首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   147篇
  免费   12篇
电工技术   8篇
化学工业   20篇
金属工艺   11篇
机械仪表   4篇
建筑科学   4篇
矿业工程   1篇
能源动力   9篇
轻工业   11篇
水利工程   2篇
石油天然气   2篇
无线电   36篇
一般工业技术   15篇
冶金工业   7篇
自动化技术   29篇
  2023年   5篇
  2022年   7篇
  2021年   6篇
  2020年   8篇
  2019年   4篇
  2018年   10篇
  2017年   10篇
  2016年   10篇
  2015年   5篇
  2014年   15篇
  2013年   16篇
  2012年   5篇
  2011年   9篇
  2010年   6篇
  2009年   6篇
  2008年   9篇
  2007年   7篇
  2006年   7篇
  2005年   5篇
  2003年   1篇
  2002年   3篇
  2001年   2篇
  1998年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有159条查询结果,搜索用时 31 毫秒
1.
A model is presented for drying of a single porous particle with superheated steam and humid air. Experimental data for spherical porous ceramic particle reported in the literature were used for the validation of the model. An inversion temperature at which the evaporation rates within superheated steam and humid air are equal was predicted. The effect of thermophysical properties of the particle (permeability 10-14 - 10-17 m2, diameter 3 × 10-3 - 10 × 10-3 m) and operating variables (gas mass flux 0.26 - 0.78 kg m-2 s-1, drying agent temperature 120-200°C) is tested. The inversion temperature is shown to be affected by the thermophysical properties of the porous particle and of the drying agent.  相似文献   
2.
The main objective of this study is to explore the utility of a neural network-based approach in hand gesture recognition. The proposed system presents two recognition algorithms to recognize a set of six specific static hand gestures, namely open, close, cut, paste, maximize, and minimize. The hand gesture image is passed through three stages: preprocessing, feature extraction, and classification. In the first method, the hand contour is used as a feature that treats scaling and translation of problems (in some cases). However, the complex moment algorithm is used to describe the hand gesture and to treat the rotation problem in addition to scaling and translation. The back-propagation learning algorithm is employed in the multilayer neural network classifier. The second method proposed in this article achieves better recognition rate than the first method.  相似文献   
3.
This paper proposes developing a H dynamic output-feedback decentralized control design method for nonlinear interconnected systems subject to time-varying parameters and external disturbances. The designed controller is formulated as an optimization problem subject to linear matrix inequalities (LMIs) for the concurrent computation of the decentralized observation and control gains, and for the external disturbance mitigation by means of a H performance criterion minimization. The propounded optimization problem, designed in LMI conditions, is expeditiously resolved by a one-step procedure to override the conservatism generated by using many step-based procedures often used in the analysis and synthesis of interconnected systems. The effectiveness of the developed control scheme is demonstrated through simulation results of multimachine power systems.  相似文献   
4.
AlGaN/GaN high electron mobility transistors (HEMTs) with Si and Al2O3 substrates reveals anomalies on Ids-Vds-T and Igs-Vgs-T characteristics (degradation in drain current, kink effect, barrier height fluctuations, etc.). Stress and random telegraph signal (RTS) measurements prove the presence of trap centers responsible for drain current degradation. An explanation of the trapping mechanism responsible for current instabilities is proposed. Deep defects analysis performed by capacitance transient spectroscopy (C-DLTS), frequency dispersion of the output conductance (Gds(f)), respectively, on gate/source and drain/source contacts and RTS prove the presence of deep defects localized, respectively, in the gate and in the channel regions. Defects detected by C-DLTS and Gds(f) are strongly correlated, respectively, to barrier height inhomogeneities and kink anomalies. Gate current analysis confirms the presence of (G-R) centers acting like traps at the interface GaN/AlGaN. Finally, the localization of these traps defects is proposed.  相似文献   
5.
6.
7.
8.
The measurement of transportation network travel time reliability is imperative to provide drivers with accurate route guidance information and to generate the shortest path (or alternative paths) connecting origins and destinations, especially under conditions of varying demands and limited capacities. Previous studies assumed that link failures in a road network are statistically independent and that reliability probabilities are perfectly determinable. In real life, these assumptions are dubious, because the failure of a link in one particular area does not necessarily result in the complete failure of the neighboring link, but may lead to deterioration of its performance. This paper presents a new methodology to study the multistate system reliability analysis of transportation networks for which one cannot formulate an “all or nothing” type of failure criterion and in which dependent link failures are considered. The methodology is presented, using a numerical example, for computing the probability that travel time between an origin and a destination may exceed a threshold.  相似文献   
9.
This paper presents the results of an investigation and pilot study into an active binocular vision system that combines binocular vergence, object recognition and attention control in a unified framework. The prototype developed is capable of identifying, targeting, verging on and recognising objects in a cluttered scene without the need for calibration or other knowledge of the camera geometry. This is achieved by implementing all image analysis in a symbolic space without creating explicit pixel-space maps. The system structure is based on the ‘searchlight metaphor’ of biological systems. We present results of an investigation that yield a maximum vergence error of ~6.5 pixels, while ~85% of known objects were recognised in five different cluttered scenes. Finally a ‘stepping-stone’ visual search strategy was demonstrated, taking a total of 40 saccades to find two known objects in the workspace, neither of which appeared simultaneously within the field of view resulting from any individual saccade.  相似文献   
10.
Data mining is a process of digging data sets from large data‐bases, especially for use to improve the operation efficiency of a company, institution, or an organization. With the increasing cases of cyber and other computer‐related crimes, computer and mobile data security has become a matter of concern, secure, and non‐contaminated data is very important for data mining to improve the performance of a system. This paper proposes a system framework that is able to collect information and then be able to generate alerts in real time. The proposed scheme is then simulated using the K‐means clustering algorithm, which is one of the most popular clustering algorithms to determine the efficiency and the accuracy of the proposed scheme. The paper concludes by proposing further improvements to be undertaken on the proposed system to improve its efficiency and accuracy. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号