首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   130篇
  免费   6篇
  国内免费   1篇
电工技术   4篇
化学工业   19篇
金属工艺   8篇
机械仪表   12篇
能源动力   3篇
轻工业   3篇
无线电   19篇
一般工业技术   42篇
冶金工业   10篇
原子能技术   2篇
自动化技术   15篇
  2022年   1篇
  2021年   4篇
  2020年   10篇
  2019年   4篇
  2018年   4篇
  2017年   3篇
  2016年   4篇
  2015年   1篇
  2014年   4篇
  2013年   3篇
  2012年   8篇
  2011年   8篇
  2010年   6篇
  2009年   9篇
  2008年   8篇
  2007年   3篇
  2006年   1篇
  2005年   11篇
  2004年   2篇
  2003年   4篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   5篇
  1997年   5篇
  1996年   3篇
  1995年   3篇
  1993年   3篇
  1990年   3篇
  1989年   2篇
  1988年   2篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1979年   1篇
  1976年   1篇
  1975年   1篇
排序方式: 共有137条查询结果,搜索用时 125 毫秒
1.
Self-assembled peptide hydrogels represent the realization of peptide nanotechnology into biomedical products. There is a continuous quest to identify the simplest building blocks and optimize their critical gelation concentration (CGC). Herein, a minimalistic, de novo dipeptide, Fmoc-Lys(Fmoc)-Asp, as an hydrogelator with the lowest CGC ever reported, almost fourfold lower as compared to that of a large hexadecapeptide previously described, is reported. The dipeptide self-assembles through an unusual and unprecedented two-step process as elucidated by solid-state NMR and molecular dynamics simulation. The hydrogel is cytocompatible and supports 2D/3D cell growth. Conductive composite gels composed of Fmoc-Lys(Fmoc)-Asp and a conductive polymer exhibit excellent DNA binding. Fmoc-Lys(Fmoc)-Asp exhibits the lowest CGC and highest mechanical properties when compared to a library of dipeptide analogues, thus validating the uniqueness of the molecular design which confers useful properties for various potential applications.  相似文献   
2.
Ramamoorthy  C.V. Tsai  W.-T. 《Computer》1996,29(10):47-58
Software is the key technology in applications as diverse as accounting, hospital management, aviation, and nuclear power. Application advances in different domains such as these-each with different requirements-have propelled software development from small batch programs to large, real-time programs with multimedia capabilities. To cope, software's enabling technologies have undergone tremendous improvement in hardware, communications, operating systems, compilers, databases, programming languages, and user interfaces, among others. In turn, those improvements have fueled even more advanced applications. Improvements in VLSI technology and multimedia, for example, have resulted in faster, more compact computers that significantly widened the range of software applications. Database and user interface enhancements, on the other hand, have spawned more interactive and collaborative development environments. Such changes have a ripple effect on software development processes as well as on software techniques and tools. In this article, we highlight software development's crucial methods and techniques of the past 30 years  相似文献   
3.
4.
One of the major problems concerning information assurance is malicious code. To evade detection, malware has also been encrypted or obfuscated to produce variants that continue to plague properly defended and patched networks with zero day exploits. With malware and malware authors using obfuscation techniques to generate automated polymorphic and metamorphic versions, anti-virus software must always keep up with their samples and create a signature that can recognize the new variants. Creating a signature for each variant in a timely fashion is a problem that anti-virus companies face all the time. In this paper we present detection algorithms that can help the anti-virus community to ensure a variant of a known malware can still be detected without the need of creating a signature; a similarity analysis (based on specific quantitative measures) is performed to produce a matrix of similarity scores that can be utilized to determine the likelihood that a piece of code under inspection contains a particular malware. Two general malware detection methods presented in this paper are: Static Analyzer for Vicious Executables (SAVE) and Malware Examiner using Disassembled Code (MEDiC). MEDiC uses assembly calls for analysis and SAVE uses API calls (Static API call sequence and Static API call set) for analysis. We show where Assembly can be superior to API calls in that it allows a more detailed comparison of executables. API calls, on the other hand, can be superior to Assembly for its speed and its smaller signature. Our two proposed techniques are implemented in SAVE) and MEDiC. We present experimental results that indicate that both of our proposed techniques can provide a better detection performance against obfuscated malware. We also found a few false positives, such as those programs that use network functions (e.g. PuTTY) and encrypted programs (no API calls or assembly functions are found in the source code) when the thresholds are set 50% similarity measure. However, these false positives can be minimized, for example by changing the threshold value to 70% that determines whether a program falls in the malicious category or not.  相似文献   
5.
