首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   166篇
  免费   9篇
  国内免费   2篇
电工技术   8篇
化学工业   36篇
金属工艺   3篇
机械仪表   4篇
建筑科学   9篇
能源动力   9篇
轻工业   6篇
水利工程   1篇
石油天然气   1篇
无线电   23篇
一般工业技术   30篇
冶金工业   8篇
原子能技术   2篇
自动化技术   37篇
  2023年   4篇
  2022年   7篇
  2021年   14篇
  2020年   6篇
  2019年   2篇
  2018年   9篇
  2017年   7篇
  2016年   4篇
  2015年   4篇
  2014年   4篇
  2013年   21篇
  2012年   13篇
  2011年   16篇
  2010年   5篇
  2009年   13篇
  2008年   16篇
  2007年   8篇
  2006年   7篇
  2005年   3篇
  2004年   4篇
  2003年   3篇
  2002年   1篇
  2001年   3篇
  1999年   1篇
  1993年   1篇
  1980年   1篇
排序方式: 共有177条查询结果,搜索用时 15 毫秒
81.
The present work addresses the problem of ensuring robust stability to time delayed plants, compensated with continuous‐time high frequency periodic controller. An efficient design methodology is proposed to synthesize the periodic controller for robust compensation of time delayed linear time‐invariant plants. The periodic controller, by virtue of its loop zero‐placement capability, is shown to achieve superior gain as well as phase/delay margin compensation, especially for non‐minimum phase plants having right half plane poles and zeros in close vicinity to each other. The periodic controller is considered in the observable canonical form which results in realizable bounded control input as well as ensuring insignificant periodic oscillations in the plant output. As a consequence, this paper, furthermore, establishes the fact that the periodic controller designed and synthesized with the proposed methodology can be implemented in real‐time with an assurance of model matching and robust zero‐error tracking. Simulation and experimental results are illustrated to establish the veracity of the claims. The closed‐loop system comprising of time‐delayed linear time‐invariant plant with the periodic controller is analyzed employing the averaging principle and presented here explicitly in a meticulous approach. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
82.
Sarkar  Arindam 《Applied Intelligence》2021,51(11):8057-8066
Applied Intelligence - The asymmetric cryptography method is typically used to transfer the key via an insecure channel while creating a key between two parties. However, since the methods using...  相似文献   
83.
Wireless Personal Communications - In the wireless sensor network, several sensor devices are distributed in an environment with a goal to collect data and then forward it to a base station which...  相似文献   
84.

In the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health security risks have also risen significantly with the rise in the use of telehealth. This paper addresses one of e-health’s key concerns, namely security. Secret sharing is a cryptographic method to ensure reliable and secure access to information. To eliminate the constraint that in the existing secret sharing schemes, this paper presents Tree Parity Machine (TPM) guided patients’ privileged based secure sharing. This is a new secret sharing technique that generates the shares using a simple mask based operation. This work considers addressing the challenges presents in the original secret sharing scheme. This proposed technique enhances the security of the existing scheme. This research introduces a concept of privileged share in which among k number of shares one share should come from a specific recipient (patient) to whom a special privilege is given to recreate the original information. In the absence of this privileged share, the original information cannot be reconstructed. This technique also offers TPM based exchange of secret shares to prevent Man-In-The-Middle-Attack (MITM). Here, two neural networks receive common inputs and exchange their outputs. In some steps, it leads to full synchronization by setting the discrete weights according to the specific rule of learning. This synchronized weight is used as a common secret session key for transmitting the secret shares. The proposed method has been found to produce attractive results that show that the scheme achieves a great degree of protection, reliability, and efficiency and also comparable to the existing secret sharing scheme.

  相似文献   
85.
