全文获取类型
收费全文 | 116篇 |
免费 | 4篇 |
专业分类
化学工业 | 24篇 |
金属工艺 | 5篇 |
机械仪表 | 1篇 |
能源动力 | 2篇 |
轻工业 | 5篇 |
无线电 | 22篇 |
一般工业技术 | 23篇 |
冶金工业 | 19篇 |
原子能技术 | 1篇 |
自动化技术 | 18篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 3篇 |
2019年 | 4篇 |
2018年 | 3篇 |
2017年 | 5篇 |
2016年 | 3篇 |
2015年 | 3篇 |
2014年 | 5篇 |
2013年 | 2篇 |
2012年 | 5篇 |
2011年 | 2篇 |
2010年 | 5篇 |
2009年 | 6篇 |
2008年 | 5篇 |
2007年 | 6篇 |
2006年 | 5篇 |
2005年 | 5篇 |
2004年 | 4篇 |
2003年 | 3篇 |
2002年 | 8篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1971年 | 1篇 |
排序方式: 共有120条查询结果,搜索用时 15 毫秒
1.
S N Maitra 《Sadhana》1985,8(4):373-385
The burn time and burnout velocity of a multistage rocket flown vertically in vacuum with constant thrust tangential to the
flight path and a prescribed initial/final thrust-to-weight ratio in an arbitrary stage have been determined.
The present paper also deals with optimal staging under given conditions of flight. 相似文献
2.
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction 总被引:13,自引:0,他引:13
Carlet C. Dalai D.K. Gupta K.C. Maitra S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(7):3105-3121
Recently, algebraic attacks have received a lot of attention in the cryptographic literature. It has been observed that a Boolean function f used as a cryptographic primitive, and interpreted as a multivariate polynomial over F/sub 2/, should not have low degree multiples obtained by multiplication with low degree nonzero functions. In this paper, we show that a Boolean function having low nonlinearity is (also) weak against algebraic attacks, and we extend this result to higher order nonlinearities. Next, we present enumeration results on linearly independent annihilators. We also study certain classes of highly nonlinear resilient Boolean functions for their algebraic immunity. We identify that functions having low-degree subfunctions are weak in terms of algebraic immunity, and we analyze some existing constructions from this viewpoint. Further, we present a construction method to generate Boolean functions on n variables with highest possible algebraic immunity /spl lceil/n/2/spl rceil/ (this construction, first presented at the 2005 Workshop on Fast Software Encryption (FSE 2005), has been the first one producing such functions). These functions are obtained through a doubly indexed recursive relation. We calculate their Hamming weights and deduce their nonlinearities; we show that they have very high algebraic degrees. We express them as the sums of two functions which can be obtained from simple symmetric functions by a transformation which can be implemented with an algorithm whose complexity is linear in the number of variables. We deduce a very fast way of computing the output to these functions, given their input. 相似文献
3.
This paper presents the formulation of a novel block-backstepping based control algorithm to address the stabilization problem for a generalized nonlinear underactuated mechanical system. For the convenience of compact design, first, the state model of the underactuated system has been converted into the block-strict feedback form. Next, we have incorporated backstepping control action to derive the expression of the control input for the generic nonlinear underactuated system. The proposed block backstepping technique has further been enriched by incorporating an integral action additionally for enhancing the steady state performance of the overall system. Asymptotic stability of the overall system has been analyzed using Lyapunov stability criteria. Subsequently, the stability of the zero dynamics has also been analyzed to ensure the global asymptotic stability of the entire nonlinear system at its desired equilibrium point. The proposed control algorithm has been applied for the stabilization of a benchmarked underactuated mechanical system to verify the effectiveness of the proposed control law in real-time environment. 相似文献
4.
Harshita Gogoi V. Nirosha Anjali Jayakumar Keerthana Prabhu Meghna Maitra 《Energy Sources, Part A: Recovery, Utilization, and Environmental Effects》2018,40(1):39-44
In the present study, pre-treated paper mill sludge (PMS) was evaluated extensively as a substrate for production of acetone-butanol-ethanol using Clostridium sporogenes NCIM 2337. The PMS was subjected to three types of pre-treatment methods namely alkali, mechanical, and thermal treatment and was analyzed by SEM. The pre-treatment of PMS by alkali was observed to be more effective over the other pre-treatment methods. The alkali pre-treated sludge was then made to undergo fermentation, which showed the conventional process of acidogenesis followed by solventogenesis. The acetone, butanol, and ethanol concentration for 15% alkali pre-treated PMS was estimated to be maximum. 相似文献
5.
