首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   143篇
  免费   6篇
电工技术   14篇
化学工业   16篇
金属工艺   3篇
机械仪表   2篇
建筑科学   6篇
能源动力   16篇
轻工业   4篇
水利工程   2篇
无线电   16篇
一般工业技术   25篇
冶金工业   15篇
自动化技术   30篇
  2024年   1篇
  2023年   8篇
  2022年   6篇
  2021年   3篇
  2020年   4篇
  2019年   3篇
  2018年   5篇
  2017年   2篇
  2016年   8篇
  2015年   3篇
  2014年   10篇
  2013年   13篇
  2012年   7篇
  2011年   15篇
  2010年   5篇
  2009年   2篇
  2008年   9篇
  2007年   4篇
  2006年   2篇
  2005年   7篇
  2004年   1篇
  2003年   1篇
  2002年   2篇
  2001年   2篇
  2000年   4篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   3篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1990年   2篇
  1988年   1篇
  1987年   1篇
  1984年   1篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1973年   1篇
排序方式: 共有149条查询结果,搜索用时 15 毫秒
81.
Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during post-manufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Trojan attacks or facilitating detection during test. Obfuscation is a technique that is conventionally employed to prevent piracy of software and hardware intellectual property (IP). In this work, we propose a novel application of key-based circuit structure and functionality obfuscation to achieve protection against hardware Trojans triggered by rare internal circuit conditions. The proposed obfuscation scheme is based on judicious modification of the state transition function, which creates two distinct functional modes: normal and obfuscated. A circuit transitions from the obfuscated to the normal mode only upon application of a specific input sequence, which defines the key. We show that it provides security against Trojan attacks in two ways: (1) it makes some inserted Trojans benign, i.e. they become effective only in the obfuscated mode; and (2) it prevents an adversary from exploiting the true rare events in a circuit to insert hard-to-detect Trojans. The proposed design methodology can thus achieve simultaneous protection from hardware Trojans and hardware IP piracy. Besides protecting ICs against Trojan attacks in foundry, we show that it can also protect against malicious modifications by untrusted computer-aided design (CAD) tools in both SoC and FPGA design flows. Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security against Trojan attacks at modest area, power and delay overhead.  相似文献   
82.
Tie-line constrained distributed state estimation   总被引:1,自引:0,他引:1  
This paper presents an implementable distributed state estimation method for online analysis of power systems having multiple, geographically separated areas. Distributed state estimation apart from giving a faster solution, also improves the condition number of the resultant gain matrices. The method proposed here uses the conventional WLS estimator (Gauss-Newton method) with equality constraints forcing the tie line flows as calculated by the adjacent areas to be equal. Based on the topology of the network, the system is partitioned into multiple areas and a processor is assigned to each of these areas for solving the local state estimation problem. Simulations carried out on the IEEE 14, 30 and 118 bus systems show good convergence properties and improvement on the condition number of the gain matrices when compared with centralized algorithms.  相似文献   
83.
This paper presents a method for the use of Supervisory Control and Data Acquisition (SCADA) and synchronized measurements for complete observability of a power system. Under normal operation, both Node Phasor Measurement Unit (NPMU) and SCADA measurements are optimally placed using integer programming and Genetic Algorithm (GA) respectively. The minimum condition number of the Jacobian matrix is used as a criteria in conjunction with GA to obtain a completely determined condition. Next, a triangular factorization approach is used to search for the necessary candidates for single branch outage and single/multiple measurement loss. These candidate measurements are optimized by the binary integer programming method. Numerical results on the IEEE test systems are demonstrated. The results clearly show the robustness of the method to obtain reliable measurements under both normal and contingency conditions.  相似文献   
84.
We build an agent-based model of incarceration based on the susceptible–infected–suspectible (SIS) model of infectious disease propagation. Our central hypothesis is that the observed racial disparities in incarceration rates between Black and White Americans can be explained as the result of differential sentencing between the two demographic groups. We demonstrate that if incarceration can be spread through a social influence network, then even relatively small differences in sentencing can result in large disparities in incarceration rates. Controlling for effects of transmissibility, susceptibility and influence network structure, our model reproduces the observed large disparities in incarceration rates given the differences in sentence lengths for White and Black drug offenders in the USA without extensive parameter tuning. We further establish the suitability of the SIS model as applied to incarceration by demonstrating that the observed structural patterns of recidivism are an emergent property of the model. In fact, our model shows a remarkably close correspondence with California incarceration data. This work advances efforts to combine the theories and methods of epidemiology and criminology.  相似文献   
85.
