首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   5篇
  国内免费   1篇
电工技术   1篇
综合类   3篇
化学工业   9篇
金属工艺   1篇
机械仪表   1篇
建筑科学   2篇
能源动力   2篇
轻工业   3篇
石油天然气   1篇
无线电   11篇
一般工业技术   17篇
冶金工业   1篇
自动化技术   13篇
  2023年   3篇
  2022年   3篇
  2021年   5篇
  2020年   7篇
  2019年   8篇
  2018年   13篇
  2017年   4篇
  2016年   4篇
  2015年   1篇
  2014年   1篇
  2013年   4篇
  2012年   4篇
  2011年   1篇
  2009年   1篇
  2008年   2篇
  2006年   3篇
  1994年   1篇
排序方式: 共有65条查询结果,搜索用时 46 毫秒
1.
Tanmoy Maiti  E. Alberta  R. Guo  A.S. Bhalla   《Materials Letters》2006,60(29-30):3861-3865
In this paper we report the evolution of the polar cluster like behavior with the incorporation of Ti4+ ion in BaZrO3 Ceramics. Dielectric behavior of BaZrxTi(1−x)O3 (x = 1.00, 0.95, 0.90, 0.85) ceramics is studied in the temperature range from 300 to 30 K. Polar cluster like behavior becomes more prominent with the increase in content of Ti4+ ion. The dielectric relaxation is analyzed by Vogel–Fulcher relation and Arrhenius law. Frequency dependence of dielectric constant and low loss tangent of these materials can be useful for the potential applications at low temperature.  相似文献   
2.
Here we study a recently proposed watermarking scheme based on the paper “Wavelet Tree Quantization” (WTQ) by Wang and Lin (IEEE Trans Image Process 13(2):154–165, 2004). In given scheme, wavelet coefficients corresponding to the same spatial locations are grouped together. Two such groups, selected at random, constitute a supertree. Some of these supertrees are quantized to embed the watermark information in the image. In the process of cryptanalysis we first identify the groups which are quantized during the watermark insertion process. Then we select the non-quantized groups and quantize them too, to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under the cipher text only jamming attack which requires only a single watermarked copy. Further, we suitably modify the WTQ scheme to make it robust against such cryptanalytic attacks.This is an extended and revised version of the paper Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme presented at the International Workshop on Distributed Computing, IWDC 2004, Kolkata, 27–30 December 2004, Lecture Notes in Computer Science, vol. 3326, pp. 219–230. Springer, Berlin Heidelberg New York (2004). Section 4 of this paper introduces a modified scheme which is an addition over the conference version. Part of this work has been done while the author T. K. Das was visiting Indian Statistical Institute, Kolkata during 2004.  相似文献   
3.
Science China Technological Sciences -  相似文献   
4.
Neural Computing and Applications - This paper addresses the influence of manufacturing variability of a helicopter rotor blade on its aeroelastic responses. An aeroelastic analysis using finite...  相似文献   
5.
This paper deals with Matlab/Simulink and experimental investigations of various maximum power point tracking (MPPT) techniques namely incremental conductance (Inc), perturb and observation (P&O), constant voltage control (CVC) method, and introduction of a novel reference power (Pref) method for extracting the maximum power from the solar photovoltaic (PV) system. The complete system model along with these MPPT methods are developed in Matlab/Simulink and simulation results are obtained during sudden increase in irradiation of 1000 W/m2, and verified experimentally. These MPPT methods are also implemented on Inverse-Sepic converter, which claims to extract maximum power from the PV system. Various experimental observations are taken to access the performance of these MPPT techniques such as settling time of the full load current under sudden exposure of irradiation level of 1000 W/m2, performance during step increase in irradiation level (from 500 W/m2 to 1000 W/m2) and vice versa. Extensive results are taken to compare these methods. The proposed Pref method is found to have lowest settling time to stabilize the load current as 520 ms, whereas, Inc method takes 1.24 s. Further, the efficiency of Inverse-Sepic converter with Pref method achieves the highest efficiency of 95.26%, whereas, it extracts lowest efficiency on same input as 90.77% with P&O method. The overall performance of the proposed Pref method is found to be superior as compared to other discussed MPPT methods as verified by experimental results.  相似文献   
6.
