首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   661篇
  免费   13篇
  国内免费   1篇
电工技术   6篇
化学工业   114篇
金属工艺   4篇
机械仪表   4篇
建筑科学   10篇
能源动力   34篇
轻工业   29篇
水利工程   4篇
无线电   106篇
一般工业技术   72篇
冶金工业   33篇
原子能技术   1篇
自动化技术   258篇
  2024年   1篇
  2023年   3篇
  2022年   5篇
  2021年   11篇
  2020年   3篇
  2019年   7篇
  2018年   14篇
  2017年   10篇
  2016年   27篇
  2015年   16篇
  2014年   29篇
  2013年   41篇
  2012年   41篇
  2011年   54篇
  2010年   48篇
  2009年   47篇
  2008年   43篇
  2007年   36篇
  2006年   35篇
  2005年   23篇
  2004年   21篇
  2003年   20篇
  2002年   21篇
  2001年   12篇
  2000年   8篇
  1999年   10篇
  1998年   16篇
  1997年   12篇
  1996年   6篇
  1995年   2篇
  1994年   7篇
  1993年   4篇
  1992年   4篇
  1990年   2篇
  1989年   8篇
  1987年   2篇
  1986年   1篇
  1985年   3篇
  1984年   5篇
  1983年   1篇
  1981年   2篇
  1979年   3篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
  1975年   2篇
  1973年   2篇
  1972年   1篇
  1971年   1篇
  1970年   1篇
排序方式: 共有675条查询结果,搜索用时 22 毫秒
1.
Unconrolled agglomeration of particles and adhesion of the particulate mass to wall surfaces are common severe problems in many drying operations. This paper reviews the mechanisms of interparticle and particle-surface attraction as well as the theory and the existing tests for characterising powders in terms of internal strength, wall friction and adhesion. The usefulness of the information obtained from these tests in dryer design and operation is critically reviewed. The importance of powder stickiness in various types of dryers is discussed and established methods of combating the problem are presented Recommendations an made for further research in the area of powder cohesion and adhesion.  相似文献   
2.
Cooling breakdown in highly exothermic reaction processes may lead to runaway. The sensitivity and the safety assessment of a batch process on cooling breakdown are studied. The dependence of the minimum cooling time and the maximum allowable time of cooling breakdown for safe operation on the process parameters is investigated.  相似文献   
3.
Systems with a coherently modulated composition are considered with regard to their elastic properties. The (stress-free) coherency strains are considered in a new frame where the standard state is redefined on the basis of the property under study. These strains are used in the study of the thermodynamics of spinodal decomposition in solids with a (generally) anisotropic distortion into a cubic matrix. Finally, the influence of these strains is considered in the study of magnetostrictive effects in such modulated systems or strained-layer superlattices.  相似文献   
4.
Summary Intrinsic viscosities [] in tetrahydrofuran (THF) at 30°C are reported for ten narrow molecular weight distribution poly(methyl methacrylate) (PMMA) samples covering nearly two orders of magnitude in molecular weight. By combining the viscosity results with absolute weight-average molecular weights determined via low-angle laser light scattering (LALLS) experiments, we have accurately determined the Mark-Houwink-Sakurada (MHS) parameters for this polymer-solvent pair (K=7.56x105 and a=0.731, when [] is in dL g-1).  相似文献   
5.
Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user’s card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary’s access to the card is revoked. In this paper, we extend Shoup’s key exchange security model to the smart card setting and examine PKINIT in this model. Using this formalization, we show that PKINIT is indeed flawed, propose a fix, and provide a proof that this fix leads to a secure protocol.  相似文献   
6.
Distributed video coding (DVC) constitutes an original coding framework to meet the stringent requirements imposed by uplink-oriented and low-power mobile video applications. The quality of the side information available to the decoder and the efficiency of the employed channel codes are primary factors determining the success of a DVC system. This contribution introduces two novel techniques for probabilistic motion compensation in order to generate side information at the Wyner-Ziv decoder. The employed DVC scheme uses a base layer, serving as a hash to facilitate overlapped block motion estimation at the decoder side. On top of the base layer, a supplementary Wyner-Ziv layer is coded in the DCT domain. Both proposed probabilistic motion compensation techniques are driven by the actual correlation channel statistics and reuse information contained in the hash. Experimental results report significant rate savings caused by the novel side information generation methods compared to previous techniques. Moreover, the compression performance of the presented DVC architecture, featuring the proposed side-information generation techniques, delivers state-of-the-art compression performance.  相似文献   
7.
