首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   215篇
  免费   5篇
电工技术   8篇
化学工业   24篇
金属工艺   1篇
机械仪表   2篇
建筑科学   9篇
能源动力   19篇
轻工业   8篇
水利工程   2篇
石油天然气   4篇
无线电   32篇
一般工业技术   45篇
冶金工业   25篇
原子能技术   4篇
自动化技术   37篇
  2024年   1篇
  2023年   2篇
  2022年   3篇
  2021年   12篇
  2020年   4篇
  2019年   5篇
  2018年   9篇
  2017年   9篇
  2016年   5篇
  2015年   4篇
  2014年   7篇
  2013年   17篇
  2012年   9篇
  2011年   11篇
  2010年   7篇
  2009年   7篇
  2008年   14篇
  2007年   10篇
  2006年   7篇
  2005年   5篇
  2004年   4篇
  2003年   1篇
  2002年   3篇
  2001年   3篇
  2000年   1篇
  1999年   3篇
  1998年   6篇
  1997年   2篇
  1996年   6篇
  1995年   7篇
  1994年   5篇
  1992年   4篇
  1991年   4篇
  1989年   1篇
  1988年   3篇
  1986年   2篇
  1985年   2篇
  1984年   2篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   3篇
  1975年   1篇
  1974年   1篇
排序方式: 共有220条查询结果,搜索用时 15 毫秒
211.
Fabrication of metal matrix surface composites (SCs) is an emerging trend of friction stir processing applications. Key factors affecting the properties of SCs are process parameters, tool geometry, tool dimensions and reinforcement strategies. In this research, effects of different reinforcement strategies and varying tool offset positions on dispersion of reinforcement particles in the base matrix are investigated. The experiments were performed in two phases using AA6063 as base metal at constant process parameters of 1120?rpm rotational speed, 40?mm/min traverse speed and 2.5° tilt angle. In the first phase, effect of six different reinforcement strategies on the reinforcement particles distribution and defect formation was studied. It was found that groove method with tool offset in retreating side (RS) exhibited better homogeneity in reinforcement distribution out of the six reinforcement strategies considered. In the second phase, effect of variation of tool offset in RS was investigated. Results from second phase of experimentation reflected that the best dispersion of reinforcement powder with larger stir zone area was found with 1.5?mm tool offset which is numerically half of the tool pin radius. The results were supported by macro and microstructural images obtained from the optical microscope and scanning electron microscope.  相似文献   
212.
Protection of medium- and large-power transformers has always remained an area of interest of relaying engineers. Conventionally, the protection is done making use of magnitude of various frequency components in differential current. A novel technique to distinguish between magnetising inrush and internal fault condition of a power transformer based on the difference in the current wave shape is developed. The proposed differential algorithm makes use of radial basis probabilistic neural network (RBPNN) instead of the conventional harmonic restraint- based differential relaying technique. A comparison of performance between RBPNN and heteroscedastic-type probabilistic neural network (PNN) is made. The optimal smoothing factor of heteroscedastic-type PNN is obtained by particle swarm optimisation technique. The results demonstrate the capability of RBPNN in terms of accuracy with respect to classification of differential current of the power transformer. For the verification of the developed algorithm, relaying signals for various operating conditions of the transformer, including internal faults and external faults, were obtained through PSCAD/EMTDC. The proposed algorithm has been implemented in MATLAB.  相似文献   
213.
It is essential to incorporate both hot and cold energy storage for a solar absorption cooling system in order to maximize the saving of conventional electrical power. The paper correlates the thermal energy storage requirements with the daily cooling demand pattern of a building. The other parameters which affect the choice of the two storage volumes are the effective sunshine hours, the chiller cooling capacity, its daily operation period and the two storage temperature differentials. The results have been obtained in a generalized manner and applied to an actual building in Kuwait.  相似文献   
214.
Heat transfer and fluid flow studies related to spent fuel bundle of a research reactor in fuelling machine has been carried out. When the fuel is in reactor core, the heat generated in the fuel bundle is removed by heavy water under normal reactor operation. However, during the de-fuelling operation, the fuel bundle is exposed to air for some period called dry period. During this period, the decay heat from fuel bundle has to be removed by air flow. This flow of air is induced by natural convection only. In this period, the temperatures of fuel and clad rise. If clad temperature rises beyond a certain limit, structural failure may occur. This failure can result into release of fission products from fuel rod. Hence the temperature of clad has to be within specified limit under all conditions. The objective of this study is to estimate the clad temperature rise during the dry period.In the CFD simulation, the turbulent natural convection flow over fuel and radiation heat transfer are accounted. Standard k-? model for turbulence, Boussinesq approximation for computing the natural convection flow and IMMERSOL model for radiation are used.The steady state and transient CFD simulation of flow and heat is performed, using the CFD code PHOENICS. The steady state analysis provides the maximum temperature the clad will attain if fuel bundle is left exposed to air for sufficiently long time. For safe operation, the clad temperature should be limited to a specified value. From steady state CFD analysis, it is found that steady state clad temperature for various decay powers is higher than the limiting value. Hence transient analysis is also performed. In the transient analysis, the variation of clad temperature with time is predicted for various decay powers. Safe dry time, i.e. the time required for clad to reach the limiting value, is predicted for various decay powers. Determination of safe dry time helps in deciding the time available to the operator to drop the bundle in light water pool for storage. The analysis is found useful in optimizing the de-fuelling process.  相似文献   
215.
A collective report on the extraction and isolation of β‐glucan from grain sources, namely, oat, barley, and wheat is presented. An analysis on the effect of medium, pH, and temperature on the purity and yield of the β‐glucan derived under acidic/alkaline/aqueous/enzymatic conditions is also made. Water extraction and alkali extraction processes are preferred as the yield and recovery of extracted β‐glucan were good. Cost‐effective development of the process for deriving high molecular weight β‐glucan is the current requirement for its wide applications in food and pharmaceutical industries.  相似文献   
216.
Rapeseed was dehulled using a Palyi pneumatic attrition system which produced 62–66% clean dehulled seed. Dehulled rapeseed was preconditioned to 7, 10 and 13% moisture levels, exposed to micro-wave irradiation for periods of up to 2.5 min and analyzed for residual thioglucoside glucohydrolase (myrosinase) activity. The 7% moisture samples heated slowly and required at least a 2.5 min treatment whereas 10 and 13% moisture samples heated more rapidly and required microwave exposures of 1.5 min or less for complete inactivation of the enzyme. The sulfur content of oils obtained from adequately microwave-treated samples (1.5 min for 10 and 13% and 2.5 min for 7% moisture samples) was equal to or lower than commercially processed crude rapeseed oils. The shorter microwave treatment of dehulled rapeseed produced considerably lighter oils and did not adversely affect the color of the meal. It also destroyed some of the rapeseed glucosinolates and improved the meal palatability. However, goitrogenic properties of microwave-treated rapeseed meal evaluated by mice feeding experiments did not appear different from untreated rapeseed meal.  相似文献   
217.
    
