首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   245篇
  免费   10篇
化学工业   56篇
金属工艺   3篇
机械仪表   6篇
建筑科学   10篇
能源动力   3篇
轻工业   23篇
水利工程   2篇
石油天然气   2篇
无线电   11篇
一般工业技术   39篇
冶金工业   37篇
自动化技术   63篇
  2023年   6篇
  2022年   13篇
  2021年   21篇
  2020年   6篇
  2019年   9篇
  2018年   5篇
  2017年   8篇
  2016年   8篇
  2015年   7篇
  2014年   11篇
  2013年   16篇
  2012年   13篇
  2011年   20篇
  2010年   6篇
  2009年   13篇
  2008年   16篇
  2007年   5篇
  2006年   8篇
  2005年   14篇
  2004年   10篇
  2003年   3篇
  2002年   7篇
  2001年   3篇
  2000年   4篇
  1999年   4篇
  1998年   6篇
  1997年   4篇
  1995年   2篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1986年   1篇
排序方式: 共有255条查询结果,搜索用时 78 毫秒
11.
This article describes an approach for the automated verification of mobile systems. Mobile systems are characterized by the explicit notion of location (e.g., sites where they run) and the ability to execute at different locations, yielding a number of security issues. To this aim, we formalize mobile systems as Labeled Kripke Structures, encapsulating the notion of location net that describes the hierarchical nesting of the threads constituting the system. Then, we formalize a generic security-policy specification language that includes rules for expressing and manipulating the code location. In contrast to many other approaches, our technique supports both access control and information flow specification. We developed a prototype framework for model checking of mobile systems. It works directly on the program code (in contrast to most traditional process-algebraic approaches that can model only limited details of mobile systems) and uses abstraction-refinement techniques, based also on location abstractions, to manage the program state space. We experimented with a number of mobile code benchmarks by verifying various security policies. The experimental results demonstrate the validity of the proposed mobile system modeling and policy specification formalisms and highlight the advantages of the model checking-based approach, which combines the validation of security properties with other checks, such as the validation of buffer overflows.  相似文献   
12.
The Dynamics of Syntactic Knowledge   总被引:1,自引:0,他引:1  
The syntactic approach to epistemic logic avoids the logicalomniscience problem by taking knowledge as primary rather thanas defined in terms of possible worlds. In this study, we combinethe syntactic approach with modal logic, using transition systemsto model reasoning. We use two syntactic epistemic modalities:‘knowing at least’ a set of formulae and ‘knowingat most’ a set of formulae. We are particularly interestedin models restricting the set of formulae known by an agentat a point in time to be finite. The resulting systems are investigatedfrom the point of view of axiomatization and complexity. Weshow how these logics can be used to formalise non-omniscientagents who know some inference rules, and study their relationshipto other systems of syntactic epistemic logics, such as Ågotnesand Walicki (2004, Proc. 2nd EUMAS, pp. 1–10), Alechinaet al. (2004, Proc. 3rd AAMAS, pp. 601–613), Duc (1997,J. Logic Comput., 7, 633–648).  相似文献   
13.
Social Network Sites (SNSs) rely exclusively on user-generated content to offer engaging and rewarding experience to its members. As a result, stimulating user communication and self-disclosure is vital for the sustainability of SNSs. However, considering that the SNS users are increasingly culturally diverse, motivating this audience to self-disclose requires understanding of their cultural intricacies. Yet existing research offers only limited insights into the role of culture behind the motivation of SNS users to self-disclose. Building on the privacy calculus framework, this study explores the role of two cultural dimensions ?C individualism and uncertainty avoidance ?C in self-disclosure decisions of SNS users. Survey responses of US and German Facebook members are used as the basis for our analysis. Structural equation modeling and multi-group analysis results reveal the distinct role of culture in the cognitive patterns of SNS users. The authors find that trusting beliefs play a key role in the self-disclosure decisions of users from individualistic cultures. At the same time, uncertainty avoidance determines the impact of privacy concerns. This paper contributes to the theory by rejecting the universal nature of privacy calculus processes. The findings provide for an array of managerial implications for SNS providers as they strive to encourage content creation and sharing by their heterogeneous members.  相似文献   
14.
Bladder cancer is the fourth most common malignancy in the US and is associated with the highest cost per patient. A high likelihood of recurrence, mandating stringent surveillance protocols, has made the development of urinary markers a focus of intense pursuit with the hope of decreasing the burden this disease places on patients and the healthcare system. To date, routine use of markers is not recommended for screening or diagnosis. Interests include the development of a single urinary marker that can be used in place of or as an adjunct to current screening and surveillance techniques, as well identifying a molecular signature for an individual’s disease that can help predict progression, prognosis, and potential therapeutic response. Markers have shown potential value in improving diagnostic accuracy when used as an adjunct to current modalities, risk-stratification of patients that could aid the clinician in determining aggressiveness of surveillance, and allowing for a decrease in invasive surveillance procedures. This review discusses the current understanding of emerging biomarkers, including miRNAs, gene signatures and detection of circulating tumor cells in the blood, and their potential clinical value in bladder cancer diagnosis, as prognostic indicators, and surveillance tools, as well as limitations to their incorporation into medical practice.  相似文献   
15.
