首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   213篇
  免费   16篇
电工技术   4篇
化学工业   37篇
金属工艺   2篇
机械仪表   8篇
建筑科学   13篇
能源动力   8篇
轻工业   16篇
水利工程   7篇
石油天然气   3篇
无线电   33篇
一般工业技术   39篇
冶金工业   9篇
原子能技术   1篇
自动化技术   49篇
  2024年   1篇
  2023年   7篇
  2022年   12篇
  2021年   24篇
  2020年   13篇
  2019年   24篇
  2018年   23篇
  2017年   15篇
  2016年   15篇
  2015年   8篇
  2014年   14篇
  2013年   17篇
  2012年   12篇
  2011年   15篇
  2010年   3篇
  2009年   6篇
  2008年   6篇
  2007年   5篇
  2006年   2篇
  2005年   2篇
  2003年   1篇
  2000年   1篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
排序方式: 共有229条查询结果,搜索用时 15 毫秒
31.
Taguchi method (TM) and response surface methodology (RSM) have been employed to optimize three parameters, including the amounts of P123, the amounts of nitric acid and calcination temperature, in order to define an optimal setting for sol-gel synthesis of high surface area mesoporous alumina powder (MA). Herein, the comparison of the both statistical approaches has been examined and discussed considering the nitrogen adsorption as the response variable because this important character for mesoporous materials is exceedingly sensitive to the synthesis parameters. The BET surface area (SBET) and pore volume of MA under Taguchi optimal condition were 323.5 m2 g−1 and 0.551 cm3 g−1, respectively, by conducting confirmation test. Furthermore, the confirmation test showed high SBET of MA (363.4 m2 g−1), which was in a good agreement with calculated SBET result (431.25 m2 g−1) by a quadratic model under RSM optimal condition. Moreover, 3D response surface plots and 2D contour plots of desirability have been discussed to visualize the influence of input factors on response variable. It is also concluded that RSM shows more appropriate (12.33% higher SBET than TM) and efficient optimal condition with determining a quadratic function as the relationship between SBET and synthesis parameters.  相似文献   
32.
In radio frequency identification (RFID) systems, search protocols are used to find a specific item in a large number of tagged products. These protocols should be secure against RFID attacks such as traceability, impersonation, DoS and eavesdropping. Sundaresan et al. (IEEE Trans Dependable Secure Comput, 2015) presented a server-less search protocol based on 128-bits PRNG function and claimed that their method can address all vulnerabilities of previous protocols. In this paper, we prove that Sundaresan et al.’s protocol is vulnerable to traceability attack with the high probability. In addition, we present an improved protocol to solve the proposed problem and analyze its security level informally and formally based on AVISPA tool and BAN logic.  相似文献   
33.
Telecommunication Systems - In the routing process, the cost (or weight) of routes determine via a function named routing criterion. Therefore, the design of Optimal Routing Criterion (ORC) is one...  相似文献   
34.
Cloud solutions are emerging as a new suitable way of transforming traditional IT data centers to highly available and reliable computing resources for hosting critical applications and data. However, software and hardware failures are a common problem in cloud datacenters that can lead to harmful damages. In this paper, we analyze the physical server failures in the Google cloud datacenter. We study the Google cluster properties to investigate the relationship among physical servers' failure rate and jobs failure events. The failure rate of Google cluster executed jobs and servers is taken into consideration during a 29‐day period. We present a reliability model for Google cluster physical machines using the continuous time Markov chains according to this observation. We attempt to analyze the obtained model through SHARPE software packages to improve the understanding of failure events in the Google cloud cluster. We also explore the cluster availability based on parameters like steady‐state availability, steady‐state unavailability, mean time to failure, and mean time to repair in the Google cluster.  相似文献   
35.
