首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   139篇
  免费   3篇
电工技术   1篇
化学工业   28篇
机械仪表   2篇
建筑科学   7篇
能源动力   9篇
轻工业   5篇
水利工程   4篇
无线电   28篇
一般工业技术   10篇
冶金工业   18篇
自动化技术   30篇
  2023年   1篇
  2022年   4篇
  2021年   1篇
  2020年   2篇
  2019年   7篇
  2018年   4篇
  2017年   2篇
  2016年   1篇
  2015年   1篇
  2014年   4篇
  2013年   7篇
  2012年   1篇
  2011年   5篇
  2010年   5篇
  2009年   5篇
  2008年   10篇
  2007年   7篇
  2006年   12篇
  2005年   6篇
  2004年   6篇
  2003年   3篇
  1999年   1篇
  1998年   3篇
  1997年   8篇
  1996年   6篇
  1995年   3篇
  1994年   2篇
  1993年   3篇
  1992年   3篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   2篇
  1986年   3篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1978年   1篇
  1977年   1篇
  1968年   1篇
排序方式: 共有142条查询结果,搜索用时 15 毫秒
11.
Most existing solutions to group security in Mobile Ad Hoc Networks (MANETs) rely on a multicast Core Based Tree (CBT) for key distribution. Such solutions, although suitable for systems with low mobility and static characteristics, are unsuitable for dynamic and sparse groups with changing neighborhoods. In this paper, we propose an entirely decentralized key generation mechanism, employing a central trusted entity only during initialization. Using our approach, keys can be established between group members with absolutely no prior communication. The solution relies on threshold cryptography and introduces a novel concept of Node-Group-Key (NGK) mapping. We have provided an extensive analytical model for the computations involved and communication costs and have also provided a lie detection mechanism. Simulation results show appreciable performance improvement and enhanced robustness.  相似文献   
12.
Abstract: Every year, billions of dollars are spent on rail track maintenance to keep the serviceability of the railroad network. These maintenance projects (of different types) must be performed by suitable maintenance teams within a planning horizon. This article presents a time‐space network model to solve the track maintenance scheduling problem (TMSP). The objective is to minimize the total travel costs of the maintenance teams as well as the impact of maintenance projects on railroad operation, which are formulated by three types of side constraints: mutually exclusive, time window, and precedence constraints. An iterative heuristic solution approach is proposed to solve the large‐scale TMSP model with a large number of side constraints. The proposed model and solution approach are applied to a large‐scale real‐world problem. Compared to the current industry practice the model outcome eliminated all hard side‐constraint violations and reduced the total objective value (travel costs and soft side‐constraint violation penalties) by 66.8%.  相似文献   
13.
Montmorency sour cherry (Prunus cerasus L.) pit oil (CPO) was extracted and characterized by various methods including: GC, LC–MS, NMR, thermogravimetric analysis (TGA), differential scanning calorimetry (DSC) and X‐ray powder diffraction (XRD). The oil gave an acid value of 1.45 mg KOH/g, saponification value of 193 mg KOH/g and unsaponifiable matter content of 0.72 %. The oil contained oleic (O) and linoleic (l ) acids as the major components with small concentrations of α‐eleostearic acid (El, 9Z,11E,13E‐octadecatrienoic acid) and saturated fatty acid palmitic (P) acid. The CPO contained six major triacyglycerols (TAG), OOO (16.83 %), OLO (16.64 %), LLO (13.20 %), OLP (7.25 %), OOP (6.49 %) and LElL (6.16 %) plus a number of other minor TAG. The TAG containing at least one saturated fatty acid constitute 33 % of the total. The polymorphic behavior of CPO as studied by DSC and XRD confirmed the presence of α, β′ and β crystal forms. The oxidative induction time of CPO was 30.3 min at 130 °C and the thermal decomposition temperature was 352 °C.  相似文献   
14.
15.
Summary In this paper two uniqueness theorems for an anisotropic mixture of two linear elastic solids are established: The former concerns the mixed boundary-value problem, the latter the displacement problem. These theorems are proved for unbounded domains in the absence of artificial restrictions upon the behaviour of the unknown fields at infinity. A reciprocity theorem is also given.  相似文献   
16.
