首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   113篇
  免费   2篇
电工技术   3篇
化学工业   17篇
金属工艺   2篇
机械仪表   3篇
建筑科学   1篇
轻工业   5篇
无线电   3篇
一般工业技术   4篇
冶金工业   9篇
自动化技术   68篇
  2022年   1篇
  2021年   2篇
  2020年   1篇
  2019年   1篇
  2017年   2篇
  2016年   1篇
  2015年   1篇
  2013年   3篇
  2012年   2篇
  2011年   2篇
  2010年   3篇
  2009年   3篇
  2008年   2篇
  2005年   2篇
  2004年   9篇
  2003年   2篇
  2002年   11篇
  2001年   12篇
  2000年   14篇
  1999年   10篇
  1998年   5篇
  1997年   6篇
  1996年   3篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
  1989年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1973年   1篇
  1972年   1篇
  1971年   2篇
  1969年   1篇
排序方式: 共有115条查询结果,搜索用时 125 毫秒
21.
This paper presents the design and implementation of an embedded soft sensor, i.e., a generic and autonomous hardware module, which can be applied to many complex plants, wherein a certain variable cannot be directly measured. It is implemented based on a fuzzy identification algorithm called "Limited Rules", employed to model continuous nonlinear processes. The fuzzy model has a Takagi-Sugeno-Kang structure and the premise parameters are defined based on the Fuzzy C-Means (FCM) clustering algorithm. The firmware contains the soft sensor and it runs online, estimating the target variable from other available variables. Tests have been performed using a simulated pH neutralization plant. The results of the embedded soft sensor have been considered satisfactory. A complete embedded inferential control system is also presented, including a soft sensor and a PID controller.  相似文献   
22.
The technique for staining unsaturated additives within cotton fibers reacts osmium tetroxide with a sorbyl moiety which has been attached to the cellulose chain. Resulting electron micrographs indicate that contrast is considerably enhanced. Measurements of fibrillar size averaged 0.30 nm, closely approximating the values in the literature.  相似文献   
23.
24.
My three year old daughter, Hannah, has spent a considerable amount of thinking time speculating on the why and wherefore of fairies. It has transpired that not all fairies are good. Miss Flora, Miss Fauna and Miss Merryweather are definitely good. Tinker Bell, though, is another brand of fairy. Didn’t she almost kill Wendy in Peter Pan? But she did have some redeeming features. In tandem with Hannah’s ruminations on the fairy world, I have been thinking about hackers of the black, grey and white hat varieties. Are black hats all bad? Are white hats all good? Are grey hats a devastating combination of both?  相似文献   
25.
Committed to stimulating discussion between vendors and users in a safe and enriching environment, Security Focus (www.securityfocus.com) is an excellent site that really does focus on some very practical areas of concern. Some of its very tangible and readily useful features can be found in the Vulnerabilities, Tools, Library, Products and Services options. Here you will find the latest technical information regarding the current status of new and established products, as well as valuable information on publications and services. It is best described by itself:  相似文献   
26.
This month I will look at several sites that provide the type of information that would go under the category of, “I always wondered what that was” or “I often wondered what that meant” or “I have been meaning to look that up for such a long time”. Well, I hope my eclectic pick of sites will address some of the great unanswered questions that have dogged your subconscious for years.  相似文献   
27.
28.
There is nothing like a major controversy flaunted on the news reels to give some spunk to a rather dry subject like email security. The biggest email blunder of 2001 was surely UK civil servant Jo Moore’s1 to the UK Labour Party press office to “bury the bad news” about the UK rail industry in the light of the events of 11 September. She could have exerted control over the entire life of that fateful email — in transit, even after it had been received at the other end, but unfortunately she was not party to this knowledge. Then five months later, two UK newspapers — the Daily Mirror and the Daily Express receive an unsigned note, apparently from an official in the transport department, alleging that Ms Moore had again succumbed to taking unfair advantage of tragedy. This time with an email suggesting using Princess Margaret’s funeral to conceal the bad news about the UK rail industry. The evidence here, a copy of an email apparently sent by Mr Sixsmith, Moore’s boss, and copied to Mr Byers2, censuring Ms Moore for committing this sin yet again. But it transpires that the message had apparently been doctored to damage Ms Moore before it was sent to the newspapers. Again, some important email tracking technology could unveil the life cycle of the doctored email, like for example who read it, when they read it, and whether they printed, copied or forwarded it.  相似文献   
29.
30.
There is no doubt that PDA’s have come of age as the communications device of choice for the growing legions of road warriors. However PDAs can become just as vulnerable as desktop systems to viruses, mobile code exploits and spam.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号