首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20篇
  免费   0篇
化学工业   7篇
石油天然气   3篇
无线电   2篇
一般工业技术   2篇
冶金工业   2篇
自动化技术   4篇
  2022年   2篇
  2020年   1篇
  2017年   1篇
  2016年   1篇
  2014年   1篇
  2013年   2篇
  2011年   2篇
  2006年   1篇
  2005年   1篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  1999年   2篇
  1995年   1篇
  1994年   1篇
  1986年   1篇
排序方式: 共有20条查询结果,搜索用时 593 毫秒
1.
钻井过程中水合物层化学稳定实验研究   总被引:1,自引:1,他引:0  
油田试验显示,钻井液中加入Lecithin可稳定北极Cascade地区水合物层。针对这一现象开展了一系列实验研究。通过特制的实验装置,对加入不同含量Lecithin后钻井液Ⅰ、Ⅱ、Ⅲ(或加入部分水)体系中甲烷水合物形成的热力学条件和甲烷水合物的生成速度与数量进行了测定。实验结果表明:Lecithin的加入基本上不影响钻井液中甲烷水合物形成的热力学条件;对于钻井液Ⅰ和钻井液Ⅲ的实验流体体系,Lecithin是很好的甲烷水合物生成促进剂。  相似文献   
2.
Gupta  Vidyadhar  Awasthi  Himanshi  Kumar  Nitish  Pandey  Amit Kumar  Gupta  Abhinav 《SILICON》2022,14(6):2989-2997
Silicon - This present article interprets the analytical models of central channel potential, the threshold voltage, and subthreshold current for Graded-Doped Junctionless-Gate-All-Around...  相似文献   
3.
A Recursive Algorithm for Computing Exact Reliability Measures   总被引:1,自引:0,他引:1  
An algorithm is presented to find source-to-K-terminal reliability in a directed graph with independent arc failures. The algorithm is based on a discrete-time Markov chain with two absorbing states. The Markov chain has an upper triangular transition probability matrix, thus the probability of absorption in a state can be found by back-substitution. We show: 1) The source-to-K-terminal reliability is the probability of absorption in a particular absorbing state; 2) The time until absorption can be used as an alternative reliability measure; and 3) The algorithm can be used to find a third reliability measure called the degree of connectedness.  相似文献   
4.
The processing of three Indian coking coal fines with feed ash values of 25.12% (S1), 22.97% (S2), and 30.38% (S3) was studied. Substantial improvement in the overall recovery of combustible could be obtained by splitting sample S1, exhibiting good washability but poor release behavior, into a coarser and a finer fraction and treating them by gravity and Jameson cell flotation, respectively. Sample S2 had over 70% of the material below 100 µm and had excellent release characteristics. The Jameson cell flotation indeed resulted in very high recovery of combustibles at the desired target ash values and split processing was not required for this sample. The floatability and washability characteristics of sample S3 indicated that gravity-based methods might improve combustible recovery in terms of theoretical yield at the desired product ash values. A combination of spiral concentration of the coarser fraction and froth flotation of the finer fraction using a Jameson cell showed some improvement in the combustible recovery of this sample. It was established in this study that if the floatability is poor or moderate, then split processing improves coal cleaning performance. Flotation alone may be recommended only when samples exhibit excellent floatability.  相似文献   
5.
