首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   115篇
  免费   3篇
化学工业   17篇
金属工艺   11篇
机械仪表   12篇
建筑科学   1篇
能源动力   2篇
轻工业   17篇
无线电   19篇
一般工业技术   13篇
原子能技术   2篇
自动化技术   24篇
  2022年   3篇
  2021年   2篇
  2020年   3篇
  2019年   5篇
  2018年   3篇
  2017年   1篇
  2016年   11篇
  2015年   1篇
  2014年   10篇
  2013年   14篇
  2012年   11篇
  2011年   13篇
  2010年   11篇
  2009年   9篇
  2008年   6篇
  2007年   3篇
  2006年   2篇
  2005年   4篇
  2004年   2篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1998年   1篇
排序方式: 共有118条查询结果,搜索用时 13 毫秒
61.
The objective of this study was to analyze the microbial risk factor of the material, employee, and machinery/instrument related to the quality of salted Chinese cabbage, but also the hygienic safety and standardization of this Chinese cabbage. The total bacteria of Chinese cabbage at cutting and salting were increased to 4.47–6.48 log CFU/g and decreased at the cleaning and dehydration process. The total bacteria in the rubber gloves and aprons of the worker were in 3–6 log CFU/g. The contamination on the machinery/instrument in the primary cleaning was in 3.88–6.07 log CFU/g and it was the highest level of the total processes. Especially, the contamination, on the conveyor belt was the highest. As a result of pH and salinity of the Chinese cabbage and salt solution, the salinity of Chinese cabbage was reduced from 2.63–2.88% in salting to 1.16–1.37% after dehydration, a decrease of 52–58%. The pH 5.87 and salinity 2.54% for the upper salt solution in a tank showed more than 2 times the difference, with pH 6.07 and 7.37% salinity for the lower salt solution in a tank.  相似文献   
62.
We consider a wireless communication environment in which a large number of local area cells are deployed within the coverage of wide area cells. In this environment, a scanning operation to detect a suitable local area cell for handoff can degrade the performance of a mobile station, because repeated scanning trials are likely to cause disruption of service and require considerable consumption of power. Therefore, we propose and analyze a hierarchical scanning algorithm that is capable of providing MS-specific neighbor cell information. Simulation results show that the proposed algorithm can significantly reduce the number of scanning trials required to detect a suitable local area cell for handoff.  相似文献   
63.
Mobile devices need to provide more accurate and personalized information in a computing environment with a small screen and limited information retrieval functions. This paper presents a user-selectable recommendation system that reflects a user interest group by employing collaborative filtering as technique to provide useful information in a mobile environment. We form similar groups by simultaneously considering a user’s information preferences and demographics. Then we reconstruct lists of a final recommendation based on what search results the similar demographic group has chosen. This is an optional filter for the search results. This means that we provide an interactive flexible recommendation list that considers a user’s intent more actively, rather than unilaterally. We show the Mean Absolute Error result to evaluate the recommendation and finally show the realization of a prototype that is based on both the iPhone and Android phone environments.  相似文献   
64.
In this paper, we show that supervisory control theory of discrete event systems can serve as a methodology to analyze the principle of democratic progress. For this purpose, we address a new supervisory control problem in which each local supervisor is designed with its own private specification, and an additional progressive specification is given as a global objective for a system to follow. We present the controllability and power-observability as the main conditions for a controlled system to meet a progressive specification in the sense that the number of local supervisors meeting private specifications increases as the controlled system evolves. We then demonstrate that the developed theory can be used to analyze the principle of democratic progress in a systematical way through a case study of labor unions in the Unites States.  相似文献   
65.
Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason, it is highly required to have an automatic tool that is real applicable to running firewalls and it should help administrators use in easy. This paper represents a first step toward a practically applicable tool called Firewall Policy Checker for firewall policy inspection based on four anomaly types. It also focuses on detecting dangerous services such as telnet, ftp and so on which many administrators set as time goes and detecting illegal servers. In addition, this tool supports a large number of rules with the high speed using efficient N-ary tree module. The experimental results using real organizations’ rules are introduced. Finally, this paper illustrates an easy 3D visualization even for non experts.  相似文献   
66.
Cognitive radio (CR) is one of the key enabling technologies for opportunistic spectrum sharing. In such a spectrum sharing paradigm, radios access spectrum opportunistically by identifying the under-utilized spectrum and then transmitting waveforms in that spectrum that are compliant to relevant spectrum access policies. Implementing such a flexible scheme requires changes in the current static spectrum management approach. As a result, declarative spectrum management through policy-based dynamic spectrum access has garnered significant attention recently. Policy-based spectrum access decouples spectrum access policies and Policy Processing Components from the radio platform. The Policies define conditions under which the radios are allowed to transmit in terms of frequencies used, geographic locations, time etc. The Policy Processing Components include a reasoning engine called the Policy Reasoner, which is responsible for enforcement, analysis and processing of the policies, as well as resolving policy conflicts. This paper describes the design and implementation of a novel policy reasoner that processes spectrum access policies efficiently by reframing the policy reasoning problem as a graph-based Boolean function manipulation problem. The proposed policy reasoner has the capability to respond to either under-specified or invalid transmission requests (sent by the system strategy reasoner) by returning multiple sets of opportunity constraints that prescribe different ways of modifying transmission parameters in order to make them policy compliant.  相似文献   
67.
In this paper, a grid-connected photovoltaic (PV) multistring power conditioning system with PV input current reduction control is proposed. An improved maximum power point tracking (MPPT) method for the multistring converter is suggested. The suggested MPPT algorithm tracks the maximum power point even though measurement errors exist. To reduce the PV current variation introduced by the inverter, a PV current variation reduction control is suggested. This PV current variation reduction control reduces the PV current variation without additional components. The low current variation reduces the filter size and improves the MPPT efficiency. All algorithms and controllers are implemented on a single-chip microcontroller. Experimental results obtained on a 3-kW prototype show high performance such as a MPPT efficiency of 99.7%, an almost unity power factor, a power efficiency of 96.7%, and a total harmonic distortion of 2.0%.  相似文献   
68.
In contrast to well-recognized protein phosphorylation on the side-chain oxygen of Ser, Thr, or Tyr residues, analogous phosphoramidation of the nitrogen of His, Lys, and Arg side chains remains much less investigated, mainly due to the instability of post-translational modifications and technical difficulties involved in their analysis. For example, reports on the enzyme activities responsible for the formation and hydrolysis of these phosphoramidates date back to as early as the 1950s, but some of these enzymes have only recently been identified and functionally characterized; this has been aided by the development of novel research tools. In this review, we summarize current knowledge of the enzymes that hydrolyze protein N-phosphoramidates, in terms of their structure, activities, and biological functions, as well as the chemical tools used to investigate them.  相似文献   
69.
In a hierarchical cellular network employing universal frequency reuse, the level of both intra- and intercell interference largely depends on the selection of a serving cell for the users in the overlapping area of multiple cells. We propose an efficient cell selection algorithm that is suitable for hierarchical cellular networks. In the proposed algorithm, uplink transmit power is used as a key parameter and cells are selected on the basis of the coordination of multiple users, rather than the choice of a single user. Simulation results show that the proposed algorithm improves performance with respect to the number of supportable users and the transmit power that each user needs in order to achieve a given target SINR.  相似文献   
70.
This study evaluated the antioxidant activities of kimchi at different fermentation times: short-term fermented kimchi (SK; less than 7days) and over-ripened kimchi (OK; greater than 2 years). In conclusion, antioxidant activity of the OK was significantly higher than the SK. The results of this study suggested that there was an increase in the antioxidant activity of fermented kimchi during the fermentation and ripening processes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号