全文获取类型
收费全文 | 206篇 |
免费 | 10篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 60篇 |
机械仪表 | 2篇 |
建筑科学 | 4篇 |
能源动力 | 15篇 |
轻工业 | 17篇 |
水利工程 | 2篇 |
无线电 | 28篇 |
一般工业技术 | 19篇 |
冶金工业 | 17篇 |
自动化技术 | 48篇 |
出版年
2023年 | 4篇 |
2022年 | 8篇 |
2021年 | 4篇 |
2020年 | 3篇 |
2019年 | 6篇 |
2018年 | 5篇 |
2017年 | 3篇 |
2016年 | 10篇 |
2015年 | 5篇 |
2014年 | 4篇 |
2013年 | 15篇 |
2012年 | 12篇 |
2011年 | 14篇 |
2010年 | 10篇 |
2009年 | 18篇 |
2008年 | 14篇 |
2007年 | 20篇 |
2006年 | 7篇 |
2005年 | 2篇 |
2004年 | 7篇 |
2003年 | 7篇 |
2002年 | 1篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 4篇 |
1998年 | 5篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 1篇 |
1993年 | 4篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1923年 | 1篇 |
排序方式: 共有216条查询结果,搜索用时 31 毫秒
11.
Rouskas Angelos N. Kazantzakis Michael G. Anagnostou Miltiades E. 《Wireless Networks》1999,5(6):429-443
We consider the problem of updating nominal carrier assignments in cellular networks, which dymamically operate with channel borrowing and reassignments, to match the timevarying offered traffic demands encountered on these systems. Assuming an existing assignment of nominal carriers and the new requirements in each cell, we formulate the problem of obtaining a new assignment such that the number of carriers required to meet the total traffic demand as well as the number of different assignments between the old and the new allocation are minimized. We introduce two approaches to obtain this new assignment. One approach treats the two objectives independently and is applicable to problems with cochannel interference constraints only. This approach produces a new assignment optimized with respect to the first goal, and then rearranges the frequencies of this new allocation so that the number of different assignments with respect to the previous allocation is minimum. A second approach aims at satisfying both goals at the same time and is applicable to problems with any type of interference constraints. The main advantage of this approach is the introduction of a single window parameter which can control the assignments produced, by favoring one goal at the expense of the other. We study several transition scenarios in macrocellular and microcellular environments, and show that in the majority of cases these objectives are conflicting, and that reconfiguration strongly depends on the amount of change of the traffic requirements. 相似文献
12.
Kostas G. Anagnostakis Michael B. Greenwald Sotiris Ioannidis Angelos D. Keromytis 《International Journal of Information Security》2007,6(6):361-378
Cooperative defensive systems communicate and cooperate in their response to worm attacks, but determine the presence of a worm attack solely on local information. Distributed worm detection and immunization systems track suspicious behavior at multiple cooperating nodes to determine whether a worm attack is in progress. Earlier work has shown that cooperative systems can respond quickly to day-zero worms, while
distributed detection systems allow detectors to be more conservative (i.e., paranoid) about potential attacks because they
manage false alarms efficiently. In this paper we present our investigation into the complex tradeoffs in such systems between
communication costs, computation overhead, accuracy of the local tests, estimation of viral virulence, and the fraction of
the network infected before the attack crests. We evaluate the effectiveness of different system configurations in various
simulations. Our experiments show that distributed algorithms are better able to balance effectiveness against worms and viruses
with reduced cost in computation and communication when faced with false alarms. Furthermore, cooperative, distributed systems
seem more robust against malicious participants in the immunization system than earlier cooperative but non-distributed approaches. 相似文献
13.
The present work reports on the investigation of the effects of chemical poisoning of CexZr1?xO2 solids by phosphorous (P) on the kinetics of oxygen storage and release (OSR) of the thus derived P-contaminated solids, as a function of CexZr1?xO2 solid composition (x = 0.3, 0.5 and 0.7) for the first time. Phosphorous deposition on the surface of CexZr1?xO2 particles followed by calcination in air at 850 °C forms nano-crystals of CePO4, which lead to a drastic decrease in the population of surface and subsurface reactive and mobile oxygen species due to the formation of P–O–Ce bonding. The concentration (μmol/g) of exchangeable 16O in the solid with 18O from the gas phase was found to increase, and the degree of reduction in the Oxygen Storage Capacity (OSC) to decrease with increasing Ce content in the CexZr1?xO2 solid after P-poisoning. The increase in the Ce content of CexZr1?xO2 makes its OSR properties more resistant against P-poisoning due to the increasing number of poison-free Ce atoms, which are able to participate in the Ce3+ ? Ce4+ redox cycle. 相似文献
14.
15.
