首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   92篇
  免费   5篇
电工技术   1篇
化学工业   22篇
机械仪表   1篇
能源动力   3篇
轻工业   15篇
无线电   6篇
一般工业技术   22篇
冶金工业   23篇
自动化技术   4篇
  2022年   2篇
  2021年   3篇
  2020年   2篇
  2019年   1篇
  2017年   4篇
  2016年   3篇
  2015年   5篇
  2013年   8篇
  2012年   2篇
  2011年   5篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2007年   1篇
  2005年   3篇
  2004年   1篇
  2003年   4篇
  2002年   3篇
  2001年   5篇
  2000年   1篇
  1999年   2篇
  1998年   13篇
  1997年   4篇
  1996年   1篇
  1995年   3篇
  1994年   2篇
  1993年   1篇
  1989年   1篇
  1988年   1篇
  1984年   2篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1977年   1篇
  1976年   1篇
  1974年   1篇
  1971年   1篇
排序方式: 共有97条查询结果,搜索用时 15 毫秒
1.
In this paper, techniques and related issues for the definition of a contextual knowledge in ambient-intelligence systems are explored. A logical structure for this kind of system, inspired by a neurobiological brain model, is proposed. Through these considerations, the role and the importance of context awareness in the definition of an artificial organism showing adaptability, pervasiveness, and scalability features are described. Techniques for the definition of a multilayer context representation are explained and practically demonstrated with a test-bed. In the proposed system, a complex event classification is obtained through the fusion of heterogeneous data coming from a set of sensors thanks to the design of a self-organizing map (SOM). The SOM represents the core of the system and testing proofs show good results in the classification of the events taking place in the monitored environment.  相似文献   
2.
The need for an electronic copyright management system (ECMS) that protects intellectual property rights (IPR) in open network environments continues to grow. Network security issues are classically handled through cryptography; however, cryptography ensures confidentiality, authenticity, and integrity only when a message is transmitted through a public channel, such as an open network. It does not protect against unauthorized copying after the message has been successfully transmitted. Digital watermarking is an effective way to protect copyright of multimedia data even after its transmission. A watermark, embedded in the data, can uniquely identify the document's owner or authorized user. The main problem with using watermark technology, for IPR protection, however, is its reversibility. Anyone who can read or detect the watermark can also remove it by inverting the watermark process. Our open network ECMS combines watermarking with cryptography to achieve reliable copyright protection while satisfying two contrasting requirements: actors in ECMS transactions must be able to verify that the watermark granting their rights is truly embedded in the multimedia document; and actors (other than the author) must not be able to remove the watermark  相似文献   
3.
An analysis is presented for the in-plane biaxial loading of an elastic system consisting of a partially bonded rigid elliptic inclusion embedded in an infinite matrix where the bond imperfections are two symmetric cracks. The boundary value problem is formulated through the complex variable technique in the case of linearly elastic matrix under general biaxial loading at infinity. The elastic solution is obtained for a simplified model by assuming incompressibility and plane strain conditions for the matrix. In particular, stress and displacement fields are represented and discussed.

Moreover, a stress criterion, which permits to take into account, either the crack extension at the interface or its deviation into the matrix, is considered to study the fracture response of the elastic system.  相似文献   

4.
Capacity of full frame DCT image watermarks   总被引:14,自引:0,他引:14  
The evaluation of the number of bits that can be hidden within an image through digital watermarking is a crucial topic, which has been addressed only for additive watermarks. The evaluation of watermark capacity is very important because it allows to put a theoretical upper bound on the amount of information that can be hidden into an image by a given watermarking procedure, regardless of the watermark extraction technique. It is the purpose of this work to suggest a methodology for the evaluation of the watermark capacity in a nonadditive, non-Gaussian framework, and to discuss the results we obtained by applying it to a set of standard images.  相似文献   
5.