Self‐assembled micrometer long gold nanoparticle chains are used as building block to fabricate a range of flexible devices to monitor human physiological signals by an easy filtration method. The chains serve as the base material for all the devices and their interconnects and contact pads as well. The micrometer long chains are an array of nanoparticles with gaps of 1–2 nm between adjacent particles. The gaps serve as quantum tunneling barrier and their modulation is basis of signal sensing in these devices. Deposited on a flexible membrane, the chains monitor temperature, artery pulsation, and electrocardiograms (ECG) signals with ease. This simple method provides an avenue to fabricate low cost integrated wearable devices based on quantum phenomena.  相似文献   
218.
219.
    
Wireless sensor network (WSN) are used to sense, process, and send important information relating to surrounding environment. In these network, one of the important issue is timely delivery of packets to destination and thus avoiding packet loss when sensor nodes are mobile. Most of the current research does not allow handling of packets of mobile sensor nodes till next Time‐division multiple access (TDMA) schedule. In this work, we investigate the problem of allocating reserved slots to mobile nodes which come in vicinity of new cluster head in currenTDMAschedule only. We model allocation of reserved slots to mobile nodes as cooperative game. We then propose cooperative coordination scheme to allow cooperation among mobile sensor nodes for accessing of reserved slots with the objective of avoiding unnecessary delay and packet loss in the network. We consider solution for both the cases when reserved slot is limited to 1 and when reserved slots are more than 1. We then propose evolutionary game theory‐based slot allocation scheme for calculation of probability by solving nash equilibrium point. This probability is used by mobile nodes to send data packets to new cluster head. Our scheme avoids end to end delay of packets and network congestion due to buffer overflows. We then present extensive simulation results comparing our scheme with existing techniques. The results show higher performance in terms of average residual energy, network lifetime and packet delivery ratio etc.  相似文献   
220.
    
Due to the remarkable development of Internet technologies, a great deal of valuable digital data is now transmitted over public networks. To guarantee the security of this data during the transfer process, the authentication of its integrity is extremely important. This paper introduces a robust and secure dual-watermarking-based fusion of watermarking, optimization, and a compression method utilizing non-sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT), and singular value decomposition (SVD). In our method, we first apply the NSCT to a higher entropy sub-band of the host image. Then, our method uses RDWT-SVD on higher frequency coefficients of the NSCT image. A similar procedure is followed for both mark images. Finally, an appropriate scaling factor, as obtained by fuzzy inference system, is used to invisibly embed the singular values of both mark data into the host image. Here, any more important mark data are scrambled before the embedding process. The simulation tests reveal that the proposed technique is not only imperceptible and secure but also robust against common attacks. The suggested method has a superior ability to extract hidden information than previous conventional techniques.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号