首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   206篇
  免费   10篇
电工技术   4篇
化学工业   60篇
机械仪表   2篇
建筑科学   4篇
能源动力   15篇
轻工业   17篇
水利工程   2篇
无线电   28篇
一般工业技术   19篇
冶金工业   17篇
自动化技术   48篇
  2023年   4篇
  2022年   8篇
  2021年   4篇
  2020年   3篇
  2019年   6篇
  2018年   5篇
  2017年   3篇
  2016年   10篇
  2015年   5篇
  2014年   4篇
  2013年   15篇
  2012年   12篇
  2011年   14篇
  2010年   10篇
  2009年   18篇
  2008年   14篇
  2007年   20篇
  2006年   7篇
  2005年   2篇
  2004年   7篇
  2003年   7篇
  2002年   1篇
  2001年   3篇
  2000年   3篇
  1999年   4篇
  1998年   5篇
  1996年   4篇
  1995年   5篇
  1994年   1篇
  1993年   4篇
  1991年   1篇
  1990年   1篇
  1988年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1923年   1篇
排序方式: 共有216条查询结果,搜索用时 31 毫秒
11.
We consider the problem of updating nominal carrier assignments in cellular networks, which dymamically operate with channel borrowing and reassignments, to match the timevarying offered traffic demands encountered on these systems. Assuming an existing assignment of nominal carriers and the new requirements in each cell, we formulate the problem of obtaining a new assignment such that the number of carriers required to meet the total traffic demand as well as the number of different assignments between the old and the new allocation are minimized. We introduce two approaches to obtain this new assignment. One approach treats the two objectives independently and is applicable to problems with cochannel interference constraints only. This approach produces a new assignment optimized with respect to the first goal, and then rearranges the frequencies of this new allocation so that the number of different assignments with respect to the previous allocation is minimum. A second approach aims at satisfying both goals at the same time and is applicable to problems with any type of interference constraints. The main advantage of this approach is the introduction of a single window parameter which can control the assignments produced, by favoring one goal at the expense of the other. We study several transition scenarios in macrocellular and microcellular environments, and show that in the majority of cases these objectives are conflicting, and that reconfiguration strongly depends on the amount of change of the traffic requirements.  相似文献   
12.
Cooperative defensive systems communicate and cooperate in their response to worm attacks, but determine the presence of a worm attack solely on local information. Distributed worm detection and immunization systems track suspicious behavior at multiple cooperating nodes to determine whether a worm attack is in progress. Earlier work has shown that cooperative systems can respond quickly to day-zero worms, while distributed detection systems allow detectors to be more conservative (i.e., paranoid) about potential attacks because they manage false alarms efficiently. In this paper we present our investigation into the complex tradeoffs in such systems between communication costs, computation overhead, accuracy of the local tests, estimation of viral virulence, and the fraction of the network infected before the attack crests. We evaluate the effectiveness of different system configurations in various simulations. Our experiments show that distributed algorithms are better able to balance effectiveness against worms and viruses with reduced cost in computation and communication when faced with false alarms. Furthermore, cooperative, distributed systems seem more robust against malicious participants in the immunization system than earlier cooperative but non-distributed approaches.  相似文献   
13.
The present work reports on the investigation of the effects of chemical poisoning of CexZr1?xO2 solids by phosphorous (P) on the kinetics of oxygen storage and release (OSR) of the thus derived P-contaminated solids, as a function of CexZr1?xO2 solid composition (x = 0.3, 0.5 and 0.7) for the first time. Phosphorous deposition on the surface of CexZr1?xO2 particles followed by calcination in air at 850 °C forms nano-crystals of CePO4, which lead to a drastic decrease in the population of surface and subsurface reactive and mobile oxygen species due to the formation of P–O–Ce bonding. The concentration (μmol/g) of exchangeable 16O in the solid with 18O from the gas phase was found to increase, and the degree of reduction in the Oxygen Storage Capacity (OSC) to decrease with increasing Ce content in the CexZr1?xO2 solid after P-poisoning. The increase in the Ce content of CexZr1?xO2 makes its OSR properties more resistant against P-poisoning due to the increasing number of poison-free Ce atoms, which are able to participate in the Ce3+ ? Ce4+ redox cycle.  相似文献   
14.
15.
