首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   125篇
  免费   13篇
  国内免费   3篇
电工技术   3篇
化学工业   38篇
金属工艺   3篇
机械仪表   1篇
建筑科学   11篇
能源动力   8篇
轻工业   10篇
石油天然气   2篇
无线电   16篇
一般工业技术   21篇
冶金工业   4篇
原子能技术   3篇
自动化技术   21篇
  2023年   2篇
  2022年   8篇
  2021年   15篇
  2020年   13篇
  2019年   12篇
  2018年   7篇
  2017年   10篇
  2016年   11篇
  2015年   4篇
  2014年   7篇
  2013年   9篇
  2012年   7篇
  2011年   10篇
  2010年   7篇
  2009年   3篇
  2008年   5篇
  2007年   4篇
  2005年   1篇
  2004年   2篇
  2002年   1篇
  1997年   1篇
  1995年   1篇
  1986年   1篇
排序方式: 共有141条查询结果,搜索用时 15 毫秒
1.

Maintaining a fluid and safe traffic is a major challenge for human societies because of its social and economic impacts. Various technologies have considerably paved the way for the elimination of traffic problems and have been able to effectively detect drivers’ violations. However, the high volume of the real-time data collected from surveillance cameras and traffic sensors along with the data obtained from individuals have made the use of traditional methods ineffective. Therefore, using Hadoop for processing large-scale structured and unstructured data as well as multimedia data can be of great help. In this paper, the TVD-MRDL system based on the MapReduce techniques and deep learning was employed to discover effective solutions. The Distributed Deep Learning System was implemented to analyze traffic big data and to detect driver violations in Hadoop. The results indicated that more accurate monitoring automatically creates the power of deterrence and behavior change in drivers and it prevents drivers from committing unusual behaviors in society. So, if the offending driver is identified quickly after committing the violation and is punished with the appropriate punishment and dealt with decisively and without negligence, we will surely see a decrease in violations at the community level. Also, the efficiency of the TVD-MRDL performance increased by more than 75% as the number of data nodes increased.

  相似文献   
2.
Internet of Things (IoT) is a newly emerged paradigm where multiple embedded devices, known as things, are connected via the Internet to collect, share, and analyze data from the environment. In order to overcome the limited storage and processing capacity constraint of IoT devices, it is now possible to integrate them with cloud servers as large resource pools. Such integration, though bringing applicability of IoT in many domains, raises concerns regarding the authentication of these devices while establishing secure communications to cloud servers. Recently, Kumari et al proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that it satisfies all security requirements and is secure against various attacks. In this paper, we first prove that the scheme of Kumari et al is susceptible to various attacks, including the replay attack and stolen-verifier attack. We then propose a lightweight authentication protocol for secure communication of IoT embedded devices and cloud servers. The proposed scheme is proved to provide essential security requirements such as mutual authentication, device anonymity, and perfect forward secrecy and is robust against security attacks. We also formally verify the security of the proposed protocol using BAN logic and also the Scyther tool. We also evaluate the computation and communication costs of the proposed scheme and demonstrate that the proposed scheme incurs minimum computation and communication overhead, compared to related schemes, making it suitable for IoT environments with low processing and storage capacity.  相似文献   
3.
Wireless Personal Communications - In recent years, Smart Cities and Smart Homes have been studied as an important field of research. The design and construction of smart homes have flourished so...  相似文献   
4.
5.
This paper is to achieve a gamma-ray source with the lowest rate of buildup factor, which is of great importance in medical, industrial and agricultural sciences.The flux buildup factor of gamma rays is calculated by the MCNP code for point, linear, surface and volume sources with shield layers of lead, iron and aluminum. The results show that for the high Z shielding material, the flux buildup factor of coaxial cylindrical sources is the lowest(1.6–2.3)of all sources, while for low Z shielding materials, the coaxial disk surface sources have smaller buildup factor(1.45–1.6).  相似文献   
6.
7.
8.
A new and simple method was developed to produce gelatin nanoparticles of ~ 30–40 nm for use as carriers for drug release applications. The nanoparticles were uniform in size and well dispersed. An anticancer drug, 5‐fluorouracil, was encapsulated with an efficiency as high as 85%. The nanoparticles showed sustained release of 5‐fluorouracil, and release rates varied with amount of crosslinking in the nanoparticles. © 2011 Wiley Periodicals, Inc. J Appl Polym Sci, 2011.  相似文献   
9.
10.

The application of the Nusselt number (Nu) correlation of a packed bed of spherical particles overestimates the rate of heat transfer in the packed beds of shredded materials. This is due to the dependence of flow distribution on the particle geometry. This discrepancy is even more pronounced due to a channeling effect at low Peclet numbers (Pe). In this study, the heat transfer coefficient for a packed bed of shredded materials was derived at low Peclet numbers. In deriving the correlation, both numerical simulation and experimental work were employed. The experimental work was carried out in a packed bed of combustible materials for the flow rates of 15 × 10? 6 to 50 × 10? 6 m 3/s and a temperature range of 30 to 60°C. Using the results of experimental work along with numerical modeling and applying a power law formulation, the best-fit Nusselt number for the packed bed of shredded materials for Pe < 25 was derived to be Nu = 0.015 0.11 + Pe 0.73 . The Nusselt number calculated from this correlation is in good agreement with the experimental data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号