首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   270篇
  免费   17篇
  国内免费   1篇
电工技术   4篇
综合类   1篇
化学工业   57篇
金属工艺   8篇
机械仪表   3篇
建筑科学   13篇
能源动力   24篇
轻工业   16篇
水利工程   3篇
无线电   45篇
一般工业技术   60篇
冶金工业   17篇
自动化技术   37篇
  2024年   1篇
  2023年   4篇
  2022年   12篇
  2021年   13篇
  2020年   16篇
  2019年   16篇
  2018年   13篇
  2017年   15篇
  2016年   11篇
  2015年   12篇
  2014年   10篇
  2013年   28篇
  2012年   14篇
  2011年   17篇
  2010年   8篇
  2009年   10篇
  2008年   8篇
  2007年   7篇
  2006年   5篇
  2005年   5篇
  2004年   7篇
  2003年   8篇
  2002年   6篇
  2001年   2篇
  1999年   3篇
  1998年   6篇
  1997年   4篇
  1996年   4篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1988年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1979年   2篇
  1978年   1篇
  1976年   1篇
  1975年   1篇
  1969年   1篇
  1968年   1篇
  1965年   3篇
排序方式: 共有288条查询结果,搜索用时 109 毫秒
31.
One of the major problems concerning information assurance is malicious code. To evade detection, malware has also been encrypted or obfuscated to produce variants that continue to plague properly defended and patched networks with zero day exploits. With malware and malware authors using obfuscation techniques to generate automated polymorphic and metamorphic versions, anti-virus software must always keep up with their samples and create a signature that can recognize the new variants. Creating a signature for each variant in a timely fashion is a problem that anti-virus companies face all the time. In this paper we present detection algorithms that can help the anti-virus community to ensure a variant of a known malware can still be detected without the need of creating a signature; a similarity analysis (based on specific quantitative measures) is performed to produce a matrix of similarity scores that can be utilized to determine the likelihood that a piece of code under inspection contains a particular malware. Two general malware detection methods presented in this paper are: Static Analyzer for Vicious Executables (SAVE) and Malware Examiner using Disassembled Code (MEDiC). MEDiC uses assembly calls for analysis and SAVE uses API calls (Static API call sequence and Static API call set) for analysis. We show where Assembly can be superior to API calls in that it allows a more detailed comparison of executables. API calls, on the other hand, can be superior to Assembly for its speed and its smaller signature. Our two proposed techniques are implemented in SAVE) and MEDiC. We present experimental results that indicate that both of our proposed techniques can provide a better detection performance against obfuscated malware. We also found a few false positives, such as those programs that use network functions (e.g. PuTTY) and encrypted programs (no API calls or assembly functions are found in the source code) when the thresholds are set 50% similarity measure. However, these false positives can be minimized, for example by changing the threshold value to 70% that determines whether a program falls in the malicious category or not.  相似文献   
32.
A basic goal in property testing is to identify a minimal set of features that make a property testable. For the case when the property to be tested is membership in a binary linear error-correcting code, Alon et al. (Trans Inf Theory, 51(11):4032–4039, 2005) had conjectured that the presence of a single low-weight codeword in the dual, and “2-transitivity” of the code (i.e., the code being invariant under a 2-transitive group of permutations on the coordinates of the code) suffice to get local testability. We refute this conjecture by giving a family of error-correcting codes where the coordinates of the codewords form a large field of characteristic two, and the code is invariant under affine transformations of the domain. This class of properties was introduced by Kaufman & Sudan (STOC, 2008) as a setting where many results in algebraic property testing generalize. Our result shows a complementary virtue: This family also can be useful in producing counterexamples to natural conjectures.  相似文献   
33.
Clean Technologies and Environmental Policy - The present work aims at investigating the compatibility of antioxidant with biodiesel through the tribological assessment of a compression ignition...  相似文献   
34.
Ensuring that rural areas of the UK have sufficient affordable houses in reasonable condition has long challenged policy makers. Previous research shows that rural housing has demand characteristics and faces supply constraints that have proven difficult to balance. The paper reports on the reasons why an innovative subsidy has achieved some success in overcoming barriers to provision in rural Scotland. It is argued that the subsidy has boosted effective demand and tackled a major supply constraint, namely land availability. Empirical material is drawn from a systematic evaluation of the mechanism. The paper concludes with reflections on its implications for the wider literature and for rural housing provision in the evolving financial and political context.  相似文献   
35.
36.
A procedure is described for the separation, identification, and quantitative estimation of propylene glycol mono- and diesters of lauric, myristic, palmitic, stearic, and oleic acids in shortenings and lard containing mono- and diglycerides. Lipid classes are separated on a silicic acid column, and individual esters are estimated by gas chromatography. Analyses of several control mixtures and commercial samples are reported. Recoveries for individual components range from 92 to 105%, and total recoveries range from 96 to 100%.  相似文献   
37.
New and renewable fuels are the major alternatives to conventional fossil fuels. Biomass in the form of agricultural residues is becoming popular among new renewable energy sources, especially given its wide potential and abundant usage. This study deals with the characterization of the pyrolysis oil obtained from palmyra palm fruit bunch (Borassus flabellifer) produced by flash pyrolysis in the maximum yield. The pyrolysis oil was analyzed to determine its elemental composition and heating value. The chemical composition of the pyrolysis oil and fractions was investigated using various chromatographic techniques such as Fourier transform infra-red (FTIR) spectroscopy, gas chromatography–mass spectroscopy (GC-MS), and 1H NMR spectroscopy. The bio-oil product was presented as an environmentally friendly green biofuel candidate. The analytical results showed that the pyrolysis bio-oils were very complex mixtures of organic compounds and contained a lot of nitrogenated and oxygenated compounds such as, phenols, aliphatic hydrocarbons, pyridines, amines, ketones, and so on.  相似文献   
38.
39.
This paper studies the experimental and exergy analysis of solar still with the sand heat energy storage system. The cumulative yield from solar still with and without energy storage material is found to be 3.3 and 1.89 kg/m2, respectively for 8-h operation. Results show that the exergy efficiency of the system is higher with the least water depth of 0.02 m (mw = 20 kg). Competitive analysis of second law efficiency shows that the exergy efficiency improves the system by 30% than conventional single slope solar still without any heat storage. The maximum exergy efficiency with energy storage material is found as 13.2% and it is less than the conventional solar still without any material inside the basin.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号