全文获取类型
收费全文 | 113篇 |
免费 | 2篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 17篇 |
金属工艺 | 2篇 |
机械仪表 | 3篇 |
建筑科学 | 1篇 |
轻工业 | 5篇 |
无线电 | 3篇 |
一般工业技术 | 4篇 |
冶金工业 | 9篇 |
自动化技术 | 68篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 1篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2013年 | 3篇 |
2012年 | 2篇 |
2011年 | 2篇 |
2010年 | 3篇 |
2009年 | 3篇 |
2008年 | 2篇 |
2005年 | 2篇 |
2004年 | 9篇 |
2003年 | 2篇 |
2002年 | 11篇 |
2001年 | 12篇 |
2000年 | 14篇 |
1999年 | 10篇 |
1998年 | 5篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1971年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有115条查询结果,搜索用时 125 毫秒
21.
This paper presents the design and implementation of an embedded soft sensor, i.e., a generic and autonomous hardware module, which can be applied to many complex plants, wherein a certain variable cannot be directly measured. It is implemented based on a fuzzy identification algorithm called "Limited Rules", employed to model continuous nonlinear processes. The fuzzy model has a Takagi-Sugeno-Kang structure and the premise parameters are defined based on the Fuzzy C-Means (FCM) clustering algorithm. The firmware contains the soft sensor and it runs online, estimating the target variable from other available variables. Tests have been performed using a simulated pH neutralization plant. The results of the embedded soft sensor have been considered satisfactory. A complete embedded inferential control system is also presented, including a soft sensor and a PID controller. 相似文献
22.
The technique for staining unsaturated additives within cotton fibers reacts osmium tetroxide with a sorbyl moiety which has been attached to the cellulose chain. Resulting electron micrographs indicate that contrast is considerably enhanced. Measurements of fibrillar size averaged 0.30 nm, closely approximating the values in the literature. 相似文献
23.
24.
Berni Dwan 《Computer Fraud & Security》2001,2001(8):13-16
My three year old daughter, Hannah, has spent a considerable amount of thinking time speculating on the why and wherefore of fairies. It has transpired that not all fairies are good. Miss Flora, Miss Fauna and Miss Merryweather are definitely good. Tinker Bell, though, is another brand of fairy. Didn’t she almost kill Wendy in Peter Pan? But she did have some redeeming features. In tandem with Hannah’s ruminations on the fairy world, I have been thinking about hackers of the black, grey and white hat varieties. Are black hats all bad? Are white hats all good? Are grey hats a devastating combination of both? 相似文献
25.
Berni Dwan 《Computer Fraud & Security》2000,2000(6):9
Committed to stimulating discussion between vendors and users in a safe and enriching environment, Security Focus (www.securityfocus.com) is an excellent site that really does focus on some very practical areas of concern. Some of its very tangible and readily useful features can be found in the Vulnerabilities, Tools, Library, Products and Services options. Here you will find the latest technical information regarding the current status of new and established products, as well as valuable information on publications and services. It is best described by itself: 相似文献
26.
Berni Dwan 《Computer Fraud & Security》2001,2001(3):6
This month I will look at several sites that provide the type of information that would go under the category of, “I always wondered what that was” or “I often wondered what that meant” or “I have been meaning to look that up for such a long time”. Well, I hope my eclectic pick of sites will address some of the great unanswered questions that have dogged your subconscious for years. 相似文献
27.
28.
Berni Dwan 《Computer Fraud & Security》2002,2002(4):7-9
There is nothing like a major controversy flaunted on the news reels to give some spunk to a rather dry subject like email security. The biggest email blunder of 2001 was surely UK civil servant Jo Moore’s1 to the UK Labour Party press office to “bury the bad news” about the UK rail industry in the light of the events of 11 September. She could have exerted control over the entire life of that fateful email — in transit, even after it had been received at the other end, but unfortunately she was not party to this knowledge. Then five months later, two UK newspapers — the Daily Mirror and the Daily Express receive an unsigned note, apparently from an official in the transport department, alleging that Ms Moore had again succumbed to taking unfair advantage of tragedy. This time with an email suggesting using Princess Margaret’s funeral to conceal the bad news about the UK rail industry. The evidence here, a copy of an email apparently sent by Mr Sixsmith, Moore’s boss, and copied to Mr Byers2, censuring Ms Moore for committing this sin yet again. But it transpires that the message had apparently been doctored to damage Ms Moore before it was sent to the newspapers. Again, some important email tracking technology could unveil the life cycle of the doctored email, like for example who read it, when they read it, and whether they printed, copied or forwarded it. 相似文献
29.
30.
Berni Dwan 《Network Security》2003,2003(11):17
There is no doubt that PDA’s have come of age as the communications device of choice for the growing legions of road warriors. However PDAs can become just as vulnerable as desktop systems to viruses, mobile code exploits and spam. 相似文献