This study evaluated the effectiveness of benzodioxole derivatives as coinitiators of radical polymerization in a model‐dental adhesive resin. To compose the adhesive resin, a monomer mixture based on 50 wt % of Bis‐GMA, 25 wt % of TEGDMA, and 25 wt % of HEMA was used. Camphorquinone (CQ) 1 mol % was used as a photoinitiator to initiate polymerization. 1,3‐Benzodioxole (BDO) and piperonyl alcohol (PA) were used as coinitiators at 0.25, 0.5, 1, 2, 4, 8, and 16 mol % level. In addition, tertiary amine, ethyl 4‐dimethylamino benzoate (EDAB) was used as coinitiator in the control group. Some physical, chemical, and mechanical properties of the polymer formed in the experimental adhesives were evaluated using the kinetics of polymerization, sorption and solubility, flexural strength, and elastic modulus tests. The results indicated that BDO and PA were effective coinitiators in the photoinitiator system based on CQ. Comparisons between the benzodioxoles derivative coinitiators and EDAB showed similar performance in the kinetics of polymerization and flexural strength. For water sorption and solubility evaluation, BDO and PA demonstrated significantly more sorption of water and less solubility than the EDAB control group. The findings suggest that BDO and PA were feasible alternatives to conventional amine as coinitiator. © 2012 Wiley Periodicals, Inc. J. Appl. Polym. Sci., 2013  相似文献   
6.
A numerical and experimental investigation is presented of a periodic phase-change process dominated by heat conduction. In the experimental arrangement a plane slab of PCM is periodically heated from above. A one-dimensional control volume computer code has been developed for the solution of the corresponding mathematical model. The comparison between numerical predictions and experimental data shows good agreement, even though appreciable effects are produced by free convection and heat transfer to the environment, neglected in the model but unavoidable in the experiment. Finally, in order to study the energy stored in the process, parameters like amplitude and mean value of the oscillations are discussed as functions of the significant dimensionless numbers of the problem.  相似文献   
7.
The present article summarizes our data regarding: (a) the effect of sex steroids on the expression of a specific astrocytic marker in glial cell cultures (GFAP); (b) the effects of aging on two markers of the peripheral myelin (glycoprotein Po and the myelin basic protein, MBP); (c) the possible modification of the damaging effects of aging on these two markers by the in vivo administration of progesterone and its derivatives; and, finally, (d) the effect of progesterone derivatives on the gene expression of Po in cultures of rat Schwann cells. The data obtained have indicated that progesterone and its 5 alpha-reduced metabolites may play an important role in the control of gene expression of GFAP and Po, respectively, in type 1 astrocytes and Schwann cells. It has also been found that the gene expression of Po and MBP is dramatically decreased in the myelin of the sciatic nerve of aged male rats and that the aged-linked decrease of the gene expression of Po is partially reversible with steroid treatment.  相似文献   
8.
A combined study of F.D. and F.E. methods for 2-D incompressible Navier-Stokes flows is undertaken. In primitive variable formulation, major difficulties are connected to spurious numerical oscillations which may arise from the enforcement of the incompressibility constraint. With regard to this problem, various F.D. schemes differ essentially according to the variable location on the mesh points, while F.E. schemes are analogously differentiated by the interpolation functions adopted for the different variables. In the present paper, we propose an F.E. analog of MAC scheme, which can be accomplished by different interpolation functions for the two velocity components. This new F.E. scheme-although based on low order approximations-eliminates all spurious oscillations. The extension to curvilinear quadrilateral elements—which is needed in order to achieve geometrical versatility—requires the problem to be formulated in general curvilinear coordinates and the contravariant velocity components to be assumed as variables. Some numerical results are presented and discussed, in order to assess the capabilities of the proposed model.  相似文献   
9.
10.
In this paper a new method based on the maximum tensile stress criterion is proposed in order to predict the crack paths in sheets of brittle materials under biaxial loading. The proposed approach allows to obtain the crack trajectory avoiding integral representations and is more simple and direct that the perturbation techniques introduced in [34–37]. Moreover, the above method takes into account of some experimental features concerning the asymptotic behaviour of crack paths. In view of applications to slightly curved cracks, the knowledge of the stress intensity factors KI and II is needed and in this aim the perturbation method of [37] is used for a slightly curved elliptical arc crack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号