首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   102篇
  免费   5篇
  国内免费   1篇
电工技术   1篇
化学工业   22篇
机械仪表   2篇
建筑科学   5篇
能源动力   17篇
轻工业   5篇
无线电   16篇
一般工业技术   15篇
冶金工业   3篇
自动化技术   22篇
  2023年   5篇
  2022年   6篇
  2021年   8篇
  2020年   3篇
  2019年   5篇
  2018年   5篇
  2017年   5篇
  2016年   4篇
  2015年   6篇
  2014年   3篇
  2013年   5篇
  2012年   8篇
  2011年   10篇
  2010年   10篇
  2009年   4篇
  2008年   4篇
  2007年   1篇
  2006年   2篇
  2005年   5篇
  2004年   1篇
  2002年   1篇
  1996年   1篇
  1995年   1篇
  1993年   1篇
  1991年   1篇
  1989年   1篇
  1981年   1篇
  1976年   1篇
排序方式: 共有108条查询结果,搜索用时 390 毫秒
81.
Drilling of hybrid Al-5%SiCp-5%B4Cp metal matrix composites   总被引:1,自引:0,他引:1  
Hybrid metal matrix composites consist of at least three constituents—a metal or an alloy matrix and two reinforcements in various forms, bonded together at the atomic level in the composite. Despite their higher specific properties (properties/unit weight) of strength and stiffness, the nonhomogeneous and anisotropic nature combined with the abrasive reinforcements render their machining difficult. The work piece may get damaged and the cutting tools experience high wear rates, which may lead to an uneconomical production process or even make the process impossible. This work reports on the drilling of Al-5%SiCp-5%B4Cp hybrid composite with high-speed steel (HSS), not expensive PCD, or carbide drills in an attempt to explore the viability of the process. Drilling of Al-5%SiC-5%B4C composites with HSS drills is possible with lower speed and feed combination. The cutting conditions for minimized tool wear and improved surface finish are identified. Characterization of tool wear and surface integrity are also carried out.  相似文献   
82.
83.
The authors report a method for the reduction of the near-end echo in the subscriber loop environment for primary-rate ISDN full-duplex data transmission. The technique uses an RC network as the matching input line impedance at the transmitter to reduce the near-end echo. Data rates ranging from the ISDN basic rate with (2B+D) channels to primary rate with (23B+D) channels are covered. The results indicate that a single basic configuration for the balancing line impedance may be adapted to keep the transhybrid loss in the range of about 22 dB in the worst case over the entire frequency range of interest. The balancing procedure for the hybrid takes place in a training sequence during which the component values of the RC matching circuit are adjusted from their initial values by an iterative adaptation procedure. Two techniques for optimizing the component values have been verified. For all cases examined, including worst-case line configurations, the components of the RC matching circuit have converged to final values, for which the minimum transhybrid loss had a maximum above 20 dB  相似文献   
84.
Heat transfer enhancement by modifying the surface of tubes is commonly practiced throughout the world. Grooves, dimples, flutes or corrugations are placed inside and outside the surface of tubes and channels for enhancement. In this article, a novel method for heat transfer enhancement by varying the spacing between the tubes is reported. A comparison is made between the heat transfer performance of plain tubes and dimpled tubes at different spacings. For analysis, an experimental setup is fabricated and assembled. The flow is externally forced laminar flow of air over a hot tube maintained at constant temperature. Four different velocities of air 0.4, 0.6, 0.8, and 1.0 m/s are considered in this study. Tube surface temperature, heat transfer coefficient, heat transfer rate and Nusselt number are the parameters studied to analyze the thermal behavior of tubes at different spacings of 1.0, 1.5, 2.0, 2.5, 3.0, and 3.5 cm. From the experimental investigation it is found that, apart from heat transfer enhancement by providing dimples on the tube surfaces, there is an optimal spacing between the tubes after which no further improvement is obtained. In this study, 3.0 cm is found to be the optimal spacing for both plain and dimpled tubes. However, the percentage value of heat transfer enhancement is greater with optimal spacing and for all velocities of air in dimpled tubes.  相似文献   
85.
This paper explores the constraints on the design of twowire repeaterless digital subscriber loop (DSL) systems. Broadly categorized, the design depends on the technical feasibility of the approach used to achieve two-wire transmission, constraints related to compatibility with other systems sharing the same cable, and immunity to central office noise. Each of these varies With the choice of system parameters including the transmission rate, transmit power, choice of line codes, etc. Technical feasibility is evaluated by computer simulation studies. Compatibility with other systems is explored by crosstalk calculations. Noise immunity considerations, as they translate into digital line power levels, are also explored.  相似文献   
86.
