首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   330篇
  免费   14篇
电工技术   3篇
综合类   1篇
化学工业   51篇
金属工艺   1篇
机械仪表   5篇
建筑科学   13篇
能源动力   12篇
轻工业   23篇
水利工程   2篇
石油天然气   2篇
无线电   51篇
一般工业技术   77篇
冶金工业   32篇
原子能技术   1篇
自动化技术   70篇
  2024年   1篇
  2023年   1篇
  2022年   4篇
  2021年   6篇
  2020年   4篇
  2019年   3篇
  2018年   7篇
  2017年   8篇
  2016年   9篇
  2015年   7篇
  2014年   13篇
  2013年   23篇
  2012年   10篇
  2011年   29篇
  2010年   19篇
  2009年   21篇
  2008年   17篇
  2007年   11篇
  2006年   15篇
  2005年   11篇
  2004年   7篇
  2003年   9篇
  2002年   8篇
  2001年   1篇
  2000年   13篇
  1999年   3篇
  1998年   8篇
  1997年   9篇
  1996年   5篇
  1995年   5篇
  1994年   4篇
  1993年   10篇
  1992年   6篇
  1991年   6篇
  1990年   8篇
  1989年   2篇
  1988年   1篇
  1987年   2篇
  1986年   3篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1981年   3篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1972年   1篇
  1969年   1篇
排序方式: 共有344条查询结果,搜索用时 15 毫秒
1.
Given a stability region of a polytope of polynomials, the edge theorem can be used to verify certain root-clustering properties of the polytope. The authors consider the inverse problem; starting with a polytope of real polynomials, they present a result that allows the construction of the smallest set of regions in the complex plane which characterizes its zero location  相似文献   
2.
Input impedance characterizes the dynamic property of a linear system. A few existing technologies thus exploit input electrical impedance of wire bonders as the signature to monitor ultrasonic wire bonding processes. However, the waveforms of "impedance" in these technologies are evaluated only approximately. To overcome the shortcoming, we propose a method to detect the true waveforms of both the real and imaginary part of the input impedance. In the method, the voltage and current at the input port of a wire bonder are probed and processed to obtain impedance via Hilbert Transform. Because dynamics of a bonding process represented by these waveforms is fully responsible for the resulted bonding quality, a quality evaluation system based on pattern recognition of these waveforms is further proposed. An artificial neural network using back propagation as training scheme learns from a set of training data to correlate a few features of the impedance waveforms with the bonding strength of the corresponding bond identified by shearing tests. Through a set of verification data, the built system is validated to be capable of evaluating bonding quality right after a bonding process. The proposed method is not only in situ and real-time, but also sensorless, which means that the system is easy to be implemented without interfering operation  相似文献   
3.
The rising production of produced water from oilfields had been proven to bring detrimental environmental effects. In this study, an efficient, recyclable, and environmental-friendly reduced graphene oxide immobilized κ-Carrageenan hydrogel composite(κCa GO) was fabricated as an alternative sorbent for crude oil-in-water demulsification. Polyethyleneimine(PEI) was employed to form a stable hydrogel composite. The conditions for the immobilization of graphene oxide(GO) on PEI-modified κ-Carrageenan(κC) beads were optimized appropriately. An immobilization yield of 77% was attained at 2% PEI, 2 h immobilization activation time, and p H6.5. Moreover, the synthesized κCa GO is capable of demulsification with an average demulsification efficiency of 70%. It was found that the demulsification efficiency increases with salinity and κCa GO dosage, and it deteriorates under alkaline condition. These phenomena can be attributed to the interfacial interactions between κCa GO and the emulsion. Furthermore, the κCa GO can be recycled to use for up to six cycles without significant leaching and degradation. As such, the synthesized κCa GO could be further developed as a potential sorbent substitute for the separation of crude oil from produced water.  相似文献   
4.
Identical twins pose a great challenge to face recognition due to high similarities in their appearances. Motivated by the psychological findings that facial motion contains identity signatures and the observation that twins may look alike but behave differently, we develop a talking profile to use the identity signatures in the facial motion to distinguish between identical twins. The talking profile for a subject is defined as a collection of multiple types of usual face motions from the video. Given two talking profiles, we compute the similarities of the same type of face motion in both profiles and then perform the classification based on those similarities. To compute the similarity of each type of face motion, we give higher weights to more abnormal motions which are assumed to carry more identity signature information.  相似文献   
5.
