首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   128篇
  免费   6篇
工业技术   134篇
  2024年   1篇
  2023年   4篇
  2022年   5篇
  2021年   14篇
  2020年   11篇
  2019年   11篇
  2018年   9篇
  2017年   6篇
  2016年   9篇
  2015年   7篇
  2014年   7篇
  2013年   11篇
  2012年   1篇
  2011年   9篇
  2010年   3篇
  2009年   4篇
  2008年   5篇
  2007年   6篇
  2005年   1篇
  2004年   1篇
  2003年   1篇
  2002年   3篇
  2001年   1篇
  1989年   1篇
  1986年   1篇
  1980年   1篇
  1973年   1篇
排序方式: 共有134条查询结果,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - Online Social Networks (OSNs) have recently been the subject of numerous studies that have attempted to develop effective methods for classifying and analyzing...  相似文献   
2.
Cassava (Manihot esculenta Cranzt) deteriorates rapidly. Hence it is processed into various products within 2 to 3 days after harvesting. For this work, tapioca was produced from three different varieties of cassava. They are Odongbo, Okoiyawo and TMS30572. The sorption isotherm for the tapioca grits from three different varieties of cassava at temperatures 25, 32 and 45 °C were determined experimentally and modelled using five different models. Using analysis of variance at 0.01 level, it was shown that the experimental sorption isotherms of the tapioca from the various cassava varieties are not significantly different from each other. However, the Guggenheim (1966) , Anderson (1946) & de Boer (1953) (GAB) model gave the best fit for sorption isotherm of tapioca from either the Odongbo or Okoiyawo varieties, while the exponential model was the best for that from TMS30572 variety.  相似文献   
3.
Protection of Metals and Physical Chemistry of Surfaces - The objective of this study was to characterize the surfaces of the steel products produced locally during their exposure to the industrial...  相似文献   
4.
Analysis of energy-tax for multipath routing in wireless sensor networks   总被引:1,自引:0,他引:1  
Recently, multipath routing in wireless sensor networks (WSN) has got immense research interest due to its capability of providing increased robustness, reliability, throughput, and security. However, a theoretical analysis on the energy consumption behavior of multipath routing has not yet been studied. In this paper, we present a general framework for analyzing the energy consumption overhead (i.e., energy tax) resulting from multipath routing protocol in WSN. The framework includes a baseline routing model, a network model, and two energy consumption schemes for sensor nodes, namely, periodic listening and selective wake-up schemes. It exploits the influence of node density, link failure rates, number of multiple paths, and transmission environment on the energy consumption. Scaling laws of energy-tax due to routing and data traffic are derived through analysis, which provide energy profiles of single-path and multipath routing and serve as a guideline for designing energy-efficient protocols for WSN. The crossover points of relative energy taxes, paid by single-path and multipath routing, reception, and transmission, are obtained. Finally, the scaling laws are validated and performance comparisons are depicted for a reference network via numerical results.  相似文献   
5.
Hashmi  Galib  Akand  Abdur Rafique  Hoq  Mahbubul  Rahman  Habibur 《SILICON》2018,10(4):1653-1660
Silicon - In this paper, simulation of a monocrystalline silicon solar cell was done using PC1D software. The impact of different solar cell parameters, with their effects on power and efficiency,...  相似文献   
6.
Cognitive radio (CR) technology enables opportunistic exploration of unused licensed channels. By giving secondary users (SUs) the capability to utilize the licensed channels (LCs) when there are no primary users (PUs) present, the CR increases spectrum utilization and ameliorates the problem of spectrum shortage. However, the absence of a central controller in CR ad hoc network (CRAHN) introduces many challenges in the efficient selection of appropriate data and backup channels. Maintenance of the backup channels as well as managing the sudden appearance of PUs are critical issues for effective operation of CR. In this paper, a prioritized medium access control protocol for CRAHN, PCR-MAC, is developed which opportunistically selects the optimal data and backup channels from a list of available channels. We also design a scheme for reliable switching of a SU from the data channel to the backup channel and vice-versa. Thus, PCR-MAC increases network throughput and decreases SUs’ blocking rate. We also develop a Markov chain-based performance analysis model for the proposed PCR-MAC protocol. Our simulations, carried out in \(NS-3\) , show that the proposed PCR-MAC outperforms other state-of-the-art opportunistic medium access control protocols for CRAHNs.  相似文献   
7.
The number of receptors expressed by cells plays an important role in controlling cell signaling events, thus determining its behaviour, state and fate. Current methods of quantifying receptors on cells are either laborious or do not maintain the cells in their native form. Here, a method integrating highly sensitive bioluminescence, high precision microfluidics and small footprint of lensfree optics is developed to quantify cell surface receptors. This method is safe to use, less laborious, and faster than the conventional radiolabelling and near field scanning methods. It is also more sensitive than fluorescence based assays and is ideal for high throughput screening. In quantifying β1 adrenergic receptors expressed on the surface of H9c2 cardiomyocytes, this method yields receptor numbers from 3.12 × 105 to 9.36 × 105 receptors/cell which are comparable with current methods. This can serve as a very good platform for rapid quantification of receptor numbers in ligand/drug binding and receptor characterization studies, which is an important part of pharmaceutical and biological research.  相似文献   
8.
Much work has focused on traffic grooming in SONET/WDM ring networks. Previous work has considered many aspects of traffic grooming, including minimizing the number of ADMs, minimizing the number of wavelengths, considering different traffic models, using different network architectures, incorporating switching capability and so on. In this work, we study traffic grooming in unidirectional ring networks with no switching capability under both uniform traffic and non-uniform traffic models to reduce electronic multiplexing costs. Based on the clustering notion, we derive a general and tighter lower bound for the number of ADMs required in traffic grooming under the uniform all-to-all traffic model. This bound reduces to special cases obtained in previous work. We also derive general, tighter, and closed form lower bounds for the number of ADMs required under two non-uniform traffic models: the distance-dependent traffic model and the non-uniform symmetric traffic model. Cost-effective multi-phase algorithms that exploit traffic characteristics are then designed and studied to efficiently groom traffic streams under different traffic models. Our numerical and simulation results show that the proposed multi-phase algorithms outperform existing traffic grooming algorithms by using a fewer number of ADMs. Our algorithms in several cases also achieve the lower bounds derived.  相似文献   
9.
Networks provide a significant function in everyday life, and cybersecurity therefore developed a critical field of study. The Intrusion detection system (IDS) becoming an essential information protection strategy that tracks the situation of the software and hardware operating on the network. Notwithstanding advancements of growth, current intrusion detection systems also experience dif- ficulties in enhancing detection precision, growing false alarm levels and identifying suspicious activities. In order to address above mentioned issues, several researchers concentrated on designing intrusion detection systems that rely on machine learning approaches. Machine learning models will accurately identify the underlying variations among regular information and irregular information with incredible efficiency. Artificial intelligence, particularly machine learning methods can be used to develop an intelligent intrusion detection framework. There in this article in order to achieve this objective, we propose an intrusion detection system focused on a Deep extreme learning machine (DELM) which first establishes the assessment of safety features that lead to their prominence and then constructs an adaptive intrusion detection system focusing on the important features. In the moment, we researched the viability of our suggested DELMbased intrusion detection system by conducting dataset assessments and evaluating the performance factors to validate the system reliability. The experimental results illustrate that the suggested framework outclasses traditional algorithms. In fact, the suggested framework is not only of interest to scientific research but also of functional importance.  相似文献   
10.
Clean Technologies and Environmental Policy - The United Nations 2030 agenda states various sustainable development goals (SDGs) to counter climate change affecting individuals' health and...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号