全文获取类型
收费全文 | 117篇 |
免费 | 3篇 |
国内免费 | 1篇 |
学科分类
工业技术 | 121篇 |
出版年
2023年 | 4篇 |
2022年 | 4篇 |
2021年 | 5篇 |
2020年 | 7篇 |
2019年 | 6篇 |
2018年 | 3篇 |
2017年 | 6篇 |
2016年 | 8篇 |
2015年 | 6篇 |
2014年 | 7篇 |
2013年 | 10篇 |
2012年 | 7篇 |
2011年 | 8篇 |
2010年 | 4篇 |
2009年 | 5篇 |
2008年 | 7篇 |
2007年 | 2篇 |
2006年 | 3篇 |
2005年 | 1篇 |
2004年 | 2篇 |
2003年 | 1篇 |
2002年 | 2篇 |
2001年 | 2篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1985年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有121条查询结果,搜索用时 15 毫秒
101.
In the reported work the block copolymers are used in the polymer disperse liquid crystal (PDLC) films. The present work has been performed to investigate the effect of block copolymer addition and block ratios on the PDLC characteristics. From our experimental finding, addition of block copolymer in PDLC shows variation in droplet size, electro-optical properties, extent of phase separation, and phase transition temperature. These finding indicate the alteration in solubility parameters of solutions with the addition of block copolymers. Moreover, the tri-block copolymer shows enlarge droplet size, enhancement in the degree of phase separation, and predict improvement in electro-optical properties, as compared to di-block copolymer. Similarly upon such comparison, the study suggests the tri-block copolymer have a relative lower molecular interaction with the liquid crystal molecules. 相似文献
102.
Md. Endadul Hoque Farzana Rahman Sheikh I. Ahamed Jong Hyuk Park 《Wireless Personal Communications》2010,55(1):65-79
One of the recent realms that gathered attention of researchers is the security issues of Radio Frequency Identification (RFID)
systems that have tradeoff between controlled costs and improved efficiency. Evolvement and benefits of RFID technology signifies
that it can be low-cost, efficient and secured solution to many pervasive applications. But RFID technology will not intermingle
into human lives until prevailing and flexible privacy mechanisms are conceived. However, ensuring strong privacy has been
an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags
from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we suggest
serverless, forward secure and untraceable authentication protocol for RFID tags. This authentication protocol safeguards
both tag and reader against almost all major attacks without the intervention of server. Though it is very critical to guarantee
untraceability and scalability simultaneously, here we are proposing a scheme to make our protocol more scalable via ownership
transfer. To the best of our knowledge this feature is incorporated in the serverless system for the first time in pervasive
environments. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far.
But we firmly believe that in near future tag searching will be a significant issue RFID based pervasive systems. So in this
paper we propose a serverless RFID tag searching protocol in pervasive environments. This protocol can search a particular
tag efficiently without server’s intervention. Furthermore they are secured against major security threats. 相似文献
103.
Khalil Ahmed Nudrat Zahid Raza Farzana Habib Muhammad Aijaz Muhammad Hayat Afridi 《Journal of Industrial and Engineering Chemistry》2013,19(6):1805-1810
In this article, polypropylene reinforced marble sludge (PP/MS) was prepared, and the effects of MS loading and polypropylene-g-maliec anhydride (PP-g-MAH) as compatibilizer on density, melt flow index (MFI), and mechanical properties of PP/MS composite were investigated. Our studies show that tensile strength, flexural strength and tensile modulus increased with increasing the MS loading but tensile strength increased till 30 pph of MS further addition of MS in PP composites decreased the strength. The % elongation at break and Izod Impact Strength decreased with increasing of MS loading. Studies revealed that PP/MS composites containing PP-g-MAH enhance the properties compared to without compatibilizer. 相似文献
104.
Occipital neuralgia, a painful condition thought to be caused by nerve entrapment, has been described in the general population. Athletes, particularly those who participate in collision sports, such as football, may be predisposed to this condition. An illustrative case is presented along with discussion of the differential diagnosis and treatment of this type of headache. 相似文献
105.