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards has fascinated noteworthy consideration from numerous research communities. In this view, numerous assessments in the form of surveys were proposed highlighting several future IoT‐centric subjects together with threat modeling, intrusion detection systems (IDS), and various emergent technologies. In contrast, in this article, we have focused exclusively on the emerging IoT‐related vulnerabilities. This article is a multi‐fold survey that emphasizes on understanding the crucial causes of novel vulnerabilities in IoT paradigms and issues in existing research. Initially, we have emphasized on different layers of IoT architecture and highlight various emerging security challenges associated with each layer along with the key issues of different IoT systems. Secondly, we discuss the exploitation, detection, and defense methodologies of IoT malware‐enabled distributed denial of service (DDoS), Sybil, and collusion attack capabilities. We have also discussed numerous state‐of‐the‐art strategies for intrusion detection and methods for IDS setup in future IoT systems. Third, we have presented a brief classification of existing IoT authentication protocols and a comparative analysis of such protocols based on different IoT‐enabled cyber attacks. For conducting a real‐time future IoT research, we have presented some emerging blockchain solutions. We have also discussed a comparative examination of some of the recently developed simulation tools and IoT test beds that are characterized based on different layers of IoT infrastructure. We have also outlined some of the open issues and future research directions and also facilitate the readers with broad classification of existing surveys in this domain that addresses several scopes related to the IoT paradigm. This survey article focuses in enabling IoT‐related research activities by comparing and merging scattered surveys in this domain.  相似文献   
6.
In many network management applications, likepost-mortem fault analysis or performance trendsprofiling, it is advantageous to have the ability toview the state of the network as it was at some time in the past. To support such Temporal Views anefficient data organization, or access method, is neededfor storing and updating network related data (as thenetwork evolves over time) and for retrieving requested past network states. For applications where thenetwork manager is not interested in the full (and maybetoo large) snapshot of a past network state it is usefulif partial state snapshots can be extracted quickly. It is thus of particular interest toconstruct an access method that can efficiently supportPartial Temporal Views. Efficiency implies that arequested partial temporal view should be constructed directly, without first computing the elaboratefull temporal view. In this paper we present a newaccess method (called the Neighbor History Index) forthis problem. One of the advantages of this method is that the update processing is independent ofthe evolution size (the total number of changes in theevolution). In addition, our method uses a small diskspace overhead. We then present a general framework for organizing time-evolving network data. Ourframework distinguishes between flat and hierarchicalevolutions and subsequently between flat andhierarchical temporal views. We also provide a way toefficiently construct temporal views on hierarchicalevolutions. This paper shows that supporting temporalviews on flat or hierarchical evolutions is notexpensive: our solutions use small space overhead, havesmall updating and compute temporal viewsfast.  相似文献   
7.
8.
The hydrogenation of (S)-proline-modified anthranilic acid was studied on Rh and Ru catalysts. The hydrogenation occurred with a very high diastereoselectivity but a moderate chemoselectivity. In general, the carbon-supported catalysts exhibited a higher activity but a lower diastereoselectivity than the alumina-supported catalysts. The use of water as the solvent instead of ethanol resulted in higher activities but lower diastereoselectivities. Rh- and Ru-based homogeneous catalysts gave a comparable selectivity but a lower activity than their heterogeneous counterparts. This revised version was published online in November 2006 with corrections to the Cover Date.  相似文献   
9.
The thermal discharge behaviour of cellulose diacetate (CA2) (39% acetyl content) and cellulose triacetate (CA3) (44% acetyl content) films was studied at different polarizing temperatures and fields. Cellulose diacetate exhibited two peaks, one at low temperatures and the other at high temperatures, whereas cellulose triacetate exhibited only one peak. The origin of these peaks in CA2 is attributed to dipolar orientation and space charge polarization respectively, while the only peak in CA3 is due to space charge polarization. The difference in thermal discharge behaviour of CA2 and CA3 is attributed to the difference in acetyl contents of the two acetates.  相似文献   
10.
A transaction processing queue manages a database which is partitioned into N items. Each arriving class-i customer requests to read and write a certain subset of the N items (called the shared and exclusive access sets and ). Classes i and j are said to conflict if

. No two conflicting classes of customers can be processed simultaneously. All classes arrive according to independent Poisson processes and have general i.i.d. service times.In this paper, we discuss database systems without queuing. We show the insensitivity property of the system, and derive analytical expressions for performance measures such as blocking probabilities, throughput, etc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号