首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   551篇
  免费   11篇
  国内免费   3篇
电工技术   6篇
化学工业   100篇
金属工艺   34篇
机械仪表   13篇
建筑科学   19篇
矿业工程   1篇
能源动力   38篇
轻工业   16篇
水利工程   5篇
石油天然气   4篇
无线电   99篇
一般工业技术   95篇
冶金工业   73篇
原子能技术   1篇
自动化技术   61篇
  2024年   5篇
  2023年   8篇
  2022年   8篇
  2021年   25篇
  2020年   12篇
  2019年   17篇
  2018年   17篇
  2017年   13篇
  2016年   17篇
  2015年   4篇
  2014年   12篇
  2013年   24篇
  2012年   21篇
  2011年   22篇
  2010年   23篇
  2009年   20篇
  2008年   22篇
  2007年   18篇
  2006年   16篇
  2005年   11篇
  2004年   9篇
  2003年   14篇
  2002年   13篇
  2001年   11篇
  2000年   7篇
  1999年   14篇
  1998年   14篇
  1997年   12篇
  1996年   10篇
  1995年   6篇
  1994年   6篇
  1993年   9篇
  1992年   11篇
  1991年   15篇
  1990年   15篇
  1988年   2篇
  1987年   4篇
  1986年   3篇
  1985年   8篇
  1984年   13篇
  1983年   5篇
  1982年   10篇
  1981年   6篇
  1980年   4篇
  1979年   2篇
  1976年   2篇
  1975年   10篇
  1974年   3篇
  1973年   4篇
  1972年   2篇
排序方式: 共有565条查询结果,搜索用时 171 毫秒
1.
A two-dimensional cross-section finite difference model is presented to simulate density dependent leachate migration in leaky aquifers. Unlike existing models, a new approach is adopted to couple the groundwater-flow equation and the hydrodynamic dispersion equation with the elimination of the intermediate step of calculating velocities. The concept of the reference density is employed, permitting increased accuracy (over pressure-based models) in the representation of the transport process. The model is then used to study the effect of several hydraulic and transport parameters on the flow pattern and plume migration which are found to be very sensitive to most of these parameters. Equiconcentration and equipotential lines are overlapped to provide a better understanding of the coupling effect.  相似文献   
2.
A. I. Alkhamis  S. A. Sherif 《Energy》1992,17(12):1165-1172
This paper deals with feasibility studies for a solar-assisted heating system for the University of Miami's Aquatic Center using the simulation program TRNSYS. The Aquatic Center is composed of an outdoor olympic size swimming pool and locker room building. The solar heating is accomplished by employing hot water generated by heat exchange with the solar collector working fluid. Two thermal storage tanks are employed for the collector and domestic use. The performance of the system is analyzed from both thermodynamic and economic standpoints and general conclusions are reached.  相似文献   
3.
This work gives an overview of the different developments for silicon germanium (Si1−xGex) from a MEMS post-processing perspective. First, the maximum processing temperature that does not introduce any damage or degradation into the standard characteristics of the CMOS driving electronics is specified. Then, the optimal type of silicon and germanium gas sources and deposition technique that results in an economical process are identified. Next, the selection criteria for a low thermal budget doping method and doping species are discussed. Finally, the advantage and disadvantage for the different approaches implemented for enhancing the physical properties of poly Si1−xGex at a CMOS backend compatible temperature are highlighted. It is shown that the optimal method depends on the application requirements and the CMOS technology used for realizing the driving electronics.  相似文献   
4.
Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services. In terms of efficiency, our scheme does not involve any database lookup or public key cryptography. In terms of deployability, our scheme can be easily deployed on existing web services, and it does not require any change to the Internet cookie specification. We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side.A notable adoption of our scheme in industry is that our cookie scheme has been used by Wordpress since version 2.4. Wordpress is a widely used open source content management system.  相似文献   
5.
Journal of Inorganic and Organometallic Polymers and Materials - Surface oxygen of oxide catalyst has low coordination number; they are negatively charged. Surface oxygen can act active site for...  相似文献   
6.
