全文获取类型

收费全文 |
61篇 |

免费 |
3篇 |

专业分类

电工技术 |
6篇 |

化学工业 |
8篇 |

建筑科学 |
2篇 |

能源动力 |
15篇 |

轻工业 |
2篇 |

无线电 |
8篇 |

一般工业技术 |
7篇 |

冶金工业 |
7篇 |

自动化技术 |
9篇 |

出版年

2022年 |
3篇 |

2020年 |
1篇 |

2019年 |
3篇 |

2018年 |
2篇 |

2017年 |
2篇 |

2016年 |
3篇 |

2015年 |
3篇 |

2013年 |
6篇 |

2012年 |
2篇 |

2011年 |
8篇 |

2010年 |
5篇 |

2009年 |
4篇 |

2008年 |
4篇 |

2007年 |
3篇 |

2006年 |
3篇 |

2005年 |
1篇 |

2001年 |
2篇 |

1999年 |
1篇 |

1998年 |
2篇 |

1997年 |
1篇 |

1988年 |
1篇 |

1986年 |
1篇 |

1984年 |
1篇 |

1979年 |
1篇 |

1967年 |
1篇 |

**排序方式：**共有64条查询结果，搜索用时 15 毫秒

1.

2.

Hrvoje Mikulčić Eberhard von Berg Milan Vujanović Peter Priesching Luka Perković Reinhard Tatschl Neven Duić 《Chemical engineering science》2012,69(1):607-615

Calcination is a thermo-chemical process, widely used in the cement industry, where limestone is converted by thermal decomposition into lime CaO and carbon dioxide CO

_{2}. The focus of this paper is on the implementation and validation of the endothermic calcination reaction mechanism of limestone in a commercial finite volume based CFD code. This code is used to simulate the turbulent flow field, the temperature field, concentrations of the reactants and products, as well as the interaction of particles with the gas phase, by solving the mathematical equations, which govern these processes. For calcination, the effects of temperature, decomposition pressure, diffusion and pore efficiency were taken into account. A simple three-dimensional geometry of a pipe reactor was used for numerical simulations. To verify the accuracy of the modelling approach, the numerical predictions were compared with experimental data, yielding satisfying results and proper trends of physical parameters influencing the process. 相似文献3.

We provide a provable-security treatment of “robust” encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a property that has been implicitly assumed in the past. We argue that it is an essential conjunct of anonymous encryption. We show that natural anonymity-preserving ways to achieve it, such as adding recipient identification information before encrypting, fail. We provide transforms that do achieve it, efficiently and provably. We assess the robustness of specific encryption schemes in the literature, providing simple patches for some that lack the property. We explain that robustness of the underlying anonymous IBE scheme is essential for public-key encryption with keyword search (PEKS) to be consistent (meaning, not have false positives), and our work provides the first generic conversions of anonymous IBE schemes to consistent (and secure) PEKS schemes. Overall, our work enables safer and simpler use of encryption. 相似文献

4.

As the hydration of calcium aluminate cements (CAC) is highly temperature dependent, yielding morphologically and structurally different hydration products that continuously alter material properties, a good knowledge of thermal properties at early stages of hydration is essential. Thermal diffusivity and thermal conductivity during CAC hydration was investigated by a transient method with a numerical approach and a transient hot wire method, respectively. For hydration at 15 °C (formation of mainly CAH

_{10}), thermal diffusivity shows a linear decrease as a function of hydration degree, while for hydration at 30 °C there is a linear increase of thermal diffusivity. Converted materials exhibited the highest values of thermal diffusivities. The results on sealed converted material indicated that thermal conductivity increased with an increase in temperature (20-80 °C), while thermal diffusivities marginally decreased with temperature. The Hashin-Shtrikman boundary conditions and a simple law of mixtures were successfully applied for estimating thermal conductivity and heat capacity, respectively, of fresh cement pastes. 相似文献5.

This work presents an improved apparatus and a numerical approach to obtain the estimate of thermal diffusivity of complex materials. Transient thermal response at the axis of cylindrical sample is measured when boundary temperature is suddenly changed. Instead of assuming an ideal step temperature excitement, a measured temperature of a material boundary was employed. An iterative procedure, based on minimizing a sum of squares function with the Levenberg–Marquardt method, is used to solve the inverse problem. A graphical user interface is built to enable easy use of the inverse thermal diffusivity estimation method. The reference materials used to evaluate the method are Agar water gel, glycerol and Ottawa quartz sand. 相似文献

6.

Modeling biomass as a renewable energy source poses many challenges with respect to feedstock variability, which are difficult to account for. It is found that at the preliminary stages of energy planning, heating value and moisture content of the feedstock are the most important factors. In addition, the effects of harvesting, transportation and storage are found to be significant even though they are often overlooked. Using the gathered information a biomass module for energy planning is created and integrated to H

_{2}RES, a renewable energy planning program. Using this excel based software, a case study for a wood processing factory is performed, using the waste wood as feedstock. Comparing various scenarios, it is concluded that using a combination of solid oxide fuel cells, solar panels and steam turbines can satisfy the factories energy requirements with excess sold to the grid. 相似文献7.

8.

9.

Transitive signatures: new schemes and proofs

**总被引：5，自引：0，他引：5** Bellare M. Neven G. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(6):2133-2151

We present novel realizations of the transitive signature primitive introduced by Micali and Rivest, enlarging the set of assumptions on which this primitive can be based, and also providing performance improvements over existing schemes. More specifically, we propose new schemes based on factoring, the hardness of the one-more discrete logarithm problem, and gap Diffie-Hellman (DH) groups. All these schemes are proven transitively unforgeable under adaptive chosen-message attack in the standard (not random-oracle) model. We also provide an answer to an open question raised by Micali and Rivest regarding the security of their Rivest-Shamir-Adleman (RSA)-based scheme, showing that it is transitively unforgeable under adaptive chosen-message attack assuming the security of RSA under one-more inversion. We then present hash-based modifications of the RSA, factoring, and gap Diffie-Hellman based schemes that eliminate the need for "node certificates" and thereby yield shorter signatures. These modifications remain provably secure under the same assumptions as the starting scheme, in the random oracle model. 相似文献

10.

Drazen Jurisic Neven Mijat George S. Moschytz 《International Journal of Circuit Theory and Applications》2013,41(1):15-32

A new and straightforward design procedure for simple canonical topologies of allpole, active‐RC, low‐selectivity band‐pass (BP) filters, with low sensitivity to component tolerances is presented. The procedure is primarily intended for discrete‐component, low‐power filter applications using just one amplifier for relatively high‐order filters. The design procedure starts out with an ‘optimized’ low‐pass (LP) prototype filter, yielding an ‘optimized’ BP filter, whereby the wealth of ‘optimized’ single‐amplifier LP filter designs can be exploited. Using a so‐called ‘lossy’ LP–BP transformation, closed‐form design equations for the design of second‐ to eighth‐order, single‐amplifier BP filters are presented. The low sensitivity, low power consumption, and low noise features of the resulting circuits, as well as the influence of the finite gain‐bandwidth product and component spread, are demonstrated for the case of a fourth‐order filter example. The optimized single‐opamp fourth‐order filter is compared with other designs, such as the cascade of optimized Biquads. Using PSpice with a TL081 opamp model, the filter performance is simulated and the results compared and verified with measurements of a discrete‐component breadboard filter using 1% resistors, 1% capacitors, and a TL081 opamp. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献