首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36篇
  免费   1篇
  国内免费   2篇
电工技术   4篇
化学工业   4篇
建筑科学   1篇
能源动力   3篇
轻工业   4篇
无线电   10篇
一般工业技术   7篇
冶金工业   3篇
自动化技术   3篇
  2023年   3篇
  2022年   4篇
  2021年   6篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2017年   3篇
  2016年   1篇
  2015年   2篇
  2014年   1篇
  2013年   1篇
  2012年   1篇
  2011年   2篇
  2010年   4篇
  2009年   1篇
  2008年   2篇
  2005年   1篇
  2003年   1篇
  1996年   1篇
  1993年   1篇
  1992年   1篇
排序方式: 共有39条查询结果,搜索用时 0 毫秒
31.
Sudha  Priya  Tun  K. S.  Gupta  M.  Kumar  Gulshan  Vincent  S. 《Journal of Applied Electrochemistry》2022,52(7):1109-1120
Journal of Applied Electrochemistry - In the present investigation, biocorrosion behaviour of novel Mg-based multicomponent low-entropy alloy (Mg70Al18Zn6Ca4Y2 LEA), fabricated using disintegrated...  相似文献   
32.
Mesoporous carbon is a promising material having multiple applications. It can act as a catalytic support and can be used in energy storage devices. Moreover, mesoporous carbon controls body’s oral drug delivery system and adsorb poisonous metal from water and various other molecules from an aqueous solution. The accuracy and improved activity of the carbon materials depend on some parameters. The recent breakthrough in the synthesis of mesoporous carbon, with high surface area, large pore-volume, and good thermostability, improves its activity manifold in performing functions. Considering the promising application of mesoporous carbon, it should be broadly illustrated in the literature. This review summarizes the potential application of mesoporous carbon in many scientific disciplines. Moreover, the outlook for further improvement of mesoporous carbon has been demonstrated in detail. Hopefully, it would act as a reference guidebook for researchers about the putative application of mesoporous carbon in multidimensional fields.  相似文献   
33.
In this study, a simple C0 isoparametric finite element formulation based on higher-order shear deformation theory is presented for static analysis of functionally graded material sandwich shells (FGMSS). To characterize the membrane-flexure behavior observed in a functionally graded shell, a displacement field involving higher-order terms in in-plane and transverse fields is considered. The proposed kinematics field incorporates for transverse normal deformation, transverse shear deformation, and nonlinear variation of the in-plane displacement field through the thickness to predict the overall response of the shell in an accurate sense. To develop the efficient C0 formulation, the derivatives of transverse displacement are treated as independent field variables (nodal unknowns). Voigt's rule of mixture is employed to ascertain the mechanical properties of each layer's constituents along the thickness direction. A wide range of numerical problems are solved assuming various parameters: side-thickness ratio, curvature-side ratio, and gradation parameter, and their interactions with regard to static analysis of FGMSS are discussed in brief. Deflection and stresses incorporating different thickness schemes of sandwich shells are presented in the form of figures. To validate the results, a functionally graded shell without sandwich arrangement is considered. Since no results are available on static analysis of FGMSS, the present 2D model based on the finite element method might be helpful in assessing the applicability of other analytical and numerical models in this area in the future.  相似文献   
34.
Journal of Materials Science: Materials in Electronics - The present study portrays structural, magnetic, electrical, optical and electronic characteristics of polycrystalline pristine and...  相似文献   
35.
An android application requires specific permissions from the user to access the system resources and perform required functionalities. Recently, the android market has experienced exponential growth, which leads to malware applications. These applications are purposefully developed by hackers to access private data of the users and adversely affect the application usability. A suitable tool to detect malware is urgently needed, as malware may harm the user. As both malware and clean applications require similar types of permissions, so it becomes a very challenging task to differentiate between them. A novel algorithm is proposed to identify the malware‐based applications by probing the permission patterns. The proposed method uses the k‐means algorithm to quarantine the malware application by obtaining permission clusters. An efficiency of 90% (approx.) is attained for malicious behaviour, which validates this work. This work substantiates the use of application permissions for potential applications in android malware detection.  相似文献   
36.
A new 2D analytical drain current model is presented for symmetric double-gate fully depleted nanoscale SOI MOSFETs. Investigation of device parameters like transconductance for double-gate fully depleted nanoscale SOI MOSFETs is also carried out. Finally this work is concluded by modeling the cut-off frequency, which is one of the main figures of merit for analog/RF performance for double-gate fully depleted nanoscale SOI MOSFETs. The results of the modeling are compared with those obtained by a 2D ATLAS device simulator to verify the accuracy of the proposed model.  相似文献   
37.

To ensure confidentiality and efficient network bandwidth, digital data must be compressed and encrypted. In most communication systems, these two factors are critical for information processing. Image compression and encryption may result in lower restoration quality and performance. Secure-JPEG is an effort to create a compression and encryption technique for digital data. This approach is based on the JPEG compression standard, which is the most extensively used lossy compression scheme. It enhances the usual JPEG compression algorithm to encrypt data during compression. The Secure-JPEG approach encrypts the data while it is compressed, and it may be easily modified to offer near lossless compression. Lossless compression, on the other hand, has a lower compression ratio and is only useful in certain situations. The paper addresses the issue of insufficient security as a result of the usage of a simple random number generator that is not cryptographically safe. The enhanced security characteristics are provided via the Generalized Bernoulli Shift Map, which has a chaotic system with proven security. Several cryptographic tests are used to validate the algorithm's security, and the chaotic system's behavior is also examined.

  相似文献   
38.
A two-unit cold standby system with an expert repairman and his assistant is examined. If the expert repairman is busy in repairing a failed unit and at that time the second unit fails, the assistant repairman repairs the latter unit. The assistant repairman needs or does not need instructions for doing repair with probability p and q, respectively. Using a regenerative point technique, various measures of system effectiveness are obtained.  相似文献   
39.
This paper deal with a two-server, two-unit redundant system in which one unit is operative and the other is a warm standby. The operative unit can fail completely, either directly from the normal state or via a partial failure, while the warm standby unit only fails due to minor faults within it. One repairman is “regular”, he always remains with the system, and the other is an “expert” who is called when needed. The system has been analysed to determine the various reliability measures by using semi-Markov processes and regenerative processes. Numerical results and some graphs pertaining to a particular case are also included.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号