In this paper we suggest an alternative method for the analysis of low frequency noise of transistors based on measurements of phase noise of a test oscillator. This method is demonstrated by experimental results obtained with a simple test oscillator with HEMT, and central frequency of 13.769 GHz. The main contribution to phase noise of the test oscillator comes from up conversion of transistor LF noise. This idea and the method can be used for the selection of transistors for high frequency application or for design of test circuit in RF IC manufacture. 相似文献
106.
In this paper we present a hybrid strategy developed using genetic algorithms (GAs), simulated annealing (SA), and quantum simulated annealing techniques (QSA) for the discrete time–cost trade-off problem (DTCTP). In the hybrid algorithm (HA), SA is used to improve hill-climbing ability of GA. In addition to SA, the hybrid strategy includes QSA to achieve enhanced local search capability. The HA and a sole GA have been coded in Visual C++ on a personal computer. Ten benchmark test problems with a range of 18 to 630 activities are used to evaluate performance of the HA. The benchmark problems are solved to optimality using mixed integer programming technique. The results of the performance analysis indicate that the hybrid strategy improves convergence of GA significantly and HA provides a powerful alternative for the DTCTP. 相似文献
107.
108.
Rifat Sipahi Nejat Olgac Dimitri Breda 《International journal of systems science》2013,44(12):1445-1455
First-order linear time invariant and time-delayed dynamics of neutral type is taken into account with three rationally independent delays. There are two main contributions of this study. (a) It is the first complete treatment in the literature on the stability analysis of systems with three delays. We use a recent procedure, the cluster treatment of characteristic roots (CTCR), for this purpose. This procedure results in an exact and exhaustive stability tableau in the domain of the three delays. (b) It provides a proof of a complex concept called the delay-stabilisability (also known as strong stability) as a by-product of CTCR. Furthermore, we deploy a numerical method (infinitesimal generator approach) to approximate the dominant characteristic roots of this class of systems, which concur with the stability outlook generated by CTCR. 相似文献
109.
Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments 总被引:1,自引:0,他引:1
Sheikh I. Ahamed Author Vitae Munirul M. Haque Author Vitae Author Vitae Farzana Rahman Author Vitae Author Vitae 《Journal of Systems and Software》2010,83(2):253-270
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enabled a swift proliferation of small and very capable devices into our daily lives. With such a prevalence of pervasive computing, the interaction among portable devices needs to be continuous and invisible to device users. As these devices become better connected, collaboration among them will play a vital role in sharing resources in an ad-hoc manner. The sharing of resources works as a facilitator for pervasive devices. However, this ad hoc interaction among devices provides the potential for security breaches. Trust can fight against such security violations by restricting malicious nodes from participating in interactions. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the continuum of trust is based on identity, physical context or a combination of both. Here, we present a context specific and reputation-based trust model along with a brief survey of trust models suitable for peer-to-peer and ad-hoc environments. This paper presents a multi-hop recommendation protocol and a flexible behavioral model to handle interactions. One other contribution of this paper is the integration of an initial trust model; this model categorizes services or contexts in different security levels based on their security needs, and these security needs are considered in trust bootstrapping. The other major contribution of this paper is a simple method of handling malicious recommendations. This paper also illustrates the implementation and evaluation of our proposed formal trust model. 相似文献
110.
The supply chain (SC) is often defined as a network that is composed of different functions, including suppliers, manufacturing plants, warehouses/distribution centers, retailers and customers. A supply network (SN) is a sequence of different and multiple numbers of functions and individual functional units that must satisfy all capacities and demand requirements imposed by customers with minimum cost to the network. The most important functions of a SN are warehousing and transportation functions. This paper addresses the warehousing and transportation network design problem that involves determining the best strategy for distributing the sub-products from the suppliers to the warehouse and from the warehouse to the manufacturers. Considering some similarities between holonic systems and SN systems, a holonic approach based modeling methodology is proposed in this study. A multiple supplier, single warehouse and multiple manufacturer system are considered to be an integrated warehousing and transportation network. Consequently, a linear programming model is presented to maximize the profit of both of the overall SN and the individual functional units of the SN functions. 相似文献