首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   0篇
电工技术   5篇
化学工业   5篇
金属工艺   1篇
机械仪表   1篇
能源动力   3篇
轻工业   2篇
无线电   5篇
一般工业技术   15篇
冶金工业   5篇
自动化技术   17篇
  2024年   1篇
  2022年   7篇
  2021年   2篇
  2020年   2篇
  2018年   1篇
  2015年   2篇
  2014年   2篇
  2013年   4篇
  2012年   2篇
  2011年   7篇
  2010年   2篇
  2009年   2篇
  2008年   4篇
  2007年   2篇
  2006年   1篇
  2005年   4篇
  2004年   3篇
  2003年   1篇
  2002年   2篇
  2001年   2篇
  1999年   1篇
  1998年   2篇
  1996年   2篇
  1990年   1篇
排序方式: 共有59条查询结果,搜索用时 0 毫秒
41.
Topics in Catalysis - The direct formic acid fuel cell holds great promise as a next generation portable power source. Here we report an experimental study on Pt and Pd monolayer (Pt* and Pd*) atop...  相似文献   
42.
    
An advanced sub-circuit model of the punch-trough insulated gate bipolar transistor (PT IGBT) based on the physics of internal device operation has been described in this article. The one-dimensional physical model of low-gain wide-base BJT is employed based on the equivalent non-linear lossy transmission line, whereas a SPICE Level 3 model is used for the diffused MOST part. The influence of voltage dependent drain-to-gate overlapping capacitance and the conductivity modulated base (drain) ohmic resistance are modelled separately. The main advantages of novel PT IGBT model are a small set of model parameters, an easy implementation in SPICE simulator and the high accuracy confirmed by comparing the simulation results with the electrical measurements of test power circuit.  相似文献   
43.
在先前的文献中描述了一种空气冷却的测试管,该测试管拥有一系列的插座和插头(在结晶过程中使用的转换插座),可以安装在实验室箱式熔炉中。该装置的用途是调节物质在坩埚槽中结晶过程的晶面和结晶速率。在本文中我们讨论一种改进型的内部冷却器——锯齿状的空气冷却管(结晶架)。这种改进型的冷却器可以简单地搭建和操作,可以延长和弯曲成为各种形状,可以用于坩埚和熔炉管中。该冷却器可以通过简单的调控对不同结晶参数和物质同步进行结晶测试,利用实验用熔炉就可以达到从一系列新型的具有层状晶体结构的化合物中得到晶体的目的。  相似文献   
44.
Models that captures the common structure of an object class have appeared few years ago in the literature (Jojic and Caspi in Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), pp. 212?C219, 2004; Winn and Jojic in Proceedings of International Conference on Computer Vision (ICCV), pp. 756?C763, 2005); they are often referred as ??stel models.?? Their main characteristic is to segment objects in clear, often semantic, parts as a consequence of the modeling constraint which forces the regions belonging to a single segment to have a tight distribution over local measurements, such as color or texture. This self-similarity within a region in a single image is typical of many meaningful image parts, even when across different images of similar objects, the corresponding parts may not have similar local measurements. Moreover, the segmentation itself is expected to be consistent within a class, although still flexible. These models have been applied mostly to segmentation scenarios. In this paper, we extent those ideas (1) proposing to capture correlations that exist in structural elements of an image class due to global effects, (2) exploiting the segmentations to capture feature co-occurrences and (3) allowing the use of multiple, eventually sparse, observation of different nature. In this way we obtain richer models more suitable to recognition tasks. We accomplish these requirements using a novel approach we dubbed stel component analysis. Experimental results show the flexibility of the model as it can deal successfully with image/video segmentation and object recognition where, in particular, it can be used as an alternative of, or in conjunction with, bag-of-features and related classifiers, where stel inference provides a meaningful spatial partition of features.  相似文献   
45.
This paper describes how electrically polarized ion-exchange beds pumped with water can produce electrolyte of steady and controllable concentration. Such devices make it possible to use water as the pumped phase in ion chromatography (IC), thus avoiding off-line eluent preparation. Control of the electrical current flowing through the devices allows precise control of the concentration of eluent that they deliver. This provides a new way of performing gradient and isocratic elutions. Using water as the carrier and two small beds of resin, one as a generator the other as a suppressor, and periodically reversing their roles through automatically switched valves, we have developed a form of continuous IC that involves little intervention by the user. The paper presents the principles of the new method and examples of its use in anion analysis.  相似文献   
46.
47.
Diffuse transient-isotachophoretic boundaries can be used as an elution gradient of increasing eluotropic strength to elute inorganic anions that have been preconcentrated on an open-tubular ion-exchange stationary phase prior to electrophoretic separation. The generation and characteristics of these gradients for elution after preconcentration have been investigated. The gradients are generated by placing a low-mobility, weak ion-exchange competing anion in the capillary (weak electrolyte, WE), and a high-mobility, strong ion-exchange competing anion in the electrolyte vials (strong electrolyte, SE). Application of voltage establishes a diffuse boundary with the composition changing from the weak anion to the strong anion. Comparison of elution gradients generated with different electrolyte systems was accomplished by comparing the eluotropic strength (a function of eluent concentration, ion-exchange selectivity coefficient, and charge) and the shape of the profile as it changes from WE to SE. The ion-exchange selectivity coefficient of the SE competing anion is important in establishing a sharp change in elution strength. A large difference in mobility between the WE and SE competing anions gives an SE with a higher final eluotropic strength, but the slope of the gradient is shallower. This results in a reduction in the efficiency of analyte focusing. To ensure maximum focusing efficiency, the WE and SE electrolytes should be selected such that the SE has the highest possible eluotropic strength for a given concentration of WE. The SE competing anion should also have a sufficiently low electrophoretic mobility to ensure focusing for the maximum number of analytes, and the mobility difference between the WE and SE competing anions should be as small as possible.  相似文献   
48.
Structural and electrical properties of sintered zinc-titanate ceramics   总被引:1,自引:0,他引:1  
The aim of this work was an investigation of structural and electrical properties of sintered zinc-titanate ceramics obtained by mechanical activation. Mixtures of ZnO and TiO2 were mechanically activated in a planetary ball mill up to 90 min and sintered isothermally in air for 120 min at 1100 °C. The phase composition in the ZnO–TiO2 system after milling and sintering was analyzed using the XRD method. Microstructure analyses were performed using SEM. The results of electric resistivity, capacitance and loss tangent of the sintered samples were obtained. The existence of zinc-titanate as a dielectric was proved (?r = 12.5, Q = 386.1, tgδ = 0.0026, ρ = 1.02 Ωm).  相似文献   
49.
    