Pattern Analysis and Applications - This paper proposed a novel 3D unsupervised spatial fuzzy-based brain MRI volume segmentation technique in the presence of intensity inhomogeneity and noise.... 相似文献
6.
Here we study a recently proposed watermarking scheme based on the paper “Wavelet Tree Quantization” (WTQ) by Wang and Lin (IEEE Trans Image Process 13(2):154–165, 2004). In given scheme, wavelet coefficients corresponding to the same spatial locations are grouped together. Two such groups, selected at random, constitute a supertree. Some of these supertrees are quantized to embed the watermark information in the image. In the process of cryptanalysis we first identify the groups which are quantized during the watermark insertion process. Then we select the non-quantized groups and quantize them too, to remove the watermark. Experimental results show that the watermark is completely removed by this attack. The cryptanalysis falls under the cipher text only jamming attack which requires only a single watermarked copy. Further, we suitably modify the WTQ scheme to make it robust against such cryptanalytic attacks.This is an extended and revised version of the paper Cryptanalysis of “Wavelet Tree Quantization” Watermarking Scheme presented at the International Workshop on Distributed Computing, IWDC 2004, Kolkata, 27–30 December 2004, Lecture Notes in Computer Science, vol. 3326, pp. 219–230. Springer, Berlin Heidelberg New York (2004). Section 4 of this paper introduces a modified scheme which is an addition over the conference version. Part of this work has been done while the author T. K. Das was visiting Indian Statistical Institute, Kolkata during 2004. 相似文献
7.
American document design process models reflect the assumption that comprehension and usability are the most important characteristics of effective documents, but it is increasingly evident that other cultures value other communicative features of documents and that purposes and intentions vary across cultures. This case study examines the responses of four sets of American readers (three sets familiar with American document design research and practice and one set of content specialists-engineers by training) to the visual aspects of an annual report. The original document was prepared for a mid-sized Japanese corporation and published and distributed in Japan; the American version is an almost literal translation of the original document from Japanese to English, with no changes in visuals, graphic design or format. Protocol analyses of readers' responses revealed distinct patterns of expectations and preferences based on (1) cultural biases, (2) degree of familiarity with the American document design model, and (3) ignorance of Japanese culture and corporate communicative practices. This study raises questions about the effectiveness in terms of cultural sensitivity of what we have called the “American” document design process model and usability testing procedures, and calls for extensive collaborative research designed to describe and analyze current practice in international settings 相似文献
8.
Hybrid materials comprising diamond nanoparticles (ND) and oligo(phenylenevinylenes) (OPVs) have been synthesized by the covalent linking of acid-functionalized ND and OPV-amine. Chromophore-functionalized ND particles with long alkyl and π-conjugated groups are readily dispersed in various organic solvents without any precipitation after several hours. A careful study of the properties of the hybrid materials revealed an aggregation-induced energy transfer from the blue fluorescent nanodiamonds to green emitting OPVs. At very low concentrations the hybrid emits in the blue region, but as the concentration is increased a gradual transition from blue to green emission occurs. Competitive processes such as aggregation-induced enhanced emission and self-absorption have been ruled out and a molecular picture of the phenomenon is proposed. This strategy can open a plethora of new avenues for fluorescent nanodiamonds in optoelectronics and light harvesting apart from bio-imaging. 相似文献
9.
Saikat Maitra Farooq Ahmad Ananta K. Das Santanu Das Binay K. Dutta 《Bulletin of Materials Science》2010,33(2):185-190
In the present work the reaction between fly ash and lime in fly ash-lime compacts under water curing and steam curing conditions
was studied thoroughly in relation to the processing conditions. Fly ash from different sources were collected, characterized,
mixed with lime in different ratios and compacted. The compacts were cured with water and steam separately. The reduction
in the free CaO content in these compacts was measured as a function of curing time and curing process. Role of two ionic
additives, FeCl3 and MgCl2, on the reaction between fly ash and lime was also investigated by measuring the free CaO content. Kinetics of these reactions
was studied by determining the reaction order and rate constants with respect to the free CaO content and it was observed
that the curing conditions and additives affected the reaction kinetics significantly. 相似文献
10.
Aluminosilicate precursor for the processing of mulite ceramics was synthesized chemically from inorganic salts following colloidal route. V2O5 was used as a sintering additive in different ratios with the precursor powder. The powder mixes were compacted and sintered at different elevated temperatures. The sintered masses were characterized by measuring the bulk density, porosity, flexural strength and fracture toughness. The extent of mullitization and final microstructure of the sintered masses were investigated by scanning electron microscopy and XRD analysis. It was observed that V2O5 exhibited favourable effect on the formation of properly crystallized mullite and in the improvement of different mechanical properties. 相似文献