首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   154篇
  免费   2篇
化学工业   13篇
金属工艺   1篇
机械仪表   15篇
轻工业   3篇
无线电   25篇
一般工业技术   16篇
冶金工业   6篇
原子能技术   2篇
自动化技术   75篇
  2024年   2篇
  2023年   5篇
  2022年   8篇
  2021年   13篇
  2020年   5篇
  2019年   11篇
  2018年   7篇
  2017年   12篇
  2016年   22篇
  2015年   8篇
  2014年   9篇
  2013年   16篇
  2012年   8篇
  2011年   11篇
  2010年   6篇
  2009年   5篇
  2008年   5篇
  2005年   2篇
  2004年   1篇
排序方式: 共有156条查询结果,搜索用时 0 毫秒
61.
Journal of Mechanical Science and Technology - During the process of missile development, repetitive or real-time calculation of the six-component aerodynamic coefficients is required. In general,...  相似文献   
62.
The blade-tower interaction of upwind horizontal axis wind turbines has become important to aerodynamic loading as the systems become larger. However, there are not enough studies describing these phenomena. To investigate this interaction, we performed numerical simulations for uniform, yawed, wind shear flow conditions, and various tower cases using the nonlinear vortex correction method with time-marching free wake. At 5 m/s, the change in the normal force coefficient is approximately 10% of the average. The blade root region has a larger azimuth range of the interaction and a bigger change in aerodynamic loading. The blade-tower interaction decreases as the yaw error and wind shear exponent increases. The interaction due to tower radius variations is higher than that due to tower clearance variations. With regard to stochastic load, the blade-tower interaction may affect the total fatigue load at low wind speed and in a more unstable atmospheric condition.  相似文献   
63.
In this paper we introduce a general framework of related-key attack on block-wise stream ciphers which are suitable for the protection of multimedia and ubiquitous systems. As a case study, we show how our cryptanalytic framework is applied to a block-wise stream cipher TWOPRIME: we construct various related-key differentials of TWOPRIME and use them to show that recovering related keys of TWOPRIME can be performed with a data complexity of 214 known plaintext blocks and a time complexity of 232 8-bit table lookups. We expect that our general framework for a related-key attack would be useful tool for analyzing many of block-wise stream ciphers.  相似文献   
64.
An experimental study is performed to investigate the effects of noncondensable (NC) gas in the steam condensing system. A vertical condenser tube is submerged in a water pool where the heat from the condenser tube is removed by boiling heat transfer. The design of the test section is based on the passive condenser system in an advanced boiling water nuclear power reactor. Data are obtained for various process parameters, such as inlet steam flow rate, noncondensable gas concentration, and system pressure. Degradation of the condensing performance with increasing noncondensable gas is investigated. The condensation heat transfer coefficient and heat transfer rate decrease with noncondensable gas. The condensation heat transfer rate is enhanced by increasing the inlet steam flow rate and the pressure. The condensation heat transfer coefficient increases with the inlet steam flow rate, however, decreases with the system pressure. For the condenser submerged in a water pool with saturated condition, the strong primary pressure dependency is observed.  相似文献   
65.
    
Digital surveillance systems are ubiquitous and continuously generate massive amounts of data, and manual monitoring is required in order to recognise human activities in public areas. Intelligent surveillance systems that can automatically ide.pngy normal and abnormal activities are highly desirable, as these would allow for efficient monitoring by selecting only those camera feeds in which abnormal activities are occurring. This paper proposes an energy-efficient camera prioritisation framework that intelligently adjusts the priority of cameras in a vast surveillance network using feedback from the activity recognition system. The proposed system addresses the limitations of existing manual monitoring surveillance systems using a three-step framework. In the first step, the salient frames are selected from the online video stream using a frame differencing method. A lightweight 3D convolutional neural network (3DCNN) architecture is applied to extract spatio-temporal features from the salient frames in the second step. Finally, the probabilities predicted by the 3DCNN network and the metadata of the cameras are processed using a linear threshold gate sigmoid mechanism to control the priority of the camera. The proposed system performs well compared to state-of-the-art violent activity recognition methods in terms of efficient camera prioritisation in large-scale surveillance networks. Comprehensive experiments and an evaluation of activity recognition and camera prioritisation showed that our approach achieved an accuracy of 98% with an F1-score of 0.97 on the Hockey Fight dataset, and an accuracy of 99% with an F1-score of 0.98 on the Violent Crowd dataset.  相似文献   
66.
Journal of Mechanical Science and Technology - As the application of composite materials increases, analysis and optimum design for various dynamic loads as well as static loads are required. In...  相似文献   
67.
Kwon  Yeji  Yu  Seungmin  Choi  Gwang Su  Kim  Jang Hwan  Baik  Mooyeol  Su  Seung Tae  Kim  Wooki 《Food science and biotechnology》2019,28(4):1235-1240
Food Science and Biotechnology - The roots of Rehmannia glutinosa (RG) have been widely used for medicinal purposes in Asia. The traditional processing of RG involves repetitive steaming and...  相似文献   
68.
Grigorev  Aleksei  Jiang  Feng  Rho  Seungmin  Sori  Worku J.  Liu  Shaohui  Sai  Sergey 《Multimedia Tools and Applications》2017,76(18):18585-18604
Multimedia Tools and Applications - Depth estimation is a significant task in the robotics vision. In this paper, we address the depth estimation from a single monocular image, which is a...  相似文献   
69.
70.
This study examined the sensitive effects of composition on the microstructure evolution and thermoelectric properties of sputtered Bi-Te films. Bi-Te films of various Te compositions (49 at.% to 60 at.%) were grown by cosputtering deposition and annealed at 200°C for different durations. We examined the microstructure of the films using x-ray diffraction (XRD) and transmission electron microscopy (TEM), and measured the electronic transport and thermoelectric properties. As the Te composition of the films changed from 49 at.% to 60 at.%, the phase of the as-sputtered film changed from the rhombohedral BiTe-type phase to the metastable rock-salt phase, which eventually transformed to the Bi2Te3-type phase upon annealing, instigating microstructure evolution. This phase transformation profoundly influenced the electrical and thermoelectric properties of the films.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号