In this article, we examine the effects of two different platelet sizes (4 and 8 μm respectively) on the architecture of freeze-cast sintered alumina scaffolds as a function of a wide range of freezing velocities, 5–57 μm s?1. The microstructural evolution along the freezing direction has been studied a-priori, explained on the basis of ice physics and the interaction of ceramic platelets with the advancing freezing front. An array of microstructures was produced to delve into the role of platelet sizes and freezing velocities on various structural parameters, viz. wavelength (λ), lamella thickness (δ), and bridge density (ρb). Regarding the pore morphology, transitions from lamellar to dendritic or isotropic structures were identified for the scaffolds containing smaller and bigger platelets, triggered by an increase in freezing velocity as well as platelet size. The different microstructures are quantified with a specific dimensionless parameter m. We identify the microstructure to be lamellar with low bridge density and m > 4. The wavelengths and bridge spacing were comparable for 2 < m < 4 and led to dendritic structure. For the morphologies characterized by m < 2, the spacing among the numerous interlamellar bridges was smaller than the structural wavelength and hence, the scaffolds revealed usually isotropic structure. Finally, the specific processing conditions that yield different morphologies and the parameter m are presented together in the form of a ‘morphology map’ to establish the different microstructural regimes.  相似文献   
86.
Wireless Personal Communications - Clustering is a promising solution to enhance lifetime of wireless sensor networks. Fuzzy logic is being used to address uncertainties in cluster head selection....  相似文献   
87.
Given a capacitated undirected graph G=(V,E)G=(V,E) with a set of terminals K⊂VKV, a mimicking network   is a smaller graph H=(VH,EH)H=(VH,EH) which contains the set of terminals K   and for every bipartition [U,K−U][U,KU] of the terminals, the cost of the minimum cut separating U   from K−UKU in G is exactly equal to the cost of the minimum cut separating U   from K−UKU in H.  相似文献   
88.
Computational intelligence techniques have widespread applications in the field of engineering process optimization, which typically comprises of multiple conflicting objectives. An efficient hybrid algorithm for solving multi-objective optimization, based on particle swarm optimization (PSO) and artificial bee colony optimization (ABCO) has been proposed in this paper. The novelty of this algorithm lies in allocating random initial solutions to the scout bees in the ABCO phase which are subsequently optimized in the PSO phase with respect to the velocity vector. The last phase involves loyalty decision-making for the uncommitted bees based on the waggle dance phase of ABCO. This procedure continues for multiple generations yielding optimum results. The algorithm is applied to a real life problem of intercity route optimization comprising of conflicting objectives like minimization of travel cost, maximization of the number of tourist spots visited and minimization of the deviation from desired tour duration. Solutions have been obtained using both pareto optimality and the classical weighted sum technique. The proposed algorithm, when compared analytically and graphically with the existing ABCO algorithm, has displayed consistently better performance for fitness values as well as for standard benchmark functions and performance metrics for convergence and coverage.  相似文献   
89.
90.
Effectiveness of lipase in detergency was studied using three test soils (lard, artificial sebum, and olive oil) on a woven cotton fabric. Distribution of oily soil on fabrics was determined for three different treatments (unwashed, washed with detergent without lipase, and washed with detergent plus lipase). Osmium tetroxide was used to label lipid soil for analysis in the scanning electron microscope. Both longitudinal and cross-sectional backscattered electron images for unwashed samples showed that soil was present on surfaces of the cotton fibers and in interfiber spaces of the yarn bundle. Lard soiled samples had large deposits on the fabric surfaces, while artificial sebum and olive oil appeared more uniformly distributed throughout the textile. Oil was deposited in the interfiber capillaries of the yarn bundle and in the crenulation, secondary walls, and lumen of the fibers. Energy dispersive X-ray microanalysis was used to determine relative concentrations of oil at selected morphological locations within the fiber structure and at the fiber surface. Soil distributions within the fibrous structures differed with type of soil and laundry treatment. Backscattered electron images dramatically demonstrated the effect of lipase on cleaning. After washing with detergent plus lipase, yarn surfaces had much less residual soil; residual soil that remained was in the irregularities of the cotton fiber surfaces. Concentrations of oil in the secondary walls, crenulations, lumen, and the fiber surfaces were lower after lipase treatment for all three soils. While washing with detergent removed soil from the yarn and fiber surfaces and the crenulation of the cotton fiber, only the samples washed with detergent plus lipase had lower concentrations of soils within the secondary wall and lumen of the cotton fibers. Fabrics soiled with olive oil and washed with detergent plus lipase had the lowest concentrations of residual soil across the textile structure; the residual soil observed was mainly in the irregularities on the fiber surfaces.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号