首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   63篇
  免费   2篇
工业技术   65篇
  2022年   3篇
  2021年   2篇
  2020年   1篇
  2018年   2篇
  2017年   2篇
  2016年   1篇
  2014年   2篇
  2013年   8篇
  2012年   3篇
  2011年   5篇
  2010年   2篇
  2009年   5篇
  2008年   4篇
  2007年   6篇
  2006年   3篇
  2005年   3篇
  2004年   2篇
  2002年   1篇
  2001年   1篇
  1998年   1篇
  1997年   1篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1986年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
排序方式: 共有65条查询结果,搜索用时 15 毫秒
1.
In the present study, we report an eco-friendly and simple route to design and synthesize novel nanocomposite catalyst based on platinum nanoparticles anchored on binary support of graphitic carbon nitride (g-C3N4) and cobalt-metal-organic framework (ZIF-67). For this purpose, ZIF-67 was prepared by precipitation method and g-C3N4 was prepared through thermal polymerization method. Later, ZIF-67 and g-C3N4 were hybridized through sonication to get homogeneous g–C3N4–ZIF-67 nanocomposite support material. Platinum nanoparticles (PtNPs) were uniformly deposited on g–C3N4–ZIF-67 by an electrochemical method. The as-developed nanocatalyst was characterized by morphological, structural and electrochemical techniques. The electrocatalytic activity of PtNPs@g–C3N4–ZIF-67 nanocatalyst towards butanol oxidation was evaluated via CV, CA, LSV and EIS in an alkaline medium. Results revealed that the proposed catalyst showed greatly enhanced electrooxidation of butanol in terms of high magnificent current density, lower oxidation potential, excellent long-term stability, large surface area, low charge transfer resistance and less toxic ability. Enhanced catalytic performance of the proposed catalyst could be ascribed to the synergistic effect of g–C3N4–ZIF-67 nanocomposite and PtNPs. The PtNPs@g–C3N4–ZIF-67 catalyst holds promising potential applications to be used as an anodic electrocatalyst for the development of high-performance alkaline fuel cells.  相似文献   
2.
This paper presents a mechanism which infers a user's plans from his/her utterances by directing the inference process towards the more likely interpretations of a speaker's statements among many possible interpretations. Our mechanism uses Bayesian theory of probability to assess the likelihood of an interpretation, and it complements this assessment by taking into consideration two aspects of an interpretation: its coherence and its information content. The coherence of an interpretation is determined by the relationships between the different statements in the discourse. The information content of an interpretation is a measure of how well defined the interpretation is in terms of the actions to be performed on the basis of this interpretation. This measure is used to guide the inference process towards interpretations with higher information content. The information content of an interpretation depends on the specificity and the certainty of the inferences in it, where the certainty of an inference depends on the knowledge on which the inference is based. Our mechanism has been developed for use in task-oriented consultation systems. The particular domain that we have chosen for exploration is that of travel booking.  相似文献   
3.
4.
The information model was conceived to address the complexities of managing large volumes of data, processes, designs, and tools that are shared by many business users with differing requirements. Because an information model derives much of its features from data models, the distinction between information modeling and data modeling is sometimes unclear. One perspective is that information modeling is context dependent: when a model is viewed as a representation scheme for users to comprehend, it is an information model. When used as a representation scheme to be processed by a computer, it is a data model.  相似文献   
5.
Twelve large-scale slab specimens and twenty-two companion push-out specimens were tested to study the behavior and capacity of composite slab joists consisting of cold-formed steel C-sections and concrete. Four shear transfer mechanisms, including surface bond, pre-fabricated bent-up tabs, pre-drilled holes, and self-drilling screws, were employed on the surface of the flange embedded in the concrete to provide shear transfer capacity. Results indicated that specimens employed with shear transfer enhancements showed a marked increase in strength and reduced deflection compared with those relying only on a natural bond between steel and concrete to resist shear. Of the three shear transfer enhancements investigated, bent-up tabs provided the best performance at both the strength and serviceability limit states, followed by drilled holes in the embedded flanges. The use of self-drilling screws resulted in the lowest strength increase. The correlation of shear transfer capacity of push-out specimens with the ultimate capacity of large-scale specimens indicated that the average experimental flexural capacity of the slab specimens was approximately 1.16 times the average predicted value based on push-out test results.  相似文献   
6.
Computed tomography images are widely used in the diagnosis of intracranial hematoma and hemorrhage. This paper presents a new approach for automated diagnosis based on classification of the normal and abnormal images of computed tomography. The computed tomography images used in the classification consists of non-enhanced computed tomography images. The proposed method consists of four stages namely pre-processing, feature extraction, feature reduction and classification. The discrete wavelet transform coefficients are the features extracted in this method. The essential coefficients are selected by the principal component analysis. The features derived are used to train the binary classifier, which infer automatically whether the image is that of a normal brain or a pathological brain, suffering from brain lesion. The proposed method has been evaluated on a dataset of 80 images. A classification with a success of 92, 97 and 98 % has been obtained by artificial neural network, k-nearest neighbor and support vector machine, respectively. This result shows that the proposed technique is robust and effective.  相似文献   
7.
Wireless Personal Communications - In this paper, the effect of perfect electric conductor (PEC) as a ground plane on antenna array is investigated. Vertical electric dipole which is of...  相似文献   
8.
We propose a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector's underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector. Experiments with real malware and antivirus interfaces on Windows operating systems justify the effectiveness of our approach.  相似文献   
9.
This paper proposes a framework to aid video analysts in detecting suspicious activity within the tremendous amounts of video data that exists in today’s world of omnipresent surveillance video. Ideas and techniques for closing the semantic gap between low-level machine readable features of video data and high-level events seen by a human observer are discussed. An evaluation of the event classification and detection technique is presented and a future experiment to refine this technique is proposed. These experiments are used as a lead to a discussion on the most optimal machine learning algorithm to learn the event representation scheme proposed in this paper.
Bhavani ThuraisinghamEmail:
  相似文献   
10.
Researchers in telesurgical robotics and security collaborated to develop the Secure ITP, a security enhancement to the Interoperable Telesurgery Protocol (ITP). The ITP defines the structure for communication between telesurgery robots and controllers and has been adopted and tested by fourteen research groups in telesurgical robotics. The Secure ITP uses open source software tools and follows guidelines in Federal Information Processing Standards (FIPS) documents published by the National Institute of Standards and Technology (NIST) to create asecurity enhancement prototype for demonstration purposes and tofacilitate the development of new security technologies which addressthe stringent requirements of telesurgery.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号