Gelatin is a natural macromolecular protein. It contains a wide variety of amino acids in its polymer structure, and it is colorless to yellowish, water‐soluble, and tasteless. It is used as a dispersing agent, sizing medium, and coating for photographic films and in pharmaceutical formulations. In this study, biodegradable mulching, based on waste gelatin from pharmaceutical gelatin scraps (derived from pharmaceutical soft gelatin capsule production), was formulated via the casting of water solutions or suspensions into flexible and consistent films. Gelatin was blended with synthetic materials such as poly(vinyl alcohol) and other natural wastes such as sugar cane bagasse and sawdust. To all formulations, 2,4‐dichlorophenoxy acetic acid (2,4‐D) was added as a herbicide. The morphology and mechanical properties of the samples were investigated with scanning electron microscopy and tensile testing, respectively. The results showed that the produced films had controlled‐release properties. The effects of various additives and crosslinking on the films and the release of the herbicide 2,4‐D from the films were also investigated. The introduction of synthetic and natural additives reduced the release rate of 2,4‐D. © 2003 Wiley Periodicals, Inc. J Appl Polym Sci 91: 2313–2319, 2004  相似文献   
7.
Amorphous Al50Ta60 alloy powders have been synthesized by mechanical alloying (MA) from elemental powders of aluminium and tantalum, and mechanical disordering (MD) from crystalline intermetallic compound powders of AlTa respectively using the rod milling technique. The mechanically alloyed and the mechanically disordered alloy powders were characterized by X-ray diffraction, scanning electron microscopy, electron probe microanalysis, transmission electron microscopy, differential thermal analysis, differential scanning calorimetry and chemical analysis. The results have shown that the crystal-to amorphous transformation in the MD process occurs through one stage, while the crystallineto-amorphous formation in the MA process occurs through three stages. At the early and intermediate stages of the MA time, heating the alloy powders to 700 K leads to the formation of an amorphous phase by a solid-state amorphizing reaction. At the final stage of the MA time, the amorphous phase is crystallized through a single sharp exothermic peak. Contrary to this, amorphous alloy powders produced by MD are crystallized through two broad exothermic peaks.  相似文献   
8.
The success of using Hidden Markov Models (HMMs) for speech recognition application has motivated the adoption of these models for handwriting recognition especially the online handwriting that has large similarity with the speech signal as a sequential process. Some languages such as Arabic, Farsi and Urdo include large number of delayed strokes that are written above or below most letters and usually written delayed in time. These delayed strokes represent a modeling challenge for the conventional left-right HMM that is commonly used for Automatic Speech Recognition (ASR) systems. In this paper, we introduce a new approach for handling delayed strokes in Arabic online handwriting recognition using HMMs. We also show that several modeling approaches such as context based tri-grapheme models, speaker adaptive training and discriminative training that are currently used in most state-of-the-art ASR systems can provide similar performance improvement for Hand Writing Recognition (HWR) systems. Finally, we show that using a multi-pass decoder that use the computationally less expensive models in the early passes can provide an Arabic large vocabulary HWR system with practical decoding time. We evaluated the performance of our proposed Arabic HWR system using two databases of small and large lexicons. For the small lexicon data set, our system achieved competing results compared to the best reported state-of-the-art Arabic HWR systems. For the large lexicon, our system achieved promising results (accuracy and time) for a vocabulary size of 64k words with the possibility of adapting the models for specific writers to get even better results.  相似文献   
9.
Non-symmetric similarity relation-based rough set model (NS-RSM) is viewed as mathematical tool to deal with the analysis of imprecise and uncertain information in incomplete information systems with “?” values. NS-RSM relies on the concept of non-symmetric similarity relation to group equivalent objects and generate knowledge granules that are then used to approximate the target set. However, NS-RSM results in unpromising approximation space when addressing inconsistent data sets that have lots of boundary objects. This is because objects in the same similarity classes are not necessarily similar to each other and may belong to different target classes. To enhance NS-RSM capability, we introduce the maximal limited similarity-based rough set model (MLS-RSM) which describes the maximal collection of indistinguishable objects that are limited tolerance to each other in similarity classes. This allows accurate computation to be done for the approximation space. Furthermore, approximation accuracy comparisons have been conducted among NS-RSM and MLS-RSM. The results demonstrate that MLS-RSM model outperforms NS-RSM and can approximate the target set more efficiently.  相似文献   
10.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号