The expansion of durability of deactivated “three-way” catalysts (TWCs) used in gasoline-driven cars by applying efficient, economically viable and environmentally friendly methods for the in␣situ regeneration of their performance to acceptable levels was investigated. New experimental results on the use of a weak oxalic acid washing solution as a means of an efficient regeneration method of a severely aged (83,000 km mileage) commercial TWC are presented. Oxalic acid is shown to be the most efficient extracting agent of phosphorus, a severe poison of TWCs, among acetic acid, citric acid, NTA and EDTA investigated. X-ray diffraction studies provided strong evidence that washing of the aged TWC results in the removal of CePO4, AlPO4 and (Mg,Ca,Zn)3(PO4)2 type phosphates leading to a significant increase of BET area and pore volume, as well as of CO and NO conversions (catalytic activity tests). The latter is strongly related with the increase in the number of active catalytic sites, as illustrated by in␣situ DRIFTS studies, after opening closed pores and uncovering additional catalyst surface.  相似文献   
16.
The author describes past research and future directions on instruction set randomization (ISR), a general technique for protecting against code-injection attacks. Such attacks are commonly encountered in a variety of application domains, remotely targeting program binaries, Web application and database backends, and Web browsers. Collectively, they represent the vast majority of reported attacks in bug- and incident-tracking repositories for the past decade, with no sign of abatement. ISR provides for a separation of code from data by randomizing the execution environment of legitimate code, which has to be suitably transformed using a key shared with the execution environment. This article describes the motivation behind ISR, the high-level concept, its use in two different application domains (binary code injection and SQL injection attacks), the author's findings and experiences (including several limitations, both of the technique and of prototypes), and future directions for improvements and application of ISR. Although he tries to provide broad coverage of the topic, the primary focus is on the research conducted at the Network Security Laboratory at Columbia.  相似文献   
17.
In future wireless networks multimedia applications are expected to finally dominate the overall traffic volume. Shared channels are more suitable for the transmission of this type of traffic, as they are able to periodically adjust their transmission rate. In this paper, we introduce a cross-layer framework for WCDMA based networks which aims to make the packet scheduling procedure more efficient. In addition to that, we further propose a traffic scheduling scheme which serves the connections not only according to their delay sensitivity, but also according to the predicted state of their wireless channel. The efficiency of the proposed scheme, in terms of average packet delay and channel utilization is verified via simulations.  相似文献   
18.
On the impact of urban climate on the energy consumption of buildings   总被引:2,自引:0,他引:2  
Climatic measurements from almost 30 urban and suburban stations as well as specific measurements performed in 10 urban canyons in Athens, Greece, have been used to assess the impact of the urban climate on the energy consumption of buildings. It is found that for the city of Athens, where the mean heat island intensity exceeds 10°C, the cooling load of urban buildings may be doubled, the peak electricity load for cooling purposes may be tripled especially for higher set point temperatures, while the minimum COP value of air conditioners may be decreased up to 25% because of the higher ambient temperatures. During the winter period, the heating load of centrally located urban buildings is found to be reduced up to 30%. Regarding the potential of natural ventilation techniques when applied to buildings located in urban canyons, it is found that, mainly during the day, this is seriously reduced because of the important decrease of the wind speed inside the canyon. Air flow reduction may be up to 10 times the flow that corresponds to undisturbed ambient wind conditions.  相似文献   
19.
We have fabricated sub-quarter-micron-patterned Au templates with electron beam lithography, and studied their effect on the fluorescence intensity of immobilized, anti-rabbit IgG antibody labeled with AlexaFluor® 546. Varying the geometry of the structured surface, the plasmon resonances are tuned to match the fluorescence wavelengths and achieve significant fluorescence enhancement. Full electrodynamic simulations were used to understand the optical response and access the quality of the fabricated structures for surface plasmon excitation.  相似文献   
20.
A challenge in network management and control is the ability to account for multi-domain requirements in the network planning process. Especially in Connection Oriented Networks where multi-domain path finding is a critical issue, networks need to be designed in such a manner as to restrict the possibility of erroneous inter-domain path selection. In this paper we propose per-domain topology design considerations that would leverage accurate disjoint path computations in a multi-domain environment, covering requirements of end-to-end path resiliency. In multi-domain environments state information between domains is heavily aggregated, hiding internal topology details dictated by scalability concerns, but also by restrictive domain administration policies for privacy, and security. Disjoint path finding is strongly affected by the aggregation techniques, since they do not provide information on path overlap. To handle this issue we introduce a metric, the Overlap Factor (OF), that quantifies path overlap in domains. The OF can be passed as an additional parameter of the inter-domain information exchange model to evaluate disjoint end-to-end paths. Alternatively, if domains were appropriately designed, this additional parameter might not be needed in evaluating resilient pairs of inter-domain paths. We based our recommended topology design algorithm on exploiting locally known OF values within the context of Genetic Algorithms. Extensive simulations confirm that domains designed using our proposed algorithm, result into accurate multi-domain disjoint path identification, with a high success ratio compared to networks that are designed without inter-domain considerations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号