全文获取类型
收费全文 | 143篇 |
免费 | 6篇 |
专业分类
电工技术 | 14篇 |
化学工业 | 16篇 |
金属工艺 | 3篇 |
机械仪表 | 2篇 |
建筑科学 | 6篇 |
能源动力 | 16篇 |
轻工业 | 4篇 |
水利工程 | 2篇 |
无线电 | 16篇 |
一般工业技术 | 25篇 |
冶金工业 | 15篇 |
自动化技术 | 30篇 |
出版年
2024年 | 1篇 |
2023年 | 8篇 |
2022年 | 6篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 3篇 |
2018年 | 5篇 |
2017年 | 2篇 |
2016年 | 8篇 |
2015年 | 3篇 |
2014年 | 10篇 |
2013年 | 13篇 |
2012年 | 7篇 |
2011年 | 15篇 |
2010年 | 5篇 |
2009年 | 2篇 |
2008年 | 9篇 |
2007年 | 4篇 |
2006年 | 2篇 |
2005年 | 7篇 |
2004年 | 1篇 |
2003年 | 1篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1990年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1984年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有149条查询结果,搜索用时 15 毫秒
81.
Rajat?Subhra?ChakrabortyEmail author Swarup?Bhunia 《Journal of Electronic Testing》2011,27(6):767-785
Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during post-manufacturing test has been
shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures
against hardware Trojans by either preventing Trojan attacks or facilitating detection during test. Obfuscation is a technique that is conventionally employed to prevent piracy of software and hardware intellectual property (IP). In
this work, we propose a novel application of key-based circuit structure and functionality obfuscation to achieve protection
against hardware Trojans triggered by rare internal circuit conditions. The proposed obfuscation scheme is based on judicious
modification of the state transition function, which creates two distinct functional modes: normal and obfuscated. A circuit transitions from the obfuscated to the normal mode only upon application of a specific input sequence, which defines
the key. We show that it provides security against Trojan attacks in two ways: (1) it makes some inserted Trojans benign,
i.e. they become effective only in the obfuscated mode; and (2) it prevents an adversary from exploiting the true rare events
in a circuit to insert hard-to-detect Trojans. The proposed design methodology can thus achieve simultaneous protection from
hardware Trojans and hardware IP piracy. Besides protecting ICs against Trojan attacks in foundry, we show that it can also
protect against malicious modifications by untrusted computer-aided design (CAD) tools in both SoC and FPGA design flows.
Simulation results for a set of benchmark circuits show that the scheme is capable of achieving high levels of security against
Trojan attacks at modest area, power and delay overhead. 相似文献
82.
Tie-line constrained distributed state estimation 总被引:1,自引:0,他引:1
Kalyan DasguptaK.S. Swarup 《International Journal of Electrical Power & Energy Systems》2011,33(3):569-576
This paper presents an implementable distributed state estimation method for online analysis of power systems having multiple, geographically separated areas. Distributed state estimation apart from giving a faster solution, also improves the condition number of the resultant gain matrices. The method proposed here uses the conventional WLS estimator (Gauss-Newton method) with equality constraints forcing the tie line flows as calculated by the adjacent areas to be equal. Based on the topology of the network, the system is partitioned into multiple areas and a processor is assigned to each of these areas for solving the local state estimation problem. Simulations carried out on the IEEE 14, 30 and 118 bus systems show good convergence properties and improvement on the condition number of the gain matrices when compared with centralized algorithms. 相似文献
83.
K. Jamuna K.S. Swarup 《International Journal of Electrical Power & Energy Systems》2011,33(10):1658-1665
This paper presents a method for the use of Supervisory Control and Data Acquisition (SCADA) and synchronized measurements for complete observability of a power system. Under normal operation, both Node Phasor Measurement Unit (NPMU) and SCADA measurements are optimally placed using integer programming and Genetic Algorithm (GA) respectively. The minimum condition number of the Jacobian matrix is used as a criteria in conjunction with GA to obtain a completely determined condition. Next, a triangular factorization approach is used to search for the necessary candidates for single branch outage and single/multiple measurement loss. These candidate measurements are optimized by the binary integer programming method. Numerical results on the IEEE test systems are demonstrated. The results clearly show the robustness of the method to obtain reliable measurements under both normal and contingency conditions. 相似文献
84.
