全文获取类型
收费全文 | 150篇 |
免费 | 7篇 |
专业分类
化学工业 | 41篇 |
金属工艺 | 2篇 |
机械仪表 | 1篇 |
建筑科学 | 1篇 |
能源动力 | 1篇 |
轻工业 | 9篇 |
无线电 | 12篇 |
一般工业技术 | 24篇 |
冶金工业 | 54篇 |
自动化技术 | 12篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2019年 | 4篇 |
2017年 | 3篇 |
2016年 | 3篇 |
2015年 | 3篇 |
2014年 | 1篇 |
2013年 | 5篇 |
2011年 | 4篇 |
2010年 | 4篇 |
2009年 | 7篇 |
2008年 | 4篇 |
2007年 | 9篇 |
2006年 | 10篇 |
2005年 | 9篇 |
2004年 | 11篇 |
2003年 | 2篇 |
2002年 | 5篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 7篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 6篇 |
1995年 | 7篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有157条查询结果,搜索用时 15 毫秒
1.
A quantitative study of firewall configuration errors 总被引:1,自引:0,他引:1
The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it according to a security policy that meets the company's needs. Configuration is a crucial task, probably the most important factor in the security a firewall provides. 相似文献
2.
This paper addresses the problem of defining a simple End-Effector design for a robotic arm that is able to grasp a given set of planar objects. The OCOG (Objects COmmon Grasp search) algorithm proposed in this paper searches for a common grasp over the set of objects mapping all possible grasps for each object that satisfy force closure and quality criteria by taking into account the external wrenches (forces and torque) applied to the object. The mapped grasps are represented by feature vectors in a high-dimensional space. This feature vector describes the design of the gripper. A database is generated for all possible grasps for each object in the feature vector space. A search algorithm is then used for intersecting all possible grasps over all parts and finding a common grasp suitable for all objects. The search algorithm utilizes the kd-tree index structure for representing the database of the sets of feature vectors. The kd-tree structure enables an efficient and low cost nearest-neighbor search for common vectors between the sets. Each common vector found (feature vector) is the grasp configuration for a group of objects, which implies the future end-effector design. The final step classifies the grasps found to subsets of the objects, according to the common vectors found. Simulations and experiments are presented for four objects to validate the feasibility of the proposed algorithm. The algorithm will be useful for standardization of end-effector design and reducing its engineering time. 相似文献
3.
A novel bio‐based composite material, suitable for electronic as well as automotive and aeronautical applications, was developed from soybean oils and keratin feather fibers (KF). This environmentally friendly, low‐cost composite can be a substitute for petroleum‐based composite materials. Keratin fibers are a hollow, light, and tough material and are compatible with several soybean (S) resins, such as acrylated epoxidized soybean oil (AESO). The new KFS lightweight composites have a density ρ ≈ 1 g/cm3, when the KF volume fraction is 30%. The hollow keratin fibers were not filled by resin infusion and the composite retained a significant volume of air in the hollow structure of the fibers. Due to the retained air, the dielectric constant, k, of the composite material was in the range of 1.7–2.7, depending on the fiber volume fraction, and these values are significantly lower than the conventional silicon dioxide or epoxy, or polymer dielectric insulators. The coefficient of thermal expansion (CTE) of the 30 wt % composite was 67.4 ppm/°C; this value is low enough for electronic application and similar to the value of silicon materials or polyimides used in printed circuit boards. The water absorption of the AESO polymer was 0.5 wt % at equilibrium and the diffusion coefficient in the KFS composites was dependent on the keratin fiber content. The incorporation of keratin fibers in the soy oil polymer enhanced the mechanical properties such as storage modulus, fracture toughness, and flexural properties, ca. 100% increase at 30 vol %. The fracture energy of a single keratin fiber in the composite was determined to be about 3 kJ/m2 with a fracture stress of about 100–200 MPa. Considerable improvements in the KFS composite properties should be possible by optimization of the resin structure and fiber selection. © 2005 Wiley Periodicals, Inc. J Appl Polym Sci 95: 1524–1538, 2005 相似文献
4.
New thermosetting resins for applications of sheet‐molding compounds (SMCs) were successfully synthesized from linseed oil, which is the most molecularly unsaturated of all plant oils. The carbon–carbon double bonds were opened by epoxidation, followed by acrylation, and then maleinization, which provided more crosslink sites and added acid functionality on the triglyceride molecules to develop thickening. Dynamic mechanical analysis showed that the storage modulus of these new polymers was approximately 2.5 GPa at 30°C, and the glass‐transition temperature was above 100°C. During maturation the resins reached a molding viscosity quickly and stayed stable. Mechanical tests showed a flexural strength of 100 MPa and a flexural modulus of 2.8 GPa. Thermogravimetric analysis showed a single degradation ranging from 300°C–480°C, which was a result of the carbonization of the crosslinked network. These bio‐based resins are promising as replacements of some petroleum‐based resins in the SMC industry. © 2005 Wiley Periodicals, Inc. J Appl Polym Sci, 2006 相似文献
5.
