首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85篇
  免费   3篇
  国内免费   22篇
系统科学   16篇
现状及发展   7篇
研究方法   9篇
综合类   76篇
自然研究   2篇
  2024年   1篇
  2023年   4篇
  2021年   11篇
  2020年   6篇
  2019年   7篇
  2018年   6篇
  2017年   3篇
  2016年   4篇
  2015年   6篇
  2014年   8篇
  2013年   5篇
  2012年   5篇
  2011年   10篇
  2010年   3篇
  2009年   1篇
  2008年   4篇
  2007年   3篇
  2006年   10篇
  2005年   3篇
  2004年   4篇
  2002年   2篇
  2001年   2篇
  1999年   1篇
  1971年   1篇
排序方式: 共有110条查询结果,搜索用时 15 毫秒
91.
The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number (SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.  相似文献   
92.
Resource sharing among peers is one of important application in Peer-to-Peer(P2P) network. Inexistenee of server makes P2P network to be a less trustable tool for property owners to distribute their resource. In order to protect intelligent property, reputation management strategy is adopted in many P2P network. As long as a P2P network reputation strategy is confirmed, application designer can employ a special detailed distribution scheme to fulfill content distribution within the net. Shmir (k, n) threshold scheme, for example, is an encryption scheme to enhance the distribution se curity of this kind of design. (k*, n) threshold scheme is a new tool similar to Shmir scheme is proposed in this paper. The new scheme based on polynomial expansion and its security is decided by the one way function used in the secret distribution procedure. The scheme efficiency and its features as well as comparison between new and Shmir scheme are also discussed in this paper.  相似文献   
93.
Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in a group environment system. A transmutation of CFP named T-CFP is proposed in this paper. The precondition of T-CFP is the system's user trusts the system center and center's cheating is meaningless at the same time. The significant difference between CFP and T-CFP is that CFP supports only two users while T-CFP can support many users to exchange special information. The security and efficiency of T-CFP are discussed with a detailed example on T-CFP utilization is demonstrated in this paper.  相似文献   
94.
95.
96.
A central role for JNK in obesity and insulin resistance   总被引:95,自引:0,他引:95  
Obesity is closely associated with insulin resistance and establishes the leading risk factor for type 2 diabetes mellitus, yet the molecular mechanisms of this association are poorly understood. The c-Jun amino-terminal kinases (JNKs) can interfere with insulin action in cultured cells and are activated by inflammatory cytokines and free fatty acids, molecules that have been implicated in the development of type 2 diabetes. Here we show that JNK activity is abnormally elevated in obesity. Furthermore, an absence of JNK1 results in decreased adiposity, significantly improved insulin sensitivity and enhanced insulin receptor signalling capacity in two different models of mouse obesity. Thus, JNK is a crucial mediator of obesity and insulin resistance and a potential target for therapeutics.  相似文献   
97.
98.
The inflammasome regulates the release of caspase activation-dependent cytokines, including interleukin (IL)-1β, IL-18 and high-mobility group box 1 (HMGB1). By studying HMGB1 release mechanisms, here we identify a role for double-stranded RNA-dependent protein kinase (PKR, also known as EIF2AK2) in inflammasome activation. Exposure of macrophages to inflammasome agonists induced PKR autophosphorylation. PKR inactivation by genetic deletion or pharmacological inhibition severely impaired inflammasome activation in response to double-stranded RNA, ATP, monosodium urate, adjuvant aluminium, rotenone, live Escherichia coli, anthrax lethal toxin, DNA transfection and Salmonella typhimurium infection. PKR deficiency significantly inhibited the secretion of IL-1β, IL-18 and HMGB1 in E. coli-induced peritonitis. PKR physically interacts with several inflammasome components, including NOD-like receptor (NLR) family pyrin domain-containing 3 (NLRP3), NLRP1, NLR family CARD domain-containing protein 4 (NLRC4), absent in melanoma 2 (AIM2), and broadly regulates inflammasome activation. PKR autophosphorylation in a cell-free system with recombinant NLRP3, apoptosis-associated speck-like protein containing a CARD (ASC, also known as PYCARD) and pro-caspase-1 reconstitutes inflammasome activity. These results show a crucial role for PKR in inflammasome activation, and indicate that it should be possible to pharmacologically target this molecule to treat inflammation.  相似文献   
99.
    
We introduce a new scheme of buffer management to handle packet queues in Mobile Ad hoc Networks (MANETs) for fixed and mobile nodes. In this scheme, we try to achieve efficient queuing in the buffer of a centrally communicating MANET node through an active queue management strategy by assigning dynamic buffer space to all neighboring nodes in proportion to the number of packets received from neighbors and hence controlling packet drop probabilities. Our simulation study reveals that the proposed scheme is a way to improve the buffer management for packet queues in MANET nodes in terms of packet loss ratio, transmission efficiency, and some other important system parameters.  相似文献   
100.
Thermomechanical cyclic quenching and tempering (TMCT) can strengthen steels through a grain size reduction mechanism. The effect of TMCT on microstructure, mechanical, and electrochemical properties of AISI 1345 steel was investigated. Steel samples heated to 1050°C, rolled, quenched to room temperature, and subjected to various cyclic quenching and tempering heat treatments were named TMCT-1, TMCT-2, and TMCT-3 samples, respectively. Microstructure analysis revealed that microstructures of all the treated samples contained packets and blocks of well-refined lath-shaped martensite and retained austenite phases with varying grain sizes (2.8–7.9 μm). Among all the tested samples, TMCT-3 sample offered an optimum combination of properties by showing an improvement of 40% in tensile strength and reduced 34% elongation compared with the non-treated sample. Nanoindentation results were in good agreement with mechanical tests as the TMCT-3 sample exhibited a 51% improvement in indentation hardness with almost identical reduced elastic modulus compared with the non-treated sample. The electrochemical properties were analyzed in 0.1 M NaHCO3 solution by potentiodynamic polarization and electrochemical impedance spectroscopy. As a result of TMCT, the minimum corrosion rate was 0.272 mm/a, which was twenty times less than that of the non-treated sample. The impedance results showed the barrier film mechanism, which was confirmed by the polarization results as the current density decreased.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号