全文获取类型
收费全文 | 330篇 |
免费 | 14篇 |
专业分类
电工技术 | 3篇 |
综合类 | 1篇 |
化学工业 | 51篇 |
金属工艺 | 1篇 |
机械仪表 | 5篇 |
建筑科学 | 13篇 |
能源动力 | 12篇 |
轻工业 | 23篇 |
水利工程 | 2篇 |
石油天然气 | 2篇 |
无线电 | 51篇 |
一般工业技术 | 77篇 |
冶金工业 | 32篇 |
原子能技术 | 1篇 |
自动化技术 | 70篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 6篇 |
2020年 | 4篇 |
2019年 | 3篇 |
2018年 | 7篇 |
2017年 | 8篇 |
2016年 | 9篇 |
2015年 | 7篇 |
2014年 | 13篇 |
2013年 | 23篇 |
2012年 | 10篇 |
2011年 | 29篇 |
2010年 | 19篇 |
2009年 | 21篇 |
2008年 | 17篇 |
2007年 | 11篇 |
2006年 | 15篇 |
2005年 | 11篇 |
2004年 | 7篇 |
2003年 | 9篇 |
2002年 | 8篇 |
2001年 | 1篇 |
2000年 | 13篇 |
1999年 | 3篇 |
1998年 | 8篇 |
1997年 | 9篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 10篇 |
1992年 | 6篇 |
1991年 | 6篇 |
1990年 | 8篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 3篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1972年 | 1篇 |
1969年 | 1篇 |
排序方式: 共有344条查询结果,搜索用时 15 毫秒
1.
Given a stability region of a polytope of polynomials, the edge theorem can be used to verify certain root-clustering properties of the polytope. The authors consider the inverse problem; starting with a polytope of real polynomials, they present a result that allows the construction of the smallest set of regions in the complex plane which characterizes its zero location 相似文献
2.
Ling S.-F. Zhang D. Yi S. Foo S. W. 《Electronics Packaging Manufacturing, IEEE Transactions on》2006,29(4):280-284
Input impedance characterizes the dynamic property of a linear system. A few existing technologies thus exploit input electrical impedance of wire bonders as the signature to monitor ultrasonic wire bonding processes. However, the waveforms of "impedance" in these technologies are evaluated only approximately. To overcome the shortcoming, we propose a method to detect the true waveforms of both the real and imaginary part of the input impedance. In the method, the voltage and current at the input port of a wire bonder are probed and processed to obtain impedance via Hilbert Transform. Because dynamics of a bonding process represented by these waveforms is fully responsible for the resulted bonding quality, a quality evaluation system based on pattern recognition of these waveforms is further proposed. An artificial neural network using back propagation as training scheme learns from a set of training data to correlate a few features of the impedance waveforms with the bonding strength of the corresponding bond identified by shearing tests. Through a set of verification data, the built system is validated to be capable of evaluating bonding quality right after a bonding process. The proposed method is not only in situ and real-time, but also sensorless, which means that the system is easy to be implemented without interfering operation 相似文献
3.
Kin Kit Fong Inn Shi Tan Henry Chee Yew Foo Man Kee Lam Adrian Chiong Yuh Tiong Steven Lim 《中国化学工程学报》2021,33(5):297-305
The rising production of produced water from oilfields had been proven to bring detrimental environmental effects. In this study, an efficient, recyclable, and environmental-friendly reduced graphene oxide immobilized κ-Carrageenan hydrogel composite(κCa GO) was fabricated as an alternative sorbent for crude oil-in-water demulsification. Polyethyleneimine(PEI) was employed to form a stable hydrogel composite. The conditions for the immobilization of graphene oxide(GO) on PEI-modified κ-Carrageenan(κC) beads were optimized appropriately. An immobilization yield of 77% was attained at 2% PEI, 2 h immobilization activation time, and p H6.5. Moreover, the synthesized κCa GO is capable of demulsification with an average demulsification efficiency of 70%. It was found that the demulsification efficiency increases with salinity and κCa GO dosage, and it deteriorates under alkaline condition. These phenomena can be attributed to the interfacial interactions between κCa GO and the emulsion. Furthermore, the κCa GO can be recycled to use for up to six cycles without significant leaching and degradation. As such, the synthesized κCa GO could be further developed as a potential sorbent substitute for the separation of crude oil from produced water. 相似文献
4.