6.
Boris Kapilevich Yosef Pinhasi Ruth Arusi Michael Anisimov Danny Hardon Boris Litvak Yan Wool 《Journal of Infrared, Millimeter and Terahertz Waves》2010,31(11):1370-1381
A single-pixel imaging remote sensor operating at 330 GHz is described. It is based on a frequency modulated continuous wave
(FMCW) and aimed at detection of concealed objects for ranges up to 40 m. The system consists of 2 horn-lens antennas integrated
with a homodyne transceiver. The synthesized linear FMCW signal at X-band is multiplied by a factor of 32 to generate the
transmitted signal. An intermediate frequency (IF) signal obtained in the output port of the 2-nd harmonic mixer is employed
for image processing. Distance measurements were made by performing data acquisition unit based on LabView interface and resulting
in a range resolution about 1 cm. Examples of 2D and 3D images reconstructed with this sensor are presented. 相似文献
7.
Lior Miller Amir Avishai Wayne D. Kaplan 《Journal of the American Ceramic Society》2006,89(1):350-353
The solubility of Mg in alumina was measured using wavelength-dispersive spectroscopy mounted on a scanning electron microscope. Careful calibration of the microscope's working conditions was performed in order to optimize the detection limit and accuracy. Measurements were conducted on water-quenched and furnace-cooled samples, without any thermal or chemical etching to avoid alteration of the bulk concentration. The results indicate the solubility limit of Mg in alumina to be 132±11 ppm at 1600°C. 相似文献
8.
9.
The problem we address is how to communicate securely with a set of users (the target set) over an insecure broadcast channel. This problem occurs in two application domains: satellite/cable pay TV and the Internet MBone. In these systems, the parameters of major concern are the number of key transmissions and the number of keys held by each receiver. In the Internet domain, previous schemes suggest building a separate key tree for each multicast program, thus incurring a setup cost of at least k log k per program for target sets of size k. In the pay TV domain, a single key structure is used for all programs, but known theoretical bounds show that either very long transmissions are required, or that each receiver needs to keep prohibitively many keys. Our approach is targeted at both domains. Our schemes maintain a single key structure that requires each receiver to keep only a logarithmic number of establishment keys for its entire lifetime. At the same time our schemes admit low numbers of transmissions. In order to achieve these goals, and to break away from the theoretical bounds, we allow a controlled number of users outside the target set to occasionally receive the multicast. This relaxation is appropriate for many scenarios in which the encryption is used to force consumers to pay for a service, rather than to withhold sensitive information. For this purpose, we introduce f-redundant establishment key allocations, which guarantee that the total number of recipients is no more than f times the number of intended recipients. We measure the performance of such schemes by the number of key transmissions they require, by their redundancy f, and by the probability that a user outside the target set (a free-rider) will be able to decrypt the multicast. We prove a new lower bound, present several new establishment key allocations, and evaluate our schemes' performance by extensive simulation 相似文献
10.
Shavitt Y. Xiaodong Sun Wool A. Yener B. 《Selected Areas in Communications, IEEE Journal on》2004,22(1):67-78
Distance estimation is important to many Internet applications. It can aid a World Wide Web client when selecting among several potential candidate servers or among candidate peer-to-peer servers. It can also aid in building efficient overlay or peer-to-peer networks that react dynamically to changes in the underlying Internet. One of the approaches to distance (i.e., time delay) estimation in the Internet is based on placing tracer stations in key locations and conducting measurements between them. The tracers construct an approximated map of the Internet after processing the information obtained from these measurements. This work presents a novel algorithm, based on algebraic tools, that computes additional distances, which are not explicitly measured. As such, the algorithm extracts more information from the same amount of measurement data. Our algorithm has several practical impacts. First, it can reduce the number of tracers and measurements without sacrificing information. Second, our algorithm is able to compute distance estimates between locations where tracers cannot be placed. To evaluate the algorithm's performance, we tested it both on randomly generated topologies and on real Internet measurements. Our results show that the algorithm computes up to 50%-200% additional distances beyond the basic tracer-to-tracer measurements. 相似文献