首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   105篇
  免费   4篇
工业技术   109篇
  2019年   1篇
  2018年   3篇
  2017年   2篇
  2016年   2篇
  2014年   4篇
  2013年   4篇
  2012年   4篇
  2011年   2篇
  2010年   1篇
  2009年   2篇
  2008年   7篇
  2007年   24篇
  2006年   11篇
  2005年   4篇
  2004年   1篇
  2003年   4篇
  2002年   1篇
  1999年   1篇
  1998年   8篇
  1997年   5篇
  1996年   3篇
  1995年   2篇
  1994年   1篇
  1993年   2篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
排序方式: 共有109条查询结果,搜索用时 15 毫秒
1.
The authors comments on the claim of Takahashi et al. that the distribution model, utilizing the mixture of Gaussian distributions, for the local critical current density of superconducting materials they proposed is a new idea. The authors points out the the method have been known since 1886.  相似文献   
2.
The recent work Professor Nagode and colleagues is discussed with respect to the use of mixture Weibull models.  相似文献   
3.
Tumor size and prognosis in aggressively treated osteosarcoma   总被引:1,自引:0,他引:1  
PURPOSE: The aim of this retrospective analysis was to investigate the prognostic significance and optimal measures of tumor size in osteosarcoma treated with intensive neoadjuvant chemotherapy. PATIENTS AND METHODS: Initial anterior-posterior (AP) and lateral x-ray films of 128 patients treated within the trials Cooperative Osteosarcoma Study (COSS)-80, -82, and -86, were evaluated for the following three tumor diameters: length, width, and depth. Metastasis-free survival (MFS) analyses were performed in univariate and multivariate models with one, two, and three dimensions of the tumor as absolute or relative measures (tumor length, referred to bone length, plane and volume to body-surface area). RESULTS: Univariate analyses of MFS showed a high prognostic significance of all absolute measures. Relative measures, at best, showed a comparable predictive value. Cox regression analysis indicated the high prognostic significance of absolute tumor volume (ATV; P < .0001) and histologic response (P < .0001). None of 19 patients with an ATV < or = 70 cm3 and only four of 53 with an ATV < or = 150 cm3 relapsed, while in patients with an ATV more than 150 cm3, the relapse rate remained 40% to 60%, irrespective of further increase in volume. CONCLUSION: Initial tumor size is an important and easily obtainable prognostic factor in osteosarcoma and may serve as a basis for risk-adapted therapy. It is best represented by the absolute three-dimensional measure ATV. There is a cut-off point regarding the incidence of metastases at a tumor volume of approximately 150 cm3 as calculated from two-plane x-ray films.  相似文献   
4.
Mesh networks are a potential solution for providing communication infrastructure in an emergency. They can be rapidly deployed by first responders in the wake of a major disaster to augment an existing wireless or wired network. We imagine a mesh node with multiple radios embedded in each emergency vehicle arriving at the site to form the backbone of a mobile wireless mesh. The ability of such a mesh network to monitor itself, diagnose faults and anticipate problems are essential features for its sustainable operation. Typical SNMP-based centralized solutions introduce a single point of failure and are unsuitable for managing such a network. Mesh-Mon is a decentralized monitoring and management system designed for such a mobile, rapidly deployed, unplanned mesh network and works independently of the underlying mesh routing protocol. Mesh-Mon nodes are designed to actively cooperate and use localized algorithms to predict, detect, diagnose and resolve network problems in a scalable manner. Mesh-Mon is independent of the underlying routing protocol and can operate even if the mesh routing protocol completely fails. One novel aspect of our approach is that we employ mobile users of the mesh, running software called Mesh-Mon-Ami, to ferry management packets between physically-disconnected partitions in a delay-tolerant-network manner. The main contributions of this paper are the design, implementation and evaluation of a comprehensive monitoring and management architecture that helps a network administrator proactively identify, diagnose and resolve a range of issues that can occur in a dynamic mesh network. In experiments on Dart-Mesh, our 16-node indoor mesh testbed, we found Mesh-Mon to be effective in quickly diagnosing and resolving a variety of problems with high accuracy, without adding significant management overhead.  相似文献   
5.
