首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   125篇
  免费   9篇
电工技术   1篇
化学工业   18篇
金属工艺   3篇
机械仪表   4篇
建筑科学   2篇
矿业工程   1篇
能源动力   16篇
轻工业   8篇
水利工程   2篇
无线电   20篇
一般工业技术   24篇
冶金工业   5篇
原子能技术   3篇
自动化技术   27篇
  2023年   3篇
  2022年   12篇
  2021年   12篇
  2020年   12篇
  2019年   11篇
  2018年   11篇
  2017年   5篇
  2016年   9篇
  2015年   6篇
  2014年   10篇
  2013年   9篇
  2012年   11篇
  2011年   4篇
  2010年   1篇
  2009年   1篇
  2008年   4篇
  2007年   3篇
  2006年   3篇
  2005年   1篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1992年   1篇
  1991年   1篇
排序方式: 共有134条查询结果,搜索用时 15 毫秒
61.
Security is one of the critical aspects of current systems, which are based on loosely coupled and technology-agnostic service-oriented architectures (SOA). Though SOA is the driving force for enterprises to open their ends for global business collaborations, nevertheless it evolves many challenges for modeling and enforcing security. One of the main problems for designing secure systems is the lack of consistent frameworks and methodologies for modeling security concerns. Traditional approaches consider security at the end of system development, which evolves inflexible and un-configurable systems, which are too difficult to maintain and manage. The other major problem with current approaches is that they assume pre-defined and hard-coded security patterns and mechanisms for secure system design. Whereas, the evolving SOA systems require configurable security to realize different security patterns and security policies in a variety of business scenarios. To solve these problems, it is necessary to model security concerns from the beginning of system modeling in a platform-independent way. This paper proposes a pattern refinement approach for security modeling to achieve configurable and declarative security, based on the principles of abstraction, refinement, separation-of-concerns and maintainability to achieve flexible configurations of SOA security. In the proposed approach, a Domain Expert defines abstract policies using common security vocabulary and a Security Expert models security with patterns and refines them for a target architecture in successive systematic refinements. Furthermore, it facilitates the transformation of abstract security models into executable security policies for the target platforms.  相似文献   
62.
For an efficient utilization of the upstream bandwidth in passive optical network, a dynamic bandwidth assignment mechanism is necessary as it helps the service providers in provisioning of bandwidth to users according to the service level agreements. The scheduling mechanism of existing schemes, immediate allocation with colorless grant and efficient bandwidth utilization (EBU), does not assign the surplus bandwidth to a specific traffic class and only divides it equally among the optical network units (ONUs). This results in overreporting of ONU bandwidth demand to the optical line terminal and causes wastage of bandwidth and increase in delays at high traffic loads. Moreover, the EBU also assigns the unused bandwidth of lightly loaded ONU queues to the overloaded queues through an Update operation. This Update operation has a flaw that it borrows the extra bandwidth to a queue in the current service interval, if the queue report is higher than its service level agreement and refunds in next service interval. This borrow‐refund operation causes reduced bandwidth allocation to the lower priority classes and increases their delay and frame loss. This study improves both these weaknesses. The simulation results show that the proposed scheme uses bandwidth efficiently and reduces mean upstream delay of type‐2 (T2) traffic class by 38% and type‐3 (T3) up to 150% compared to immediate allocation with colorless grant at a cost of up to 10% higher delay for T2. However, T4 performance improves by 400% compared to EBU with slight increase in delay for T2 traffic class. Overall, it shows a balanced performance for all the traffic classes and minimizes the bandwidth waste per cycle as well as the frame loss rate.  相似文献   
63.
Within the communication networks, a delayed constrained data packet is the one that will be dropped if not being served before a certain deadline time, which causes data packet loss affecting the quality of service (QoS). In this paper, we study the blocking probability and the mean delay of such delay constrained packets in an asynchronous single-wavelength optical buffer in optical packet switching networks, where the packet arrival process follows the Poisson process and the packet-length distribution is assumed to be general. We obtain the integral equations of the modeled system and the exact expressions of blocking probabilities and the mean delays. Numerical examples are provided to validate the results with interesting observations being highlighted.  相似文献   
64.
The objectives of this study involve the optimization of longitudinal porous fins of square cross-section using metaheuristic algorithms. A generalized nonlinear ordinary differential equation is derived using Darcy and Fourier’s laws in the energy balance around a control volume and is solved numerically using RFK 45 method. The temperature of the base surface is higher than the fin surface, and the fin tip is kept adiabatic or cooled by convection heat transfer. The other pertinent parameters include Rayleigh number (100 ≤ Ra ≤ 104), Darcy number, (10−4 ≤ Da ≤ 10−2), relative thermal conductivity ratio of solid phase to fluid (1000 ≤ kr ≤ 8000), Nusselt number (10 ≤ Nu ≤ 100), porosity (0.1 ≤ φ ≤ 0.9). The impacts of these parameters on the entropy generation rate are investigated and optimized using metaheuristic algorithms. In computer science, metaheuristic algorithms are one of the most widely used techniques for optimization problems. In this research, three metaheuristic algorithms, including the firefly algorithm (FFA), particle swarm algorithm (PSO), and hybrid algorithm (FFA-PSO) are employed to examine the performance of square fins. It is demonstrated that FFA-PSO takes fewer iterations and less computational time to converge compared to other algorithms.  相似文献   
65.