The purpose of this study was to investigate the effects of pasture-based versus indoor total mixed ration (TMR) feeding systems on the chemical composition, quality characteristics, and sensory properties of full-fat Cheddar cheeses. Fifty-four multiparous and primiparous Friesian cows were divided into 3 groups (n = 18) for an entire lactation. Group 1 was housed indoors and fed a TMR diet of grass silage, maize silage, and concentrates; group 2 was maintained outdoors on perennial ryegrass only pasture (GRS); and group 3 was maintained outdoors on perennial ryegrass/white clover pasture (CLV). Full-fat Cheddar cheeses were manufactured in triplicate at pilot scale from each feeding system in September 2015 and were examined over a 270-d ripening period at 8°C. Pasture-derived feeding systems were shown to produce Cheddar cheeses yellower in color than that of TMR, which was positively correlated with increased cheese β-carotene content. Feeding system had a significant effect on the fatty acid composition of the cheeses. The nutritional composition of Cheddar cheese was improved through pasture-based feeding systems, with significantly lower thrombogenicity index scores and a greater than 2-fold increase in the concentration of vaccenic acid and the bioactive conjugated linoleic acid C18:2 cis-9,trans-11, whereas TMR-derived cheeses had significantly higher palmitic acid content. Fatty acid profiling of cheeses coupled with multivariate analysis showed clear separation of Cheddar cheeses derived from pasture-based diets (GRS or CLV) from that of a TMR system. Such alterations in the fatty acid profile resulted in pasture-derived cheeses having reduced hardness scores at room temperature. Feeding system and ripening time had a significant effect on the volatile profile of the Cheddar cheeses. Pasture-derived Cheddar cheeses had significantly higher concentrations of the hydrocarbon toluene, whereas TMR-derived cheese had significantly higher concentration of 2,3-butanediol. Ripening period resulted in significant alterations to cheese volatile profiles, with increases in acid-, alcohol-, aldehyde-, ester-, and terpene-based volatile compounds. This study has demonstrated the benefits of pasture-derived feeding systems for production of Cheddar cheeses with enhanced nutritional and rheological quality compared with a TMR feeding system.  相似文献   
16.
A series of dihydropyrimidinone-based antimalarial compounds were designed and synthesised based on the previously identified amide-based quinoline hybrids which showed good resistance reversal ability against the resistant strain of Plasmodium falciparum. The aromatic ring on the dihydropyrimidinone of the original hits was exchanged for a methyl group to bring the molecular weights below 500 Da and also determine the effect of the aromatic ring count on the resistance reversal ability of the hybrids. Apart from the previously used amide bond, the hybrid linker was also extended to the triazole linker. Although the triazole linker is synthetically easier to access, the use of an amide linker seems to have an activity advantage. The synthesised compounds in addition to the previously identified hits were subjected to molecular docking particularly targeting the orthosteric site of Plasmodium falciparum glutathione reductase (PfGR) protein. The ligand with the best binding interaction was rationally optimised to increase its suitability as a competitive inhibitor against the cofactor of the PfGR. Two of the optimised ligands showed better binding affinities than the cofactor while one of the two ligands displayed hydrophobically packed correlated hydrogen-bond which is very important in maintaining the ligand stability within the protein. In silico ADME predictions of the synthesised compounds indicate that these compounds possess good pharmacokinetic properties.  相似文献   
17.
Multifunctional or structural electrolytes are characterized by ionic conductivity high enough to be used in the electrochemical devices and mechanical performance suitable for the structural applications. Preliminary insights are provided into the combustion behavior of structural bi-continuous electrolytes based on bisphenol A diglycidyl ether (DGEBA), synthesized using the techniques of reaction induced phase separation and emulsion templating. The effect of the composition of the structural electrolytes and external heat flux on the behavior of the formulations were studied using a cone calorimeter with gases formed during testing analyzed using FTIR. The composition of the formulations investigated was changed by varying the type and amount of the ion conductive part of the bi-continuous electrolyte. Two ionic liquids, 1-ethyl-3-methylimidazolium bis(fluorosulfonyl)imide (EMIM-TFSI) and 1-butyl-3-methylimidazolium tetrafluoroborate (BMIM-BF4), as well as a deep eutectic solvent (DES) based on ethylene glycol and choline chloride, were used. The results obtained confirm that time to ignition, heat release rate (HRR), total mass loss, as well as the composition of the gases released during tests depend on the composition of the formulations. Addition of liquid electrolyte is found to reduce the time to ignition by up to 10% and the burning time by between 28% and 60% with the added benefit of reducing the HRR by at least 34%. Gaseous products such as CO2, CO, H2O, CH4, C2H2, N2O, NO, and HCN were detected for all formulations with the gases SO2, NH3, HCl, C2H4, and NH3 found to be for certain formulations only.  相似文献   
18.
