首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   115篇
  免费   4篇
化学工业   23篇
金属工艺   5篇
机械仪表   1篇
能源动力   2篇
轻工业   5篇
无线电   22篇
一般工业技术   23篇
冶金工业   19篇
原子能技术   1篇
自动化技术   18篇
  2023年   1篇
  2021年   1篇
  2020年   3篇
  2019年   4篇
  2018年   3篇
  2017年   5篇
  2016年   3篇
  2015年   3篇
  2014年   5篇
  2013年   2篇
  2012年   5篇
  2011年   2篇
  2010年   5篇
  2009年   6篇
  2008年   5篇
  2007年   6篇
  2006年   5篇
  2005年   5篇
  2004年   4篇
  2003年   3篇
  2002年   8篇
  2000年   1篇
  1999年   1篇
  1998年   6篇
  1997年   3篇
  1996年   2篇
  1995年   2篇
  1994年   4篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1982年   1篇
  1981年   1篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1973年   1篇
  1971年   1篇
排序方式: 共有119条查询结果,搜索用时 38 毫秒
1.
S N Maitra 《Sadhana》1985,8(4):373-385
The burn time and burnout velocity of a multistage rocket flown vertically in vacuum with constant thrust tangential to the flight path and a prescribed initial/final thrust-to-weight ratio in an arbitrary stage have been determined. The present paper also deals with optimal staging under given conditions of flight.  相似文献   
2.
This paper presents formulation of a novel block‐backstepping based control algorithm to overcome the challenges posed by the tracking and the stabilization problem for a differential drive wheeled mobile robot (WMR). At first, a two‐dimensional output vector for the WMR has been defined in such a manner that it would decouple the two control inputs and, thereby, allow the designer to formulate the control laws for the two inputs one at a time. Actually, the decoupling has been carried out in a way to convert the system into block‐strict feedback form. Thereafter, block‐backstepping control algorithm has been utilized to derive the expressions of the control inputs for the WMR system. The proposed block‐backstepping technique has further been enriched by incorporating an integral action for enhancing the steady state performance of the overall system. Global asymptotic stability of the overall system has been analyzed using Lyapunov stability criteria. Finally, the proposed control algorithm has been implemented on a laboratory scale differential drive WMR to verify the effectiveness of the proposed control law in real‐time environment. Indeed, the proposed design approach is novel in the sense that it has judiciously exploited the nonholonomic constraint of the WMR to result in a reduced order block‐backstepping controller for the WMR, and thereby, it has eventually yielded a compact expression of the control law that is amenable to real‐time implementation. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
3.
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It has been observed that a Boolean function f used as a cryptographic primitive, and interpreted as a multivariate polynomial over F/sub 2/, should not have low degree multiples obtained by multiplication with low degree nonzero functions. In this paper, we show that a Boolean function having low nonlinearity is (also) weak against algebraic attacks, and we extend this result to higher order nonlinearities. Next, we present enumeration results on linearly independent annihilators. We also study certain classes of highly nonlinear resilient Boolean functions for their algebraic immunity. We identify that functions having low-degree subfunctions are weak in terms of algebraic immunity, and we analyze some existing constructions from this viewpoint. Further, we present a construction method to generate Boolean functions on n variables with highest possible algebraic immunity /spl lceil/n/2/spl rceil/ (this construction, first presented at the 2005 Workshop on Fast Software Encryption (FSE 2005), has been the first one producing such functions). These functions are obtained through a doubly indexed recursive relation. We calculate their Hamming weights and deduce their nonlinearities; we show that they have very high algebraic degrees. We express them as the sums of two functions which can be obtained from simple symmetric functions by a transformation which can be implemented with an algorithm whose complexity is linear in the number of variables. We deduce a very fast way of computing the output to these functions, given their input.  相似文献   
4.
This paper presents the formulation of a novel block-backstepping based control algorithm to address the stabilization problem for a generalized nonlinear underactuated mechanical system. For the convenience of compact design, first, the state model of the underactuated system has been converted into the block-strict feedback form. Next, we have incorporated backstepping control action to derive the expression of the control input for the generic nonlinear underactuated system. The proposed block backstepping technique has further been enriched by incorporating an integral action additionally for enhancing the steady state performance of the overall system. Asymptotic stability of the overall system has been analyzed using Lyapunov stability criteria. Subsequently, the stability of the zero dynamics has also been analyzed to ensure the global asymptotic stability of the entire nonlinear system at its desired equilibrium point. The proposed control algorithm has been applied for the stabilization of a benchmarked underactuated mechanical system to verify the effectiveness of the proposed control law in real-time environment.  相似文献   
5.
6.
