全文获取类型
收费全文 | 192篇 |
免费 | 6篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 37篇 |
机械仪表 | 2篇 |
建筑科学 | 6篇 |
能源动力 | 3篇 |
轻工业 | 15篇 |
水利工程 | 2篇 |
无线电 | 40篇 |
一般工业技术 | 20篇 |
冶金工业 | 12篇 |
自动化技术 | 58篇 |
出版年
2023年 | 3篇 |
2022年 | 6篇 |
2021年 | 3篇 |
2020年 | 8篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 2篇 |
2016年 | 10篇 |
2015年 | 3篇 |
2014年 | 4篇 |
2013年 | 13篇 |
2012年 | 12篇 |
2011年 | 7篇 |
2010年 | 8篇 |
2009年 | 22篇 |
2008年 | 14篇 |
2007年 | 18篇 |
2006年 | 9篇 |
2005年 | 2篇 |
2004年 | 9篇 |
2003年 | 3篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1923年 | 1篇 |
排序方式: 共有198条查询结果,搜索用时 15 毫秒
191.
The environmental Kuznets curve for US counties: A spatial econometric analysis with extensions 总被引:4,自引:0,他引:4
Anil?RupasinghaEmail author Stephan?J.?Goetz David?L.?Debertin Angelos?Pagoulatos 《Papers in Regional Science》2004,83(2):407-424
We examine the relationship between county per capita income and toxic pollutants using a comprehensive model of the Environmental Kuznets Curve. The model incorporates ethnic diversity, spatial effects and most independent variables used in previous studies. Initial results suggest that the relationship follows an inverted-U-shape. However, incorporation of a cubic term for income reveals that toxic pollution eventually increases again as income continues to rise. Ethnic diversity and spatial effects are found to be important in understanding toxic pollution in US counties. We also detect an EKC-type relationship with respect to income inequality.Received: 25 January 2002, Accepted: 8 March 2003, JEL Classification:
R11, Q20The authors gratefully acknowledge funding from the US Department of Agriculture under NRI Grant No. 00-5401-9320, as well as the comments of three anonymous reviewers. An earlier version of this article was presented at the North American Regional Science Association meetings in Charleston, SC in November 2001. 相似文献
192.
The electromigration behaviour of triple level Al-1%Si-0.5%Cu thin films is presented as used in a metallization process necessary for high-density CMOS (HDCMOS) ASIC technology. A prediction time-to-failure (TTFx) formula has been fit and the 0.01% cumulative-failure-function F(t) vs. time has been calculated. Reliability improvement was achieved by using test vehicles baked for t=1400 hrs at T=200°C.Maximum current density design rules are derived as a function of the sigma value for each metal level. 相似文献
193.
The purpose of this article is to estimate the demand and supply relationships of the US petroleum market. By measuring the elasticities and cross-elasticities of demand, the relative responsiveness of changes in prices and income and the possibility of substitution of alternative energy resources for petroleum are determined. The demand for refined products is also estimated. Finally, through projection of the demand for, and the domestic supply and imports of crude petroleum under alternative assumptions, a measure of the magnitude of physical reserves and capital requirements is obtained for policies of self-sufficiency and free trade. 相似文献
194.
Stelios Sidiroglou Angelos D. Keromytis 《International Journal of Information Security》2006,5(2):77-91
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based buffer overflow and underflow
attacks, and recover from them by allowing the program to continue execution. Our hypothesis is that we can treat each code
function as a transaction that can be aborted when an attack is detected, without affecting the application's ability to correctly
execute. Our approach allows us to enable selectively or disable components of this defensive mechanism in response to external
events, allowing for a direct tradeoff between security and performance. We combine our defensive mechanism with a honeypot-like
configuration to detect previously unknown attacks, automatically adapt an application's defensive posture at a negligible
performance cost, and help determine worm signatures. Our scheme provides low impact on application performance, the ability
to respond to attacks without human intervention, the capacity to handle previously unknown vulnerabilities, and the preservation
of service availability. We implement a stand-alone tool, DYBOC, which we use to instrument a number of vulnerable applications.