The growth of the networks has difficult network management. Recently, a concept called software‐defined network (SDN) has been proposed to address this issue, which makes network management more adaptable. Control and forwarding planes are separated in SDN. The control plane is a centralized logical controller that controls the network. The forwarding plane that consists of transfer devices is responsible for transmitting packets. Because the network resources are limited, optimizing the use of resources in the networks is an important issue. Load balancing improves the balanced distribution of loads across multiple resources in order to maximize the reliability and network resources efficiency. SDN controllers can create an optimal load balancing compared to traditional networks because they have a network global view. The load‐balancing problem can be solved using many different nature‐inspired meta‐heuristic techniques because it has the NP‐complete nature. Hence, for solving load balancing problem in SDN, nature‐inspired meta‐heuristic techniques are important methods. However, to the best of our knowledge, there is not a survey or systematic review on studying these matters. Accordingly, in the area of the load balancing in the SDN, this paper reviews systematically the nature‐inspired meta‐heuristic techniques. Also, this study demonstrates advantages and disadvantages regarded of the chosen nature‐inspired meta‐heuristic techniques and considers their algorithms metrics. Moreover, to apply better load balancing techniques in the future, the important challenges of these techniques have been investigated.  相似文献   
36.
An important challenge in radio frequency identification (RFID) systems is the collision concern. When an interrogator send a request, it has several tags to answer to in its transmission range, and a tag collision has occurred. The interrogator must be able to recognize tags as rapidly as possible. A collision problem is a power‐consuming occurrence that diminishes the operation of RFID structure. This article proposes a tag anti‐collision power‐clustering RFID algorithm for all tag identification. The tags are boundaries into the several power level clusters based on distances of the reader. Specifically, in the proposed algorithm, tags and readers use of balanced incomplete blocks design (BIBD) to reach a fast identification. In a BIBD matrix, any two columns intersect exactly in one component that makes it possible for easy transmission of any two tags via the tag's identification in their read cycles. The aim of this article is to propose a joint organization that while decreases power consumption increases the working lifetime of RFID structure. The reader can get each tag ID by distinguishing each unit of BIBD symbols, one by one. The use of proposed algorithm brings about a great improvement in the power consumption and identification time.  相似文献   
37.
In an open‐channel confluence, deep scour holes and depositional point bars are usually formed due to high bed‐shear stresses and secondary circulations. In the present study, presuming the effectiveness of channel geometry on the flow dynamics at the confluence, some variables including different side slope angles of the main channel (θ = 45°, 60°, 75°, 90°), lateral to downstream discharge ratio (Qr), and downstream densimetric Froude number (Frg3) were experimentally studied under clear‐water condition for the confluence angle α = 90°. According to the results, the increase of θ led to a greater penetration of scour hole across the main and tributary channels, whereas a little scour development was observed along those channels. Meanwhile, an increase in Qr and Frg3 caused further scouring, but their effects on the dimensions of scour hole diminished with increase of θ. Thus, with increase of Qr from 0.194 to 0.552, the mean penetration rate of scour hole to all directions for θ = 45°, 60°, 75°, and 90° was obtained 42.8%, 32.4%, 25%, and 20.5%, respectively. In addition, considering the effect of θ, Qr, and Frg3, some empirical relationships were obtained for estimating the penetration length of scour hole. The derived relationships show that Frg3 plays more important role on the dimensions of scour hole than θ.  相似文献   
38.
39.
Gravity and magnetism are implemented to change the morphology of zinc oxide nanorod sensors during synthesis. The effects of gravity and magnetism can translate into future application of these nanorods through cost‐effective, environmentally friendly, and easy‐to‐use biosensor technology with the quickest available sensing. The sensors can pave the way toward detection of both bacteria and fungi present on the surface with high sensitivity. This ability to sense microorganisms in a “non‐solution‐based” environment represents a key step forward in the fields of health and food safety, as well as solid‐state nanomaterial biotechnology applications. Hundreds of thousands of people are affected each year by accidental contamination and current protocols are far from preventative. The results of the magnetic field studies when compared with previous results show that the following factors affect the outcome of applying magnetic field during the growth of nanorods on their morphology: the direction of growth with respect to gravity, the method of seeding, and the substrate.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号