Here we study a recently proposed watermarking scheme based on the paper “Wavelet Tree Quantization” (WTQ) by Wang and Lin (IEEE Trans Image Process 13(2):154–165, 2004). In given scheme, wavelet coefficients corresponding to the same spatial locations are grouped together. Two such groups, selected at random, constitute a supertree. Some of these supertrees are quantized to embed the watermark information in the image. In the process of cryptanalysis we first identify the groups which are quantized during the watermark insertion process. Then we select the non-quantized groups and quantize them too, to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under the cipher text only jamming attack which requires only a single watermarked copy. Further, we suitably modify the WTQ scheme to make it robust against such cryptanalytic attacks.This is an extended and revised version of the paper Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme presented at the International Workshop on Distributed Computing, IWDC 2004, Kolkata, 27–30 December 2004, Lecture Notes in Computer Science, vol. 3326, pp. 219–230. Springer, Berlin Heidelberg New York (2004). Section 4 of this paper introduces a modified scheme which is an addition over the conference version. Part of this work has been done while the author T. K. Das was visiting Indian Statistical Institute, Kolkata during 2004.  相似文献   
7.
American document design process models reflect the assumption that comprehension and usability are the most important characteristics of effective documents, but it is increasingly evident that other cultures value other communicative features of documents and that purposes and intentions vary across cultures. This case study examines the responses of four sets of American readers (three sets familiar with American document design research and practice and one set of content specialists-engineers by training) to the visual aspects of an annual report. The original document was prepared for a mid-sized Japanese corporation and published and distributed in Japan; the American version is an almost literal translation of the original document from Japanese to English, with no changes in visuals, graphic design or format. Protocol analyses of readers' responses revealed distinct patterns of expectations and preferences based on (1) cultural biases, (2) degree of familiarity with the American document design model, and (3) ignorance of Japanese culture and corporate communicative practices. This study raises questions about the effectiveness in terms of cultural sensitivity of what we have called the “American” document design process model and usability testing procedures, and calls for extensive collaborative research designed to describe and analyze current practice in international settings  相似文献   
8.
In the present work the reaction between fly ash and lime in fly ash-lime compacts under water curing and steam curing conditions was studied thoroughly in relation to the processing conditions. Fly ash from different sources were collected, characterized, mixed with lime in different ratios and compacted. The compacts were cured with water and steam separately. The reduction in the free CaO content in these compacts was measured as a function of curing time and curing process. Role of two ionic additives, FeCl3 and MgCl2, on the reaction between fly ash and lime was also investigated by measuring the free CaO content. Kinetics of these reactions was studied by determining the reaction order and rate constants with respect to the free CaO content and it was observed that the curing conditions and additives affected the reaction kinetics significantly.  相似文献   
9.
Aluminosilicate precursor for the processing of mulite ceramics was synthesized chemically from inorganic salts following colloidal route. V2O5 was used as a sintering additive in different ratios with the precursor powder. The powder mixes were compacted and sintered at different elevated temperatures. The sintered masses were characterized by measuring the bulk density, porosity, flexural strength and fracture toughness. The extent of mullitization and final microstructure of the sintered masses were investigated by scanning electron microscopy and XRD analysis. It was observed that V2O5 exhibited favourable effect on the formation of properly crystallized mullite and in the improvement of different mechanical properties.  相似文献   
10.
The use of a liquid–liquid biphasic thermomorphic or temperature-dependent multicomponent solvent (TMS) system, in which the catalyst accumulates in one of the liquid phases and the product goes preferably to the other liquid phase, can be an enabling strategy of commercial hydroformylation processes with high selectivity, efficiency and ease of product separation and catalyst recovery. This paper describes the synthesis of n-nonanal, a commercially important fine chemical, by the hydroformylation reaction of 1-octene using a homogeneous catalyst consisting of HRh(PPh3)3(CO) and P(OPh)3 in a TMS-system consisting of propylene carbonate (PC), dodecane and 1,4-dioxane. At a reaction temperature of 363 K, syngas pressure of 1.5 MPa and 0.68 mM concentration of the catalyst, HRh(CO)(PPh3)3, the conversion of 1-octene and the yield of total aldehyde were 97% and 95%, respectively. With a reaction time of 2 h and a selectivity of 89.3%, this catalytic system can be considered as highly reactive and selective compared to conventional ones. The resulting total turnover number was 600, while the turnover frequency was 400 h?1. The effects of increasing the concentration of 1-octene, catalyst loading, partial pressure of CO and H2 and temperature on the rate of reaction have been studied at 353, 363 and 373 K. The rate was found to be first order with respect to concentrations of the catalyst and 1-octene, and the partial pressure of H2. The dependence of the reaction rate on the partial pressure of CO showed typical substrate inhibited kinetics. The kinetic behavior differs significantly from the kinetics of conventional systems employing HRh(CO)(PPh3)3 in organic solvents. Most notable are the lack of olefin inhibition and the absence of a critical catalyst concentration. A mechanistic rate equation has been proposed and the kinetic parameters evaluated with an average error of 5.5%. The activation energy was found to be 69.8 kJ/mol.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号