首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   243篇
  免费   19篇
  国内免费   2篇
电工技术   1篇
化学工业   65篇
金属工艺   4篇
建筑科学   6篇
矿业工程   2篇
能源动力   15篇
轻工业   31篇
水利工程   1篇
无线电   31篇
一般工业技术   34篇
冶金工业   20篇
原子能技术   1篇
自动化技术   53篇
  2023年   5篇
  2022年   15篇
  2021年   15篇
  2020年   14篇
  2019年   9篇
  2018年   15篇
  2017年   11篇
  2016年   12篇
  2015年   6篇
  2014年   20篇
  2013年   16篇
  2012年   14篇
  2011年   15篇
  2010年   9篇
  2009年   13篇
  2008年   7篇
  2007年   6篇
  2006年   6篇
  2005年   7篇
  2004年   2篇
  2003年   6篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1999年   3篇
  1998年   11篇
  1997年   6篇
  1996年   3篇
  1995年   5篇
  1994年   3篇
  1993年   2篇
  1989年   2篇
  1981年   1篇
  1980年   1篇
排序方式: 共有264条查询结果,搜索用时 31 毫秒
1.
Surface functionalization and modification including the grafting process are effective approaches to improve and enhance the reverse osmosis (RO) membrane performance. This work is aimed to synthesize grafted/crosslinked cellulose acetate (CA)/cellulose triacetate (CTA) blend RO membranes using N-isopropylacrylamide (N-IPAAm) as a monomer and N,N-methylene bisacrylamide (MBAAm) as a crosslinker. The morphology of these membranes was analyzed by scanning electron microscopy and their surface roughness was characterized by atomic force microscopy. The performance of these membranes was evaluated through measuring two major parameters of salt rejection and water flux using RO unit at variable operating pressures. It was noted that the surface average roughness obviously decreased from 148 nm for the pure CA/CTA blend membrane with 2.5% CTA to 110 nm and 87 nm for the grafted N-IPAAm and grafted/crosslinked N-IPAAM/MBAAm/CA/CTA-RO membranes, respectively. Moreover, the contact angle decreased from 51.98° to 47.6° and 43.8° after the grafting and crosslinking process. The salt rejection of the grafted CA/CTA-RO membrane by 0.1% N-IPAAm produced the highest value of 98.12% and the water flux was 3.29 L/m2h at 10 bar.  相似文献   
2.
N. Kamoun  B. Rezig 《Thin solid films》2007,515(15):5949-5952
We have investigated synthesis conditions and some properties of sprayed Cu2ZnSnS4 (CZTS) thin films in order to determine the best preparation conditions for the realization of CZTS based photovoltaic solar cells. The thin films are made by means of spraying of aqueous solutions containing copper chloride, zinc chloride, tin chloride and thiourea on heated glass substrates at various temperatures. In order to optimize the synthesis conditions of the CZTS films, two series of experiments are performed. In the first series the sprayed duration was fixed at 30 min and in the second it is fixed at 60 min. In each series, the substrate temperature was changed from 553°K to 633°K. The X-ray diffraction shows, on one hand, that the best crystallinity was obtained for 613°K as substrate temperature and 60 min as sprayed duration. On the other hand, these CZTS films exhibit the kesterite structure with preferential orientation along the [112] direction. Atomical Force Microscopy was used to determine the grain sizes and the roughness of these CZTS thin film. After the annealing treatment, we estimated the optical band-gap energy of the CZTS thin film exhibiting the best crystallinity as 1.5 eV which is quite close to the optimum value for a solar cell.  相似文献   
3.
In this paper, we consider a discrete-time queuing system with head-of-line non-preemptive priority scheduling and a single server subjected to server interruptions. We model the server interruptions by a correlated Markovian on/off process with geometrically distributed on and off periods. Two classes of traffic are considered, namely high-priority and low-priority traffic. In the first part of the paper, we derive an expression for the functional equation describing the transient evolution of this priority queuing system. This functional equation is then manipulated and transformed into a mathematical tractable form. This allows us to derive the joint probability generating function (pgf) of the system contents. From this pgf, closed-form expressions for various performance measures, such as mean and variance of system contents and customer delay can be derived. Finally, we illustrate our solution technique with some numerical examples, whereby we demonstrate the negative effect of correlation in the interruption process on the performance of both classes. Some numerical results illustrating the impact of second-order characteristics of the arrival process on mean delays are also presented. The proposed approach which is purely based on pgfs is entirely analytical and enables the derivation of not only steady-state but transient performance measures, as well. The paper presents new insights into the performance analysis of discrete-time queues with service interruption and it also covers some previously published results as a special case.

