首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   209篇
  免费   12篇
  国内免费   5篇
电工技术   2篇
综合类   1篇
化学工业   18篇
金属工艺   8篇
机械仪表   10篇
建筑科学   5篇
能源动力   8篇
轻工业   16篇
无线电   34篇
一般工业技术   53篇
冶金工业   1篇
原子能技术   11篇
自动化技术   59篇
  2023年   2篇
  2022年   10篇
  2021年   16篇
  2020年   8篇
  2019年   9篇
  2018年   12篇
  2017年   20篇
  2016年   20篇
  2015年   13篇
  2014年   19篇
  2013年   33篇
  2012年   12篇
  2011年   19篇
  2010年   5篇
  2009年   3篇
  2008年   2篇
  2007年   4篇
  2006年   2篇
  2005年   3篇
  2004年   1篇
  2003年   3篇
  2000年   1篇
  1997年   2篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
  1989年   2篇
  1986年   1篇
  1970年   1篇
排序方式: 共有226条查询结果,搜索用时 46 毫秒
1.
Bulge is a defect that causes geometrical inaccuracy and premature failure in the innovative incremental sheet forming (ISF) process. This study has two-fold objectives: (1) knowing the bulging behavior of a Cu clad tri-layered steel sheet as a function of forming conditions, and (2) analyzing the bending effect on bulging in an attempt to identify the associated mechanism. A series of ISF tests and bending analysis are performed to realize these objectives. From the cause-effect analysis, it is found that bulge formation in the layered sheet is sensitive to forming conditions in a way that bulging can be minimized utilizing annealed material and performing ISF with larger tool diameter and step size. The bending under tension analysis reveals that the formation of bulge is an outgrowth of bending moment that the forming tool applies on the sheet during ISF. Furthermore, the magnitude of bending moment depending upon the forming conditions varies from 0.046 to 10.24 N·m/m and causes a corresponding change in the mean bulge height from 0.07 to 0.91 mm. The bending moment governs bulging in layered sheet through a linear law. These findings lead to a conclusion that the bulge defect can be overcome by controlling the bending moment and the formula proposed can be helpful in this regards.  相似文献   
2.
The development of an inorganic electrochemical stable solid-state electrolyte is essentially responsible for future state-of-the-art all-solid-state lithium batteries (ASSLBs). Because of their advantages in safety, working temperature, high energy density, and packaging, ASSLBs can develop an ideal energy storage system for modern electric vehicles (EVs). A solid electrolyte (SE) model must have an economical synthesis approach, exhibit electrochemical and chemical stability, high ionic conductivity, and low interfacial resistance. Owing to its highest conductivity of 17 mS·cm-1, and deformability, the sulfide-based Li7P3S11 solid electrolyte is a promising contender for the high-performance bulk type of ASSLBs. Herein, we present a current glimpse of the progress of synthetic procedures, structural aspects, and ionic conductivity improvement strategies. Structural elucidation and mechanistic approaches have been extensively discussed by using various characterization techniques. The chemical stability of Li7P3S11 could be enhanced via oxide doping, and hard and soft acid/base (HSAB) concepts are also discussed. The issues to be undertaken for designing the ideal solid electrolytes, interfacial challenges, and high energy density have been discoursed. This review aims to provide a bird's eye view of the recent development of Li7P3S11-based solid-state electrolyte applications and explore the strategies for designing new solid electrolytes with a target-oriented approach to enhance the efficiency of high energy density all-solid-state lithium batteries.  相似文献   
3.
In distributed systems, user authentication schemes based on password and smart card are widely used to ensure only authorized access to the protected services. Recently, Chang et al. presented an untraceable dynamic-identity-based user authentication scheme with verifiable-password-update. In this research, we illustrate that Chang et al.’s scheme violates the purpose of dynamic-identity contrary to authors’ claim. We show that once the smart card of an arbitrary user is lost, passwords of all registered users are at risk. Using information from an arbitrary smart card, an adversary can impersonate any user of the system. In addition, its password change phase has loopholes and is misguiding. The scheme has no provision for session key agreement and the smart card lacks any verification mechanism. Then we come-up with an improved remote user authentication scheme with the session key agreement, and show its robustness over related schemes.  相似文献   
4.
This paper proposes an adaptive watermarking scheme for e-government document images. The adaptive scheme combines the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Genetic algorithm (GA), subsequently, is employed for the optimization of the scaling factor of the masking. Involving a number of steps, the scheme proposed through this study begins by calculating the mask of the host image using luminance masking. It is then continued by transforming the mask on each area into all frequencies domain. The watermark image, following this, is embedded by modifying the singular values of DCT-transformed host image with singular values of mask coefficient of host image and the control parameter of DCT-transformed watermark image using Genetic Algorithm (GA). The use of both the singular values and the control parameter respectively, in this case, is not only to improve the sensitivity of the watermark performance but also to avoid the false positive problem. The watermark image, afterwards, is extracted from the distorted images. The experiment results show the improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks.  相似文献   
5.
