首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   158篇
  免费   6篇
  国内免费   1篇
电工技术   6篇
化学工业   27篇
金属工艺   6篇
机械仪表   2篇
建筑科学   2篇
矿业工程   1篇
能源动力   7篇
轻工业   14篇
水利工程   1篇
无线电   30篇
一般工业技术   29篇
冶金工业   10篇
自动化技术   30篇
  2024年   1篇
  2023年   1篇
  2022年   6篇
  2021年   10篇
  2020年   10篇
  2019年   6篇
  2018年   9篇
  2017年   8篇
  2016年   4篇
  2015年   5篇
  2014年   6篇
  2013年   16篇
  2012年   5篇
  2011年   7篇
  2010年   10篇
  2009年   9篇
  2008年   10篇
  2007年   7篇
  2006年   2篇
  2005年   1篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2001年   1篇
  2000年   2篇
  1999年   5篇
  1998年   3篇
  1997年   3篇
  1996年   4篇
  1993年   1篇
  1987年   1篇
  1981年   2篇
  1980年   2篇
  1977年   1篇
排序方式: 共有165条查询结果,搜索用时 15 毫秒
1.
A deterministic approach for downscaling ~ 40 km resolution Soil Moisture and Ocean Salinity (SMOS) observations is developed from 1 km resolution MODerate resolution Imaging Spectroradiometer (MODIS) data. To account for the lower soil moisture sensitivity of MODIS surface temperature compared to that of L-band brightness temperature, the disaggregation scale is fixed to 10 times the spatial resolution of MODIS thermal data (10 km). Four different analytic downscaling relationships are derived from MODIS and physically-based model predictions of soil evaporative efficiency. The four downscaling algorithms differ with regards to i) the assumed relationship (linear or nonlinear) between soil evaporative efficiency and near-surface soil moisture, and ii) the scale at which soil parameters are available (40 km or 10 km). The 1 km resolution airborne L-band brightness temperature from the National Airborne Field Experiment 2006 (NAFE'06) are used to generate a time series of eleven clear sky 40 km by 60 km near-surface soil moisture observations to represent SMOS pixels across the three-week experiment. The overall root mean square difference between downscaled and observed soil moisture varies between 1.4% v/v and 1.8% v/v depending on the downscaling algorithm used, with soil moisture values ranging from 0 to 15% v/v. The accuracy and robustness of the downscaling algorithms are discussed in terms of their assumptions and applicability to SMOS.  相似文献   
2.
Electroless NiP films, with 12 to 16 wt % P, were deposited from a moderately acid solution. Thermogravimetric analysis indicates the presence of occluded hydrogen in the layers, which desorbs upon heating. The amount of incorporated hydrogen decreases when the pH of the solution or the nickel sulfate concentration is increased; by contrast it increases with hypophosphite concentration. Cyclic voltammetry, using an electrochemical quartz crystal microbalance, confirms the existence of parasitic reactions, namely the reduction of protons of the solvent during the cathodic process and oxidation of hydrogen during the dissolution of the layers. This behaviour is in qualitative agreement with the proposed reaction scheme.  相似文献   
3.
Neural Computing and Applications - Among several types of fuel cells available in the market, proton exchange membrane fuel cell (PEMFC) is characterized by low operating temperature, high...  相似文献   
4.
The increasing architecture complexity of data converters makes it necessary to use behavioral models to simulate their electrical performance and to determine their relevant data features. For this purpose, a specific data converter simulation environment has been developed which allows designers to perform time-domain behavioral simulations of pipelined analog to digital converters (ADCs). All the necessary blocks of this specific simulation environment have been implemented using the popular Matlab simulink environment. The purpose of this paper is to present the behavioral models of these blocks taking into account most of the pipelined ADC non-idealities, such as sampling jitter, noise, and operational amplifier parameters (white noise, finite DC gain, finite bandwidth, slew rate, and saturation voltages). Simulations, using a 10-bit pipelined ADC as a design example, show that in addition to the limits analysis and the electrical features extraction, designers can determine the specifications of the basic blocks in order to meet the given data converter requirements.  相似文献   
5.
