全文获取类型
收费全文 | 604篇 |
免费 | 36篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 9篇 |
综合类 | 1篇 |
化学工业 | 162篇 |
金属工艺 | 14篇 |
机械仪表 | 21篇 |
建筑科学 | 17篇 |
矿业工程 | 3篇 |
能源动力 | 44篇 |
轻工业 | 81篇 |
水利工程 | 19篇 |
石油天然气 | 15篇 |
无线电 | 32篇 |
一般工业技术 | 73篇 |
冶金工业 | 35篇 |
原子能技术 | 9篇 |
自动化技术 | 109篇 |
出版年
2023年 | 15篇 |
2022年 | 25篇 |
2021年 | 37篇 |
2020年 | 26篇 |
2019年 | 34篇 |
2018年 | 27篇 |
2017年 | 25篇 |
2016年 | 31篇 |
2015年 | 22篇 |
2014年 | 23篇 |
2013年 | 67篇 |
2012年 | 44篇 |
2011年 | 41篇 |
2010年 | 23篇 |
2009年 | 16篇 |
2008年 | 13篇 |
2007年 | 22篇 |
2006年 | 14篇 |
2005年 | 13篇 |
2004年 | 9篇 |
2003年 | 9篇 |
2002年 | 9篇 |
2001年 | 7篇 |
2000年 | 4篇 |
1999年 | 5篇 |
1998年 | 12篇 |
1997年 | 5篇 |
1996年 | 5篇 |
1993年 | 3篇 |
1991年 | 3篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 5篇 |
1977年 | 2篇 |
1976年 | 6篇 |
1975年 | 4篇 |
1974年 | 3篇 |
1973年 | 1篇 |
1972年 | 2篇 |
1971年 | 1篇 |
1969年 | 1篇 |
1967年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有644条查询结果,搜索用时 12 毫秒
1.
With lower costs and greater availability, heavy fuel oil appears as an attractive alternative to the conventional gas oil used in industrial gas turbines. However, higher levels of radiation and smoke are expected, and this note reports on some preliminary tests made with a combustion chamber burning fuels of different carbon content, ranging from kerosine to a 25% blend of residual fuel oil in gas oil, at a chamber pressure of 10 atm*. The combustion rig was equipped with a total-radiation pyrometer and black-body furnace capable of measurement at different axial stations along the spray-stabilized flame. The presence of the residual fuel oil in the gas oil was found to promote significant increases in the mean levels of radiation, emissivity and smoke density, with a modest increase in liner temperature. 相似文献
2.
Bahareh ZIBANEZHAD Kamran ZAMANIFAR Razieh Sadat SADJADY Yousef RASTEGARI 《浙江大学学报(英文版)(C辑:计算机与电子)》2011,12(9)
With the growing use of service-oriented architecture for designing next generation software systems,the service composition problem and its execution complexity have become even more important in resp... 相似文献
3.
Salam Al-E’mari Mohammed Anbar Yousef Sanjalawe Selvakumar Manickam Iznan Hasbullah 《计算机系统科学与工程》2022,40(1):87-102
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology. 相似文献
4.
This work is focused on the study of combined heat and mass transfer or double-diffusive convection near a vertical truncated cone embedded in a fluid-saturated porous medium in the presence of thermal radiation, magnetic field and variable viscosity effects. The viscosity of the fluid is assumed to be an inverse linear function of the fluid temperature. A boundary-layer analysis is employed to derive the non-dimensional governing equations. The governing equations for this investigation are transformed into a set of non-similar equations and solved numerically using the fourth-order Runge–Kutta integration scheme with the Newton–Raphson shooting technique. Comparisons with previously published work on special cases of the problem are performed and the results are found to be in excellent agreement. A parametric study illustrating the influence of the radiation parameter, magnetic field parameter, viscosity-variation parameter, buoyancy ratio and the Lewis number on the fluid velocity, temperature and solute concentration profiles as well as the Nusselt number and Sherwood number is conducted. The results of this parametric study are shown graphically and the physical aspects of the problem are highlighted and discussed. 相似文献
5.
Nooshin Bigdeli Yousef Farid Karim Afshar 《Engineering Applications of Artificial Intelligence》2012,25(4):753-765
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme. 相似文献
6.
A method of tuning for PI controllers with one-way lead/lag decoupling tuning is demonstrated for 2×2 input-output systems, based on finite frequency response data. The frequency response estimates are obtained from closed loop tests using an identification technique based on bandpass filters. The open-loop frequency response is calculated and used to tune PI controllers and to fit lead-lag compensators for decoupling by weighted least-squares. Separate optimization of the PI controllers and the lead-lag compensator is preferred. The tuning takes into account violations of desired multivariable robustness criteria. The method is illustrated by application to a paper machine headbox simulation and by experiments in distillation column temperature control. 相似文献
7.