In this study, the effects of viscous dissipation and internal heat generation/absorption on heat transfer viscous flow over a moving wedge in the presence of suction or injection with a convective boundary condition have been carried out numerically for various values of dimensionless parameters. With the help of similarity transformation, the momentum and energy equations are reduced to a set of coupled non‐linear ordinary differential equations. These equations are solved using the Runge–Kutta fourth‐order method with a shooting technique. The variation in the dimensionless temperature, velocity, heat transfer coefficient, and shear stress have been presented in tabular as well as in graphical form for a range of controlling parameters. It is shown that the dimensionless heat transfer rate is a strong function of viscous dissipation and convective parameters and heat transfer shows an enhanced behavior with the stretching parameter for both the favorable and unfavorable regimes. It is also shown that in the presence of a heat source, the dimensionless temperature and its gradients in thermal boundary layers are found to be high for a high value of the convection parameter. The comparison of present results with the available data shows a good agreement. © 2013 Wiley Periodicals, Inc. Heat Trans Asian Res, 42(7): 589–602, 2013; Published online in Wiley Online Library ( wileyonlinelibrary.com/journal/htj ). DOI 10.1002/htj.21055  相似文献   
66.
The purpose of this study is to investigate the effect of printing parameters on the physical and mechanical properties of additively manufactured ceramics (alumina and zirconia). Sample parts were obtained by extrusion-based additive manufacturing of a ceramic-binder mixture and subsequent post-processing (debinding and sintering). Their mechanical properties (microhardness, flexural strength, toughness) were measured and correlated with the printing parameters. Part orientation is the most significant factor for microhardness and flexural strength in both ceramic materials. Parts with vertical orientation show higher hardness while horizontal samples show higher flexural strength compared to their respective counterparts. Extrusion velocity was found to be insignificant for hardness and flexural strength. However, a marginal increase in fracture toughness with the increase in the extrusion velocity was observed. The fracture toughness of additively manufactured ceramics shows an increasing trend with elastic modulus and flexural strength and a decreasing trend with hardness and sintered density.  相似文献   
67.
A boundary layer analysis has been presented for the mixed convection of water at 4°C over a vertical plate embedded in a porous medium. The Robin or convective boundary condition at the surface has been considered where the heat lost from the surface is the product of a heat transfer coefficient and the temperature difference between the surface and the free stream. The governing non‐similar boundary layer equations for both the forced and free convection dominated regimes were solved numerically by means of an implicit finite difference method. The friction factor and dimensionless heat transfer rate (Nusselt number) are presented for several values of the dimensionless heat transfer coefficient and buoyancy parameter. © 2012 Wiley Periodicals, Inc. Heat Trans Asian Res; Published online in Wiley Online Library (wileyonlinelibrary.com/journal/htj). DOI 10.1002/htj.21022  相似文献   
68.
In this article, we present and discuss three statistical methods for surface reconstruction. A typical input to a surface reconstruction technique consists of a large set of points that has been sampled from a smooth surface and contains uncertain data in the form of noise and outliers. We first present a method that filters out uncertain and redundant information yielding a more accurate and economical surface representation. Then we present two methods, each of which converts the input point data to a standard shape representation; the first produces an implicit representation while the second yields a triangle mesh.  相似文献   
69.
In general, high-temperature processes cause thermal stresses and diffusion of dopants, resulting in reduced device yields. It is thus desirable to reduce the number of high-temperature steps and the use of an in situ doping technique eliminates one such step. In this investigation, low-pressure chemical vapour deposition (LPCVD) and plasma-enhanced chemical vapour deposition (PECVD) have been utilised to deposit in situ doped polycrystalline silicon films. The process characteristics and properties such as spreading resistance, grain structure, etch rate using a plasma and dopant concentrations of these films have been investigated and explained using a simple model for dopant activation and grain growth. It is shown that good-quality films suitable for VLSI can be produced.  相似文献   
70.
We report the magnetic characteristics of Pb-doped Sr-ferrites at room temperature. The polycrystalline samples of the series Sr0.5Pb0.52 + Fe12 - xPbx3 + O19\mathrm{Sr}_{0.5}\mathrm{Pb}_{0.5}^{2 +} \mathrm{Fe}_{12 - x}\mathrm{Pb}_{x}^{3 +} \mathrm{O}_{19} (x=0, 0.2, 0.4, 0.6, 0.8, 1.0) have been prepared by the standard ceramic technique with the aim to study the magnetic properties including coercivity, remanence, and energy at room temperature. The measurements show decreasing trends in coercivity and remanence from 4682 Oe to 1783 Oe and from 1833 G to 1511 G for the sample with x-content of 0.0 to 1.0, respectively. A minute addition of Pb affects the behavior of the materials by decreasing its energy product.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号