首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   68篇
  免费   8篇
电工技术   1篇
化学工业   24篇
机械仪表   1篇
建筑科学   4篇
能源动力   2篇
轻工业   3篇
无线电   2篇
一般工业技术   14篇
原子能技术   1篇
自动化技术   24篇
  2024年   1篇
  2023年   1篇
  2022年   2篇
  2021年   7篇
  2020年   4篇
  2019年   8篇
  2018年   7篇
  2017年   9篇
  2016年   4篇
  2015年   2篇
  2014年   1篇
  2013年   6篇
  2012年   5篇
  2011年   2篇
  2010年   4篇
  2009年   3篇
  2008年   1篇
  2001年   2篇
  1995年   2篇
  1991年   1篇
  1989年   1篇
  1988年   1篇
  1984年   1篇
  1978年   1篇
排序方式: 共有76条查询结果,搜索用时 31 毫秒
1.
2.
Beam-column connections have a significant role in the results of the analysis and the design of steel frames. In this paper, a genetic algorithm has been used for the non-linear analysis and design of steel frames. For minimizing the weight of frames, while satisfying the applied constraints and restraints such as the limits of normal and combined stresses, criteria such as target displacement(s) and the number and locations of plastic hinges were used. To analyze and design the frame elements, I and box-shaped standard sections were used for beams and columns, respectively. Finally, some clues for finding optimizing semi-rigid connection stiffness values for beam-to-column connections have been obtained. The degrees of these rigidities are obtained by a genetic algorithm during the procedure of optimization in order to reach a frame with the minimum weight. SAP2000 structural analysis program was used to perform modal analysis and linear and non-linear static solutions as well as the design of the elements. A MATLAB program was written for the process of optimization. The procedure of optimization was based on a weight minimization carried out for 9 steel frames. Thus, the optimum connection stiffness could be obtained for minimizing the weight of the structure. The results show that the non-linear analysis gives less weight for short period frames with semi-rigid connections compared to those of linear ones. However, by increasing the periods of frames, much less weights are obtained in the case of non-linear analysis with semi-rigid connections.  相似文献   
3.
Moosaei  H.  Ketabchi  S.  Razzaghi  M.  Tanveer  M. 《Neural Processing Letters》2021,53(2):1545-1564
Neural Processing Letters - In this paper, we propose two efficient approaches of twin support vector machines (TWSVM). The first approach is to reformulate the TWSVM formulation by introducing...  相似文献   
4.
Engineering with Computers - In this study, a new fractal-fractional (FF) derivative is defined by coupling the local conformable derivative and non-local Caputo fractional derivative. Using the...  相似文献   
5.
Recently Lin and Tsai [Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405-414] and Yang et al. [Improvements of image sharing with steganography and authentication, The Journal of Systems and Software 80 (2007) 1070-1076] proposed secret image sharing schemes combining steganography and authentication based on Shamir's polynomials. The schemes divide a secret image into some shadows which are then embedded in cover images in order to produce stego images for distributing among participants. To achieve better authentication ability Chang et al. [Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130-3137] proposed in 2008 an improved scheme which enhances the visual quality of the stego images as well and the probability of successful verification for a fake stego block is 1/16.In this paper, we employ linear cellular automata, digital signatures, and hash functions to propose a novel (t,n)-threshold image sharing scheme with steganographic properties in which a double authentication mechanism is introduced which can detect tampering with probability 255/256. Employing cellular automata instead of Shamir's polynomials not only improves computational complexity from to O(n) but obviates the need to modify pixels of cover images unnecessarily. Compared to previous methods [C. Lin, W. Tsai, Secret image sharing with steganography and authentication, The Journal of Systems and Software 73 (2004) 405-414; C. Yang, T. Chen, K. Yu, C. Wang, Improvements of image sharing with steganography and authentication, The Journal of Systems and Software 80 (2007) 1070-1076; C. Chang, Y. Hsieh, C. Lin, Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130-3137], we use fewer number of bits in each pixel of cover images for embedding data so that a better visual quality is guaranteed. We further present some experimental results.  相似文献   
6.
Horseradish peroxidase (HRP) and glucose oxidase (GOx) were co-immobilized on polyurethane, and the resulting HRP/GOx/polyurethane biocatalyst was characterized using scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDAX) mapping techniques. The prepared biocatalyst was used for removal of acid orange 7 as model azo dye. The required H2O2 for activation of HRP was in-situ produced using GOx to prevent deactivation of HRP in the presence of excess chemical H2O2. Central composite design (CCD) was applied for modeling and optimization of parameters affecting the activity of prepared biocatalyst. Under the optimum conditions, removal efficiency of the azo dye was predicted to be 87.47%, which was in good agreement with the experimental value (89.69%). In addition, the performance of the prepared biocatalyst for removal of two other dyes with different structure was investigated at the optimum conditions, and a removal efficiency of 91.56% and 95.25% was obtained for removal of methylene blue and malachite green, respectively. The results demonstrated that the resultant HRP/GOx/Polyurethane biocatalyst was able to decrease the chemical oxygen demand (COD) of a textile effluent from 740mg/L to 96mg/L, indicating that the prepared biocatalyst is an effective enzymatic system for treatment of real wastewater.  相似文献   
7.
Dam failure has been the subject of many hydraulic engineering studies due to its complicated physics with many uncertainties involved and the potential to cause many losses of lives and economical losses. A primary source of uncertainties in many dam failure analyses refers to prediction of the reservoir’s outflow hydrograph, which is studied in the present investigation. This paper presents an experimental study on instantaneous dam failure flood under different reservoir’s capacities and lengths in which the side slopes change within a range of 30°–90°. Thus, several outflow hydrographs are calculated and compared. The results reveal the role of the side slopes on dam break flood wave, such that lower side slope creates more catastrophic outflow. The reservoir capacity and length are also recognized to be important factors, such that they do affect peak discharge and time to peak of the outflow hydrograph. Finally, the paper presents two simple relations for peak discharge and maximum water level estimation at any downstream location.  相似文献   
8.
9.
10.
The paper proposes a concept configuration of reactors for coupling OCM and FTS, and presents systematic simulation results. FTS section is a combination of fixed bed and membrane fluidized bed reactor, and feed of the FT reactor is supplied by OCM. The reactor configuration is compared with the consecutive reactors of OCM and one fixed bed FT reactor. Effects of CH4/O2 ratio, percent of N2 in the feed, contact time, and input temperature on the yield of ethylene and valuable hydrocarbons are studied. The results show that compared with one FTS reactor configuration, the dual FTS reactor configuration is more effective and thus gives much higher product yields. Furthermore, a main decrease is observed in the formation of CO2 and CH4.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号