首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   184篇
  免费   8篇
工业技术   192篇
  2023年   1篇
  2022年   4篇
  2021年   8篇
  2020年   3篇
  2019年   1篇
  2018年   28篇
  2017年   22篇
  2016年   10篇
  2015年   1篇
  2014年   2篇
  2013年   6篇
  2012年   9篇
  2011年   23篇
  2010年   12篇
  2009年   20篇
  2008年   11篇
  2007年   14篇
  2006年   6篇
  2005年   4篇
  2004年   1篇
  2003年   1篇
  2002年   3篇
  1999年   1篇
  1997年   1篇
排序方式: 共有192条查询结果,搜索用时 15 毫秒
1.
Non-muscle-invasive bladder cancer is the most common form of bladder cancer. The main problem in managing bladder tumors is the high recurrence after the transurethral resection of bladder tumors (TURBT). Our study aimed to examine the fate of intravesically applied cancer cells as the implantation of cancer cells after TURBT is thought to be a cause of tumor recurrence. We established an orthotopic mouse bladder tumor model with MB49-GFP cancer cells and traced them during the first three days to define their location and contacts with normal urothelial cells. Data were obtained by Western blot, immunolabeling, and light and electron microscopy. We showed that within the first two hours, applied cancer cells adhered to the traumatized epithelium by cell projections containing α3β1 integrin on their tips. Cancer cells then migrated through the epithelium and on day 3, they reached the basal lamina or even penetrated it. In established bladder tumors, E-cadherin and desmoplakin 1/2 were shown as feasible immunohistochemical markers of tumor margins based on the immunolabeling of various junctional proteins. Altogether, these results for the first time illustrate cancer cell implantation in vivo mimicking cellular events of tumor recurrence in bladder cancer patients.  相似文献   
2.
The concept of reputation is widely used as a measure of trustworthiness based on ratings from members in a community. The adoption of reputation systems, however, relies on their ability to capture the actual trustworthiness of a target. Several reputation models for aggregating trust information have been proposed in the literature. The choice of model has an impact on the reliability of the aggregated trust information as well as on the procedure used to compute reputations. Two prominent models are flow-based reputation (e.g., EigenTrust, PageRank) and subjective logic-based reputation. Flow-based models provide an automated method to aggregate trust information, but they are not able to express the level of uncertainty in the information. In contrast, subjective logic extends probabilistic models with an explicit notion of uncertainty, but the calculation of reputation depends on the structure of the trust network and often requires information to be discarded. These are severe drawbacks. In this work, we observe that the ‘opinion discounting’ operation in subjective logic has a number of basic problems. We resolve these problems by providing a new discounting operator that describes the flow of evidence from one party to another. The adoption of our discounting rule results in a consistent subjective logic algebra that is entirely based on the handling of evidence. We show that the new algebra enables the construction of an automated reputation assessment procedure for arbitrary trust networks, where the calculation no longer depends on the structure of the network, and does not need to throw away any information. Thus, we obtain the best of both worlds: flow-based reputation and consistent handling of uncertainties.  相似文献   
3.
Learning Fast Emulators of Binary Decision Processes   总被引:1,自引:0,他引:1  
Computation time is an important performance characteristic of computer vision algorithms. The paper shows how existing (slow) binary decision algorithms can be approximated by a (fast) trained WaldBoost classifier. WaldBoost learning minimises the decision time of the classifier while guaranteeing predefined precision. We show that the WaldBoost algorithm together with bootstrapping is able to efficiently handle an effectively unlimited number of training examples provided by the implementation of the approximated algorithm. Two interest point detectors, the Hessian-Laplace and the Kadir-Brady saliency detectors, are emulated to demonstrate the approach. Experiments show that while the repeatability and matching scores are similar for the original and emulated algorithms, a 9-fold speed-up for the Hessian-Laplace detector and a 142-fold speed-up for the Kadir-Brady detector is achieved. For the Hessian-Laplace detector, the achieved speed is similar to SURF, a popular and very fast handcrafted modification of Hessian-Laplace; the WaldBoost emulator approximates the output of the Hessian-Laplace detector more precisely.  相似文献   
4.
We present a 4-approximation algorithm for the problem of placing the fewest guards on a 1.5D terrain so that every point of the terrain is seen by at least one guard. This improves on the previous best approximation factor of 5 (see King in Proceedings of the 13th Latin American Symposium on Theoretical Informatics, pp. 629–640, 2006). Unlike most of the previous techniques, our method is based on rounding the linear programming relaxation of the corresponding covering problem. Besides the simplicity of the analysis, which mainly relies on decomposing the constraint matrix of the LP into totally balanced matrices, our algorithm, unlike previous work, generalizes to the weighted and partial versions of the basic problem.  相似文献   
5.
Data mining is sometimes treating data consisting of items representing measurements of a single property taken in different time points. In this case data can be understood as a time series of one feature. It is no exception when the clue for evaluation of such data is related to their development trends as observed in several successive time points. From the qualitative point of view one can distinguish three basic types of behaviour between two neighbouring time points: the value of the feature is stable (remains the same), it grows or it falls. This paper is concerned with identification of typical qualitative development patterns as they appear in the windows of given length in the considered time-stamped data and their utilization for specification of interesting subgroups.  相似文献   
6.
