全文获取类型
收费全文 | 193篇 |
免费 | 6篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 38篇 |
机械仪表 | 2篇 |
建筑科学 | 6篇 |
能源动力 | 3篇 |
轻工业 | 15篇 |
水利工程 | 2篇 |
无线电 | 40篇 |
一般工业技术 | 20篇 |
冶金工业 | 12篇 |
自动化技术 | 58篇 |
出版年
2023年 | 3篇 |
2022年 | 7篇 |
2021年 | 3篇 |
2020年 | 8篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 2篇 |
2016年 | 10篇 |
2015年 | 3篇 |
2014年 | 4篇 |
2013年 | 13篇 |
2012年 | 12篇 |
2011年 | 7篇 |
2010年 | 8篇 |
2009年 | 22篇 |
2008年 | 14篇 |
2007年 | 18篇 |
2006年 | 9篇 |
2005年 | 2篇 |
2004年 | 9篇 |
2003年 | 3篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1923年 | 1篇 |
排序方式: 共有199条查询结果,搜索用时 78 毫秒
161.
Nikolaos Passas Markos Bonazountas 《Bulletin of Engineering Geology and the Environment》2004,63(1):13-18
The Akaki Dam is located some 26 km southwest of Nicosia and 0.5 km west of Malounta village. The dam is up to 31 m high and has a storage capacity of 2 million m3. The reservoir retained by the dam has a surface area of 18 ha at full storage levels. The paper discusses water management considerations for the area following the construction of the dam. 相似文献
162.
Georgios Kambourakis Angelos Rouskas Stefanos Gritzalis 《Wireless Personal Communications》2004,29(3-4):303-321
The SSL/TLS protocol is a de-facto standard that has proved its effectiveness in the wired Internet and it will probably be the most promising candidate for future heterogeneous wireless environments. In this paper, we propose potential solutions that this protocol can offer to future “all-IP” heterogeneous mobile networks with particular emphasis on the user's side. Our approach takes into consideration the necessary underlying public key infrastructure (PKI) to be incorporated in future 3G core network versions and is under investigation by 3GPP. We focus on the standard 3G+ authentication and key agreement (AKA), as well as the recently standardized extensible authentication protocol (EAP)-AKA procedures and claim that SSL-based AKA mechanisms can provide for an alternative, more robust, flexible and scalable security framework. In this 3G+ environment, we perceive authentication as a service, which has to be performed at the higher protocol layers irrespectively of the underlying network technology. We conducted a plethora of experiments concentrating on the SSL's handshake protocol performance, as this protocol contains demanding public key operations, which are considered heavy for mobile devices. We gathered measurements over the GPRS and IEEE802.11b networks, using prototype implementations, different test beds and considering battery consumption. The results showed that the expected high data rates on one hand, and protocol optimisations on the other hand, can make SSL-based authentication a realistic solution in terms of service time for future mobile systems. 相似文献
163.
An analytic network process and trapezoidal interval‐valued fuzzy technique for order preference by similarity to ideal solution network access selection method
下载免费PDF全文
![点击此处可从《International Journal of Communication Systems》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Emmanouil Skondras Aggeliki Sgora Angelos Michalas Dimitrios D. Vergados 《International Journal of Communication Systems》2016,29(2):307-329
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service‐level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP‐ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
164.
Constructive methods for matrices of multihomogeneous (or multigraded) resultants for unmixed systems have been studied by Weyman, Zelevinsky, Sturmfels, Dickenstein and Emiris. We generalize these constructions to mixed systems, whose Newton polytopes are scaled copies of one polytope, thus taking a step towards systems with arbitrary supports. First, we specify matrices whose determinant equals the resultant and characterize the systems that admit such formulae. Bézout-type determinantal formulae do not exist, but we describe all possible Sylvester-type and hybrid formulae. We establish tight bounds for all corresponding degree vectors, and specify domains that will surely contain such vectors; the latter are new even for the unmixed case. Second, we make use of multiplication tables and strong duality theory to specify resultant matrices explicitly, for a general scaled system, thus including unmixed systems. The encountered matrices are classified; these include a new type of Sylvester-type matrix as well as Bézout-type matrices, known as partial Bezoutians. Our public-domain Maple implementation includes efficient storage of complexes in memory, and construction of resultant matrices. 相似文献
165.
