全文获取类型
收费全文 | 334篇 |
免费 | 9篇 |
国内免费 | 1篇 |
学科分类
工业技术 | 344篇 |
出版年
2023年 | 3篇 |
2022年 | 11篇 |
2021年 | 13篇 |
2020年 | 3篇 |
2019年 | 11篇 |
2018年 | 15篇 |
2017年 | 12篇 |
2016年 | 9篇 |
2015年 | 7篇 |
2014年 | 9篇 |
2013年 | 24篇 |
2012年 | 16篇 |
2011年 | 15篇 |
2010年 | 17篇 |
2009年 | 24篇 |
2008年 | 18篇 |
2007年 | 23篇 |
2006年 | 20篇 |
2005年 | 10篇 |
2004年 | 8篇 |
2003年 | 15篇 |
2002年 | 11篇 |
2001年 | 6篇 |
2000年 | 8篇 |
1998年 | 3篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1990年 | 2篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1985年 | 4篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有344条查询结果,搜索用时 0 毫秒
1.
Reusability of software, regardless of its utilizing technique, is widely believed to be a promising means for improving software productivity and reliability. However it is not practiced adequately due to the lack of techniques that facilitate the locating of reusable components that are functionally close. In this paper we apply Kohonen's Self-Organizing Maps to develop an approach for promoting Software Reuse. We look at the details of how Self-Organization can arrange and regularize data from the original pattern space into a topology preserving map. We describe a practical implementation of the SOM methodology for Software Reuse using a database of UNIX commands. And finally we briefly present our proposed Software Reuse Methodology. 相似文献
2.
Sachin Singh Sushil Puradkar Yugyung Lee 《Information Systems and E-Business Management》2006,4(4):421-439
Ubiquitous computing refers to building a global computing environment where seamless and invisible access to computing resources is provided to the user. Pervasive computing deals with acquiring context knowledge from the environment and providing dynamic, proactive and context-aware services to the user. A Ubiquitous computing environment is created by sharing knowledge and information between Pervasive computing environments. In this paper we propose a framework that uses the potential of the Semantic Web to weave Pervasive computing environments into a Ubiquitous computing environment. We discuss how the collaboration of these Pervasive environments can create an effective Ubiquitous computing environment referred herein as the Integrated Global Pervasive Computing Framework (IGPF). We test the effectiveness of the Ubiquitous environment through a small scenario from a prototype system that we have implemented over this framework to handle medical emergency scenario. 相似文献
3.
Simulation study of the effect of wall roughness on the dynamics of granular flows in rotating semicylindrical chutes 下载免费PDF全文
Sushil S. Shirsath Johan T. Padding J. A. M. Kuipers Herman J. H. Clercx 《American Institute of Chemical Engineers》2015,61(7):2117-2135
A discrete element model (DEM) is used to investigate the behavior of spherical particles flowing down a semicylindrical rotating chute. The DEM simulations are validated by comparing with particle tracking velocimetry results of spherical glass particles flowing through a smooth semicylindrical chute at different rotation rates of the chute. The DEM model predictions agree well with experimental results of surface velocity and particle bed height evolution. The validated DEM model is used to investigate the influence of chute roughness on the flow behavior of monodisperse granular particles in rotating chutes. To emulate different base roughnesses, a rough base is constructed out of a square close packing of fixed spherical particles with a diameter equal to, smaller, or larger than the flowing particles. Finally, the DEM model is used to study segregation in a binary density mixture for different degrees of roughness of the chute. © 2015 American Institute of Chemical Engineers AIChE J, 61: 2117–2135, 2015 相似文献
4.
Abstract To demonstrate the Pancharatnam phase as a geometric (Berry's) phase, each polarization state must be obtained by projecting the previous state on it. We describe a simple interferometric arrangement for such a demonstration which only uses a single rotation linear analyser to introduce a continuously variable phase difference between the two beams. 相似文献
5.
Sundar Kunwar Puran Pandey Mao Sui Sushil Bastola 《Science and Technology of Advanced Materials》2018,19(1):160-173
Alloy nanoparticles (NPs) can offer a wide range of opportunities for various applications due to their composition and structure dependent properties such as multifunctionality, electronic heterogeneity, site-specific response, and multiple plasmon resonance bands. In this work, the fabrication of self-assembled PdxAg1-x NPs alloy nanostructures with distinct size, density, shape, and composition is demonstrated via the solid-state dewetting of sputtered Pd/Ag thin films on c-plane sapphire. The initial stage of bilayer dewetting exhibits the nucleation of voids, followed by the expansion of voids and cluster breakdown and finally shape transformation along with the temperature control. Bilayer composition shows a substantial influence on the dewetting such that the overall dewetting is enhanced along with the increased Ag composition, i.e. Pd0.25Ag0.75 > Pd0.5Ag0.5 > Pd0.75Ag0.25. On the other hand, the size and density of NPs can be efficiently controlled by varying the initial thickness of bilayers. Reflectance peaks in UV and near-infrared (NIR) regions and a wide absorption band in the visible region arisen from the surface plasmon resonance are observed in reflectance spectra. The peak intensity depends on the composition of PdxAg1-x NPs and the NIR peaks gradually blue-shift with the size decrement. 相似文献
6.
7.
8.
Minimum-cost network hardening using attack graphs 总被引:3,自引:0,他引:3
In defending one’s network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemingly well-guarded network through a multi-step intrusion, in which each step prepares for the next. Attack graphs can reveal the threat by enumerating possible sequences of exploits that can be followed to compromise given critical resources. However, attack graphs do not directly provide a solution to remove the threat. Finding a solution by hand is error-prone and tedious, particularly for larger and less secure networks whose attack graphs are overly complicated. In this paper, we propose a solution to automate the task of hardening a network against multi-step intrusions. Unlike existing approaches whose solutions require removing exploits, our solution is comprised of initially satisfied conditions only. Our solution is thus more enforceable, because the initial conditions can be independently disabled, whereas exploits are usually consequences of other exploits and hence cannot be disabled without removing the causes. More specifically, we first represent given critical resources as a logic proposition of initial conditions. We then simplify the proposition to make hardening options explicit. Among the options we finally choose solutions with the minimum cost. The key improvements over the preliminary version of this paper include a formal framework of the minimum network hardening problem, and an improved one-pass algorithm in deriving the logic proposition while avoiding logic loops. 相似文献
9.
This paper describes data mining and data warehousing techniques that can improve the performance and usability of Intrusion
Detection Systems (IDS). Current IDS do not provide support for historical data analysis and data summarization. This paper
presents techniques to model network traffic and alerts using a multi-dimensional data model and star schemas. This data model was used to perform network security analysis and detect denial of service attacks. Our data model can also
be used to handle heterogeneous data sources (e.g. firewall logs, system calls, net-flow data) and enable up to two orders
of magnitude faster query response times for analysts as compared to the current state of the art. We have used our techniques
to implement a prototype system that is being successfully used at Army Research Labs. Our system has helped the security
analyst in detecting intrusions and in historical data analysis for generating reports on trend analysis.
Recommended by: Ashfaq Khokhar 相似文献
10.
Sushil K. Singh 《Canadian Metallurgical Quarterly》2006,132(1):77-79
A computationally simple kernel method is proposed for obtaining drawdowns due to unsteady pumping of large diameter wells. The kernels can be worked out even on a hand-held calculator. The new method can also be used to obtain residual drawdowns. The new method yields results as good as those obtained using earlier methods. 相似文献