Microsystem Technologies - This study presents the results on the feasibility of a resonant planar chemical capacitive sensor in the microwave frequency range suitable for gas detection and...  相似文献   
6.

The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate. Integrating the social component into IoT gave rise to the Social Internet of Things (SIoT), which has helped overcome various issues such as heterogeneity and navigability. In this kind of environment, participants compete to offer a variety of attractive services. Nevertheless, some of them resort to malicious behaviour to spread poor-quality services. They perform so-called Trust-Attacks and break the basic functionality of the system. Trust management mechanisms aim to counter these attacks and provide the user with an estimate of the trust degree they can place in other users, thus ensuring reliable and qualified exchanges and interactions. Several works in literature have interfered with this problem and have proposed different Trust-Models. The majority tried to adapt and reapply Trust-Models designed for common social networks or peer-to-peer ones. That is, despite the similarities between these types of networks, SIoT ones present specific peculiarities. In SIoT, users, devices and services are collaborating. Devices entities can present constrained computing and storage capabilities, and their number can reach some millions. The resulting network is complex, constrained and highly dynamic, and the attacks-implications can be more significant. In this paper, we propose DSL-STM a new dynamic and scalable multi-level Trust-Model, specifically designed for SIoT environments. We propose multidimensional metrics to describe and SIoT entities behaviours. The latter are aggregated via a Machine Learning-based method, allowing classifying users, detecting attack types and countering them. Finally, a hybrid propagation method is suggested to spread trust values in the network, while minimizing resource consumption and preserving scalability and dynamism. Experimentation made on various simulated scenarios allows us to prove the resilience and performance of DSL-STM.

  相似文献   
7.
This paper presents a design of a smart humidity sensor. First we begin by the modeling of a Capacitive MEMS-based humidity sensor. Using neuronal networks and Matlab environment to accurately express the non-linearity, the hysteresis effect and the cross sensitivity of the output humidity sensor used. We have done the training to create an analytical model CHS “Capacitive Humidity Sensor”. Because our sensor is a capacitive type, the obtained model on PSPICE reflects the humidity variation by a capacity variation, which is a passive magnitude; it requires a conversion to an active magnitude, why we realize a conversion capacity/voltage using a switched capacitor circuit SCC. In a second step a linearization, by Matlab program, is applied to CHS response whose goal is to create a database for an element of correction “CORRECTOR”. After that we use the bias matrix and the weights matrix obtained by training to establish the CHS model and the CORRECTOR model on PSPICE simulator, where the output of the first is identical to the output of the CHS and the last correct its nonlinear response, and eliminate its hysteresis effect and cross sensitivity. The three blocks; CHS model, CORRECTOR model and the capacity/voltage converter, represent the smart sensor.  相似文献   
8.
Configuration Logic (CL) is a formal language that allows a network engineer to express constraints in terms of the actual parameters found in the configuration of network devices. We present an efficient algorithm that can automatically check a pool of devices for conformance to a set of CL constraints; moreover, this algorithm can point to the part of the configuration responsible for the error when a constraint is violated. Contrary to other validation approaches that require dumping the configuration of the whole network to a central location in order to be verified, we also present an algorithm that analyzes the correct formulas and greatly helps reduce the amount of data that need to be transferred to that central location, pushing as much of the evaluation of the formula locally on each device. The procedure is also backwards-compatible, in such a way that a device that does not (or only partially) supports a local evaluation may simply return a subset or all of its configuration. These capabilities have been integrated into a network management tool called ValidMaker.  相似文献   
9.
10.
Benchmarking is comparing the output of different systems for a given set of input data in order to improve the system’s performance. Faced with the lack of realistic and operational benchmarks that can be used for testing optimization methods and control systems in flexible systems, this paper proposes a benchmark system based on a real production cell. A three-step method is presented: data preparation, experimentation, and reporting. This benchmark allows the evaluation of static optimization performances using traditional operation research tools and the evaluation of control system's robustness faced with unexpected events.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号