A microfluidic dispensing device that is capable of generating droplets with volumes varying between 1 nL and 50 pL at an ejection frequency of up to 6 kHz is presented. In this device, a piezoactuator pushes onto an elastic membrane via piston tips; the mechanical bending of the membrane generates a pressure pulse pushing droplets out. An analytical model was developed solving bending characteristics of a plate-actuated fluidic dispensing system and used to calculate the displaced volume. The model was extended to perform stress analysis to find the optimum piston tip radius by minimizing design stresses. The optimum piston tip radius was found to be 67% of the chamber radius. The actuation force estimated using the analytical model was then used as input to a finite element model of the dispenser. A detailed numerical analysis was then performed to model the fluid flow and droplet ejection process and to find critical geometric and operating parameters. Results from both models were used together to find the best design parameters. The device contains three layers, a silicon layer sandwiched between two polydimethylsiloxane (PDMS) polymer layers. Silicon dry etching, together with PDMS soft lithography, was used to fabricate the chip. PDMS oxygen plasma bonding is used to bond the layers. Prototypes developed were successfully tested to dispense same-sized droplets repeatedly without unwanted droplets. The design allows easy expansion and simultaneous dispensing of fluids.$hfill$[2009-0099]   相似文献   
87.

In the present work, mechanical alloying was used to prepare Al-20wt.% Al2O3 metal-matrix nanocomposites having up to 4wt.% ZrO2 at the expense of Al2O3. The powders were milled for different time intervals. To characterize the powders after milling, x-ray diffraction and transmission electron microscopy were used to identify the phase composition, crystallite size and morphology. In order to study the sinterability, the milled powders were cold pressed and sintered in argon atmosphere at different firing temperatures up to 470 °C for 1 h. The relative density and apparent porosity of the sintered composites were determined according to Archimedes principle. Moreover, the microstructure was examined by a scanning electron microscope attached with an energy dispersive spectrometer (EDS). Microhardness and AC conductivity of sintered composites were also measured. The results pointed out that the increasing of milling time is responsible for uniform distribution of Al2O3-ZrO2 particles in the Al matrix as well as remarkable increases in relative density, microhardness and AC conductivity of the sintered specimens. Also, the relative density was affected considerably by the increasing of sintering temperature. Moreover, increasing of ZrO2 content led to a significant decrease in the crystal size of the milled powders and increase in the microhardness of the sintered compacts. No changes were observed on the conductivity after addition of ZrO2.

  相似文献   
88.
Journal of Materials Science: Materials in Electronics - Polymer composite (PC) films comprising polyvinyl alcohol (PVA) and poly(3,4-ethylene dioxythiophene):poly(styrene sulfonate) (PEDOT:PSS)...  相似文献   
89.
In order to ensure secure sharing of resources in an ad-hoc network of handheld devices in a multimedia and ubiquitous computing environment, mutual collaboration is essential. However, the limitations, such as poor storage and computational capability of these multimedia and ubiquitous devices stand as the bottleneck for effective sharing of resources. As a result of this drawback, the adversaries are obtaining access to the new doors for security breaches. Mutual Trust is the weapon used to combat security violations by restricting malicious devices from participating in any interaction in such an open and dynamic environment. In this paper, we present a context-specific and reputation-based trust model along with a brief survey and a comparative study of the existing trust models found in the literature. To the best of our knowledge, our model is the first formal trust model for multimedia and ubiquitous computing, which incorporates multi-hop recommendation capability and flexible behavioral model to handle interactions among devices. The other major contribution of this universal trust model is a simple protocol for circumventing malicious recommendations and handling them for achieving accuracy. This paper also illustrates the implementation and evaluation detailed of our proposed omnipresent formal trust model.  相似文献   
90.
One of the recent realms that gathered attention of researchers is the security issues of Radio Frequency Identification (RFID) systems that have tradeoff between controlled costs and improved efficiency. Evolvement and benefits of RFID technology signifies that it can be low-cost, efficient and secured solution to many pervasive applications. But RFID technology will not intermingle into human lives until prevailing and flexible privacy mechanisms are conceived. However, ensuring strong privacy has been an enormous challenge due to extremely inadequate computational storage of typical RFID tags. So in order to relieve tags from responsibility, privacy protection and security assurance was guaranteed by central server. In this paper, we suggest serverless, forward secure and untraceable authentication protocol for RFID tags. This authentication protocol safeguards both tag and reader against almost all major attacks without the intervention of server. Though it is very critical to guarantee untraceability and scalability simultaneously, here we are proposing a scheme to make our protocol more scalable via ownership transfer. To the best of our knowledge this feature is incorporated in the serverless system for the first time in pervasive environments. One extension of RFID authentication is RFID tag searching, which has not been given much attention so far. But we firmly believe that in near future tag searching will be a significant issue RFID based pervasive systems. So in this paper we propose a serverless RFID tag searching protocol in pervasive environments. This protocol can search a particular tag efficiently without server’s intervention. Furthermore they are secured against major security threats.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号