At present, health care applications, government services, and banking applications use big data with cloud storage to process and implement data. Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data. Sometimes, data may have highly sensitive information, leading users to consider using big data and cloud processing regardless of whether they are secured are not. Threats to sensitive data in cloud systems produce high risks, and existing security methods do not provide enough security to sensitive user data in cloud and big data environments. At present, several security solutions support cloud systems. Some of them include Hadoop Distributed File System (HDFS) baseline Kerberos security, socket layer-based HDFS security, and hybrid security systems, which have time complexity in providing security interactions. Thus, mobile data security algorithms are necessary in cloud environments to avoid time risks in providing security. In our study, we propose a data mobility and security (DMoS) algorithm to provide security of data mobility in cloud environments. By analyzing metadata, data are classified as secured and open data based on their importance. Secured data are sensitive user data, whereas open data are open to the public. On the basis of data classification, secured data are applied to the DMoS algorithm to achieve high security in HDFS. The proposed approach is compared with the time complexity of three existing algorithms, and results are evaluated.  相似文献   
50.
    
Fog computing provides quality of service for cloud infrastructure. As the data computation intensifies, edge computing becomes difficult. Therefore, mobile fog computing is used for reducing traffic and the time for data computation in the network. In previous studies, software-defined networking (SDN) and network functions virtualization (NFV) were used separately in edge computing. Current industrial and academic research is tackling to integrate SDN and NFV in different environments to address the challenges in performance, reliability, and scalability. SDN/NFV is still in development. The traditional Internet of things (IoT) data analysis system is only based on a linear and time-variant system that needs an IoT data system with a high-precision model. This paper proposes a combined architecture of SDN and NFV on an edge node server for IoT devices to reduce the computational complexity in cloud-based fog computing. SDN provides a generalization structure of the forwarding plane, which is separated from the control plane. Meanwhile, NFV concentrates on virtualization by combining the forwarding model with virtual network functions (VNFs) as a single or chain of VNFs, which leads to interoperability and consistency. The orchestrator layer in the proposed software-defined NFV is responsible for handling real-time tasks by using an edge node server through the SDN controller via four actions: task creation, modification, operation, and completion. Our proposed architecture is simulated on the EstiNet simulator, and total time delay, reliability, and satisfaction are used as evaluation parameters. The simulation results are compared with the results of existing architectures, such as software-defined unified virtual monitoring function and ASTP, to analyze the performance of the proposed architecture. The analysis results indicate that our proposed architecture achieves better performance in terms of total time delay (1800 s for 200 IoT devices), reliability (90%), and satisfaction (90%).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号