首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   144篇
  免费   2篇
电工技术   1篇
化学工业   36篇
金属工艺   6篇
机械仪表   2篇
建筑科学   2篇
能源动力   11篇
轻工业   7篇
水利工程   1篇
无线电   12篇
一般工业技术   41篇
冶金工业   7篇
自动化技术   20篇
  2023年   4篇
  2022年   14篇
  2021年   15篇
  2020年   7篇
  2019年   11篇
  2018年   5篇
  2017年   5篇
  2016年   7篇
  2015年   3篇
  2014年   9篇
  2013年   10篇
  2012年   7篇
  2011年   2篇
  2010年   6篇
  2009年   9篇
  2008年   7篇
  2006年   6篇
  2005年   1篇
  2004年   3篇
  2003年   2篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1997年   1篇
  1992年   2篇
  1991年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
排序方式: 共有146条查询结果,搜索用时 15 毫秒
101.
Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39% of security risks are related to the human factor, and 95% of successful cyber-attacks are caused by human error, with most of them being insider threats. The major human factor issue in cybersecurity is a lack of user awareness of cyber threats. This study focuses on the human factor by surveying the vulnerabilities and reducing the risk by focusing on human nature and reacting to different situations. This study highlighted that most of the participants are not experienced with cybersecurity threats and how to protect their personal information. Moreover, the lack of awareness of the top three vulnerabilities related to the human factor in cybersecurity, such as phishing attacks, passwords, attacks, and social engineering, are major problems that need to be addressed and reduced through proper awareness and training.  相似文献   
102.
The physio-chemical changes in concrete mixes due to different coarse aggregate (natural coarse aggregate and recycled coarse aggregate (RCA)) and mix design methods (conventional method and Particle Packing Method (PPM)) are studied using thermogravimetric analysis of the hydrated cement paste. A method is proposed to estimate the degree of hydration ( α) from chemically bound water (WB). The PPM mix designed concrete mixes exhibit lower α. Recycled aggregate concrete (RAC) mixes exhibit higher and α after 7 d of curing, contrary to that after 28 and 90 d. The chemically bound water at infinite time ( WB) of RAC mixes are lower than the respective conventional concrete mixes. The lower W B, Ca(OH)2 bound water, free Ca(OH)2 content and FT-IR analysis substantiate the use of pozzolanic cement in the parent concrete of RCA. The compressive strength of concrete and α cannot be correlated for concrete mixes with different aggregate type and mix design method as the present study confirms that the degree of hydration is not the only parameter which governs the macro-mechanical properties of concrete. In this regard, further study on the influence of interfacial transition zone, voids content and aggregate quality on macro-mechanical properties of concrete is needed.  相似文献   
103.
Energy harvesting (EH) technology in wireless communication is a promising approach to extend the lifetime of future wireless networks. A cross-layer optimal adaptation policy for a point-to-point energy harvesting (EH) wireless communication system with finite buffer constraints over a Rayleigh fading channel based on a Semi-Markov Decision Process (SMDP) is investigated. Most adaptation strategies in the literature are based on channel-dependent adaptation. However, besides considering the channel, the state of the energy capacitor and the data buffer are also involved when proposing a dynamic modulation policy for EH wireless networks. Unlike the channel-dependent policy, which is a physical layer-based optimization, the proposed cross-layer dynamic modulation policy is a guarantee to meet the overflow requirements of the upper layer by maximizing the throughput while optimizing the transmission power and minimizing the dropping packets. Based on the states of the channel conditions, data buffer, and energy capacitor, the scheduler selects a particular action corresponding to the selected modulation constellation. Moreover, the packets are modulated into symbols according to the selected modulation type to be ready for transmission over the Rayleigh fading channel. Simulations are used to test the performance of the proposed cross-layer policy scheme, which shows that it significantly outperforms the physical layer channel-dependent policy scheme in terms of throughput only.  相似文献   
104.
Comparative study for determining the K R -curves associated with the cohesive stress distribution for complete fracture process for two standard specimen geometries i.e., three-point bending test and compact tension test specimen geometries of concrete using analytical method and weight function approach is reported in the paper. The laboratory size specimen (100 ≤  D  ≤  400 mm) with initial-notch length/depth ratios 0.3 and 0.5 are considered in the investigation. The load-crack opening displacement curves for these specimens are obtained using well known version of Fictitious Crack Model (FCM). It is found from the numerical results that the weight function method improves computational efficiency without any appreciable error. The stability analysis on the K R -curves and the influence of specimen geometry and the size-effect on the K R -curves, the CTOD-curves and the process zone length during crack propagation of complete fracture process are also described.  相似文献   
105.
106.
Describes a new method of evaluation of scientific output by laboratories engaged in diverse fields of research. This method helps to evaluate those outputs which are quite recent and not amenable to citation analysis. For the purpose of analysis, impact factor of journals in which papers are published are considered. A method for normalisation of impact factor of journals has been described and, normalised impact factors have also been used for the purpose of analysis. It is found that in such analysis normalised impact factor tends to show better results compared to simple impact factor. The analysis helps us to generate numerous performance indicators such as average impact factor and normalised impact factor for each laboratory and the research complex such as CSIR as a whole; average impact factor and normalised impact factor for each scientist of a laboratory and the research complex; spectral distribution of papers falling within various ranges of impact factors and normalised impact factors. By comparing the performances over several years the trend of research activity of each laboratory can also be obtained.Paper presented at the International Conference on Science Indicators for Developing Countries, Paris, 15–19 October, 1990.  相似文献   
107.
108.
A novel technique is developed to simulate the effects of an infinite elastic solid by using multiple springs having spatially varying stiffnesses. The spring constants are computed by numerical integration of classical solutions for point or line loads in an infinite or semi-infinite elastic mass. Under certain conditions, even the 'exact' values of spring constants may become negative at some nodes. A simple and highly effective algorithm is proposed to remove this computational difficulty. The technique is applied to the computation of displacements and stresses around underground openings. For a circular opening subjected to different stress conditions, spring constants computed by the proposed numerical integration technique are found to be 'identical' to their 'exact' values. Results obtained by the proposed technique for displacements and stresses around circular and non-circular openings are found to be in an excellent agreement with classical and boundary element solutions. The principal advantages of the proposed technique are that an unbounded solid may be simulated by a relatively very small finite model and a standard finite element code requires no modification for its implementation.  相似文献   
109.
110.
A finite element technique of analysing the hydrodynamic pressure, resulting from the vibration of a structure submerged in an unbounded fluid domain, is presented. A suitable boundary condition is proposed for the surface where the unbounded fluid domain is truncated. Pressure is assumed to be the nodal unknown and the fluid is treated as being incompressible and inviscid. The proposed method is computationally very efficient and its implementation in a finite element program is quite straightforward. The efficiency of the method is demonstrated by analysing some two-dimensional problems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号