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.  相似文献   
6.
We consider the problem of finite horizon discrete-time Kalman filtering for systems with parametric uncertainties. Specifically, we consider unknown but deterministic uncertainties where the uncertain parameters are assumed to lie in a convex polyhedron with uniform probability density. The condition and a procedure for the construction of a suboptimal filter that minimizes an expected error covariance over-bound are derived.  相似文献   
7.
SNORE: spike noise removal and detection   总被引:1,自引:0,他引:1  
A method for detection and removal of random spike noise in magnetic resonance (MR) raw data (k-space data) is described. This method would reduce or eliminate the corduroy-type and higher than usual level artifacts in MR images resulting from random spike noise in k-space data. The method described involves applying a spatially varying threshold to be k-space data. Any data point that has a magnitude greater than that of the threshold value at that location will be replaced by a local complex average of the neighboring data points or some other suitable data replacement scheme.  相似文献   
8.
Pinch analysis was initially developed as a methodology for optimizing energy efficiency in process plants. Applications of pinch analysis applications are based on common principles of using stream quantity and quality to determine optimal system targets. This initial targeting step identifies the pinch point, which then allows complex problems to be decomposed for the subsequent design of an optimal network using insights drawn from the targeting stage. One important class of pinch analysis problems is energy planning with footprint constraints, which began with the development of carbon emissions pinch analysis; in such problems, energy sources and demands are characterized by carbon footprint as the quality index. This methodology has been extended by using alternative quality indexes that measure different sustainability dimensions, such as water footprint, land footprint, emergy transformity, inoperability risk, energy return on investment and human fatalities. Pinch analysis variants still have the limitation of being able to use one quality index at a time, while previous attempts to develop pinch analysis methods using multiple indices have only been partially successful for special cases. In this work, a multiple-index pinch analysis method is developed by using an aggregate quality index, based on a weighted linear function of different quality indexes normally used in energy planning. The weights used to compute the aggregate index are determined via the analytic hierarchy process. A case study for Indian power sector is solved to illustrate how this approach allows multiple sustainability dimensions to be accounted for in energy planning.  相似文献   
9.
This paper investigates the fundamental difference between a simple e-tender box and a traditional physical tender box, and highlights a series of security traps created by the functional differences. Based on our findings, we have defined the security requirements for an e-tender submission protocol. We also discuss functional limitations of cryptographic technologies. As a result, two secure e-tender submission protocols are proposed which enable a secure e-tender submission. Protocols are assumed to run under the condition that all tendering parties (principal and tenderers) are dishonest players. Our informal and formal security analysis show that these protocols meet their security goals under well known collusion scenarios. Because security is a process not a product, our approach will have broad industry application for developing secure electronic business processes in areas other than e-tendering.
Colin BoydEmail:
  相似文献   
10.
This study was initiated to examine the feasibility of providing multimedia mail, in particular video mail, on the existing World Wide Web platform. In this instance, the Web browser will act as the user agent of the mailing system. With this, users will be able to compose, send and read video mail directly on the Web. This paper examines a number of possible system architectures that can be employed for the development of video mail. Based on the following key issues: portability of system, flexibility of system, Internet standard support, security and authentication, and message compression and storage, a final architecture was selected to build video mail. The approach taken is that the system will be interfaced to the Web using a standard HyperText Transfer Protocol (HTTP) server and a standard Web browser. This is achieved through the use of Common Gateway Interface (CGI) programs and forms which reside in a standard HTTP server to provide the functionality of video mail, and a separate mail server for the storage and management of messages. This will cause the HTTP server to behave as if it is an electronic mail (E-mail) system. Video mail has been successfully implemented at the School of Applied Science, Nanyang Technological University, Singapore. The development work has been carried out on a Sun SPARC5 workstation and the Typhoon relational database system was used to construct the mail server. All software codes were written in C or C++. A video capturing application used in conjunction with a SunVideo card has been developed for video and audio recording. The paper also addresses implementation issues pertaining to the use of CGI programs, mail server development, and video and audio management.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号