Kristian Lum Samarth Swarup Stephen Eubank James Hawdon 《Journal of the Royal Society Interface》2014,11(98)
We build an agent-based model of incarceration based on the susceptible–infected–suspectible (SIS) model of infectious disease propagation. Our central hypothesis is that the observed racial disparities in incarceration rates between Black and White Americans can be explained as the result of differential sentencing between the two demographic groups. We demonstrate that if incarceration can be spread through a social influence network, then even relatively small differences in sentencing can result in large disparities in incarceration rates. Controlling for effects of transmissibility, susceptibility and influence network structure, our model reproduces the observed large disparities in incarceration rates given the differences in sentence lengths for White and Black drug offenders in the USA without extensive parameter tuning. We further establish the suitability of the SIS model as applied to incarceration by demonstrating that the observed structural patterns of recidivism are an emergent property of the model. In fact, our model shows a remarkably close correspondence with California incarceration data. This work advances efforts to combine the theories and methods of epidemiology and criminology. 相似文献
85.
RE Hilsenrath M Swarup FZ Bischoff JE Buster SA Carson 《Canadian Metallurgical Quarterly》1997,68(3):510-513
OBJECTIVE: To document the relation between sexual abstinence and the proportion of X-bearing sperm in the ejaculate. DESIGN: Prospective cohort study. SETTING: Medical college. PATIENT(S): Ten normospermic men, aged 30 to 40 years, provided two semen samples: the first sample was obtained 1.0 to 1.5 days after ejaculation; the second, 7 to 10 days after ejaculation. INTERVENTION(S): Abstinence. MAIN OUTCOME MEASURE(S): Proportion of X- and Y-bearing sperm in two ejaculates. RESULT(S): Multicolor fluorescent in situ hybridization using directly labeled alpha-satellite probes specific for chromosomes 18, X and Y were used to analyze 40,273 sperm. After 1.0 to 1.5 days of abstinence, there were 47.6% +/- 1.7% (mean +/- SD) X-bearing sperm, and after 7 to 10 days of abstinence, there were 49.6% +/- 2.1% X-bearing sperm. The X:Y ratio increased marginally from 0.905 to 0.981. CONCLUSION(S): Sexual abstinence marginally increases the proportion of X-bearing sperm in the ejaculate as assessed by multicolor fluorescent in situ hybridization. This change of borderline statistical significance probably has little impact on the secondary sex ratio. 相似文献
86.
Pradeep Shrivastava Alok Saxena Abha Swarup 《Lakes & Reservoirs: Research and Management》2003,8(1):1-4
Shahpura Lake receives untreated domestic sewage from residential areas in Bhopal city. Analysis of water, plankton, fish and sediment reveals that the lake is contaminated by certain heavy metals. The concentrations of some of these metals including iron and manganese were within acceptable limits, whereas others including chromium, nickel, zinc and lead were not within acceptable water quality limits. Metal concentrations in the sewage inlet drain and lake sediment were compared with published criteria. The comparison revealed that the metals in the sediment ranged from the ‘non‐polluted’ to the ‘heavy pollution’ categories. The reference dose was calculated by the adoption of the United States Environmental Protection Agency reference dose factor, and the result reveals that the local population is not exposed to undue health risks. Concentrations of heavy metals in the water increased during the second year of the study, indicating an increase in the pollution load on the system. This might increase the bioaccumulation levels in fish and increase the actual dose of metals to which the local population will be exposed. 相似文献
87.
