首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   92篇
  免费   2篇
  国内免费   1篇
电工技术   1篇
化学工业   17篇
机械仪表   1篇
建筑科学   1篇
能源动力   8篇
无线电   24篇
一般工业技术   13篇
冶金工业   1篇
自动化技术   29篇
  2024年   1篇
  2023年   5篇
  2022年   6篇
  2021年   5篇
  2020年   6篇
  2019年   7篇
  2018年   6篇
  2017年   6篇
  2016年   3篇
  2015年   2篇
  2014年   6篇
  2013年   9篇
  2012年   4篇
  2011年   4篇
  2010年   5篇
  2009年   7篇
  2008年   3篇
  2007年   2篇
  2006年   1篇
  2004年   2篇
  2001年   1篇
  1998年   1篇
  1996年   2篇
  1986年   1篇
排序方式: 共有95条查询结果,搜索用时 0 毫秒
61.

In this paper we present an assistive system designed for supporting young children affected by autism in their process of learning pronunciation and meaning of new words. The system is built-up of a mobile application and objects identifiers which in our case were Estimote Beacon sensors. The system requires active participation of a parent who selects words to learn, records pronunciation of object names, selects illustrations, and activates and turns off the application. The entire process is designed to extend parents’ care and to support autistic children with an instant repetition of pronounced object’s names when those items are met during playing or moving around the house. An experimental part of our project consists of a report where we compare collected results of two autistic children using our application installed on a smart watch and on a smart phone. In both reported cases autistic children made a visible progress in speed of learning new words when compared to an equivalent period of time without assistive application support.

  相似文献   
62.
A simple and reproducible chromatographic method for determination of decabromodiphenyl ether (DBDPE) is presented. The mobile phase consisted of aqueous acetonitrile solution. A simple quantitative extraction method using a soxhlet extraction is proposed to extract decabromodiphenyl ether from textile backcoated sample, and, a rapid chromatographic method using spectrophotometric detection, is described for the determination of decabromodiphenyl ether. The proposed method is applied for the determination of the decabromodiphenyl ether in a backcoated textile. Complete methods validation for both the extraction and analytical methods are discussed. Linear calibration curve in a range of 0.3-300.0mg/microL is achieved with a detection limit of 0.1microg. The method is successfully applied to the determination of decabromodiphenyl ether in several backcoated formulations.  相似文献   
63.
Top tensioned strings and beams are often used in civil and marine applications. Typically these members have constant cross sections, and a pronounced, usually linear, tension variation, due to the effects of gravity. In this paper simple, approximate formulas for the natural frequency of such strings are derived, based on asymptotic techniques, while for the tensioned beam case approximate closed-form results are developed by the Wentzel–Kramers–Brillouin method. Both derivations are shown in reasonable detail. While similar work is known for a beam with varying axial tension this is believed to be the first time that a single analytic expression is developed for the full length of the beam. A simple example in which the bottom tension is only 9% of the top tension is analyzed for cases with and without bending stiffness, and the solutions have been compared to the exact solution for the string case and to the results from three finite-element programs for the beam case. The accuracy was found to be very good, even in this situation, in which the tension variation is large.  相似文献   
64.
Advances introduced to electronics and electromagnetics leverage the production of low-cost and small wireless sensors. Wireless sensor networks (WSNs) consist of large amount of sensors equipped with radio frequency capabilities. In WSNs, data routing algorithms can be classified based on the network architecture into flat, direct, and hierarchal algorithms. In hierarchal (clustering) protocols, network is divided into sub-networks in which a node acts as a cluster head, while the rest behave as member nodes. It is worth mentioning that the sensor nodes have limited processing, storage, bandwidth, and energy capabilities. Hence, providing energy-efficient clustering protocol is a substantial research subject for many researchers. Among proposed cluster-based protocols, low-energy adaptive clustering hierarchy (LEACH) and threshold LEACH (T-LEACH), as well as modified threshold-based cluster head replacement (MT-CHR) protocols are of a great interest as of being energy optimized. In this article, we propose two protocols to cluster a WSN through taking advantage of the shortcomings of these protocols (i.e., LEACH, T-LEACH, and MT-CHR), namely centralized density- and threshold-based cluster head replacement (C-DTB-CHR) and C-DTB-CHR with adaptive data distribution (C-DTB-CHR-ADD) protocols that mainly aim at optimizing energy through minimizing the number of re-clustering operations, precluding cluster heads nodes premature death, deactivating some nodes located at dense areas from cluster’s participation, as well as reducing long-distance communications. In particular, in C-DTB-CHR protocol, some nodes belong to dense clusters are put in the sleeping mode based on a certain node active probability, thereby reducing the communications with the cluster heads and consequently prolonging the network lifetime. Moreover, the base station is concerned about setting up the required clusters and accordingly informing sensor nodes along with their corresponding active probability. C-DTB-CHR-ADD protocol provides more energy optimization through adaptive data distribution where direct and multi-hoping communications are possible. Interestingly, our simulation results show impressive improvements over what are closely related in the literature in relation to network lifetime, utilization, and network performance degradation period.  相似文献   
65.
Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected content in an attempt to disrupt the system and waste network resources. When faced by such phenomenon, regular peers get discouraged from participating in the P2P network as they find less value in the system. In this work, we investigate the amount of resources required to restrain pollution attacks by means of content validation. We introduce multiple adaptive techniques that can minimize the spread of polluted content, while at the same time reduce the cost of content validation for peers participating in the network. Furthermore, the proposed pollution-restraint techniques are resistant to collusion from malicious peers, and they do not contribute to excessive communication overhead in the P2P network.  相似文献   
66.
67.
The Internet of Things (IoT) offers a new era of connectivity, which goes beyond laptops and smart connected devices for connected vehicles, smart homes, smart cities, and connected healthcare. The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users. With the increasing use of multimedia in communications, the content security of remote-sensing images attracted much attention in academia and industry. Image encryption is important for securing remote sensing images in the IoT environment. Recently, researchers have introduced plenty of algorithms for encrypting images. This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption (ISCACE-RSI) technique in IoT Environment. The proposed model follows a three-stage process, namely pre-processing, encryption, and optimal key generation. The remote sensing images were preprocessed at the initial stage to enhance the image quality. Next, the ISCACE-RSI technique exploits the double-layer remote sensing image encryption (DLRSIE) algorithm for encrypting the images. The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid (DNA) Strand Displacement (DNASD) approach. The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images. Then, the study presents three DNASD-related encryption rules based on the variety of DNASD, and those rules are applied for encrypting the images at the DNA sequence level. For an optimal key generation of the DLRSIE technique, the ISCA is applied with an objective function of the maximization of peak signal to noise ratio (PSNR). To examine the performance of the ISCACE-RSI model, a detailed set of simulations were conducted. The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches.  相似文献   
68.
As the GDL (Gas diffusion layer) is the most sensitive component in the fuel cell, any change in its structure causes a change in its porosity, which strongly influences the contact between the components of the fuel cell. Note that the state of contact depends on the applied clamping pressure, the thickness and the porosity of the GDL, and the geometry of the rib (bending radius) of the BPP (Bipolar plates). These components can be subject to variations coming from very high compression, so it is necessary to consider the reliability of their dimension via modeling/simulation by the integration of uncertainties. In this article, we will study the influence on the contact pressure of the uncertainties of the mechanical design parameters. A probabilistic approach (Gauss's law) is applied to evaluate the effect of the mechanical uncertainties parameter on the contact pressure between GDL/MEA and GDL/BPP.  相似文献   
69.
In the literature, many models and studies focused on the steady-state aspect of fuel cell systems while their dynamic transient behavior is still a wide area of research. In the present paper, we study the effects of mechanical solicitations on the performance of a proton exchange membrane fuel cell as well as the coupling between the physico-chemical phenomena and the mechanical behavior. We first develop a finite element method to analyze the local porosity distribution and the local permeability distribution inside the gas diffusion layer induced by different pressures applied on deformable graphite or steel bipolar plates. Then, a multi-physical approach is carried out, taking into account the chemical phenomena and the effects of the mechanical compression of the fuel cell, more precisely the deformation of the gas diffusion layer, the changes in the physical properties and the mass transfer in the gas diffusion layer. The effects of this varying porosity and permeability fields on the polarization and on the power density curves are reported, and the local current density is also investigated. Unlike other studies, our model accounts for a porosity field that varies locally in order to correctly simulate the effect of an inhomogeneous compression in the cell.  相似文献   
70.
Solar space cooling is important in the countries of the Arabian Peninsula where nearly half of the total produced electricity is used for air conditioning of residential commercial and public buildings. In Kuwait, large proportion of funds were allocated for research in solar cooling applications. By the year 1985, several small and medium capacity demonstration projects were installed and tested and more were anticipated for the future. These systems used flat plate collectors and small vapor absorption refrigeration (VAR) system of 5 to 10 tons cooling capacity (TR). The first large installation in Kuwait was carried out in the early eighties for a school building. Immediately thereafter, an equally important installation comprising of 300 m2 of flat plate collector area and three 10 TR VAR chillers, was completed in 1983 for an office building of the Ministry of Defense (MOD). These two well instrumented installations were tested for more than one summer season. The system at MOD is the most successful installation and it has been functioning excellently, to-date. Performance results of the system taken during the summer of 1995 have been presented in this paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号