8.
Samuel Swearson Aseel O. Rataan Steven Eliason Brad A. Amendt Yousef Zakharia Aliasger K. Salem Thai Ho Youcef M. Rustum 《International journal of molecular sciences》2022,23(10)
This study was carried out to quantitate the expression levels of microRNA-17, -19a, -34a, -155, and -210 (miRs) expressed in nine clear cell renal cell carcinoma (ccRCC) and one chromophobe renal cell carcinoma cell line with and without sarcomatoid differentiation, and in six primary kidney tumors with matching normal kidney tissues. The data in the five non-sarcomatoid ccRCC cell lines—RC2, CAKI-1, 786-0, RCC4, and RCC4/VHL—and in the four ccRCC with sarcomatoid differentiation—RCJ41T1, RCJ41T2, RCJ41M, and UOK-127—indicated that miR-17 and -19a were expressed at lower levels relative to miR-34a, -155, and -210. Compared with RPTEC normal epithelial cells, miR-34a, miR-155, and miR-210 were expressed at higher levels, independent of the sarcomatoid differentiation status and hypoxia-inducible factors 1α and 2α (HIFs) isoform expression. In the one chromophobe renal cell carcinoma cell line, namely, UOK-276 with sarcomatoid differentiation, and expressing tumor suppressor gene TP53, miR-34a, which is a tumor suppressor gene, was expressed at higher levels than miR-210, -155, -17, and -19a. The pilot results generated in six tumor biopsies with matching normal kidney tissues indicated that while the expression of miR-17 and -19a were similar to the normal tissue expression profile, miR-210, -155, -and 34a were expressed at a higher level. To confirm that differences in the expression levels of the five miRs in the six tumor biopsies were statistically significant, the acquisition of a larger sample size is required. Data previously generated in ccRCC cell lines demonstrating that miR-210, miR-155, and HIFs are druggable targets using a defined dose and schedule of selenium-containing molecules support the concept that simultaneous and concurrent downregulation of miR-210, miR-155, and HIFs, which regulate target genes associated with increased tumor angiogenesis and drug resistance, may offer the potential for the development of a novel mechanism-based strategy for the treatment of patients with advanced ccRCC. 相似文献
9.
This paper presents the design,implementation and testing of an embedded system that integrates solar and storage energy resources to smart homes within the smart microgrid.The proposed system provides the required home energy by installing renewable energy and storage devices.It also manages and schedules the power flow during peak and off-peak periods.In addition,a two-way communication protocol is developed to enable the home owners and the utility service provider to improve the energy flow and the consumption efficiency.The system can be an integral part for homes in a smart grid or smart microgrid power networks.A prototype for the proposed system was designed,implemented and tested by using a controlled load bank to simulate a scaled random real house consumption behavior.Three different scenarios were tested and the results and findings are reported.Moreover,data flow security among the home,home owners and utility server is developed to minimize cyber-attacks. 相似文献
10.
Weikai Ding Yousef Sultan Shumei Li Wenjun Wen Bangjun Zhang Yiyi Feng Junguo Ma Xiaoyu Li 《International journal of molecular sciences》2022,23(11)
Previous studies have indicated that the harmful heavy metal lead (Pb) contamination in aquatic systems has caused intelligence development disorders and nervous system function abnormalities in juveniles due to the increased permeability of the blood–brain barrier. Ionic liquids (ILs) are considered “green” organic solvents that can replace traditional organic solvents. Studies have found the presence of ILs in soil and water due to chemical applications or unintentional leakage. Therefore, what would happen if Pb interacted with ILs in a body of water? Could ILs enable Pb to more easily cross the blood–brain barrier? Therefore, we examined the combined exposure of Pb and ILs in common carp at low concentration (18.3 mg L−1 of Pb(CH3COO)2•3 H2O and 11 mg L−1 of the IL 1-methyl-3-octylimidazolium chloride, 5% of their LC50) for 28 days in the present study. The result of a neurobehavioral assay showed that chronic exposure of lead at lower concentrations significantly altered fish movement and neurobehaviors, indicating that lead exposure caused neurotoxicity in the carp. Increases in the neurotransmitter dopamine levels and injuries in the fish brain accounted for neurobehavioral abnormalities induced by lead exposure. Moreover, we also found that lead could easily cross the blood–brain barrier and caused significant bioaccumulation in the brain. Particularly, our study indicated that the ionic liquid could not synergistically promote blood–brain barrier permeability and hence failed to increase the absorption of lead in the fish brain, suggesting that the combined exposure of lead and ILs was not a synergistic effect but antagonism to the neurotoxicity. The results of this study suggested that ILs could recede the Pb induced neurotoxicity in fish. 相似文献