全文获取类型
收费全文 | 125篇 |
免费 | 4篇 |
国内免费 | 1篇 |
专业分类
化学工业 | 25篇 |
金属工艺 | 5篇 |
机械仪表 | 1篇 |
建筑科学 | 1篇 |
能源动力 | 2篇 |
轻工业 | 5篇 |
无线电 | 25篇 |
一般工业技术 | 23篇 |
冶金工业 | 21篇 |
原子能技术 | 1篇 |
自动化技术 | 21篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 3篇 |
2019年 | 4篇 |
2018年 | 4篇 |
2017年 | 5篇 |
2016年 | 4篇 |
2015年 | 3篇 |
2014年 | 5篇 |
2013年 | 2篇 |
2012年 | 7篇 |
2011年 | 3篇 |
2010年 | 6篇 |
2009年 | 7篇 |
2008年 | 5篇 |
2007年 | 6篇 |
2006年 | 5篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2003年 | 3篇 |
2002年 | 8篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1971年 | 1篇 |
排序方式: 共有130条查询结果,搜索用时 15 毫秒
1.
S N Maitra 《Sadhana》1985,8(4):373-385
The burn time and burnout velocity of a multistage rocket flown vertically in vacuum with constant thrust tangential to the
flight path and a prescribed initial/final thrust-to-weight ratio in an arbitrary stage have been determined.
The present paper also deals with optimal staging under given conditions of flight. 相似文献
2.
Interactive optimization algorithms use real–time interaction to include decision maker preferences based on the subjective quality of evolving solutions. In water resources management problems where numerous qualitative criteria exist, use of such interactive optimization methods can facilitate in the search for comprehensive and meaningful solutions for the decision maker. The decision makers using such a system are, however, likely to go through their own learning process as they view new solutions and gain knowledge about the design space. This leads to temporal changes (nonstationarity) in their preferences that can impair the performance of interactive optimization algorithms. This paper proposes a new interactive optimization algorithm – Case-Based Micro Interactive Genetic Algorithm – that uses a case-based memory and case-based reasoning to manage the effects of nonstationarity in decision maker’s preferences within the search process without impairing the performance of the search algorithm. This paper focuses on exploring the advantages of such an approach within the domain of groundwater monitoring design, though it is applicable to many other problems. The methodology is tested under non-stationary preference conditions using simulated and real human decision makers, and it is also compared with a non-interactive genetic algorithm and a previous version of the interactive genetic algorithm. 相似文献
3.
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction 总被引:13,自引:0,他引:13
Carlet C. Dalai D.K. Gupta K.C. Maitra S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(7):3105-3121
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It has been observed that a Boolean function f used as a cryptographic primitive, and interpreted as a multivariate polynomial over F/sub 2/, should not have low degree multiples obtained by multiplication with low degree nonzero functions. In this paper, we show that a Boolean function having low nonlinearity is (also) weak against algebraic attacks, and we extend this result to higher order nonlinearities. Next, we present enumeration results on linearly independent annihilators. We also study certain classes of highly nonlinear resilient Boolean functions for their algebraic immunity. We identify that functions having low-degree subfunctions are weak in terms of algebraic immunity, and we analyze some existing constructions from this viewpoint. Further, we present a construction method to generate Boolean functions on n variables with highest possible algebraic immunity /spl lceil/n/2/spl rceil/ (this construction, first presented at the 2005 Workshop on Fast Software Encryption (FSE 2005), has been the first one producing such functions). These functions are obtained through a doubly indexed recursive relation. We calculate their Hamming weights and deduce their nonlinearities; we show that they have very high algebraic degrees. We express them as the sums of two functions which can be obtained from simple symmetric functions by a transformation which can be implemented with an algorithm whose complexity is linear in the number of variables. We deduce a very fast way of computing the output to these functions, given their input. 相似文献
4.
Design and implementation of a block‐backstepping based tracking control for nonholonomic wheeled mobile robot 下载免费PDF全文
This paper presents formulation of a novel block‐backstepping based control algorithm to overcome the challenges posed by the tracking and the stabilization problem for a differential drive wheeled mobile robot (WMR). At first, a two‐dimensional output vector for the WMR has been defined in such a manner that it would decouple the two control inputs and, thereby, allow the designer to formulate the control laws for the two inputs one at a time. Actually, the decoupling has been carried out in a way to convert the system into block‐strict feedback form. Thereafter, block‐backstepping control algorithm has been utilized to derive the expressions of the control inputs for the WMR system. The proposed block‐backstepping technique has further been enriched by incorporating an integral action for enhancing the steady state performance of the overall system. Global asymptotic stability of the overall system has been analyzed using Lyapunov stability criteria. Finally, the proposed control algorithm has been implemented on a laboratory scale differential drive WMR to verify the effectiveness of the proposed control law in real‐time environment. Indeed, the proposed design approach is novel in the sense that it has judiciously exploited the nonholonomic constraint of the WMR to result in a reduced order block‐backstepping controller for the WMR, and thereby, it has eventually yielded a compact expression of the control law that is amenable to real‐time implementation. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
5.
