NLP) developers, engineering managers and experts involved to have a decision-making approach.  相似文献   
3.
In experiments on white rat males it was established that infrared laser radiation (frequency 500 Hz) was more potent in stimulating repair of skin wounds than 3000 Hz radiation. This manifested in enhanced proliferative activity of fibroblasts and epithelial cells, decreased areas of the wound.  相似文献   
4.
The objective of this study was to validate retrospective caregiver interviews for diagnosing major causes of severe neonatal illness and death. A convenience sample of 149 infants aged < 28 days with one or more suspected diagnoses of interest (low birthweight/severe malnutrition, preterm birth, birth asphyxia, birth trauma, neonatal tetanus, pneumonia, meningitis, septicaemia, diarrhoea, congenital malformation or injury) was taken from patients admitted to two hospitals in Dhaka, Bangladesh. Study paediatricians performed a standardised history and physical examination and ordered laboratory and radiographic tests according to study criteria. With a median interval of 64.5 days after death or hospital discharge, caregivers of 118 (79%) infants were interviewed about their child's illness. Using reference diagnoses based on predefined clinical and laboratory criteria, the sensitivity and specificity of particular combinations of signs (algorithms) reported by the caregivers were ascertained. Sufficient numbers of children with five reference standard diagnoses were studied to validate caregiver reports. Algorithms with sensitivity and specificity > 80% were identified for neonatal tetanus, low birthweight/severe malnutrition and preterm delivery. Algorithms with specificities > 80% for birth asphyxia and pneumonia had sensitivities < 70%, or alternatively had high sensitivity with lower specificity. In settings with limited access to medical care, retrospective caregiver interviews provide a valid means of diagnosing several of the most common causes of severe neonatal illness and death.  相似文献   
5.
Secretory middle ear otitis is of difficult assessment in children with severe hearing impairment. This otitis, very frequent in infants and children, influences negatively the auditive capacity and apprenticeship as well. Our study deals with the prevalence and severity of the secretive middle ear otitis in an scholar population handicapped by a heavy hypoacusia. Demographically, etiologic and seasonal correlations are considered in the paper. The outcome shows a high incidence of the condition, an inversely relation with the age, an evident seasonal distribution and the absence of correlation between etiology of middle ear disease and sensorineural deafness.  相似文献   
6.
VTG was purified from seabream Sparus aurata plasma by ion exchange chromatography on a DEAE-Sepharose column. The vitellogenin was characterized and its properties were determined. The molecular mass of the native form, obtained by Sephadex G-200 column, was around 450 kDa, whereas an apparent molecular mass of 180 kDa was detected by electrophoresis under denaturing and reducing conditions, suggesting a dimeric form for the native protein. The presence of carbohydrates was determined using concanavalin A, while the presence of phosphate groups was detected by Stains-all, a cationic stain. These data together with the sex specificity, the estrogen inducibility, and the cross-reactivity of the abVTG against the major yolk proteins identifies this protein as vitellogenin. The validated ELISA was used for a rapid and reliable measurement of plasma VTG changes related with those of estradiol-17beta in female broodstock.  相似文献   
7.
A 100- to 3200-mg dose range of FCE 22,178 was studied in this phase I single-dose escalation safety/kinetics study. After oral administration, a rapid drug absorptive phase and a biexponential disposition profile were observed. Mean estimates of the terminal elimination half-life of FCE 22,178, over the doses studied, ranged from 7.6 to 14.4 hours. A disproportionate increase in both maximum peak plasma concentration (Cmax) and area under the curve (AUC0-infinity) was noticed for doses higher than 400 mg. Mean estimates of systemic clearance (CLs/F) over the 100- to 400-mg doses were 0.053 to 0.064 L/hour/kg, and were significantly higher for the three higher dose levels. This nonlinearity appears to be related to the changes in oral bioavailability. Estimates of distribution volume (Vd, lambda z/F) for FCE 22,178 increased from 0.75 L/kg at the 100-mg dose to 3.00 L/kg at the 3200-mg dose, and renal clearance (CLr) also increased with dose. Both observations may be related to an increase in free fraction of FCE 22,178 at higher doses. Urinary excretion of unchanged drug averaged < 10% for all dose levels. The urinary excretion of the glucuronide metabolite (M1) averaged 41 to 70% for doses up to 400 mg, but diminished to 13% at the 3200-mg dose. The disposition of M1 appeared to be formation-rate limited. In addition, the ratio of the formation to the disposition clearance for M1 was relatively stable and apparently dose independent. No drug-related adverse experiences were observed over the studied dose range after single doses at FCE 22,178.  相似文献   
8.