The goal of this work is to present a causation modeling methodology with the ability to accurately infer blood glucose levels using a large set of highly correlated noninvasive input variables over an extended period of time. These models can provide insight to improve glucose monitoring, and glucose regulation through advanced model-based control technologies. The efficacy of this approach is demonstrated using real data from a type 2 diabetic (T2D) subject collected under free-living conditions over a period of 25 consecutive days. The model was identified and tested using eleven variables that included three food variables as well as several activity and stress variables. The model was trained using 20 days of data and validated using 5 days of data. This gave a fitted correlation coefficient of 0.70 and an average absolute error (AAE) (i.e., the average of the absolute values for the measured glucose concentration minus modeled glucose concentration) of 13.3 mg/dL for the validation data. This AAE result was significantly better than the subject’s personal glucose meter AAE of 15.3 mg/dL for replicated measurements.  相似文献   
6.
The beta exponential distribution   总被引:1,自引:0,他引:1  
The exponential distribution is perhaps the most widely applied statistical distribution for problems in reliability. In this note, we introduce a generalization—referred to as the beta exponential distribution—generated from the logit of a beta random variable. We provide a comprehensive treatment of the mathematical properties of the beta exponential distribution. We derive expressions for the moment generating function, characteristic function, the first four moments, variance, skewness, kurtosis, mean deviation about the mean, mean deviation about the median, Rényi entropy, Shannon entropy, the distribution of sums and ratios, and the asymptotic distribution of the extreme order statistics. We also discuss simulation issues, estimation by the methods of moments and maximum likelihood and provide an expression for the Fisher information matrix. We hope that this generalization will attract wider applicability in reliability.  相似文献   
7.
Computational Markets to Regulate Mobile-Agent Systems   总被引:9,自引:0,他引:9  
Mobile-agent systems allow applications to distribute their resource consumption across the network. By prioritizing applications and publishing the cost of actions, it is possible for applications to achieve faster performance than in an environment where resources are evenly shared. We enforce the costs of actions through markets, where user applications bid for computation from host machines.We represent applications as collections of mobile agents and introduce a distributed mechanism for allocating general computational priority to mobile agents. We derive a bidding strategy for an agent that plans expenditures given a budget, and a series of tasks to complete. We also show that a unique Nash equilibrium exists between the agents under our allocation policy. We present simulation results to show that the use of our resource-allocation mechanism and expenditure-planning algorithm results in shorter mean job completion times compared to traditional mobile-agent resource allocation. We also observe that our resource-allocation policy adapts favorably to allocate overloaded resources to higher priority agents, and that agents are able to effectively plan expenditures, even when faced with network delay and job-size estimation error.  相似文献   
8.
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to define context-sensitive rules, such as “allow database access only to staff who are currently located in the main office”. However, these rules, or the facts that are needed to verify authority, often involve sensitive context information. This paper presents a secure context-sensitive authorization system that protects confidential information in facts or rules. Furthermore, our system allows multiple hosts in a distributed environment to perform the evaluation of an authorization query in a collaborative way; we do not need a universally trusted central host that maintains all the context information. The core of our approach is to decompose a proof for making an authorization decision into a set of sub-proofs produced on multiple different hosts, while preserving the integrity and confidentiality policies of the mutually untrusted principals operating these hosts. We prove the correctness of our algorithm.  相似文献   
9.
As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to act as a gateway between sensors and electronic health record systems, caregivers can continuously monitor the patients and deliver better care. Furthermore, individuals can become better engaged in monitoring and managing their own health. Although some work on mHealth sensing has addressed security, achieving strong privacy for low-power sensors remains a challenge. We make three contributions. First, we propose an mHealth sensing protocol that provides strong security and privacy properties at the link layer, with low energy overhead, suitable for low-power sensors. The protocol uses three novel techniques: adaptive security, to dynamically modify transmission overhead; MAC striping, to make forgery difficult even for small-sized Message Authentication Codes; and asymmetric resource requirements, in recognition of the limited resources in tiny mHealth sensors. Second, we demonstrate its feasibility by implementing a prototype on a Chronos wrist device, and evaluating it experimentally. Third, we provide a security, privacy, and energy analysis of our system.  相似文献   
10.
For original paper by Yacoub et al., see IEEE Trans. Broadcasting., vol.51, p.504-11 (2005 December).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号