The expansion of durability of deactivated “three-way” catalysts (TWCs) used in gasoline-driven cars by applying efficient,
economically viable and environmentally friendly methods for the in␣situ regeneration of their performance to acceptable levels was investigated. New experimental results on the use of a weak oxalic acid washing solution as a means of an efficient regeneration method of a severely aged (83,000 km mileage) commercial TWC are presented. Oxalic
acid is shown to be the most efficient extracting agent of phosphorus, a severe poison of TWCs, among acetic acid, citric
acid, NTA and EDTA investigated. X-ray diffraction studies provided strong evidence that washing of the aged TWC results in
the removal of CePO4, AlPO4 and (Mg,Ca,Zn)3(PO4)2 type phosphates leading to a significant increase of BET area and pore volume, as well as of CO and NO conversions (catalytic
activity tests). The latter is strongly related with the increase in the number of active catalytic sites, as illustrated
by in␣situ DRIFTS studies, after opening closed pores and uncovering additional catalyst surface. 相似文献
16.
The author describes past research and future directions on instruction set randomization (ISR), a general technique for protecting against code-injection attacks. Such attacks are commonly encountered in a variety of application domains, remotely targeting program binaries, Web application and database backends, and Web browsers. Collectively, they represent the vast majority of reported attacks in bug- and incident-tracking repositories for the past decade, with no sign of abatement. ISR provides for a separation of code from data by randomizing the execution environment of legitimate code, which has to be suitably transformed using a key shared with the execution environment. This article describes the motivation behind ISR, the high-level concept, its use in two different application domains (binary code injection and SQL injection attacks), the author's findings and experiences (including several limitations, both of the technique and of prototypes), and future directions for improvements and application of ISR. Although he tries to provide broad coverage of the topic, the primary focus is on the research conducted at the Network Security Laboratory at Columbia. 相似文献
17.
Saied M. Abd El-atty Dimitrios N. Skoutas Angelos N. Rouskas George T. Karetsos 《Wireless Personal Communications》2008,46(1):33-45
In future wireless networks multimedia applications are expected to finally dominate the overall traffic volume. Shared channels
are more suitable for the transmission of this type of traffic, as they are able to periodically adjust their transmission
rate. In this paper, we introduce a cross-layer framework for WCDMA based networks which aims to make the packet scheduling
procedure more efficient. In addition to that, we further propose a traffic scheduling scheme which serves the connections
not only according to their delay sensitivity, but also according to the predicted state of their wireless channel. The efficiency
of the proposed scheme, in terms of average packet delay and channel utilization is verified via simulations. 相似文献
18.
M Santamouris N Papanikolaou I Livada I Koronakis C Georgakis A Argiriou D.N Assimakopoulos 《Solar Energy》2001,70(3):201
Climatic measurements from almost 30 urban and suburban stations as well as specific measurements performed in 10 urban canyons in Athens, Greece, have been used to assess the impact of the urban climate on the energy consumption of buildings. It is found that for the city of Athens, where the mean heat island intensity exceeds 10°C, the cooling load of urban buildings may be doubled, the peak electricity load for cooling purposes may be tripled especially for higher set point temperatures, while the minimum COP value of air conditioners may be decreased up to 25% because of the higher ambient temperatures. During the winter period, the heating load of centrally located urban buildings is found to be reduced up to 30%. Regarding the potential of natural ventilation techniques when applied to buildings located in urban canyons, it is found that, mainly during the day, this is seriously reduced because of the important decrease of the wind speed inside the canyon. Air flow reduction may be up to 10 times the flow that corresponds to undisturbed ambient wind conditions. 相似文献
19.
P. PetrouI. Raptis S. KakabakosTh. Speliotis A. GerardinoN. Papanikolaou 《Microelectronic Engineering》2011,88(8):1845-1848
We have fabricated sub-quarter-micron-patterned Au templates with electron beam lithography, and studied their effect on the fluorescence intensity of immobilized, anti-rabbit IgG antibody labeled with AlexaFluor® 546. Varying the geometry of the structured surface, the plasmon resonances are tuned to match the fluorescence wavelengths and achieve significant fluorescence enhancement. Full electrodynamic simulations were used to understand the optical response and access the quality of the fabricated structures for surface plasmon excitation. 相似文献
20.
Angelos Lenis Vasilis Merekoulias Vasilis Maglaris 《Journal of Network and Systems Management》2010,18(4):374-394
A challenge in network management and control is the ability to account for multi-domain requirements in the network planning
process. Especially in Connection Oriented Networks where multi-domain path finding is a critical issue, networks need to
be designed in such a manner as to restrict the possibility of erroneous inter-domain path selection. In this paper we propose
per-domain topology design considerations that would leverage accurate disjoint path computations in a multi-domain environment, covering requirements of end-to-end path resiliency. In multi-domain environments
state information between domains is heavily aggregated, hiding internal topology details dictated by scalability concerns,
but also by restrictive domain administration policies for privacy, and security. Disjoint path finding is strongly affected
by the aggregation techniques, since they do not provide information on path overlap. To handle this issue we introduce a
metric, the Overlap Factor (OF), that quantifies path overlap in domains. The OF can be passed as an additional parameter of the inter-domain information exchange model to evaluate disjoint end-to-end paths.
Alternatively, if domains were appropriately designed, this additional parameter might not be needed in evaluating resilient
pairs of inter-domain paths. We based our recommended topology design algorithm on exploiting locally known OF values within the context of Genetic Algorithms. Extensive simulations confirm that domains designed using our proposed algorithm,
result into accurate multi-domain disjoint path identification, with a high success ratio compared to networks that are designed
without inter-domain considerations. 相似文献