This article focuses on the optimization of PCDM, a parallel, two-dimensional (2D) Delaunay mesh generation application, and its interaction with parallel architectures based on simultaneous multithreading (SMT) processors. We first present the step-by-step effect of a series of optimizations on performance. These optimizations improve the performance of PCDM by up to a factor of six. They target issues that very often limit the performance of scientific computing codes. We then evaluate the interaction of PCDM with a real SMT-based SMP system, using both high-level metrics, such as execution time, and low-level information from hardware performance counters.  相似文献   
8.
Dimitris  Nikos  Costas   《Computers & Security》2009,28(7):578-591
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats–attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero.  相似文献   
9.
The problem of channel sharing by rate adaptive streams belonging to various classes is considered. Rate adaptation provides the opportunity for accepting more connections by adapting the bandwidth of connections that are already in the system. However, bandwidth adaptation must be employed in a careful manner in order to ensure that (a) bandwidth is allocated to various classes in a fair manner (system perspective) and (b) bandwidth adaptation does not affect adversely the perceived user quality of the connection (user quality). The system perspective aspect has been studied earlier. This paper focuses on the equally important user perspective. It is proposed to quantify user Quality of Service (QoS) through measures capturing short and long-term bandwidth fluctuations that can be implemented with the mechanisms of traffic regulators, widely used in networking for the purpose of controlling the traffic entering or exiting a network node. Furthermore, it is indicated how to integrate the user perspective metrics with the optimal algorithms for system performance metrics developed earlier by the authors. Simulation results illustrate the effectiveness of the proposed framework.
Leonidas GeorgiadisEmail:

Nikos G. Argiriou   received the Diploma degree in Electrical Engineering from the Department of Electrical Engineering, Telecommunication Division, Aristotle University of Thessaloniki, Greece, in 1996. He worked as a researcher, on secure medical image transmission over networks, at the Image Processing Lab at the same university during 1996–1997. During 1998–2000 he was a researcher for the European Project Esprit Catserver concerning the use of advanced Quality of Service techniques in CATV networks. He received his Ph.D. degree at Aristotle University of Thessaloniki in 2007. His current research interests are in the development and implementation of QoS techniques for wired and wireless networks. Leonidas Georgiadis   received the Diploma degree in Electrical Engineering from Aristotle University, Thessaloniki, Greece, in 1979, and his M.S. and Ph.D degrees both in Electrical Engineering from the University of Connecticut, in 1981 and 1986, respectively. From 1986 to 1987 he was Research Assistant Professor at the University of Virginia, Charlottesville. In 1987 he joined IBM T. J. Watson Research Center, Yorktown Heights as a Research Staff Member. Since October 1995, he has been with the Telecommunications Department of Aristotle University, Thessaloniki, Greece. His interests are in the area of wireless networks, high speed networks, routing, scheduling, congestion control, modeling and performance analysis.  相似文献   
10.
Surface tensions (σ) of binary liquid mixtures of acetonitrile (ACN) with 1-propanol (PrOH) were measured over the entire composition range at eight different temperatures, 278.15 K, 283.15 K, 288.15 K, 293.15 K, 298.15 K, 303.15 K, 308.15 K, and 313.15 K. The lyophobicities (β) of the surfactant PrOH relative to that of ACN as well as the surface mole fractions () of PrOH at various temperatures were derived using the extended Langmuir model (Langmuir 17, 4261, 2001). The β values indicate the greater affinity of PrOH for the surface, and this trend slightly increases with rising temperature. The determined values indicate that the surface concentration of PrOH is always higher than its bulk concentration and consequently confirm that the surface is enriched with PrOH.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号