In the design phase of business and IT system development, it is desirable to predict the properties of the system-to-be. A number of formalisms to assess qualities such as performance, reliability and security have therefore previously been proposed. However, existing prediction systems do not allow the modeler to express uncertainty with respect to the design of the considered system. Yet, in contemporary business, the high rate of change in the environment leads to uncertainties about present and future characteristics of the system, so significant that ignoring them becomes problematic. In this paper, we propose a formalism, the Predictive, Probabilistic Architecture Modeling Framework (P2AMF), capable of advanced and probabilistically sound reasoning about business and IT architecture models, given in the form of Unified Modeling Language class and object diagrams. The proposed formalism is based on the Object Constraint Language (OCL). To OCL, P2AMF adds a probabilistic inference mechanism. The paper introduces P2AMF, describes its use for system property prediction and assessment and proposes an algorithm for probabilistic inference.  相似文献   
6.
We investigated double perovskite compounds of the form Sr 2 XOsO 6 (X = Li, Na, Ca) using the full-potential linearized augmented plane wave (FP-LAPW) method. For the exchange-correlation energy, Wu and Cohen generalized gradient approximation (WC-GGA), Perdew, Burke and Ernzerhof GGA (PBE-GGA), Engel and Vosko GGA (EV-GGA), and GGA plus Hubbard U-parameter (GGA + U) were used. The calculated structural parameters are in good agreement with the existing experimental results. Calculation of different elastic constants and elastic moduli reveals that these compounds are elastically stable and possess ductile nature. The GGA + U approach yields quite accurate results of the bandgap as compared with the simple GGA schemes. The density of states plot shows that Sr-4d, Os-5d and O-2p states predominantly contribute to the conduction and valence bands. Further, our results regarding to the magnetic properties of these compounds reveal their ferromagnetic nature. In addition, these compounds seem to possess half-metallic properties, making them useful candidates for applications in spintronics devices.  相似文献   
7.
Continuous improvements in very-large-scale integration (VLSI) technology and design software have significantly broadened the scope of digital signal processing (DSP) applications. The use of application-specific integrated circuits (ASICs) and programmable digital signal processors for many DSP applications have changed, even though new system implementations based on reconfigurable computing are becoming more complex. Adaptable platforms that combine hardware and software programmability efficiency are rapidly maturing with discrete wavelet transformation (DWT) and sophisticated computerized design techniques, which are much needed in today’s modern world. New research and commercial efforts to sustain power optimization, cost savings, and improved runtime effectiveness have been initiated as initial reconfigurable technologies have emerged. Hence, in this paper, it is proposed that the DWT method can be implemented on a field-programmable gate array in a digital architecture (FPGA-DA). We examined the effects of quantization on DWT performance in classification problems to demonstrate its reliability concerning fixed-point math implementations. The Advanced Encryption Standard (AES) algorithm for DWT learning used in this architecture is less responsive to resampling errors than the previously proposed solution in the literature using the artificial neural networks (ANN) method. By reducing hardware area by 57%, the proposed system has a higher throughput rate of 88.72%, reliability analysis of 95.5% compared to the other standard methods.  相似文献   
8.
In this paper, we proposed a modified turbulent particle swarm optimization (named MTPSO) model for solving planar graph coloring problem based on particle swarm optimization. The proposed model is consisting of the walking one strategy, assessment strategy and turbulent strategy. The proposed MTPSO model can solve the planar graph coloring problem using four-colors more efficiently and accurately. Compared to the results shown in Cui et al. (2008), not only the experimental results of the proposed model can get smaller average iterations but can get higher correction coloring rate when the number of nodes is greater than 30.  相似文献   
9.
Traditionally, the block-based medial axis transform (BB-MAT) and the chessboard distance transform (CDT) were usually viewed as two completely different image computation problems, especially for three dimensional (3D) space. In fact, there exist some equivalent properties between them. The relationship between both of them is first derived and proved in this paper. One of the significant properties is that CDT for 3D binary image V is equal to BB-MAT for image V' where it denotes the inverse image of V. In a parallel algorithm, a cost is defined as the product of the time complexity and the number of processors used. The main contribution of this work is to reduce the costs of 3D BB-MAT and 3D CDT problems proposed by Wang [65]. Based on the reverse-dominance technique which is redefined from dominance concept, we achieve the computation of the 3D CDT problem by implementing the 3D BB-MAT algorithm first. For a 3D binary image of size N3, our parallel algorithm can be run in O(logN) time using N3 processors on the concurrent read exclusive write (CREW) parallel random access machine (PRAM) model to solve both 3D BB-MAT and 3D CDT problems, respectively. The presented results for the cost are reduced in comparison with those of Wang's. To the best of our knowledge, this work is the lowest costs for the 3D BB-MAT and 3D CDT algorithms known. In parallel algorithms, the running time can be divided into computation time and communication time. The experimental results of the running, communication and computation times for the different problem sizes are implemented in an HP Superdome with SMP/CC-NUMA (symmetric multiprocessor/cache coherent non-uniform memory access) architecture. We conclude that the parallel computer (i.e., SMP/CC-NUMA architecture or cluster system) is more suitable for solving problems with a large amount of input size.  相似文献   
10.
The ubiquitous environment has been developed since the extension of IT technology. The term ‘Ubiquitous’ is referred firstly by Mark Weiser, which means the user based environment that provides network service ‘any time, anywhere’. In the ubiquitous environment, the computing environment should have the device that recognizes the user and the environment. But there is not a verification process when dealing in sensitive information, and it may cause serious errors or malfunction. In order to complement the problem, members of the CCRA utilized CC(Common Criteria) to build up an assessment system and create a secured ubiquitous environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号