Our performance benchmarks indicate a slow-down of 20% for Apache in full-protection mode, and 1.2% with selective protection.
We provide preliminary evidence toward the validity of our transactional hypothesis via two experiments: first, by applying
our scheme to 17 vulnerable applications, successfully fixing 14 of them; second, by examining the behavior of Apache when
each of 154 potentially vulnerable routines are made to fail, resulting in correct behavior in 139 cases (90%), with similar
results for sshd (89%) and Bind (88%). 相似文献
195.
Georgios Kambourakis Denise-Penelope N. Kontoni Angelos Rouskas Stefanos Gritzalis 《Computers & Education》2007
While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and authorization services, offering mutual trust to both learners and service providers. Considering PKI requirements for online distance learning networks, this paper discusses the potential application of ACs in a proposed trust model. Typical e-learning trust interactions between e-learners and providers are presented, demonstrating that robust security mechanisms and effective trust control can be obtained and implemented. The application of ACs to support m-learning is also presented and evaluated through an experimental test-bed setup, using the general packet radio service network. The results showed that AC issuing is attainable in service times while simultaneously can deliver flexible and scalable solutions to both learners and e-learning providers. 相似文献
196.
Victor Mendoza Eirini Katsidoniotaki Markos Florentiades Jorge Dot Fraga Eduard Dyachuk 《风能》2023,26(6):521-537
In this work, a closely spaced dual turbine concept is studied. The distance between the two side-by-side hubs is 1.05 , where is the rotor diameter. This configuration has a potential benefit for offshore wind developments in which power density can be maximized. The main goal is to evaluate the overall aerodynamic performance, blade loads, and wake structure of a reference wind turbine generator operating within this dual turbine configuration and to compare the effects against those for the typical single turbine configuration. For this purpose, an actuator line model has been employed together with the large eddy simulation approach for predicting the turbulence effects. This model was implemented by using the open-source computational fluid dynamics toolbox OpenFOAM. Results show a better performance for the dual turbine concept. Under same operating conditions, the aerodynamic power of each turbine within the dual concept is higher than the power of the stand alone turbine, particularly at lower operating wind speeds (approximately 2% to 3% of extra power per turbine). Comparison between the two configurations shows similar character of the tangential and normal forces acting on the blades in terms of magnitude and fluctuation, eliminating potential concerns regarding fatigue and blade design. The largest difference in the tangential and normal root bending moments are approximately 3% and 2%, respectively, between single and dual turbine configurations. Finally, wake recovery analysis shows a downwind velocity deficit that is not enhanced streamwise in the dual turbine configuration with no considerable difference after 7 . 相似文献
197.
Behaviormetrika - Clustering of mixed-type datasets can be a particularly challenging task as it requires taking into account the associations between variables with different level of measurement,... 相似文献
198.
This work investigates the potential of developing a rapid test based on wicking of oil into paper for determining whether a reused frying oil is to be rejected. To achieve this goal, wicking patterns (oil penetration rate and oil front shape versus time) of both fresh and prolonged fried extra virgin olive oil are optically registered at six different paper stripes. Four of them are double-ply towel papers whereas the other two are single-ply chromatographic papers. Wicking tests are performed at 20 °C and 30 °C. It is shown that the type of paper affects seriously the wicking patterns. Double-ply papers present high oil penetration rates but very irregular oil front shapes whereas single-ply papers yield lower oil penetration rates but pretty flat oil fronts. Furthermore, it is found that only under certain conditions the penetration rates obey the well known Lucas–Washburn equation. A discussion is made on the phenomena that take place during wicking of oil into paper which may cause deviations from the Lucas–Washburn equation. A semi-empirical model is proposed to describe the above deviations by incorporating the effect of time evolving pore sizes. 相似文献