首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   820篇
  免费   66篇
  国内免费   17篇
工业技术   903篇
  2024年   1篇
  2023年   36篇
  2022年   51篇
  2021年   99篇
  2020年   64篇
  2019年   51篇
  2018年   70篇
  2017年   55篇
  2016年   64篇
  2015年   34篇
  2014年   48篇
  2013年   75篇
  2012年   47篇
  2011年   52篇
  2010年   35篇
  2009年   19篇
  2008年   16篇
  2007年   17篇
  2006年   10篇
  2005年   6篇
  2004年   14篇
  2003年   6篇
  2002年   7篇
  2001年   3篇
  2000年   5篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1996年   1篇
  1995年   4篇
  1994年   2篇
  1993年   1篇
  1989年   1篇
  1982年   2篇
  1980年   1篇
  1972年   1篇
排序方式: 共有903条查询结果,搜索用时 156 毫秒
1.
2.
NiO nanostructure was synthesized using a simple co-precipitation method and was embedded on reduced graphene oxide surface via ultrasonication. Structural investigations were made through X-ray diffraction (XRD) and functional groups were confirmed by Fourier transform infrared spectroscopy (FTIR). XRD analysis revealed the grain size reduction with doping. Fourier transform infrared spectroscopy confirmed the presence of metal-oxygen bond in pristine and doped NiO nanostructure as well as the presence of carbon containing groups. Scanning electron microscopy (SEM) indicated that the particle size decreased when NiO nanostructure was doped with copper. BET surface area was found to increase almost up to 43 m2/g for Cu doped NiO nanostructure/rGO composite. Current-voltage measurements were performed using two probe method. UV–Visible spectroscopic profiles showed the blue and red shift for Cu doped NiO nanostructure and Cu doped NiO Nanostructure/rGO composite respectively. Rate constant for Cu doped NiO nanostructure/rGO composite found to increase 4.4 times than pristine NiO nanostructure.  相似文献   
3.
Abstract

Industry 4.0 aims at providing a digital representation of a production landscape, but the challenges in building, maintaining, optimizing, and evolving digital models in inter-organizational production chains have not been identified yet in a systematic manner. In this paper, various Industry 4.0 research and technical challenges are addressed, and their present scenario is discussed. Moreover, in this article, the novel concept of developing experience-based virtual models of engineering entities, process, and the factory is presented. These models of production units, processes, and procedures are accomplished by virtual engineering object (VEO), virtual engineering process (VEP), and virtual engineering factory (VEF), using the knowledge representation technique of Decisional DNA. This blend of the virtual and physical domains permits monitoring of systems and analysis of data to foresee problems before they occur, develop new opportunities, prevent downtime, and even plan for the future by using simulations. Furthermore, the proposed virtual model concept not only has the capability of Query Processing and Data Integration for Industrial Data but also real-time visualization of data stream processing.  相似文献   
4.
Fabrication and thermal characterization of a resistance temperature detector (RTD) heater and microthermocouples (MTs) on silicon substrates have been reported in this paper. The influence of film thickness and nickel-gold (Au) electroplating on RTD on its steady-state temperature with respect to its steady-state electrical power input and resistance is studied. Further, the thermal effects of multiple thermocouples in a thermopile as well as the effects of Au layers in the contact pads of the thermopiles on their open-circuit Seebeck voltage are studied. Therein lies the novelty of this paper. The in situ operating relationships for the RTD heater and the MT are provided  相似文献   
5.
In order to monitor sufficiently large areas of interest for surveillance or any event detection, we need to look beyond stationary cameras and employ an automatically configurable network of nonoverlapping cameras. These cameras need not have an overlapping field of view and should be allowed to move freely in space. Moreover, features like zooming in/out, readily available in security cameras these days, should be exploited in order to focus on any particular area of interest if needed. In this paper, a practical framework is proposed to self-calibrate dynamically moving and zooming cameras and determine their absolute and relative orientations, assuming that their relative position is known. A global linear solution is presented for self-calibrating each zooming/focusing camera in the network. After self-calibration, it is shown that only one automatically computed vanishing point and a line lying on any plane orthogonal to the vertical direction is sufficient to infer the dynamic network configuration. Our method generalizes previous work which considers restricted camera motions. Using minimal assumptions, we are able to successfully demonstrate promising results on synthetic, as well as on real data.  相似文献   
6.
The Journal of Supercomputing - Agile software development (ASD) and software product line (SPL) have shown significant benefits for software engineering processes and practices. Although both...  相似文献   
7.
Radio frequency identification (RFID) tag delegation enables a centralized back-end server to delegate the right to identify and authenticate a tag to specified readers. This should be used to mitigate the computational load on the server side and also to solve the issues in terms of latency and dependency on network connectivity. In this study, we describe a basic RFID delegation architecture and then under this model, we investigate the security of an RFID delegation protocol: Song Mitchell delegation (SMD), which is recently proposed by Song and Mitchell. We point out security flaws that have gone unnoticed in the design and present two attacks namely, a tag impersonation attack and a desynchronization attack against it. We also discover a subtle flaw by which a delegated entity can still keep its delegation rights after the expire of them—this infringes security policy of the scheme. More precisely, we show that the protocol will be still vulnerable to previously mentioned attacks, even if the back-end server ends the delegation right of a delegated reader and update the secrets of the delegated tags. To counteract such flaws, we improve the SMD protocol with a stateful variant so that it provides the claimed security properties.  相似文献   
8.
The sorption behavior of acid dyes onto cetyltrimethylammonium bromide (CTAB)-modified silica as a function of pH in the aqueous medium was studied. Single-and multi-solute sorption equilibria of orange Ⅱ(OR), phenol red (PR) and Eriochrome Black T (EBT) were studied at pH 3, unbuffered water pH and pH 11. Sorption behavior of EBT could not be conducted at pH3 due to its aggregation in acidic medium. All the reaction conditions, experimental protocols and techniques remained the same throughout the sorption process. Sorption isotherms for single-solute system were fitted by the Langmuir model, while Langmuir competitive model (LCM) and the ideal adsorbed solution theory (IAST) coupled with Langmuir model (IAST/Langmuir) were used for the prediction of multisolute competitive sorption. Sorption affinities influenced by the factors like physical interactive forces between the molecules of CTA on silica and sorbate, structural limitations of the dyes based on their geometrical arrangement were investigated. Sorption affinity of OR was found to be higher than that of EBT and PR at all the pH values investigated. Magnitude of the sorption capacities was observed to be higher in acidic medium but lower in alkaline medium. Trends of the sorption affinities in multisolute system were simlar to those in single-solute system but magnitude of the sorption capacities was significantly reduced due to the prevailing competition among the sorbates.  相似文献   
9.
Silhouette-based human action recognition using SAX-Shapes   总被引:1,自引:0,他引:1  
Human action recognition is an important problem in Computer Vision. Although most of the existing solutions provide good accuracy results, the methods are often overly complex and computationally expensive, hindering practical applications. In this regard, we introduce the combination of time-series representation for the silhouette and Symbolic Aggregate approXimation (SAX), which we refer to as SAX-Shapes, to address the problem of human action recognition. Given an action sequence, the extracted silhouettes of an actor from every frame are transformed into time series. Each of these time series is then efficiently converted into the symbolic vector: SAX. The set of all these SAX vectors (SAX-Shape) represents the action. We propose a rotation invariant distance function to be used by a random forest algorithm to perform the human action recognition. Requiring only silhouettes of actors, the proposed method is validated on two public datasets. It has an accuracy comparable to the related works and it performs well even in varying rotation.  相似文献   
10.
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号