首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   172篇
  免费   17篇
  国内免费   1篇
工业技术   190篇
  2023年   7篇
  2022年   16篇
  2021年   15篇
  2020年   8篇
  2019年   9篇
  2018年   9篇
  2017年   12篇
  2016年   18篇
  2015年   7篇
  2014年   16篇
  2013年   13篇
  2012年   11篇
  2011年   9篇
  2010年   10篇
  2009年   6篇
  2008年   4篇
  2007年   2篇
  2006年   1篇
  2005年   6篇
  2001年   1篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1981年   1篇
排序方式: 共有190条查询结果,搜索用时 234 毫秒
1.
2.
Utilizing CO2 in an electro-chemical process and synthesizing value-added chemicals are amongst the few viable and scalable pathways in carbon capture and utilization technologies.CO2 electro-reduction is also counted as one of the main options entailing less fossil fuel consumption and as a future electrical energy storage strategy.The current study aims at developing a new electrochemical platform to produce low-carbon e-biofuel through multifunctional electrosynthesis and integrated co-valorisation of biomass feedstocks with captured CO2.In this approach,CO2 is reduced at the cathode to produce drop-in fuels(e.g.,methanol)while value-added chemicals(e.g.,selective oxidation of alcohols,aldehydes,carboxylic acids and amines/amides)are produced at the anode.In this work,a numerical model of a continuous-flow design considering various anodic and cathodic reactions was built to determine the most techno-economically feasible configurations from the aspects of energy efficiency,environment impact and economical values.The reactor design was then optimized via parametric analysis.  相似文献   
3.
The Discrete Cosine Transform (DCT) is one of the most widely used techniques for image compression. Several algorithms are proposed to implement the DCT-2D. The scaled SDCT algorithm is an optimization of the DCT-1D, which consists in gathering all the multiplications at the end. In this paper, in addition to the hardware implementation on an FPGA, an extended optimization has been performed by merging the multiplications in the quantization block without having an impact on the image quality. A simplified quantization has been performed also to keep higher the performances of the all chain. Tests using MATLAB environment have shown that our proposed approach produces images with nearly the same quality of the ones obtained using the JPEG standard. FPGA-based implementations of this proposed approach is presented and compared to other state of the art techniques. The target is an an Altera Cyclone II FPGA using the Quartus synthesis tool. Results show that our approach outperforms the other ones in terms of processing-speed, used resources and power consumption. A comparison has been done between this architecture and a distributed arithmetic based architecture.  相似文献   
4.
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.  相似文献   
5.
In an attempt to decrease the incidence of central venous catheter sepsis in children with cancer, we conducted a study to evaluate the benefit of adding broad-spectrum antibiotics to the catheter "flush solution." In a prospective, placebo-controlled, double-blinded, randomized trial, 69 children with different types of malignancies were studied. The central venous catheters in these children were flushed with either the standard solution (normal saline + 100 U/ml of heparin) or the study solution (25 microgram/ml of both amikacin and vancomycin added to the standard solution). At the conclusion of the study, 64 children with a total of 67 indwelling central venous lines were assessable. The total catheter days on study were 20,700 days, with a median of 323 catheter days per patient. We documented 10 events of catheter-related infections (0.49 events/1,000 catheter days at risk). Five of these events were catheter-related sepsis (0.24 sepses/1,000 catheter days): two were fungal and three were bacterial. Due to the low incidence of catheter-related sepsis in this study, no statement regarding the prophylactic use of antibiotics could be made. The extremely low rate of catheter-related sepsis reported herein may be retrospectively attributed to continuous staff education regarding aseptic techniques in handling these catheters. Staff education is essential, and probably the most effective factor in preventing catheter-related sepsis.  相似文献   
6.
