首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   150篇
  免费   7篇
化学工业   41篇
金属工艺   2篇
机械仪表   1篇
建筑科学   1篇
能源动力   1篇
轻工业   9篇
无线电   12篇
一般工业技术   24篇
冶金工业   54篇
自动化技术   12篇
  2022年   1篇
  2021年   2篇
  2019年   4篇
  2017年   3篇
  2016年   3篇
  2015年   3篇
  2014年   1篇
  2013年   5篇
  2011年   4篇
  2010年   4篇
  2009年   7篇
  2008年   4篇
  2007年   9篇
  2006年   10篇
  2005年   9篇
  2004年   11篇
  2003年   2篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   7篇
  1998年   3篇
  1997年   2篇
  1996年   6篇
  1995年   7篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1991年   2篇
  1990年   6篇
  1989年   4篇
  1988年   2篇
  1987年   1篇
  1986年   1篇
  1985年   3篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   1篇
  1980年   2篇
  1978年   2篇
  1977年   2篇
  1976年   1篇
  1975年   1篇
排序方式: 共有157条查询结果,搜索用时 15 毫秒
1.
A quantitative study of firewall configuration errors   总被引:1,自引:0,他引:1  
Wool  A. 《Computer》2004,37(6):62-67
The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it according to a security policy that meets the company's needs. Configuration is a crucial task, probably the most important factor in the security a firewall provides.  相似文献   
2.
This paper addresses the problem of defining a simple End-Effector design for a robotic arm that is able to grasp a given set of planar objects. The OCOG (Objects COmmon Grasp search) algorithm proposed in this paper searches for a common grasp over the set of objects mapping all possible grasps for each object that satisfy force closure and quality criteria by taking into account the external wrenches (forces and torque) applied to the object. The mapped grasps are represented by feature vectors in a high-dimensional space. This feature vector describes the design of the gripper. A database is generated for all possible grasps for each object in the feature vector space. A search algorithm is then used for intersecting all possible grasps over all parts and finding a common grasp suitable for all objects. The search algorithm utilizes the kd-tree index structure for representing the database of the sets of feature vectors. The kd-tree structure enables an efficient and low cost nearest-neighbor search for common vectors between the sets. Each common vector found (feature vector) is the grasp configuration for a group of objects, which implies the future end-effector design. The final step classifies the grasps found to subsets of the objects, according to the common vectors found. Simulations and experiments are presented for four objects to validate the feasibility of the proposed algorithm. The algorithm will be useful for standardization of end-effector design and reducing its engineering time.  相似文献   
3.
A novel bio‐based composite material, suitable for electronic as well as automotive and aeronautical applications, was developed from soybean oils and keratin feather fibers (KF). This environmentally friendly, low‐cost composite can be a substitute for petroleum‐based composite materials. Keratin fibers are a hollow, light, and tough material and are compatible with several soybean (S) resins, such as acrylated epoxidized soybean oil (AESO). The new KFS lightweight composites have a density ρ ≈ 1 g/cm3, when the KF volume fraction is 30%. The hollow keratin fibers were not filled by resin infusion and the composite retained a significant volume of air in the hollow structure of the fibers. Due to the retained air, the dielectric constant, k, of the composite material was in the range of 1.7–2.7, depending on the fiber volume fraction, and these values are significantly lower than the conventional silicon dioxide or epoxy, or polymer dielectric insulators. The coefficient of thermal expansion (CTE) of the 30 wt % composite was 67.4 ppm/°C; this value is low enough for electronic application and similar to the value of silicon materials or polyimides used in printed circuit boards. The water absorption of the AESO polymer was 0.5 wt % at equilibrium and the diffusion coefficient in the KFS composites was dependent on the keratin fiber content. The incorporation of keratin fibers in the soy oil polymer enhanced the mechanical properties such as storage modulus, fracture toughness, and flexural properties, ca. 100% increase at 30 vol %. The fracture energy of a single keratin fiber in the composite was determined to be about 3 kJ/m2 with a fracture stress of about 100–200 MPa. Considerable improvements in the KFS composite properties should be possible by optimization of the resin structure and fiber selection. © 2005 Wiley Periodicals, Inc. J Appl Polym Sci 95: 1524–1538, 2005  相似文献   
4.