Identical twins pose a great challenge to face recognition due to high similarities in their appearances. Motivated by the psychological findings that facial motion contains identity signatures and the observation that twins may look alike but behave differently, we develop a talking profile to use the identity signatures in the facial motion to distinguish between identical twins. The talking profile for a subject is defined as a collection of multiple types of usual face motions from the video. Given two talking profiles, we compute the similarities of the same type of face motion in both profiles and then perform the classification based on those similarities. To compute the similarity of each type of face motion, we give higher weights to more abnormal motions which are assumed to carry more identity signature information. 相似文献
5.
Younes Seifi Suriadi Suriadi Ernest Foo Colin Boyd 《International Journal of Information Security》2015,14(3):221-247
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan. 相似文献
6.
We consider the problem of finite horizon discrete-time Kalman filtering for systems with parametric uncertainties. Specifically, we consider unknown but deterministic uncertainties where the uncertain parameters are assumed to lie in a convex polyhedron with uniform probability density. The condition and a procedure for the construction of a suboptimal filter that minimizes an expected error covariance over-bound are derived. 相似文献
7.
SNORE: spike noise removal and detection 总被引:1,自引:0,他引:1
A method for detection and removal of random spike noise in magnetic resonance (MR) raw data (k-space data) is described. This method would reduce or eliminate the corduroy-type and higher than usual level artifacts in MR images resulting from random spike noise in k-space data. The method described involves applying a spatially varying threshold to be k-space data. Any data point that has a magnitude greater than that of the threshold value at that location will be replaced by a local complex average of the neighboring data points or some other suitable data replacement scheme. 相似文献
8.
Mayuresh Patole Santanu Bandyopadhyay Dominic C. Y. Foo Raymond R. Tan 《Clean Technologies and Environmental Policy》2017,19(7):1967-1975
Pinch analysis was initially developed as a methodology for optimizing energy efficiency in process plants. Applications of pinch analysis applications are based on common principles of using stream quantity and quality to determine optimal system targets. This initial targeting step identifies the pinch point, which then allows complex problems to be decomposed for the subsequent design of an optimal network using insights drawn from the targeting stage. One important class of pinch analysis problems is energy planning with footprint constraints, which began with the development of carbon emissions pinch analysis; in such problems, energy sources and demands are characterized by carbon footprint as the quality index. This methodology has been extended by using alternative quality indexes that measure different sustainability dimensions, such as water footprint, land footprint, emergy transformity, inoperability risk, energy return on investment and human fatalities. Pinch analysis variants still have the limitation of being able to use one quality index at a time, while previous attempts to develop pinch analysis methods using multiple indices have only been partially successful for special cases. In this work, a multiple-index pinch analysis method is developed by using an aggregate quality index, based on a weighted linear function of different quality indexes normally used in energy planning. The weights used to compute the aggregate index are determined via the analytic hierarchy process. A case study for Indian power sector is solved to illustrate how this approach allows multiple sustainability dimensions to be accounted for in energy planning. 相似文献
9.
This paper investigates the fundamental difference between a simple e-tender box and a traditional physical tender box, and
highlights a series of security traps created by the functional differences. Based on our findings, we have defined the security
requirements for an e-tender submission protocol. We also discuss functional limitations of cryptographic technologies. As
a result, two secure e-tender submission protocols are proposed which enable a secure e-tender submission. Protocols are assumed
to run under the condition that all tendering parties (principal and tenderers) are dishonest players. Our informal and formal
security analysis show that these protocols meet their security goals under well known collusion scenarios. Because security
is a process not a product, our approach will have broad industry application for developing secure electronic business processes
in areas other than e-tendering.
相似文献
Colin BoydEmail: |
10.
This study was initiated to examine the feasibility of providing multimedia mail, in particular video mail, on the existing World Wide Web platform. In this instance, the Web browser will act as the user agent of the mailing system. With this, users will be able to compose, send and read video mail directly on the Web. This paper examines a number of possible system architectures that can be employed for the development of video mail. Based on the following key issues: portability of system, flexibility of system, Internet standard support, security and authentication, and message compression and storage, a final architecture was selected to build video mail. The approach taken is that the system will be interfaced to the Web using a standard HyperText Transfer Protocol (HTTP) server and a standard Web browser. This is achieved through the use of Common Gateway Interface (CGI) programs and forms which reside in a standard HTTP server to provide the functionality of video mail, and a separate mail server for the storage and management of messages. This will cause the HTTP server to behave as if it is an electronic mail (E-mail) system. Video mail has been successfully implemented at the School of Applied Science, Nanyang Technological University, Singapore. The development work has been carried out on a Sun SPARC5 workstation and the Typhoon relational database system was used to construct the mail server. All software codes were written in C or C++. A video capturing application used in conjunction with a SunVideo card has been developed for video and audio recording. The paper also addresses implementation issues pertaining to the use of CGI programs, mail server development, and video and audio management. 相似文献