首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   159篇
  免费   21篇
工业技术   180篇
  2022年   10篇
  2021年   11篇
  2020年   13篇
  2019年   15篇
  2018年   14篇
  2017年   13篇
  2016年   6篇
  2015年   5篇
  2014年   5篇
  2013年   10篇
  2012年   3篇
  2011年   7篇
  2010年   5篇
  2009年   2篇
  2008年   7篇
  2007年   5篇
  2006年   4篇
  2005年   7篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   3篇
  2000年   2篇
  1999年   6篇
  1996年   2篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1991年   4篇
  1990年   4篇
  1989年   4篇
  1978年   1篇
  1977年   1篇
  1974年   1篇
排序方式: 共有180条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
5.
6.
Telecommunication Systems - Integration of optical and millimeter-wave systems provide a promising solution for future giga-bits per second wireless communication systems. We have proposed and...  相似文献   
7.
An efficient and robust numerical scheme based on Haar wavelets and finite differences is suggested for the solution of two-dimensional time dependent linear and nonlinear partial differential equations (PDEs). Excellent feature of the scheme is the conversion of linear and non-linear PDEs to algebraic equations which are comparatively easy to handle. Convergence of the scheme, which guarantees small error norm as the resolution level increases, is also an important part of this work. Different error norms are computed to check efficiency of the technique. Computations verify accuracy, flexibility and low computational cost of the method.  相似文献   
8.
We propose a joint optimization network management framework for quality‐of‐service (QoS) routing with resource allocation. Our joint optimization framework provides a convenient way of maximizing the reliability or minimizing the jitter delay of paths. Data traffic is sensitive to droppage at buffers, while it can tolerate jitter delay. On the other hand, multimedia traffic can tolerate loss but it is very sensitive to jitter delay. Depending on the type of data, our scheme provides a convenient way of selecting the parameters which result in either reliability maximization or jitter minimization. We solve the optimization problem for a GPS network and provide the optimal solutions. We find the values of control parameters which control the type of optimization performed. We use our analytical results in a multi‐objective QoS routing algorithm. Finally, we provide insights into our optimization framework using simulations. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
9.
Recently, a newly discovered Dicer-substrate siRNA (DsiRNA) demonstrates higher potency in gene silencing than siRNA but both suffer from rapid degradation, poor cellular uptake and chemical instability. Therefore, Tat-peptide was exploited to protect and facilitate their delivery into cells. In this study, Tat-peptide was complexed with siRNA or DsiRNA through simple complexation. The physicochemical properties (particle size, surface charge and morphology) of the complexes formed were then characterized. The ability of Tat-peptide to carry and protect siRNA or DsiRNA was determined by UV-Vis spectrophotometry and serum protection assay, respectively. Cytotoxicity effect of these complexes was assessed in V79 cell line. siRNA-Tat complexes had particle size ranged from 186?±?17.8 to 375?±?8.3?nm with surface charge ranged from ?9.3?±?1.0 to +13.5?±?1.0?mV, depending on the Tat-to-siRNA concentration ratio. As for DsiRNA-Tat complexes, the particle size was smaller than the ones complexed with siRNA, ranging from 176?±?8.6 to 458?±?14.7?nm. Their surface charge was in the range of +27.1?±?3.6 to +38.1?±?0.9?mV. Both oligonucleotide (ON) species bound strongly to Tat-peptide, forming stable complexes with loading efficiency of more than 86%. These complexes were relatively non cytotoxic as the cell viability of ~90% was achieved. In conclusion, Tat-peptide has a great potential as siRNA and DsiRNA vector due to the formation of stable complexes with desirable physical characteristics, low toxicity and able to carry high amount of siRNA or DsiRNA.  相似文献   
10.
The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommendation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号