New thermosetting resins for applications of sheet‐molding compounds (SMCs) were successfully synthesized from linseed oil, which is the most molecularly unsaturated of all plant oils. The carbon–carbon double bonds were opened by epoxidation, followed by acrylation, and then maleinization, which provided more crosslink sites and added acid functionality on the triglyceride molecules to develop thickening. Dynamic mechanical analysis showed that the storage modulus of these new polymers was approximately 2.5 GPa at 30°C, and the glass‐transition temperature was above 100°C. During maturation the resins reached a molding viscosity quickly and stayed stable. Mechanical tests showed a flexural strength of 100 MPa and a flexural modulus of 2.8 GPa. Thermogravimetric analysis showed a single degradation ranging from 300°C–480°C, which was a result of the carbonization of the crosslinked network. These bio‐based resins are promising as replacements of some petroleum‐based resins in the SMC industry. © 2005 Wiley Periodicals, Inc. J Appl Polym Sci, 2006  相似文献   
5.
6.
A single-pixel imaging remote sensor operating at 330 GHz is described. It is based on a frequency modulated continuous wave (FMCW) and aimed at detection of concealed objects for ranges up to 40 m. The system consists of 2 horn-lens antennas integrated with a homodyne transceiver. The synthesized linear FMCW signal at X-band is multiplied by a factor of 32 to generate the transmitted signal. An intermediate frequency (IF) signal obtained in the output port of the 2-nd harmonic mixer is employed for image processing. Distance measurements were made by performing data acquisition unit based on LabView interface and resulting in a range resolution about 1 cm. Examples of 2D and 3D images reconstructed with this sensor are presented.  相似文献   
7.
The solubility of Mg in alumina was measured using wavelength-dispersive spectroscopy mounted on a scanning electron microscope. Careful calibration of the microscope's working conditions was performed in order to optimize the detection limit and accuracy. Measurements were conducted on water-quenched and furnace-cooled samples, without any thermal or chemical etching to avoid alteration of the bulk concentration. The results indicate the solubility limit of Mg in alumina to be 132±11 ppm at 1600°C.  相似文献   
8.
9.
The problem we address is how to communicate securely with a set of users (the target set) over an insecure broadcast channel. This problem occurs in two application domains: satellite/cable pay TV and the Internet MBone. In these systems, the parameters of major concern are the number of key transmissions and the number of keys held by each receiver. In the Internet domain, previous schemes suggest building a separate key tree for each multicast program, thus incurring a setup cost of at least k log k per program for target sets of size k. In the pay TV domain, a single key structure is used for all programs, but known theoretical bounds show that either very long transmissions are required, or that each receiver needs to keep prohibitively many keys. Our approach is targeted at both domains. Our schemes maintain a single key structure that requires each receiver to keep only a logarithmic number of establishment keys for its entire lifetime. At the same time our schemes admit low numbers of transmissions. In order to achieve these goals, and to break away from the theoretical bounds, we allow a controlled number of users outside the target set to occasionally receive the multicast. This relaxation is appropriate for many scenarios in which the encryption is used to force consumers to pay for a service, rather than to withhold sensitive information. For this purpose, we introduce f-redundant establishment key allocations, which guarantee that the total number of recipients is no more than f times the number of intended recipients. We measure the performance of such schemes by the number of key transmissions they require, by their redundancy f, and by the probability that a user outside the target set (a free-rider) will be able to decrypt the multicast. We prove a new lower bound, present several new establishment key allocations, and evaluate our schemes' performance by extensive simulation  相似文献   
10.
Distance estimation is important to many Internet applications. It can aid a World Wide Web client when selecting among several potential candidate servers or among candidate peer-to-peer servers. It can also aid in building efficient overlay or peer-to-peer networks that react dynamically to changes in the underlying Internet. One of the approaches to distance (i.e., time delay) estimation in the Internet is based on placing tracer stations in key locations and conducting measurements between them. The tracers construct an approximated map of the Internet after processing the information obtained from these measurements. This work presents a novel algorithm, based on algebraic tools, that computes additional distances, which are not explicitly measured. As such, the algorithm extracts more information from the same amount of measurement data. Our algorithm has several practical impacts. First, it can reduce the number of tracers and measurements without sacrificing information. Second, our algorithm is able to compute distance estimates between locations where tracers cannot be placed. To evaluate the algorithm's performance, we tested it both on randomly generated topologies and on real Internet measurements. Our results show that the algorithm computes up to 50%-200% additional distances beyond the basic tracer-to-tracer measurements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号