6.
This research evaluates the effects of PLA/PP blend ratio and Lyocell/hemp mixture ratio on the morphology, water absorption, mechanical and thermal properties of PLA‐based composites. The composites were fabricated with 30 mass % hemp using compression moulding. As a reference composites made from PP were also studied. Combining of hemp and Lyocell in PLA composite leads to the reduction of moisture absorption and can improve the impact, tensile, flexural properties when compared with PLA/hemp. Composite based on the PLA/PP blend‐matrix could not improve the tensile and flexural properties compared with PLA/hemp, however; the lighter composite with better impact properties was obtained. The crystallization temperature of the PLA‐PP/hemp increased compared with pure PLA. This result was also confirmed by the SEM micrographs. The moisture absorption of PLA‐PP/hemp was higher than PLA/hemp. Based on theoretical analysis of DMTA data, there was favorable adhesion in all composites. © 2014 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2014 , 131, 40534.  相似文献   
7.
Dry machining is sometimes less effective when higher machining efficiency, better surface finish quality, and severe cutting conditions are required. For these situations, semi-dry operations utilizing very small amount of cutting fluids called minimum quantity lubrication is expected to become a powerful tool and played a significant role in a number of practical applications. It has been observed from the literature survey that a systematic research work has to be carried out to determine the optimum quantity of lubricant with appropriate cutting conditions for achieving better machinability characteristics of a material. Hence, an attempt has been made in this paper to enhance the machinability characteristics in high speed turning of superalloy Inconel 718 using quantity of lubricant, delivery pressure at the nozzle, frequency of pulses, direction of application of cutting fluid, cutting speed, and feed rate as the process parameters. Results indicated that the use of optimized minimum quantity lubrication parameters under pulsed jet mode leads to lower cutting force, cutting temperature, and flank wear.  相似文献   
8.
A high conversion light water reactor lattice has been analysed using the code DRAGON Version4. This analysis was performed to test the performance of the advanced self-shielding models incorporated in DRAGON Version4. The self-shielding models are broadly classified into two groups – “equivalence in dilution” and “subgroup approach”. Under the “equivalence in dilution” approach we have analysed the generalized Stamm’ler model with and without Nordheim model and Riemann integration. These models have been analysed also using the Livolant–Jeanpierre normalization. Under the “subgroup approach”, we have analysed Statistical self-shielding model based on physical probability tables and Ribon extended self-shielding model based on mathematical probability tables. This analysis will help in understanding the performance of advanced self-shielding models for a lattice that is tight and has a large fraction of fissions happening in the resonance region. The nuclear data for the analysis was generated in-house. NJOY99.90 was used for generating libraries in DRAGLIB format for analysis using DRAGON and A Compact ENDF libraries for analysis using MCNP5. The evaluated datafiles were chosen based on the recommendations of the IAEA Co-ordinated Research Project on the WIMS Library Update Project. The reference solution for the problem was obtained using Monte Carlo code MCNP5. It was found that the Ribon extended self-shielding model based on mathematical probability tables using correlation model performed better than all other models.  相似文献   
9.
A system for analyzing program structures is described. The system extracts relational information from C programs according to a conceptual model and stores the information in a database. It is shown how several interesting software tasks can be performed by using the relational views. These tasks include generation of graphical views, subsystem extraction, program layering, dead code elimination and binding analysis  相似文献   
10.
On the capacity of network coding for random networks   总被引:1,自引:0,他引:1  
We study the maximum flow possible between a single-source and multiple terminals in a weighted random graph (modeling a wired network) and a weighted random geometric graph (modeling an ad-hoc wireless network) using network coding. For the weighted random graph model, we show that the network coding capacity concentrates around the expected number of nearest neighbors of the source and the terminals. Specifically, for a network with a single source, l terminals, and n relay nodes such that the link capacities between any two nodes is independent and identically distributed (i.i.d.) /spl sim/X, the maximum flow between the source and the terminals is approximately nE[X] with high probability. For the weighted random geometric graph model where two nodes are connected if they are within a certain distance of each other we show that with high probability the network coding capacity is greater than or equal to the expected number of nearest neighbors of the node with the least coverage area.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号