首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   93篇
  免费   6篇
综合类   1篇
化学工业   2篇
机械仪表   1篇
建筑科学   8篇
矿业工程   3篇
能源动力   28篇
轻工业   12篇
石油天然气   3篇
无线电   2篇
一般工业技术   6篇
自动化技术   33篇
  2024年   2篇
  2023年   6篇
  2022年   1篇
  2021年   13篇
  2020年   2篇
  2019年   6篇
  2018年   1篇
  2017年   13篇
  2016年   4篇
  2015年   10篇
  2014年   11篇
  2013年   9篇
  2012年   3篇
  2011年   4篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2005年   2篇
  2003年   1篇
  2002年   1篇
  2001年   2篇
  1991年   2篇
  1985年   1篇
  1971年   1篇
排序方式: 共有99条查询结果,搜索用时 0 毫秒
1.

Nowadays, the unparalleled growth of Internet of Things (IoT) is a new digital disruption which intelligent devices are connected and working together. IoT connects personal computers, tablets, and smart phones in our daily communications from leisure purposes to business tasks. However, the security concern of IoT can’t be overemphasized due to the connectivity among communication gadgets. Sustainably, Twitter is one of the most popular Instant Message (IM) toolkits today. When Twitter is being utilized, there will be some negligible and imperceptible digital remnants left in the computing devices, which could be probative digital evidences in a court of law when IoT application is involved. Hence, the digital forensics of IM has been a relatively rigorous, competitive, and novel research field by the law enforcement agency officers and the information security staffs with respect to some cybercrimes concerning IoT. Consequently, this research is targeting on the utilization of Twitter on the desktop PC under Windows 7 operating system via the acquisition of volatile digital bread crumbs inside physical memory of the computing device for the purpose of presenting supportive digital evidences for some information security concerns. The proposed various scenarios in the design of the experiment could be the paradigms for digital forensics specialists or law enforcement agencies to follow in order to reconstruct the previous operations in the Twitter sessions of a certain user under the IoT ecosystems.

  相似文献   
2.
    
The accelerated life model with time-dependent scale transformation is studied. A notion of (relative) degradation for the two distribution functions is introduced via the formal approach. A specific model with “physical” degradation is considered. Simple non-parametric properties of the model are studied. Possible generalizations are discussed.  相似文献   
3.
Many methods have been reported on improving the photogenerated cathodic protection of nano-TiO2 coatings for metals. In this work, nano-TiO2 coatings doped with cerium nitrate have been developed by sol–gel method for corrosion protection of 316 L stainless steel. Surface morphology, structure, and properties of the prepared coatings were investigated by X-ray diffraction, X-ray photoelectron spectroscopy, scanning electron microscopy and energy dispersive X-ray spectroscopy. The corrosion protection performance of the prepared coatings was evaluated in 3 wt% NaCl solution by using electrochemical techniques in the presence and absence of simulated sunlight illumination. The results indicated that the 1.2% Ce-TiO2 coating with three layers exhibited an excellent photogenerated cathodic protection under illumination attributed to the higher separation efficiency of electron–hole pairs and higher photoelectric conversion efficiency. The results also showed that after doping with an appropriate concentration of cerium nitrate, the anti-corrosion performance of the TiO2 coating was improved even without irradiation due to the self-healing property of cerium ions.  相似文献   
4.
    
Modular integrated construction (MiC) becomes a promising solution to improve production efficiency in the construction industry. However, the off-site production and on-site installation processes of MiC pose challenges to collaboration efficiency among the multiple stakeholders involved, including subcontractors, contractors, and consumers. These challenges stem from information dispersion, which impedes effective collaboration and communication. Such problems can be solved by introducing a blockchain-based cyber-physical service platform, which can facilitate information sharing and collaboration across the supply chain. In this paper, we study the impacts of MiC and blockchain technology on construction supply chains and reveal several important insights. First, we find that there exists a first-mover advantage in the traditional construction supply chain, where subcontractors engage in a sequential game, and the subcontractor who produces first obtains more profit than the counterparts. Moreover, the contractor's ability to increase profits by reducing the unit cost of construction time is limited, but it can improve the effectiveness of the time gap due to early delivery. Second, we show that MiC should not be introduced if it significantly reduces collaboration efficiency in the supply chain. Interestingly, increasing the unit cost of construction for subcontractors can actually result in greater profits for all members of the supply chain. Regarding adopting blockchain technology, our findings suggest that supply chain members generally hold similar attitudes. Specifically, when the value of blockchain in improving collaboration efficiency is below a certain threshold, its adoption may not be beneficial, despite its potential to enable rapid production and early delivery.  相似文献   
5.
    