Component-based software development is rapidly introducing numerous new paradigms and possibilities to deliver highly customized software in a distributed environment. Among other communication, teamwork, and coordination problems in global software development, the detection of faults is seen as the key challenge. Thus, there is a need to ensure the reliability of component-based applications requirements. Distributed device detection faults applied to tracked components from various sources and failed to keep track of all the large number of components from different locations. In this study, we propose an approach for fault detection from component-based systems requirements using the fuzzy logic approach and historical information during acceptance testing. This approach identified error-prone components selection for test case extraction and for prioritization of test cases to validate components in acceptance testing. For the evaluation, we used empirical study, and results depicted that the proposed approach significantly outperforms in component selection and acceptance testing. The comparison to the conventional procedures, i.e., requirement criteria, and communication coverage criteria without irrelevancy and redundancy successfully outperform other procedures. Consequently, the F-measures of the proposed approach define the accurate selection of components, and faults identification increases in components using the proposed approach were higher (i.e., more than 80 percent) than requirement criteria, and code coverage criteria procedures (i.e., less than 80 percent), respectively. Similarly, the rate of fault detection in the proposed approach increases, i.e., 92.80 compared to existing methods i.e., less than 80 percent. The proposed approach will provide a comprehensive guideline and roadmap for practitioners and researchers.  相似文献   
9.
Segmentation of vessel in retinal fundus images is a primary step for the clinical identification for specific eye diseases. Effective diagnosis of vascular pathologies from angiographic images is thus a vital aspect and generally depends on segmentation of vascular structure. Although various approaches for retinal vessel segmentation are extensively utilized, however, the responses are lower at vessel's edges. The curvelet transform signifies edges better than wavelets, and hence convenient for multiscale edge enhancement. The bilateral filter is a nonlinear filter that is capable of providing effective smoothing while preserving strong edges. Fast bilateral filter is an advanced version of bilateral filter that regulates the contrast while preserving the edges. Therefore, in this paper a fusion algorithm is recommended by fusing fast bilateral filter that can effectively preserve the edge details and curvelet transform that has better capability to detect the edge direction feature and better investigation and tracking of significant characteristics of the image. Afterwards C mean thresholding is used for the extraction of vessel. The recommended fusion approach is assessed on DRIVE dataset. Experimental results illustrate that the fusion algorithm preserved the advantages of the both and provides better result. The results demonstrate that the recommended method outperforms the traditional approaches.  相似文献   
10.
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Station. The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS. In order to increase the transfer speed and efficiency, the Mavlink does not encrypt the messages. As a result, the protocol is vulnerable to various security attacks such as Eavesdropping, GPS Spoofing, and DDoS. In this study, we tackle the problem and secure the Mavlink communication protocol. By leveraging the Mavlink packet’s vulnerabilities, this research work introduces an experiment in which, first, the Mavlink packets are compromised in terms of security requirements based on our threat model. The results show that the protocol is insecure and the attacks carried out are successful. To overcome Mavlink security, an additional security layer is added to encrypt and secure the protocol. An encryption technique is proposed that makes the communication between the UAV and GCS secure. The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency. The results are validated in terms of transfer speed, performance, and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol. Our achieved results have significant improvement over the literature and Mavlink in terms of security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号