Mobile Ad-hoc NETworks (MANET) are infrastructureless networks where self-configuring mobile nodes are connected by wireless links. Because of its decentralized operation, these nodes rely on each other to store and forward packets. Video transmission over MANETs is more challenging than over conventional wireless networks due to rapid topology changes and lack of central administration. Most of the proposed MANET protocols assume that all nodes are working within a cooperative and friendly network context. However, misbehaving nodes that exhibit abnormal behaviors can disrupt the network operation and affect the network availability by refusing to cooperate to route packets due to their selfish or malicious behavior. In this paper, we examine the effect of packet dropping attacks on video transmission over MANETs. We also study the effects of mitigation using intrusion detection systems to MANET in presence of video traffic. To the best of our knowledge, this is the first attempt to study multimedia over such environments. We propose a novel intrusion detection system, which is an adaptive acknowledgment scheme (AACK) with the ability to detect misbehaved nodes and avoid them in other transmissions. The aim of AACK scheme is to overcome watchdog weaknesses due to collisions and limited transmission power and also to improve TWOACK scheme. To demonstrate the performance of our proposed scheme, simulation experiments are performed. The results of our experiments show that MPEG4 is more suitable for our simulation environment than H264 video traffic. The simulation results show that AACK scheme provides better network performance with less overhead than other schemes; it also shows that AACK outperforms both TWOACK and watchdog in video transmission applications in the presence of misbehaving nodes.  相似文献   
7.
8.
This paper studies the behavior of the low‐complexity switch‐and‐examine diversity combining (SEC) and switch‐and‐examine diversity combining with post‐examine selection (SECps) antenna selection schemes with interference. In this paper, we first derive the cumulative distribution function (CDF) of the end‐to‐end (e2e) signal‐to‐interference plus noise ratio at the selection scheme combiner output. This CDF is then used to derive closed‐form expressions for the e2e outage and symbol error probabilities for the independent nonidentically distributed and independent identically distributed cases of diversity branches. In the analysis, the channels of the desired user and the interferers are assumed to follow Rayleigh distribution. Furthermore, to have more details about the system insights, the performance is evaluated at the high signal‐to‐noise ratio (SNR) values where the diversity order and coding gain are derived and analyzed. The derived analytical and asymptotic results are validated via a comparison with Monte‐Carlo simulations. Main findings show that with interference power does not scale with average SNR; the system can still achieve performance gain when more receive antennas are used. This happens at the values of switching threshold that are close to average SNR. Also, results illustrate that the interference is noticeably affecting the gain achieved in system performance when more antennas are used. Furthermore, findings show that the SECps selection scheme outperforms the conventional SEC scheme when more antennas are added with the switching threshold is much larger than the average SNR. Finally, findings show that the SEC and SECps antenna selection schemes are efficient for systems which operate at the range of low SNR values and this makes them attractive candidates to be implemented in the emerging mobile broadband communication systems. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
9.
The ultra-precision dicing of hard and brittle materials causes high wear on the abrasive tool which results in the deterioration of blade cross section as well as the decrease of diamond grain exposure. Resin-bonded diamond blades are used due to their in-process self-sharpening capability. Nevertheless, the shape of the blade cross section generated by self-sharpening is random which leads to poor accuracy when precise grooves need to be produced. Metal-bonded diamond blades feature higher tool lifetime and shape accuracy compared to resin-bonded blades, but are not capable of performing self-sharpening. In this study, the laser dressing of metal-bonded diamond blades is investigated to enable their use in the ultra-precision dicing of hard and brittle materials by continuous laser dressing. We investigated laser dressing with and without the presence of cooling water. The sharpness (grain exposure) after dressing is measured by the cutting face surface roughness. The dicing performance is evaluated by observing the dicing results in terms of cutting depth consistency and by monitoring the spindle power during dicing. Dicing blades which have been laser dressed in an environment with coolant feature less grain exposure than dicing blades which have been laser dressed in dry condition. The dicing results show an improvement in the sharpness and durability of laser-dressed dicing blades in comparison with new or conventionally dressed blades. The ability to apply and perform laser dressing on a dicing machine in an environment with coolant shows the feasibility of laser technology for continuous dressing.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号