首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   152篇
  免费   7篇
电工技术   1篇
化学工业   28篇
金属工艺   11篇
机械仪表   4篇
能源动力   5篇
轻工业   20篇
无线电   30篇
一般工业技术   37篇
冶金工业   16篇
自动化技术   7篇
  2023年   1篇
  2021年   3篇
  2020年   2篇
  2018年   2篇
  2017年   2篇
  2016年   11篇
  2015年   3篇
  2014年   4篇
  2013年   6篇
  2012年   8篇
  2011年   2篇
  2010年   4篇
  2009年   3篇
  2008年   3篇
  2007年   3篇
  2006年   5篇
  2005年   4篇
  2004年   4篇
  2003年   3篇
  2002年   7篇
  2001年   2篇
  2000年   8篇
  1999年   7篇
  1998年   9篇
  1997年   4篇
  1996年   6篇
  1995年   4篇
  1994年   5篇
  1993年   3篇
  1992年   3篇
  1991年   8篇
  1990年   6篇
  1989年   4篇
  1988年   1篇
  1987年   2篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1982年   3篇
排序方式: 共有159条查询结果,搜索用时 390 毫秒
1.
We investigated some properties of the hydride Mg2FeH6 substituted with yttrium by a first principles calculation. Some experimental results showed that 4d transition metal, yttrium serves as a good catalyst for magnesium based hydrogen storage alloys, but there are a few theoretical studies about magnesium based hydrides substituted with it. Mg2FeH6 is regarded as a cheaper material than pure MgH2, while it is crystalized into Fm3m structure (space group 225). Although it has high hydrogen storage capacity, many investigations have not been devoted to it due to its extremely high thermodynamic stability. The yttrium substituted Mg2FeH6 exhibits very low energy of formation, and its desorption temperature, 75 °C is very suitable for practical hydrogen storage applications. Our results showed that Mg2FeH6 is destabilized effectively by yttrium substitution and introducing vacancy defects has additive effect to the improvement of dehydrogenation performance.  相似文献   
2.
A.c. impedance has been determined at room temperature on hydrogen-free and hydrogen-charged passivating oxide films on aluminium in 0.05m Na2SO4 solution. Analysis of the impedance data enabled a clear distinction between the capacitance and inductance of the hydrogen-free oxide film and those of the hydrogen-charged oxide film to be made. The changes in capacitance and inductance by hydrogen-charging into the oxide films are discussed in relation to the compositional change from -Al2O3 to hydrated alumina.  相似文献   
3.
Top-k frequent pattern mining finds interesting patterns from the highest support to the k-th support. The approach can be effectively applied in numerous fields such as marketing, finance, bio-data analysis, and so on since it does not need constraints by a minimum support threshold. Top-k mining methods use the support of the k-th pattern, not a user-specified minimum support. Thus, the methods conduct mining operations based on very low supports until the k-th pattern is detected. When a low support is used in the mining process, single-paths with numerous items are generated, where the top-k mining algorithm extracts valid patterns by combining the items for each single-path. Therefore, the bigger the number of combinations is, the larger the increase in time and memory consumption is. In this paper, in order to mine top-k frequent patterns more efficiently, we consider converting patterns obtained from single-paths into composite patterns during the mining process and recovering them as the original patterns when the top-k frequent patterns are extracted. For this, we define a new concept, the composite pattern, and propose novel techniques for reducing pattern combinations in the single-path. Two algorithms are introduced in this paper, where the former is CRM (Combination Reducing method), applying our reduction manner, and the latter is CRMN (Combination Reducing method for N-itemset), considering N-itemset, i.e., patterns’ lengths. A performance evaluation shows that CRM and CRMN algorithms can efficiently reduce pattern combinations in single-paths compared to state-of-the-art algorithms. The experimental results also illustrate that our approaches have outstanding performance in terms of runtime, memory, and scalability.  相似文献   
4.
Wireless Multimedia Sensor Networks (WMSNs) consist of networks of interconnected devices involved in retrieving multimedia content, such as, video, audio, acoustic, and scalar data, from the environment. The goal of these networks is optimized delivery of multimedia content based on quality of service (QoS) parameters, such as delay, jitter and distortion. In multimedia communications each packet has strict playout deadlines, thus late arriving packets and lost packets are treated equally. It is a challenging task to guarantee soft delay deadlines along with energy minimization, in resource constrained, high data rate WMSNs. Conventional layered approach does not provide optimal solution for guaranteeing soft delay deadlines due to the large amount of overhead involved at each layer. Cross layer approach is fast gaining popularity, due to its ability to exploit the interdependence between different layers, to guarantee QoS constraints like latency, distortion, reliability, throughput and error rate. The paper presents a channel utilization and delay aware routing (CUDAR) protocol for WMSNs. This protocol is based on a cross-layer approach, which provides soft end-to-end delay guarantees along with efficient utilization of resources. Extensive simulation analysis of CUDAR shows that it provides better delay guarantees than existing protocols and consequently reduces jitter and distortion in WMSN communication.  相似文献   
5.