166.
Yingbo Song Michael E. Locasto Angelos Stavrou Angelos D. Keromytis Salvatore J. Stolfo 《Machine Learning》2010,81(2):179-205
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious
code to be easily, and automatically, transformed into semantically equivalent variants frustrates attempts to construct simple,
easily verifiable representations for use in security sensors. In this paper, we present a quantitative analysis of the strengths
and limitations of shellcode polymorphism, and describe the impact that these techniques have in the context of learning-based
IDS systems. Our examination focuses on dual problems: shellcode encryption-based evasion methods and targeted “blending”
attacks. Both techniques are currently being used in the wild, allowing real exploits to evade IDS sensors. This paper provides
metrics to measure the effectiveness of modern polymorphic engines and provide insights into their designs. We describe methods
to evade statistics-based IDS sensors and present suggestions on how to defend against them. Our experimental results illustrate
that the challenge of modeling self-modifying shellcode by signature-based methods, and certain classes of statistical models,
is likely an intractable problem. 相似文献
167.
The present work is focused on applying washing treatments using Cl-containing reagents, such as di-chloroacetic acid (DCA) for the first time, and 1,2-di-chloropropane, DCP (0.1 M) solutions in regaining the activity and oxygen storage capacity (OSC) of an aged commercial Pd-based TWC. Segments extracted from an aged (56,000 km) commercial Pd/Rh-based (9:1) TWC after washing with DCA resulted in 100 % removal of Pb and about 43 % of P, while washing with DCP solution was ineffective in removing these specific contaminants. DCA-washing regeneration method was found to increase Pd surface concentration by four times compared to the aged TWC, whereas DCP-washing was considerably less effective than DCA in recovering Pd active sites. The OSC of the aged catalyst was significantly improved by the use of DCA-washing, whereas no improvement was observed by DCP-washing. Nevertheless, DCP-washing was found to be more effective in improving the performance of aged TWC towards CO oxidation. The removal of Pb is likely a reason for the DCA-washing being more effective in improving C3H6 and NO conversions and OSC. 相似文献
168.
169.
The systematic sequencing of the yeast genome has raised the problem of the biological significance of the open reading frames (ORFs) revealed: it is possible that some of these are fortuitous. To avoid the analysis of such fortuitous ORFs, a minimum length of 100 sense codons was adopted. Nevertheless, the presence of fortuitous ORFs of more than 100 codons cannot be excluded. Thus, in the context of functional analysis, a method for discrimination between fortuitous and biologically active ORFs may be useful. The discrimination method described here is based on multiple criteria: ORF length, codon bias, and both amino-acid and dipeptide composition of the corresponding polypeptide. The thresholds for each criterion are based on the comparison between two learning sets: one drawn from random DNA sequences and the second from known genes. The method was validated by two test sets (one random and one biological) and then applied to the ORFs of chromosomes I, II, III, V, VIII, IX and XI. This method predicts 123 fortuitous ORFs among the 1773 identified on these chromosomes. 相似文献
170.
Angelos Kalogeropoulos 《Yeast (Chichester, England)》1995,11(6):555-565
The goal of the present work is the construction of software (EXPLORA) which automatically detects Open Reading Frames (ORF), intron-containing or not, in the nuclear sequences of the yeast Saccharomyces cerevisiae. In order to detect introns within (or preceding) ORFs, one must define precise rules of how an intron is identified. These rules are described here. The software is able to detect correctly an intron-associated ORF in at least 88% of cases. We tested all yeast nuclear entries of the EMBL database with the software, and found, in addition to the known intron-associated ORFs, some others which may include an intron. Finally the software was applied to the DNA sequences of chromosomes III and XI, in which it detected eight new intron-associated ORFs. 相似文献