The demand for general reduction of the energy consumption in civil engineering leads to more frequent use of insulating materials with air gaps or cavities. Heat transfer through a constructional part can be decreased by adding an air gap and low emissivity reflective foils to the structure. In the first part of this paper, the impacts of cavity thickness and inner surface emissivity on combined conduction, convection and radiation heat transfer was experimentally explored in the case of constructional part with a horizontal cavity subjected to constant downward heat flux. The heat flow meter Netzsch HFM 436 Lambda was used for steady-state measurements. Results suggest that the studied parameters seriously affect the combined heat transfer in the composed structure. In the second part the paper reports the numerical study of two-dimensional conjugate heat transfer in closed horizontal cavity having air as the intervening medium. Numerical models validated by related experimental results were performed to further investigate the effect of radiation heat transfer. It was found that in general, the total heat flux through the composed structure decreases with increasing air cavity thickness, which is significant especially when low emissivity inner surfaces are taking into account. The direction of heat flow (downward or upward heat flow) has a significant impact on the convection heat transfer. An important contribution from the present work is the analysis of the optimal thickness of the cavity at different boundary conditions. The optimal thickness of the enclosure with low emissivity surfaces is 16 mm when subjected to upward heat flux.  相似文献   
7.
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. ?kori? and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.  相似文献   
8.
The ability of Lactobacillus (Lb.) gasseri K 7 to inhibit adhesion of Escherichia coli O8:K88 to intestinal mucosa was studied on cultured Caco-2 cells and ex vivo on pigs' small intestinal tissue. Lactobacilli were added simultaneously with E. coli, before E. coli and after E. coli for competition, exclusion and displacement assays. The concentration of lactobacilli on fully differentiated Caco-2 cells was 4.5+/-0.3 x 10(8) cfu/well, while the concentration of E. coli varied from 1.5 x 10(6) to 4.3 x 10(8) cfu/well. The number of E. coli adhered to Caco-2 monolayer (cfu/well) was lineary correlated (R(2)=0.97) to the concentration of added cells. In the assay simulating exclusion, E. coli adhesion was reduced by Lb. gasseri K 7 strain by 0.1 to 0.6 log cfu/well. The binding of E. coli was inhibited even more when incubated simultaneously with lactobacilli, particularly at the lowest concentration of E. coli (ratio E. coli/lactobacilli 1:248), where five-times reduction (or 0.7 log) was observed. When adhesion to tissue derived from pigs' jejunum was tested, concentration of E. coli was constant (6.9+/-0.14 x 10(7) cfu/ml), while the concentration of Lb. gasseri K 7 was 5.9 x 10(7) and 1.3 x 10(7) cfu/ml in two independent experiments, respectively. The adhesion of E. coli and Lb. gasseri K 7 cells to jejunal mucosa was similar (1.0+/-0.17 x 10(6) and 1.54+/-0.10 x 10(6) cfu/cm(2)) when the concentrations of single strains in suspensions were approximately the same. No significant competition, exclusion or displacement of E. coli by lactobacilli was observed on jejunal tissue. In conclusion, Lb. gasseri K 7 was found to be effective in reducing E. coli adhesion to Caco-2 enterocytes, but it was not able to do so in ex vivo conditions tested for pig jejunal tissue.  相似文献   
9.
The behavioral and electroantennographic responses of Prorhinotermes canalifrons to its soldier frontal gland secretion, and two separated major components of the secretion, (E)-1-nitropentadec-1-ene and (E,E)-α-farnesene, were studied in laboratory experiments. Behavioral experiments showed that both the frontal gland secretion and (E,E)-α-farnesene triggered alarm reactions in P. canalifrons, whereas (E)-1-nitropentadec-1-ene did not affect the behavior of termite groups. The alarm reactions were characterized by rapid walking of activated termites and efforts to alert and activate other members of the group. Behavioral responses to alarm pheromone differed between homogeneous and mixed groups, suggesting complex interactions. Antennae of both soldiers and pseudergates were sensitive to the frontal gland secretion and to (E,E)-α-farnesene, but soldiers showed stronger responses. The dose responses to (E,E)-α-farnesene were identical for both soldiers and pseudergates, suggesting that both castes use similar receptors to perceive (E,E)-α-farnesene. Our data confirm (E,E)-α-farnesene as an alarm pheromone of P. canalifrons.  相似文献   
10.
The problem of unsteady compressible fluid flow in an enclosure induced by thermoacoustic waves is studied numerically. Full compressible set of Navier–Stokes equations are considered and numerically solved by boundary-domain integral equations approach coupled with wavelet compression and domain decomposition to achieve numerical efficiency. The thermal energy equation is written in its most general form including the Rayleigh and reversible expansion rate terms. Both, the classical Fourier heat flux model and wave heat conduction model are investigated.The velocity–vorticity formulation of the governing Navier–Stokes equations is employed, while the pressure field is evaluated from the corresponding pressure Poisson equation. Material properties are taken to be for the perfect gas, and assumed to be pressure and temperature dependent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号