Developing future weapons systems has become increasingly complicated and costly. The armed forces of major nations use modeling and simulation techniques for new weapons systems from the conceptual stage to design, production, deployment and training stages to shorten the development cycle and guarantee their effectiveness. Failure in the development cycle carries too much loss in time and money. Therefore, computer-based modeling and simulation techniques are applied from the conceptual stage to gauge the efficacy of new weapons systems. The objective of this study is to develop a modeling and simulation methodology for small scale engagement using the DEVS formalism. The entities required for modeling and simulation are divided into three categories: combat, logical, and environmental entities. Combat entities represent the military hardware or combatants; logical entities represent the judgment and decision entities for the interaction between various entities; and environmental entities emulate the constituents of real combat environment. The combat entities are further modeled into Shell and Core Parts to maximize their reusability under various combat scenarios. The proposed framework is verified using a one-on-one combat engagement simulation (written in C++) between two submarines.  相似文献   
6.
-Bergamotenoic acid, a compound previously shown to stimulate oviposition inH. zea, was converted into a set of bicyclic analogs and tested with a set of acyclic side chain analogs to ascertain the molecular structure that maximizes insect behavioral response. While changes in the bicyclic ring elicited no variation in response, alteration in the side chain structure of-bergamotenoic acid resulted in significant changes in moth preference. Free rotation about the C-C bond proximal to the carboxylic acid group appears to be an important structural factor, since saturation of the side chain double bond significantly increased activity. The carboxylic acid group seems to be required for strong oviposition stimulation, since analogs lacking the carboxylic acid group exhibited no significant oviposition activity. Oviposition preference ofH. zea was also influenced by the length of the hydrocarbon chain to which the carboxylic acid is attached. While hexanoic acid was found inactive, the ovipositional preference for the heptanoic and octanoic acids was greatest for the one 8-carbon tested. This and other work suggest that carboxylic acids of specific chain lengths influence the oviposition behavior of bothHelicoverpa andHeliothis species and may be associated with host-plant selection. The potential use of this information in designing integrated pest management strategies for control ofH. zea is discussed.  相似文献   
7.
Pt-decorated CdSe tetrapods with different arm lengths were tested for the photocatalytic hydrogen generation reaction. Well-defined CdSe tetrapods with controlled wurtzite arm lengths were synthesized by the continuous precursor injection (CPI) approach. Pt nanocrystals with an extremely small size of ~1 nm were directly decorated on the overall surfaces of CdSe tetrapods. Ligand-exchanged Pt-decorated CdSe tetrapods with different arm lengths were employed as photocatalysts for photocatalytic hydrogen generation reaction in the presence of hole scavengers. Pt-decorated CdSe tetrapods with shorter arm length showed the highest photocatalytic efficiency, which is due to higher probability of charge separation.  相似文献   
8.
金刚石有序排列锯片切割性能的研究   总被引:4,自引:2,他引:4  
在金刚石锯片刀头表面上,金刚石颗粒的切割效率取决于金刚石颗粒之间的间距分布和单个金刚石的磨损状况。在这项研究中,试图分析金刚石颗粒之间的间距分布,在锯片的加工中,金刚石颗粒是人工有序排布的,将这种金刚石有序排列的锯片的切割特性与普通锯片的切割特性做了对比。金刚石颗粒的平均间距定为4mm,使用浓度为1.1ct/cm^3的美国40/50目的金刚石。在完成切割之后,在金刚石有序排列的锯片上,80%的金刚石颗粒可观测到其间距仍保持在2~6mm的范围内,  相似文献   
9.
This experimental studies were carried out in order to understand the effects of the PVD coating and the UNSM treatment of HSS55 (high speed steel 55) during the production of the automotive inner pipe by the plastic deformation of S45C. The field test and the SEM images revealed that the PVD coating is necessary in spite of the high compressive residual stresses which were formed at the head of a punch pin. Upon the application of the AlCrN coating with the UNSM treatment the productivity and reliability of a punch pin had improved more than about 2.6 times compared to that of the TiN coating without the UNSM treatment. It is likely that the improvement is caused by the decreased stress concentration factor by the ‘wrapped in oxides’ inside of an abrasion pit. The abrasion pits were mostly generated within range of 5% ∼ 50% of the diameter ratio from the end of a pin and reached the maximum value about 17% from the end of a pin.  相似文献   
10.
Tracing interactive attack traffic that traverses stepping stones (i.e., intermediate hosts) is challenging, as the packet headers, lengths, and contents can all be changed by the stepping stones. The traffic timing (delays between packets) has therefore been studied as a means of tracing traffic. One such technique uses traffic timing as a side channel into which a watermark, or identifying tag, can be embedded to aid with tracing. The effectiveness of such techniques is greatly reduced when the packet count of the traffic is changed at the stepping stone. Such transformations may occur as a result of either active countermeasures (e.g. chaff packets, flow splitting) by an adversary attempting to defeat tracing, or by incidental repacketization of the traffic by network interfaces.This paper presents a new method of embedding a watermark in traffic timing, for purposes of tracing the traffic in the presence of flow splitting, chaff packets, timing perturbation, and repacketization. This method uses an invariant characteristic of two connection flows which are part of the same stepping stone chain, namely, the elapsed time of the flows. The duration of each flow is sliced into short fixed-length intervals. Packet timing is adjusted to manipulate the packet count in specific intervals (without adding or deleting any packets), for purposes of embedding the watermark. The method is self-synchronizing and does not require clock synchronization between the watermark encoder and decoder.A statistical analysis of the method, with no assumptions or limitations concerning the distribution of packet times, proves the effectiveness of the method given a sufficient number of packets, despite natural and/or deliberate repacketization and countermeasures by an adversary. The method has been implemented and tested on a large number of SSH traffic flows. The results demonstrate that 100% detection rates and very low false positive rates are achieved under conditions of multiple countermeasures, and using only a few hundred packets.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号