Online Social Media, such as Twitter, Facebook and WhatsApp, are important sources of real-time information related to emergency events, including both natural calamities, man-made disasters, epidemics, and so on. There has been lot of recent work on designing information systems that would be useful for aiding post-disaster relief operations, as well as for pre-disaster preparedness. A special issue on “Exploitation of Social Media for Emergency Relief and Preparedness” was conducted for the journal Information Systems Frontiers. The objective of this special issue was to present a platform for dissemination of the empirical results of various technologies for extracting vital and actionable information from social media content in disaster situations. The papers included in this issue are expected to be the stepping stones for future explorations and technical innovations towards technologies meant for utilizing various online and offline information sources for enhancing pre-disaster preparedness and post-disaster relief operations.  相似文献   
7.
Success of a scientific entity generally undergoes myriad vicissitudes, resulting in different patterns of success trajectories. Understanding and characterizing the rise and fall of scientific success is important not only from the perspective of designing new mathematical models but also to enhance the quality of various real-world systems such as scientific article search and recommendation systems. In this paper, we present a large-scale study of the subject by analyzing the success of two major scientific entities—papers and authors—in Computer Science and Physics. We quantify “success” in terms of citations and in the process discover six distinct success trajectories which are prevalent across multidisciplinary datasets. Our results reveal that these trajectories are not fully random, but are rather generated through a complex process. We further shed light on the behavior of these trajectories and unfold many interesting facets by asking fundamental questions—which trajectory is more successful, how significant and stable are these categories, what factors trigger the rise and fall of trajectories? A few of our findings sharply contradict the well-accepted beliefs on bibliographic research such as “Preferential Attachment”, “first-mover advantage”. We believe that this study will argue in favor of revising the existing metrics used for quantifying scientific success.  相似文献   
8.
Underground mining production process is vulnerable and highly dynamic in nature. Among the various causes of accidents in underground mine, major one is presence of flammable and noxious gases. Though many existing safety gadgets are there but they could not work reliably because of the typical nature of mines structure and production variability. Wireless data and communication network is also not successful because wireless communication in underground mine is significantly more challenging than through air. This work introduces the application of mobile wireless sensor network in order to monitor a variety of parameters in underground mines which have life threatening effects towards them. Each node of the network placed over the safety gear (helmet wore statutorily by every miner) comprises of various sensors depending on the requirement with microcontroller unit and other low power accessories. The proposed work has a unique feature that it will make the personnel aware about the situation of the gases present and surrounding by automatically generating different alarms and different light indicators. Other function of this device will be to transmit the data sensed by the sensors in the device to the control room wirelessly so that the responsible person would be aware of the situation. This work is focused on the design of such a prototype model for the underground mines with the aforementioned specification.  相似文献   
9.
This paper reports the first integration of laser‐etched polycrystalline diamond microchannels with template‐fabricated microporous copper for extreme convective boiling in a composite heat sink for power electronics and energy conversion. Diamond offers the highest thermal conductivity near room temperature, and enables aggressive heat spreading along triangular channel walls with 1:1 aspect ratio. Conformally coated porous copper with thickness 25 µm and 5 µm pore size optimizes fluid and heat transport for convective boiling within the diamond channels. Data reported here include 1280 W cm?2 of heat removal from 0.7 cm2 surface area with temperature rise beyond fluid saturation less than 21 K, corresponding to 6.3 × 105 W m?2 K?1. This heat sink has the potential to dissipate much larger localized heat loads with small temperature nonuniformity (5 kW cm?2 over 200 µm × 200 µm with <3 K temperature difference). A microfluidic manifold assures uniform distribution of liquid over the heat sink surface with negligible pumping power requirements (e.g., <1.4 × 10?4 of the thermal power dissipated). This breakthrough integration of functional materials and the resulting experimental data set a very high bar for microfluidic heat removal.  相似文献   
10.
We calculate the electronic local density of states (LDOS) of DNA nucleotide bases (A,C,G,T), deposited on graphene. We observe significant base-dependent features in the LDOS in an energy range within a few electronvolts of the Fermi level. These features can serve as electronic fingerprints for the identification of individual bases in scanning tunneling spectroscopy (STS) experiments that perform image and site dependent spectroscopy on biomolecules. Thus the fingerprints of DNA-graphene hybrid structures may provide an alternative route to DNA sequencing using STS.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号