Duncan John; Bundesen Claus; Olson Andrew; Humphreys Glyn; Chavda Swarup; Shibuya Hitomi 《Canadian Metallurgical Quarterly》1999,128(4):450
A variety of impairments in visual attention can follow damage to the brain. The authors develop systematic methods for analyzing such impairments in terms of C. Bundesen's (see record 1991-03287-001) Theory of Visual Attention and apply these in a group of 9 patients with parietal lobe lesions and variable spatial neglect. In whole report, patients report letters from brief, vertical arrays in left or right visual field. The results show substantial, largely bilateral impairments in processing capacity, implying a major nonlateralized aspect to neglect. In partial report, arrays contain 1 or 2 letters in red and/or green. The task is to report only those letters in a specified target color. In addition to the expected bias against left-sided letters, patients show striking, bilateral preservation of top-down control, or attentional priority for targets. The results show how differentiation of attentional impairments can be informed by a theory of normal function. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
88.
Cyril Brignone Tim Connors Mehrban Jam Geoff Lyon Geetha Manjunath Alan McReynolds Swarup Mohalik Ian Robinson Craig Sayers Cosme Sevestre Jean Tourrilhes Venugopal Srinivasmurthy 《Distributed and Parallel Databases》2007,21(2-3):145-165
The importance and difficultly of asset tracking make it worthy of attention. We focus on data centers consisting of vertical
racks where each rack may accommodate a variety of equipment. We describe an asset tracking system which automatically detects
and identifies equipment within rack; has “pinpoint” accuracy, i.e., location resolution equals asset size; relays this information
to possibly several management back-ends; includes a back-end application that maintains a location history for all equipment;
and uses a visualization tool to display both the current state and the history of deployment.
The solution features a flexible architecture that simplifies the connection with both existing and future asset management
applications. The architecture supports simple configuration, load balancing, and redundancy. Care has been taken to use widely
recognized standards wherever possible.
Recommended by Monem Beitelmal 相似文献
89.
Unit commitment solution methodology using genetic algorithm 总被引:4,自引:0,他引:4
Solution methodology of unit commitment (UC) using genetic algorithms (GA) is presented. Problem formulation of the unit commitment takes into consideration the minimum up and down time constraints, start up cost and spinning reserve, which is defined as minimization of the total objective function while satisfying the associated constraints. Problem specific operators are proposed for the satisfaction of time dependent constraints. Problem formulation, representation and the simulation results for a 10 generator-scheduling problem are presented 相似文献
90.
Arun Kumar Das Vincent Rajkumar Arun Kumar Verma Devendra Swarup 《International Journal of Food Science & Technology》2012,47(3):585-591
The effective utilisation of Moringa oleiferia mature leaves (MOL) extract as an antioxidant in cooked goat meat patties during refrigerated storage was investigated, and its efficiency was evaluated against butylated hydroxytoluene (BHT). The extract exhibited high phenolic content (48.36 mg of gallic acid equivalent per g), flavonoid (31.42 mg g?1 of sample) being the major component. Moringa oleiferia mature leaves extract showed excellent antioxidant activity as determined by radical‐scavenging activity of 1, 1‐diphenyl 2 picrylhydrazyl (DPPH). The IC50 value of MOL extract for 2, 2‐diphenyl‐1‐picrylhydrazyl radical scavenging was 18.54 μg mL?1. Total phenolic content (as gallic acid equivalent) significantly (P < 0.05) increased from 285.56 in control to 379.45 in patties with MOL extract. MOL extract (0.1%) when added to meat was found to retard lipid peroxidation of cooked goat meat patties as measured by TBARS number during refrigerated storage. The increase in TBARS number in MOL extract–treated samples was very slow and remained lowest (0.53 mg malonaldehyde per kg sample) up to 15 days. The antioxidant activity of MOL extract was found to be comparable to BHT. Addition of MOL extract did not affect any of the sensory attributes of patties. The MOL extract at a level of 100 mg/100 g meat was sufficient to protect goat meat patties against oxidative rancidity for periods longer than the most commonly used synthetic antioxidant like BHT. 相似文献