The growing concern for global warming caused by the increased atmospheric concentration of carbon dioxide (CO2) has a significant effect on environmental and energy policies and economic activities, due to the ever-increasing use of fossil fuels such as coal, oil and natural gas throughout the world. A variety of complexities and uncertainties exist in CO2-emission-related processes and various impact factors, such as CO2-emission inventory, mitigation measure, and cost parameter. Decision makers face problems of how many clean-energy resources (or carbon credits) are needed to be replaced (or bought) by measuring electric-power benefits and uncertain economic penalties from random excess CO2 exceeding to given discharge permits. In this study, an integrated optimization modeling approach is developed for planning CO2 abatement through emission trading scheme (ETS) and clean development mechanism (CDM), where uncertainties presented in terms of fuzzy sets, interval values, and random variables can be addressed. The developed model is also applied to a case study of planning CO2-emission mitigation for an electric-power system (EPS) that involves three fossil-fueled power plants (i.e., gas, oil and coal-power plants). Different trading schemes and clean-energy development plans corresponding to different CO2-emission management policies have been analyzed. The results demonstrate that CO2-emission reduction program can be performed cost-effective through emission trading and clean-energy development projects. Violation analyses are also conducted to demonstrate that different violation levels for model’s objective and constraints have different effects on system benefit and satisfaction degree as well as emission trading and clean-energy development.  相似文献   
6.
    
This paper considers the integration of preventive maintenance and tactical production planning in a multiproduct production system, where setup costs and times are sequence dependent. A set of products needs to be produced in lots during a finite planning horizon, where preventive maintenance is conducted periodically at the end of some production periods and corrective maintenance is always performed when there is a failure. The system downtime—as caused by maintenance and setup—affects the system's available production capacity. We use a sequence‐oriented method to search for the optimal setup sequence and develop some steps to prune the searching tree. Our objective is to find the optimal preventive maintenance interval, production lot size, and production sequence in every period, by minimizing the sum of maintenance, production, inventory, and setup costs within the planning horizon. Numerical examples are presented to illustrate our model.  相似文献   
7.
    
The back-propagation (BP) and generalized regression neural network models (GRNN) were investigated to predict the thin layer drying behavior in municipal sewage sludge during hot air forced convection. The accuracy of the BP model to predict the moisture content of the sewage sludge thin layer during hot air forced convective drying was far higher than that of the GRNN model. The GRNN models could automatically determine the best smoothing parameters, which were 0.6 and 0.3 for predicting the moisture content and average temperature, respectively. The model type for predicting the average temperature of the sewage sludge thin layer was selected for different sample groups by comparing their MSE values or R2 values. The GRNN model was suitable for predicting the average temperature corresponding to the sample groups at hot air velocity of 0.6 m/s, and drying temperatures of 100 °C, 160 °C; hot air velocity of 1.4 m/s, and drying temperatures of 130 °C, 140 °C; hot air velocity of 2.0 m/s, and drying temperatures of 150 °C, 160 °C. The average temperature for the other sample groups was best predicted by the BP model.  相似文献   
8.
Electricity generated by solar Photovoltaic (PV) power systems is emerging as one of the most promising cleaner alternatives to replace conventional energy sources, such as coal, oil, and natural gas. This study examines managerial sources of operational efficiency or inefficiency on 855 large commercial rooftop PV power systems in California by examining both scale efficiency and Returns to Scale (RTS). For the research purpose, this study utilizes Data Envelopment Analysis (DEA) as a methodology to assess the scale measures. A difficulty in applying DEA to the performance analysis of PV power systems is that it contains uncontrollable variables such as ambient temperature and solar irradiation, all of which are influenced by weather. It is also widely known that PV power systems cannot produce electricity during night, so being unable to serve as a base load. Thus, these uncontrollable factors often influence the performance of PV power systems. Paying attention to the effects of those uncontrollable factors, this study discusses how to measure scale efficiency and RTS within the framework of DEA. Then, as an application of the proposed approach, this study examines the performance of large commercial rooftop PV power systems in California. This study finds that they belong to increasing (48), constant (807) and decreasing (0) RTS, implying that most of the PV power systems in California have been operating in their appropriate sizes. This further indicates that the operational inefficiency of PV power systems is due to managerial inappropriateness, not their sizes for generation. Thus, there is a space to improve operational efficiency of rooftop PV systems under constant RTS, through managerial efforts such as increase in transmission capacity and operational flexibility to improve solar penetration, and routine maintenance to minimize detrimental effects of dust deposition.  相似文献   
9.
    
Adaptable software systems and architectures give the programmer the ability to create applications that might customize themselves to runtime-emerging requirements. Computational reflection is a programming language technique that is commonly used to achieve the development of this kind of systems. Most runtime reflective systems use Meta-Object Protocols (MOPs). However, MOPs restrict the amount of features an application can customize, and the way they can express its own adaptation. Furthermore, this kind of systems uses a fixed programming language: they develop an interpreter, not a whole language-independent platform.What we present in this paper a non-restrictive reflective platform, called nitrO, that achieves a real computational-environment jump, making every application and language feature adaptable at runtime—without any previously defined restriction. Moreover, the platform has been built using a generic interpreter, in which the reflection mechanism is independent of the language selected by the programmer. Different applications may dynamically adapt each other, regardless of the programming language they use.  相似文献   
10.
    
This editorial paper provides an overview of new advances on hardware security challenges and promising solutions for real world applications. It first presents the increasing hardware vulnerabilities with the emergence of diverse computing platforms. Then, it details the technical challenges, research opportunities, and potential solutions to cyber-attacks on -physical- devices.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号