This paper presents the formulation of a novel block-backstepping based control algorithm to address the stabilization problem for a generalized nonlinear underactuated mechanical system. For the convenience of compact design, first, the state model of the underactuated system has been converted into the block-strict feedback form. Next, we have incorporated backstepping control action to derive the expression of the control input for the generic nonlinear underactuated system. The proposed block backstepping technique has further been enriched by incorporating an integral action additionally for enhancing the steady state performance of the overall system. Asymptotic stability of the overall system has been analyzed using Lyapunov stability criteria. Subsequently, the stability of the zero dynamics has also been analyzed to ensure the global asymptotic stability of the entire nonlinear system at its desired equilibrium point. The proposed control algorithm has been applied for the stabilization of a benchmarked underactuated mechanical system to verify the effectiveness of the proposed control law in real-time environment. 相似文献
6.
Extreme Two‐Phase Cooling from Laser‐Etched Diamond and Conformal,Template‐Fabricated Microporous Copper 下载免费PDF全文
James W. Palko Hyoungsoon Lee Chi Zhang Tom J. Dusseault Tanmoy Maitra Yoonjin Won Damena D. Agonafer Jess Moss Farzad Houshmand Guoguang Rong Joshua D. Wilbur Derrick Rockosi Ihor Mykyta Dan Resler David Altman Mehdi Asheghi Juan G. Santiago Kenneth E. Goodson 《Advanced functional materials》2017,27(45)
This paper reports the first integration of laser‐etched polycrystalline diamond microchannels with template‐fabricated microporous copper for extreme convective boiling in a composite heat sink for power electronics and energy conversion. Diamond offers the highest thermal conductivity near room temperature, and enables aggressive heat spreading along triangular channel walls with 1:1 aspect ratio. Conformally coated porous copper with thickness 25 µm and 5 µm pore size optimizes fluid and heat transport for convective boiling within the diamond channels. Data reported here include 1280 W cm?2 of heat removal from 0.7 cm2 surface area with temperature rise beyond fluid saturation less than 21 K, corresponding to 6.3 × 105 W m?2 K?1. This heat sink has the potential to dissipate much larger localized heat loads with small temperature nonuniformity (5 kW cm?2 over 200 µm × 200 µm with <3 K temperature difference). A microfluidic manifold assures uniform distribution of liquid over the heat sink surface with negligible pumping power requirements (e.g., <1.4 × 10?4 of the thermal power dissipated). This breakthrough integration of functional materials and the resulting experimental data set a very high bar for microfluidic heat removal. 相似文献
7.
Harshita Gogoi V. Nirosha Anjali Jayakumar Keerthana Prabhu Meghna Maitra 《Energy Sources, Part A: Recovery, Utilization, and Environmental Effects》2018,40(1):39-44
In the present study, pre-treated paper mill sludge (PMS) was evaluated extensively as a substrate for production of acetone-butanol-ethanol using Clostridium sporogenes NCIM 2337. The PMS was subjected to three types of pre-treatment methods namely alkali, mechanical, and thermal treatment and was analyzed by SEM. The pre-treatment of PMS by alkali was observed to be more effective over the other pre-treatment methods. The alkali pre-treated sludge was then made to undergo fermentation, which showed the conventional process of acidogenesis followed by solventogenesis. The acetone, butanol, and ethanol concentration for 15% alkali pre-treated PMS was estimated to be maximum. 相似文献
8.
Pattern Analysis and Applications - This paper proposed a novel 3D unsupervised spatial fuzzy-based brain MRI volume segmentation technique in the presence of intensity inhomogeneity and noise.... 相似文献
9.
Here we study a recently proposed watermarking scheme based on the paper “Wavelet Tree Quantization” (WTQ) by Wang and Lin (IEEE Trans Image Process 13(2):154–165, 2004). In given scheme, wavelet coefficients corresponding to the same spatial locations are grouped together. Two such groups, selected at random, constitute a supertree. Some of these supertrees are quantized to embed the watermark information in the image. In the process of cryptanalysis we first identify the groups which are quantized during the watermark insertion process. Then we select the non-quantized groups and quantize them too, to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under the cipher text only jamming attack which requires only a single watermarked copy. Further, we suitably modify the WTQ scheme to make it robust against such cryptanalytic attacks.This is an extended and revised version of the paper Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme presented at the International Workshop on Distributed Computing, IWDC 2004, Kolkata, 27–30 December 2004, Lecture Notes in Computer Science, vol. 3326, pp. 219–230. Springer, Berlin Heidelberg New York (2004). Section 4 of this paper introduces a modified scheme which is an addition over the conference version. Part of this work has been done while the author T. K. Das was visiting Indian Statistical Institute, Kolkata during 2004. 相似文献
10.
American document design process models reflect the assumption that comprehension and usability are the most important characteristics of effective documents, but it is increasingly evident that other cultures value other communicative features of documents and that purposes and intentions vary across cultures. This case study examines the responses of four sets of American readers (three sets familiar with American document design research and practice and one set of content specialists-engineers by training) to the visual aspects of an annual report. The original document was prepared for a mid-sized Japanese corporation and published and distributed in Japan; the American version is an almost literal translation of the original document from Japanese to English, with no changes in visuals, graphic design or format. Protocol analyses of readers' responses revealed distinct patterns of expectations and preferences based on (1) cultural biases, (2) degree of familiarity with the American document design model, and (3) ignorance of Japanese culture and corporate communicative practices. This study raises questions about the effectiveness in terms of cultural sensitivity of what we have called the “American” document design process model and usability testing procedures, and calls for extensive collaborative research designed to describe and analyze current practice in international settings 相似文献