Yi  Dharma P.   《Ad hoc Networks》2007,5(1):35-48
Wireless sensor networks are often deployed in hostile environments and operated on an unattended mode. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. Due to their expensive energy consumption and hardware requirements, asymmetric key based cryptographies are not suitable for resource-constrained wireless sensors. Several symmetric-key pre-distribution protocols have been investigated recently to establish secure links between sensor nodes, but most of them are not scalable due to their linearly increased communication and key storage overheads. Furthermore, existing protocols cannot provide sufficient security when the number of compromised nodes exceeds a critical value. To address these limitations, we propose an improved key distribution mechanism for large-scale wireless sensor networks. Based on a hierarchical network model and bivariate polynomial-key generation mechanism, our scheme guarantees that two communicating parties can establish a unique pairwise key between them. Compared with existing protocols, our scheme can provide sufficient security no matter how many sensors are compromised. Fixed key storage overhead, full network connectivity, and low communication overhead can also be achieved by the proposed scheme.  相似文献   
17.
The objective of the study presented here was to investigate the performance of an enhanced two-step anaerobic process for the treatment of WWTP sludge. This process was developed to answer the urgent need currently faced by WWTP operators to reduce the production of biosolids, for which disposal pathways are facing increasing difficulties. A pilot plant was operated on a full-scale WWTP (2,500 p.e.) over a period of 4 months. It consisted of a thermal pre-treatment of excess sludge at 175 degrees C and 40 min, followed by dewatering and methanisation of the centrate in a fixed-film reactor. The thermal lysis had a two-fold enhancing effect on sludge reduction efficiency: firstly, it allowed a decrease of the HRT in the methaniser to 2.9 days and secondly, it yielded biosolids with a high dewaterability. This contributed to further reductions in the final volume of sludge to be disposed of. The two-step process achieved a sludge reduction efficiency of 65% as TSS, thus giving an interesting treatment option for WWTP facing sludge disposal problems.  相似文献   
18.
A novel metal-insulator-metal (MIM) structure has been developed for use in field-programmable gate arrays (FPGAs) as a voltage-programmable link (VPL). The present structure relies on a combination of a refractory metal and aluminum as the lower electrode, and aluminum alone as the top electrode. The insulator, prepared by means of plasma-enhanced chemical vapor deposition, comprises a sandwich of nearly stoichiometric silicon dioxide interposed between two layers of silicon-rich silicon nitride. This MIM structure has displayed characteristics desirable for use in the emerging FPGA technology  相似文献   
19.
The purpose of the present theoretical analysis is to provide explicit solutions for the problem of condensation of vapours on the lateral surface of a long vertical plate fin of variable cross-section. The formulation yields solutions to the Limiting cases so that the results can be employed in the design of the condenser section of a flat plate heat pipe in which the fin is considered to be an essential element in transporting heat liberated by the condensing vapours. It is observed that the local and average Nusselt numbers depend on fin parameter, fin profile index, Rayleigh number and degree of subcooling.  相似文献   
20.
NS Litofsky  D Hinton  C Raffel 《Canadian Metallurgical Quarterly》1994,34(6):967-72; discussion 972-3
Mutations in the p53 gene, which codes for a cell division regulatory protein, have been identified in approximately one-third of adult astrocytomas. We evaluated 35 astrocytic tumors (17 pilocytic, 4 diffuse low grade, 12 anaplastic, and 2 glioblastoma) in pediatric patients for p53 mutations, using polymerase chain reaction-single-stranded conformation polymorphism analysis as a screening technique. Additionally, those tumors identified with homozygosity in the area of the p53 gene on chromosome 17 by Southern blotting were sequenced to look for p53 mutations. No tumors were identified with polymerase chain reaction-single-stranded conformation polymorphism analysis shifts indicative of mutations in the p53 gene. Five of 21 tumors were homozygous in the region of the p53 gene on chromosome 17; no mutations in exons 5 to 8 were found in any of these tumors. The frequency of p53 mutation in pediatric astrocytomas is significantly less than the frequency for adult tumors, regardless of tumor grade. Furthermore, the frequency of p53 mutations in high-grade astrocytomas is significantly lower in pediatric tumors than in adult tumors. These results suggest that p53 is not important in the oncogenesis of pediatric astrocytomas. Oncogenesis in pediatric astrocytomas may occur by different mechanisms than those of similar tumors in adults.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号