首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   117篇
  免费   3篇
  国内免费   1篇
工业技术   121篇
  2023年   4篇
  2022年   4篇
  2021年   5篇
  2020年   7篇
  2019年   6篇
  2018年   3篇
  2017年   6篇
  2016年   8篇
  2015年   6篇
  2014年   7篇
  2013年   10篇
  2012年   7篇
  2011年   8篇
  2010年   4篇
  2009年   5篇
  2008年   7篇
  2007年   2篇
  2006年   3篇
  2005年   1篇
  2004年   2篇
  2003年   1篇
  2002年   2篇
  2001年   2篇
  1999年   1篇
  1998年   2篇
  1996年   1篇
  1995年   3篇
  1994年   1篇
  1992年   1篇
  1985年   1篇
  1976年   1篇
排序方式: 共有121条查询结果,搜索用时 15 毫秒
101.
In the reported work the block copolymers are used in the polymer disperse liquid crystal (PDLC) films. The present work has been performed to investigate the effect of block copolymer addition and block ratios on the PDLC characteristics. From our experimental finding, addition of block copolymer in PDLC shows variation in droplet size, electro-optical properties, extent of phase separation, and phase transition temperature. These finding indicate the alteration in solubility parameters of solutions with the addition of block copolymers. Moreover, the tri-block copolymer shows enlarge droplet size, enhancement in the degree of phase separation, and predict improvement in electro-optical properties, as compared to di-block copolymer. Similarly upon such comparison, the study suggests the tri-block copolymer have a relative lower molecular interaction with the liquid crystal molecules.  相似文献   
102.
One of the recent realms that gathered attention of researchers is the security issues of Radio Frequency Identification (RFID) systems that have tradeoff between controlled costs and improved efficiency. Evolvement and benefits of RFID technology signifies that it can be low-cost, efficient and secured solution to many pervasive applications. But RFID technology will not intermingle into human lives until prevailing and flexible privacy mechanisms are conceived. However, ensuring strong privacy has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we suggest serverless, forward secure and untraceable authentication protocol for RFID tags. This authentication protocol safeguards both tag and reader against almost all major attacks without the intervention of server. Though it is very critical to guarantee untraceability and scalability simultaneously, here we are proposing a scheme to make our protocol more scalable via ownership transfer. To the best of our knowledge this feature is incorporated in the serverless system for the first time in pervasive environments. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue RFID based pervasive systems. So in this paper we propose a serverless RFID tag searching protocol in pervasive environments. This protocol can search a particular tag efficiently without server’s intervention. Furthermore they are secured against major security threats.  相似文献   
103.
In this article, polypropylene reinforced marble sludge (PP/MS) was prepared, and the effects of MS loading and polypropylene-g-maliec anhydride (PP-g-MAH) as compatibilizer on density, melt flow index (MFI), and mechanical properties of PP/MS composite were investigated. Our studies show that tensile strength, flexural strength and tensile modulus increased with increasing the MS loading but tensile strength increased till 30 pph of MS further addition of MS in PP composites decreased the strength. The % elongation at break and Izod Impact Strength decreased with increasing of MS loading. Studies revealed that PP/MS composites containing PP-g-MAH enhance the properties compared to without compatibilizer.  相似文献   
104.
Occipital neuralgia, a painful condition thought to be caused by nerve entrapment, has been described in the general population. Athletes, particularly those who participate in collision sports, such as football, may be predisposed to this condition. An illustrative case is presented along with discussion of the differential diagnosis and treatment of this type of headache.  相似文献   
105.
In this paper we suggest an alternative method for the analysis of low frequency noise of transistors based on measurements of phase noise of a test oscillator. This method is demonstrated by experimental results obtained with a simple test oscillator with HEMT, and central frequency of 13.769 GHz. The main contribution to phase noise of the test oscillator comes from up conversion of transistor LF noise. This idea and the method can be used for the selection of transistors for high frequency application or for design of test circuit in RF IC manufacture.  相似文献   
106.
In this paper we present a hybrid strategy developed using genetic algorithms (GAs), simulated annealing (SA), and quantum simulated annealing techniques (QSA) for the discrete time–cost trade-off problem (DTCTP). In the hybrid algorithm (HA), SA is used to improve hill-climbing ability of GA. In addition to SA, the hybrid strategy includes QSA to achieve enhanced local search capability. The HA and a sole GA have been coded in Visual C++ on a personal computer. Ten benchmark test problems with a range of 18 to 630 activities are used to evaluate performance of the HA. The benchmark problems are solved to optimality using mixed integer programming technique. The results of the performance analysis indicate that the hybrid strategy improves convergence of GA significantly and HA provides a powerful alternative for the DTCTP.  相似文献   
107.
108.
First-order linear time invariant and time-delayed dynamics of neutral type is taken into account with three rationally independent delays. There are two main contributions of this study. (a) It is the first complete treatment in the literature on the stability analysis of systems with three delays. We use a recent procedure, the cluster treatment of characteristic roots (CTCR), for this purpose. This procedure results in an exact and exhaustive stability tableau in the domain of the three delays. (b) It provides a proof of a complex concept called the delay-stabilisability (also known as strong stability) as a by-product of CTCR. Furthermore, we deploy a numerical method (infinitesimal generator approach) to approximate the dominant characteristic roots of this class of systems, which concur with the stability outlook generated by CTCR.  相似文献   
109.
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enabled a swift proliferation of small and very capable devices into our daily lives. With such a prevalence of pervasive computing, the interaction among portable devices needs to be continuous and invisible to device users. As these devices become better connected, collaboration among them will play a vital role in sharing resources in an ad-hoc manner. The sharing of resources works as a facilitator for pervasive devices. However, this ad hoc interaction among devices provides the potential for security breaches. Trust can fight against such security violations by restricting malicious nodes from participating in interactions. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the continuum of trust is based on identity, physical context or a combination of both. Here, we present a context specific and reputation-based trust model along with a brief survey of trust models suitable for peer-to-peer and ad-hoc environments. This paper presents a multi-hop recommendation protocol and a flexible behavioral model to handle interactions. One other contribution of this paper is the integration of an initial trust model; this model categorizes services or contexts in different security levels based on their security needs, and these security needs are considered in trust bootstrapping. The other major contribution of this paper is a simple method of handling malicious recommendations. This paper also illustrates the implementation and evaluation of our proposed formal trust model.  相似文献   
110.
The supply chain (SC) is often defined as a network that is composed of different functions, including suppliers, manufacturing plants, warehouses/distribution centers, retailers and customers. A supply network (SN) is a sequence of different and multiple numbers of functions and individual functional units that must satisfy all capacities and demand requirements imposed by customers with minimum cost to the network. The most important functions of a SN are warehousing and transportation functions. This paper addresses the warehousing and transportation network design problem that involves determining the best strategy for distributing the sub-products from the suppliers to the warehouse and from the warehouse to the manufacturers. Considering some similarities between holonic systems and SN systems, a holonic approach based modeling methodology is proposed in this study. A multiple supplier, single warehouse and multiple manufacturer system are considered to be an integrated warehousing and transportation network. Consequently, a linear programming model is presented to maximize the profit of both of the overall SN and the individual functional units of the SN functions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号