Scope and purpose

In this contribution, we consider a practical queuing model, with HOL priority scheduling, two classes of traffic, and a server which is subjected to a correlated Markovian interruption process. We first derive a non-linear functional equation relating the joint pgf of the system state vector between two consecutive slots. Then we outline a solution technique to solve for this functional equation. This allows us to derive the joint pgf of the system contents of both classes, from which various performance measures related to mean system contents and customer delays are derived. We also demonstrate how the proposed approach allows for derivation of transient performance measures, as well. It should be noted that detailed coverage of the transient analysis of the system is beyond the scope of this paper.To our best knowledge, this is the first initiative that aims to explore the performance of queuing systems with priority scheduling when the shared server is subjected to service interruption. The paper also generalizes the results of Walraevens et al. (Analysis of a single-server ATM queue with priority scheduling, Computers & Operations Research 2003;30(12):1807–30) by incorporating service interruption into their original queuing model. By means of numerical results, the paper also demonstrates the effect of correlation in the service interruption process on the performance of both classes of customers. The impact of second-order characteristics of the arrival process on mean delays is also investigated.  相似文献   
4.
Next-generation cellular networks are expected to provide users with innovative gigabits and terabits per second speeds and achieve ultra-high reliability, availability, and ultra-low latency. The requirements of such networks are the main challenges that can be handled using a range of recent technologies, including multi-access edge computing (MEC), artificial intelligence (AI), millimeter-wave communications (mmWave), and software-defined networking. Many aspects and design challenges associated with the MEC-based 5G/6G networks should be solved to ensure the required quality of service (QoS). This article considers developing a complex MEC structure for fifth and sixth-generation (5G/6G) cellular networks. Furthermore, we propose a seamless migration technique for complex edge computing structures. The developed migration scheme enables services to adapt to the required load on the radio channels. The proposed algorithm is analyzed for various use cases, and a test bench has been developed to emulate the operator’s infrastructure. The obtained results are introduced and discussed.  相似文献   
5.

The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate. Integrating the social component into IoT gave rise to the Social Internet of Things (SIoT), which has helped overcome various issues such as heterogeneity and navigability. In this kind of environment, participants compete to offer a variety of attractive services. Nevertheless, some of them resort to malicious behaviour to spread poor-quality services. They perform so-called Trust-Attacks and break the basic functionality of the system. Trust management mechanisms aim to counter these attacks and provide the user with an estimate of the trust degree they can place in other users, thus ensuring reliable and qualified exchanges and interactions. Several works in literature have interfered with this problem and have proposed different Trust-Models. The majority tried to adapt and reapply Trust-Models designed for common social networks or peer-to-peer ones. That is, despite the similarities between these types of networks, SIoT ones present specific peculiarities. In SIoT, users, devices and services are collaborating. Devices entities can present constrained computing and storage capabilities, and their number can reach some millions. The resulting network is complex, constrained and highly dynamic, and the attacks-implications can be more significant. In this paper, we propose DSL-STM a new dynamic and scalable multi-level Trust-Model, specifically designed for SIoT environments. We propose multidimensional metrics to describe and SIoT entities behaviours. The latter are aggregated via a Machine Learning-based method, allowing classifying users, detecting attack types and countering them. Finally, a hybrid propagation method is suggested to spread trust values in the network, while minimizing resource consumption and preserving scalability and dynamism. Experimentation made on various simulated scenarios allows us to prove the resilience and performance of DSL-STM.