OBJECTIVE: To document the relation between sexual abstinence and the proportion of X-bearing sperm in the ejaculate. DESIGN: Prospective cohort study. SETTING: Medical college. PATIENT(S): Ten normospermic men, aged 30 to 40 years, provided two semen samples: the first sample was obtained 1.0 to 1.5 days after ejaculation; the second, 7 to 10 days after ejaculation. INTERVENTION(S): Abstinence. MAIN OUTCOME MEASURE(S): Proportion of X- and Y-bearing sperm in two ejaculates. RESULT(S): Multicolor fluorescent in situ hybridization using directly labeled alpha-satellite probes specific for chromosomes 18, X and Y were used to analyze 40,273 sperm. After 1.0 to 1.5 days of abstinence, there were 47.6% +/- 1.7% (mean +/- SD) X-bearing sperm, and after 7 to 10 days of abstinence, there were 49.6% +/- 2.1% X-bearing sperm. The X:Y ratio increased marginally from 0.905 to 0.981. CONCLUSION(S): Sexual abstinence marginally increases the proportion of X-bearing sperm in the ejaculate as assessed by multicolor fluorescent in situ hybridization. This change of borderline statistical significance probably has little impact on the secondary sex ratio.  相似文献   
86.
Shahpura Lake receives untreated domestic sewage from residential areas in Bhopal city. Analysis of water, plankton, fish and sediment reveals that the lake is contaminated by certain heavy metals. The concentrations of some of these metals including iron and manganese were within acceptable limits, whereas others including chromium, nickel, zinc and lead were not within acceptable water quality limits. Metal concentrations in the sewage inlet drain and lake sediment were compared with published criteria. The comparison revealed that the metals in the sediment ranged from the ‘non‐polluted’ to the ‘heavy pollution’ categories. The reference dose was calculated by the adoption of the United States Environmental Protection Agency reference dose factor, and the result reveals that the local population is not exposed to undue health risks. Concentrations of heavy metals in the water increased during the second year of the study, indicating an increase in the pollution load on the system. This might increase the bioaccumulation levels in fish and increase the actual dose of metals to which the local population will be exposed.  相似文献   
87.
A variety of impairments in visual attention can follow damage to the brain. The authors develop systematic methods for analyzing such impairments in terms of C. Bundesen's (see record 1991-03287-001) Theory of Visual Attention and apply these in a group of 9 patients with parietal lobe lesions and variable spatial neglect. In whole report, patients report letters from brief, vertical arrays in left or right visual field. The results show substantial, largely bilateral impairments in processing capacity, implying a major nonlateralized aspect to neglect. In partial report, arrays contain 1 or 2 letters in red and/or green. The task is to report only those letters in a specified target color. In addition to the expected bias against left-sided letters, patients show striking, bilateral preservation of top-down control, or attentional priority for targets. The results show how differentiation of attentional impairments can be informed by a theory of normal function. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
88.
The importance and difficultly of asset tracking make it worthy of attention. We focus on data centers consisting of vertical racks where each rack may accommodate a variety of equipment. We describe an asset tracking system which automatically detects and identifies equipment within rack; has “pinpoint” accuracy, i.e., location resolution equals asset size; relays this information to possibly several management back-ends; includes a back-end application that maintains a location history for all equipment; and uses a visualization tool to display both the current state and the history of deployment. The solution features a flexible architecture that simplifies the connection with both existing and future asset management applications. The architecture supports simple configuration, load balancing, and redundancy. Care has been taken to use widely recognized standards wherever possible. Recommended by Monem Beitelmal  相似文献   
89.
Unit commitment solution methodology using genetic algorithm   总被引:4,自引:0,他引:4  
Solution methodology of unit commitment (UC) using genetic algorithms (GA) is presented. Problem formulation of the unit commitment takes into consideration the minimum up and down time constraints, start up cost and spinning reserve, which is defined as minimization of the total objective function while satisfying the associated constraints. Problem specific operators are proposed for the satisfaction of time dependent constraints. Problem formulation, representation and the simulation results for a 10 generator-scheduling problem are presented  相似文献   
90.
The effective utilisation of Moringa oleiferia mature leaves (MOL) extract as an antioxidant in cooked goat meat patties during refrigerated storage was investigated, and its efficiency was evaluated against butylated hydroxytoluene (BHT). The extract exhibited high phenolic content (48.36 mg of gallic acid equivalent per g), flavonoid (31.42 mg g?1 of sample) being the major component. Moringa oleiferia mature leaves extract showed excellent antioxidant activity as determined by radical‐scavenging activity of 1, 1‐diphenyl 2 picrylhydrazyl (DPPH). The IC50 value of MOL extract for 2, 2‐diphenyl‐1‐picrylhydrazyl radical scavenging was 18.54 μg mL?1. Total phenolic content (as gallic acid equivalent) significantly (P < 0.05) increased from 285.56 in control to 379.45 in patties with MOL extract. MOL extract (0.1%) when added to meat was found to retard lipid peroxidation of cooked goat meat patties as measured by TBARS number during refrigerated storage. The increase in TBARS number in MOL extract–treated samples was very slow and remained lowest (0.53 mg malonaldehyde per kg sample) up to 15 days. The antioxidant activity of MOL extract was found to be comparable to BHT. Addition of MOL extract did not affect any of the sensory attributes of patties. The MOL extract at a level of 100 mg/100 g meat was sufficient to protect goat meat patties against oxidative rancidity for periods longer than the most commonly used synthetic antioxidant like BHT.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号