We present a framework for model checking concurrent software systems which incorporates both states and events. Contrary to other state/event approaches, our work also integrates two powerful verification techniques, counterexample-guided abstraction refinement and compositional reasoning. Our specification language is a state/event extension of linear temporal logic, and allows us to express many properties of software in a concise and intuitive manner. We show how standard automata-theoretic LTL model checking algorithms can be ported to our framework at no extra cost, enabling us to directly benefit from the large body of research on efficient LTL verification. We also present an algorithm to detect deadlocks in concurrent message-passing programs. Deadlock- freedom is not only an important and desirable property in its own right, but is also a prerequisite for the soundness of our model checking algorithm. Even though deadlock is inherently non-compositional and is not preserved by classical abstractions, our iterative algorithm employs both (non-standard) abstractions and compositional reasoning to alleviate the state-space explosion problem. The resulting framework differs in key respects from other instances of the counterexample-guided abstraction refinement paradigm found in the literature. We have implemented this work in the magic verification tool for concurrent C programs and performed tests on a broad set of benchmarks. Our experiments show that this new approach not only eases the writing of specifications, but also yields important gains both in space and in time during verification. In certain cases, we even encountered specifications that could not be verified using traditional pure event-based or state-based approaches, but became tractable within our state/event framework. We also recorded substantial reductions in time and memory consumption when performing deadlock-freedom checks with our new abstractions. Finally, we report two bugs (including a deadlock) in the source code of Micro-C/OS versions 2.0 and 2.7, which we discovered during our experiments. This research was sponsored by the National Science Foundation (NSF) under grants no. CCR-9803774 and CCR-0121547, the Office of Naval Research (ONR) and the Naval Research Laboratory (NRL) under contract no. N00014-01-1-0796, the Army Research Office (ARO) under contract no. DAAD19-01-1-0485, and was conducted as part of the Predictable Assembly from Certifiable Components (PACC) project at the Software Engineering Institute (SEI). This article combines and builds upon the papers (CCO+04) and (CCOS04). Received December 2004 Revised July 2005 Accepted July 2005 by Eerke A. Boiten, John Derrick, Graeme Smith and Ian Hayes  相似文献   
19.
In Queensland, Australia, forest areas are discriminated from non-forest by applying a threshold (∼ 12%) to Landsat-derived Foliage Projected Cover (FPC) layers (equating to ∼ 20% canopy cover), which are produced routinely for the State. However, separation of woody regrowth following agricultural clearing cannot be undertaken with confidence, and is therefore not mapped routinely by State Agencies. Using fully polarimetric C-, L- and P-band NASA AIRSAR and Landsat FPC data for forests and agricultural land near Injune, central Queensland, we corroborate that woody regrowth dominated by Brigalow (Acacia harpophylla) cannot be discriminated using either FPC or indeed C-band data alone, because the rapid attainment of a canopy cover leads to similarities in both reflectance and backscatter with remnant forest. We also show that regrowth cannot be discriminated from non-forest areas using either L-band or P-band data alone. However, mapping can be achieved by thresholding and intersecting these layers, as regrowth is unique in supporting both a high FPC (> ∼ 12%) and C-band SAR backscatter (> ~ − 18 dB at HV polarisation) and low L-band and P-band SAR backscatter (e.g. < =∼ 14 dB at L-band HH polarisation). To provide a theoretical explanation, a wave scattering model based on that of Durden et al. [Durden, S.L., Van Zyl, J.J. & Zebker, H.A. (1989). Modelling and observation of radar polarization signature of forested areas. IEEE Trans. Geoscience and Remote Sensing, 27, 290-301.] was used to demonstrate that volume scattering from leaves and small branches in the upper canopy leads to increases in C-band backscattering (particularly HV polarisations) from regrowth, which increases proportionally with FPC. By contrast, low L-band and P-band backscatter occurs because of the lack of double bounce interactions at co-polarisations (particularly HH) and volume scattering at HV polarisation from the stems and branches, respectively, when their dimensions are smaller than the wavelength. Regrowth maps generated by applying simple thresholds to both FPC and AIRSAR L-band data showed a very close correspondence with those mapped using same-date 2.5 m Hymap data and an average 73.7% overlap with those mapped through time-series comparison of Landsat-derived land cover classifications. Regrowth mapped using Landsat-derived FPC from 1995 and JER-1 SAR data from 1994-1995 also corresponded with areas identified within the time-series classification and true colour stereo photographs for the same period. The integration of Landsat FPC and L-band SAR data is therefore expected to facilitate regrowth mapping across Queensland and other regions of Australia, particularly as Japan's Advanced Land Observing System (ALOS) Phase Arrayed L-band SAR (PALSAR), to be launched in 2006, will observe at both L-band HH and HV polarisations.  相似文献   
20.
State Space Search with Prioritised Soft Constraints   总被引:2,自引:0,他引:2  
This paper addresses two issues: how to choose between solutions for a problem specified by multiple criteria, and how to search for solutions in such situations. We argue against an approach common in decision theory, reducing several criteria to a single cost (e.g., using a weighted sum cost function) and instead propose a way of partially ordering solutions satisfying a set of prioritised soft constraints. We describe a generalisation of the A* search algorithm which uses this ordering and prove that under certain reasonable assumptions the algorithm is complete and optimal.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号