首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42篇
  免费   1篇
  43篇
  2022年   1篇
  2021年   1篇
  2018年   2篇
  2014年   1篇
  2013年   1篇
  2012年   1篇
  2011年   1篇
  2009年   3篇
  2007年   2篇
  2006年   1篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  1999年   2篇
  1998年   1篇
  1990年   3篇
  1989年   1篇
  1988年   1篇
  1987年   4篇
  1986年   1篇
  1985年   1篇
  1982年   2篇
  1979年   1篇
  1977年   1篇
  1974年   1篇
  1971年   1篇
  1970年   1篇
  1967年   1篇
排序方式: 共有43条查询结果,搜索用时 14 毫秒
41.
Somani  L. L.  Choudhari  J. S.  Saxena  S. N. 《Plant and Soil》1974,41(2):223-232
Plant and Soil - Acid gradient elution technique was used at three stages with low, medium and high acid concentrations (N/10, 5 N and 10 N HCl) successively to dissolve phosphorus components of...  相似文献   
42.
An attacker’s connection can propagate quickly to different parts of a transparent All-Optical Network. Such attacks affect the normal traffic and cause a quality of service degradation or outright service denial. Attack monitors can collect the information of each link and each node to help diagnose the attacker’s exact location. Quick detection and localization of an attack source helps avoid losing large amounts of data in an all-optical network. However, to detect attack sources, it is not necessary to put monitors on all nodes. Since not every wavelength on every link is being used all the time, we propose to use the idle wavelengths to setup diagnostic connections and obtain the necessary information needed for diagnosis purposes. We show that placing a relatively small number of monitors at some key nodes in a network is sufficient to achieve level of performance. However, the monitor placement policy, routing policy, and diagnosis method are challenging problems. We, in this paper, first develop a monitor placement policy, a test connection policy, and a routing policy based on our definition of crosstalk attack and monitor node models. With these policies, we show that we can always detect and localize the malicious connections as long as there is no more than one malicious connection on each wavelength in the whole network. After this, we develop a scalable diagnosis method, which can localize the sources of the such malicious attacks in a fast manner. Arun K. Somani is currently Jerry R. Junkins Chair Professor of Electrical and Computer Engineering at Iowa State University. He earned his MSEE and Ph.D. degrees in electrical engineering from the McGill University, Montreal, Canada, in 1983 and 1985, respectively. He worked as Scientific Officer for Govt. of India, New Delhi from 1974 to 1982. From 1985 to 1997, he was a faculty member at the University of Washington, Seattle, WA, where he was a Professor of EE and CSE from 1995 onwards. From 1997 to 2002, he served as David C. Nicholas Professor of Electrical and Computer Engineering at Iowa State University. Professor Somani’s research interests are in the area of fault tolerant computing, computer communication and networks, wireless and optical networking, computer architecture, and parallel computer systems. Tao Wu received the B.S. and M.S.E.E. degrees in telecommunication engineering from the University of Electronic Science and Technology of China, Sichuan, China, in 1993 and 1996, respectively, and the Ph.D. degree in computer and electrical engineering from Iowa State University, Ames, in 2003. He is currently a Software Engineer with Microsoft Corporation. His research interests are in the area of WDM-based optical networking, network security, and image processing.  相似文献   
43.
BackgroundBetter drug regimens for mass drug administration (MDA) could accelerate the Global Programme to Eliminate Lymphatic Filariasis (LF). This community study was designed to compare the safety and efficacy of MDA with IDA (ivermectin, diethylcarbamazine and albendazole) or DA (diethylcarbamazine and albendazole) in India.Methodology/Principal findingsThis two-armed, open-labelled, block randomised, community study was conducted in LF endemic villages in Yadgir district, Karnataka, India. Consenting participants ≥5 years of age were tested for circulating filarial antigenemia (CFA) and microfilaremia (Mf) before treatment with a single oral dose of IDA or DA. Adverse events (AEs) were monitored actively for two days and passively for five more days. Persons with positive CFA or Mf tests at baseline were retested 12-months post-treatment to assess treatment efficacy.Baseline CFA and Mf-rates were 26.4% and 6.9% in IDA and 24.5% and 6.4% in DA villages respectively. 4758 and 4160 participants received IDA and DA. Most AEs were mild after both treatments; fewer than 0.1% of participants experienced AEs with severity > grade 1. No serious AEs were observed. Fever, headache and dizziness were the most common AEs. AE rates were slightly higher after IDA than DA (8.3% vs. 6.4%, P<0.01). AEs were more frequent in females and Mf-positives after either treatment, but significantly more frequent after IDA (40.5% vs 20.2%, P < 0.001).IDA was more effective for clearing Mf than DA (84% vs. 61.8%, P < 0.001). Geometric mean Mf counts per 60μl in retested Mf-positives decreased by 96.4% from 11.8 after IDA and by 90.0% from 9.5 after DA. Neither treatment was effective for clearing CFA.Conclusions/SignificanceIDA had an acceptable safety profile and was more effective for clearing Mf than DA. With adequate compliance and medical support to manage AEs, IDA has the potential to accelerate LF elimination in India.Trial registrationClinical Trial Registry of India (CTRI No/2016/10/007399)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号