  相似文献   
6.
In this paper, we take an interest in representation and treatment of imprecision and uncertainty in order to propose an original approach to approximate reasoning. This work has a practical application in supervised learning pattern recognition. Production rules whose conclusions are accompanied by belief degrees, are obtained by supervised learning from a training set. The proposed learning method is multi-featured, it allows to take into account the possible predictive power of a simultaneously considered feature conjunction. On the other hand, the feature space partition allows a fuzzy representation of the features and data imprecision integration. This uncertainty is managed in the learning phase as well as in the recognition one. To introduce more flexibility and to overcome the boundary problem due to the manipulations of membership functions of fuzzy sets, we propose to use a context-oriented approximate reasoning. For this purpose, we introduce an adequate distance to compare neighbouring facts. This distance, measuring imprecision, combined with the uncertainty of classification decisions represented by belief degrees, drives the approximate inference. The proposed method was implemented in a software called SUCRAGE and confronted with a real application in the field of image processing. The obtained results are very satisfactory. They validate our approach and allow us to consider other application fields.  相似文献   
7.

Context

Formal methods are very useful in the software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and modeling of various system aspects expressed usually through different paradigms. These different formalisms make the verification of global developed systems more difficult.

Objective

In this paper, we propose to combine two modeling formalisms, in order to express both functional and security timed requirements of a system to obtain all the requirements expressed in a unique formalism.

Method

First, the system behavior is specified according to its functional requirements using Timed Extended Finite State Machine (TEFSM) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security requirements specified in Nomad language. This language is adapted to express security properties such as permissions, prohibitions and obligations with time considerations.

Results

The proposed algorithms produce a global TEFSM specification of the system that includes both its functional and security timed requirements.

Conclusion

It is concluded that it is possible to merge several requirement aspects described with different formalisms into a global specification that can be used for several purposes such as code generation, specification correctness proof, model checking or automatic test generation. In this paper, we applied our approach to a France Telecom Travel service to demonstrate its scalability and feasibility.  相似文献   
8.
This paper reports the biomonitoring of metallic pollution in the mine of Sidi Kamber Skikda town, to determine the resistance and/or tolerance to Zn, Pb, Cd and Cu in metalliferous plants. During the period of March–May, 2015, soil and plants samples were collected from three different stations in the study area. The total heavy metal fraction was determined by ICP/MS, whereas biochemical markers were determined by spectrophotometric techniques. The results obtained showed high levels of heavy metals in soil and plants compared to international standards. The translocation factor revealed that the studied plants can transfer and/or accumulate metals in their roots or their aerial parts as a function of characteristics of each metal, soil contents and physiological role in the plant. The contents of chlorophyll, proline, total sugars and total proteins are directly influenced by changes in bioavailable contents of heavy metals. It has been found that the plants studied and biomarkers are better suited for phytoremediation and biomonitoring of heavy metals pollution.  相似文献   
9.
Multimedia Tools and Applications - A multi-scale analysis method, called Empirical Mode Decomposition (EMD), has been proposed for analysis of nonlinear and non stationary data. The empirical mode...  相似文献   
10.
The formation of macropores in silicon during electrochemical etching processes has attracted much interest. Experimental evidences indicate that charge transport in silicon and in the electrolyte should realistically be taken into account in order to be able to describe the macropore morphology. However, up to now, none of the existing models has the requested degree of sophistication to reach such a goal. Therefore, we have undertaken the development of a mathematical model (phase-field model) to describe the motion and shape of the silicon/electrolyte interface during anodic dissolution. It is formulated in terms of the fundamental expression for the electrochemical potential and contains terms which describe the process of silicon dissolution during electrochemical attack in a hydrofluoric acid (HF) solution. It should allow us to explore the influence of the physical parameters on the etching process and to obtain the spatial profiles across the interface of various quantities of interest, such as the hole concentration, the current density, or the electrostatic potential. As a first step, we find that this model correctly describes the space charge region formed at the silicon side of the interface.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号