首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   201篇
  免费   18篇
  国内免费   1篇
电工技术   2篇
化学工业   35篇
金属工艺   13篇
机械仪表   9篇
建筑科学   6篇
能源动力   5篇
轻工业   40篇
水利工程   4篇
石油天然气   1篇
无线电   26篇
一般工业技术   32篇
冶金工业   6篇
原子能技术   1篇
自动化技术   40篇
  2023年   8篇
  2022年   17篇
  2021年   16篇
  2020年   8篇
  2019年   9篇
  2018年   10篇
  2017年   13篇
  2016年   20篇
  2015年   8篇
  2014年   20篇
  2013年   12篇
  2012年   13篇
  2011年   10篇
  2010年   14篇
  2009年   9篇
  2008年   6篇
  2007年   5篇
  2006年   2篇
  2005年   6篇
  2003年   1篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1997年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1981年   1篇
排序方式: 共有220条查询结果,搜索用时 15 毫秒
1.
2.
Utilizing CO2 in an electro-chemical process and synthesizing value-added chemicals are amongst the few viable and scalable pathways in carbon capture and utilization technologies.CO2 electro-reduction is also counted as one of the main options entailing less fossil fuel consumption and as a future electrical energy storage strategy.The current study aims at developing a new electrochemical platform to produce low-carbon e-biofuel through multifunctional electrosynthesis and integrated co-valorisation of biomass feedstocks with captured CO2.In this approach,CO2 is reduced at the cathode to produce drop-in fuels(e.g.,methanol)while value-added chemicals(e.g.,selective oxidation of alcohols,aldehydes,carboxylic acids and amines/amides)are produced at the anode.In this work,a numerical model of a continuous-flow design considering various anodic and cathodic reactions was built to determine the most techno-economically feasible configurations from the aspects of energy efficiency,environment impact and economical values.The reactor design was then optimized via parametric analysis.  相似文献   
3.
The Discrete Cosine Transform (DCT) is one of the most widely used techniques for image compression. Several algorithms are proposed to implement the DCT-2D. The scaled SDCT algorithm is an optimization of the DCT-1D, which consists in gathering all the multiplications at the end. In this paper, in addition to the hardware implementation on an FPGA, an extended optimization has been performed by merging the multiplications in the quantization block without having an impact on the image quality. A simplified quantization has been performed also to keep higher the performances of the all chain. Tests using MATLAB environment have shown that our proposed approach produces images with nearly the same quality of the ones obtained using the JPEG standard. FPGA-based implementations of this proposed approach is presented and compared to other state of the art techniques. The target is an an Altera Cyclone II FPGA using the Quartus synthesis tool. Results show that our approach outperforms the other ones in terms of processing-speed, used resources and power consumption. A comparison has been done between this architecture and a distributed arithmetic based architecture.  相似文献   
4.
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.  相似文献   
5.
Editors’ note     

Editorial Note

Editors’ note  相似文献   
6.
Mobile Ad-hoc NETworks (MANET) are infrastructureless networks where self-configuring mobile nodes are connected by wireless links. Because of its decentralized operation, these nodes rely on each other to store and forward packets. Video transmission over MANETs is more challenging than over conventional wireless networks due to rapid topology changes and lack of central administration. Most of the proposed MANET protocols assume that all nodes are working within a cooperative and friendly network context. However, misbehaving nodes that exhibit abnormal behaviors can disrupt the network operation and affect the network availability by refusing to cooperate to route packets due to their selfish or malicious behavior. In this paper, we examine the effect of packet dropping attacks on video transmission over MANETs. We also study the effects of mitigation using intrusion detection systems to MANET in presence of video traffic. To the best of our knowledge, this is the first attempt to study multimedia over such environments. We propose a novel intrusion detection system, which is an adaptive acknowledgment scheme (AACK) with the ability to detect misbehaved nodes and avoid them in other transmissions. The aim of AACK scheme is to overcome watchdog weaknesses due to collisions and limited transmission power and also to improve TWOACK scheme. To demonstrate the performance of our proposed scheme, simulation experiments are performed. The results of our experiments show that MPEG4 is more suitable for our simulation environment than H264 video traffic. The simulation results show that AACK scheme provides better network performance with less overhead than other schemes; it also shows that AACK outperforms both TWOACK and watchdog in video transmission applications in the presence of misbehaving nodes.  相似文献   
7.
Electrogenerated cyanomethylanions obtained by reduction of dry acetonitrile at a steel grid cathode were used to promote the addition of ethyl bromoacetate to thiourea derivatives. The reaction yields the corresponding 2-imino-1,3-thiazolidin-4-one. The reaction pathway was discussed based on the kinetic and thermodynamic data obtained by computational methods. In addition, the biological activity of these new compounds was also investigated.  相似文献   
8.
9.
This paper studies the behavior of the low‐complexity switch‐and‐examine diversity combining (SEC) and switch‐and‐examine diversity combining with post‐examine selection (SECps) antenna selection schemes with interference. In this paper, we first derive the cumulative distribution function (CDF) of the end‐to‐end (e2e) signal‐to‐interference plus noise ratio at the selection scheme combiner output. This CDF is then used to derive closed‐form expressions for the e2e outage and symbol error probabilities for the independent nonidentically distributed and independent identically distributed cases of diversity branches. In the analysis, the channels of the desired user and the interferers are assumed to follow Rayleigh distribution. Furthermore, to have more details about the system insights, the performance is evaluated at the high signal‐to‐noise ratio (SNR) values where the diversity order and coding gain are derived and analyzed. The derived analytical and asymptotic results are validated via a comparison with Monte‐Carlo simulations. Main findings show that with interference power does not scale with average SNR; the system can still achieve performance gain when more receive antennas are used. This happens at the values of switching threshold that are close to average SNR. Also, results illustrate that the interference is noticeably affecting the gain achieved in system performance when more antennas are used. Furthermore, findings show that the SECps selection scheme outperforms the conventional SEC scheme when more antennas are added with the switching threshold is much larger than the average SNR. Finally, findings show that the SEC and SECps antenna selection schemes are efficient for systems which operate at the range of low SNR values and this makes them attractive candidates to be implemented in the emerging mobile broadband communication systems. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
10.
The ultra-precision dicing of hard and brittle materials causes high wear on the abrasive tool which results in the deterioration of blade cross section as well as the decrease of diamond grain exposure. Resin-bonded diamond blades are used due to their in-process self-sharpening capability. Nevertheless, the shape of the blade cross section generated by self-sharpening is random which leads to poor accuracy when precise grooves need to be produced. Metal-bonded diamond blades feature higher tool lifetime and shape accuracy compared to resin-bonded blades, but are not capable of performing self-sharpening. In this study, the laser dressing of metal-bonded diamond blades is investigated to enable their use in the ultra-precision dicing of hard and brittle materials by continuous laser dressing. We investigated laser dressing with and without the presence of cooling water. The sharpness (grain exposure) after dressing is measured by the cutting face surface roughness. The dicing performance is evaluated by observing the dicing results in terms of cutting depth consistency and by monitoring the spindle power during dicing. Dicing blades which have been laser dressed in an environment with coolant feature less grain exposure than dicing blades which have been laser dressed in dry condition. The dicing results show an improvement in the sharpness and durability of laser-dressed dicing blades in comparison with new or conventionally dressed blades. The ability to apply and perform laser dressing on a dicing machine in an environment with coolant shows the feasibility of laser technology for continuous dressing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号