首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   994篇
  免费   79篇
  国内免费   10篇
电工技术   24篇
综合类   2篇
化学工业   300篇
金属工艺   33篇
机械仪表   46篇
建筑科学   45篇
矿业工程   6篇
能源动力   58篇
轻工业   54篇
水利工程   26篇
石油天然气   16篇
无线电   90篇
一般工业技术   186篇
冶金工业   38篇
原子能技术   5篇
自动化技术   154篇
  2024年   2篇
  2023年   10篇
  2022年   26篇
  2021年   68篇
  2020年   66篇
  2019年   85篇
  2018年   94篇
  2017年   97篇
  2016年   80篇
  2015年   45篇
  2014年   57篇
  2013年   105篇
  2012年   64篇
  2011年   73篇
  2010年   51篇
  2009年   33篇
  2008年   17篇
  2007年   21篇
  2006年   16篇
  2005年   14篇
  2004年   4篇
  2003年   4篇
  2002年   6篇
  2001年   3篇
  2000年   5篇
  1999年   2篇
  1998年   9篇
  1997年   5篇
  1996年   5篇
  1995年   4篇
  1993年   6篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1986年   1篇
  1983年   1篇
排序方式: 共有1083条查询结果,搜索用时 531 毫秒
1.
For the first time in this study, Zinc oxide nanoparticles were biosynthesized by the eco-friendly and cost-effective procedure using Amygdalus scoparia stem bark extract then used as antibacterial, antifungal, anticancer, and anti-diabetic agents. The characterization techniques confirmed the biosynthesis, crystalline nature, structure, size, elemental composition of ZnO NPs and bioactive compounds that exist in A. scoparia extract accounting for Zn2+ ion reduction, capping and stabilization of ZnO NPs. The ZnO NPs displayed remarkable inhibitory activity against E. coli, E. aerigenes, S. aureus, P. oryzae, F. thapsinum, and F. semitectum compared to antibiotic standards. The ZnO NPs showed significant inhibitory effects on cancer cell lines, while it had no toxic effect on Vero normal cell line. The ZnO NPs (30 mg/kg)-treated diabetic rats showed significantly higher levels of insulin and lower AST, ALT and blood glucose compared with the STZ induced diabetic group and other treated groups (P < 0.05). The ZnO NPs- and extract-treated rats showed significantly higher levels of IR, GluT2, and GCK expression and lower TNFα expression compared with the STZ induced diabetic rats. Our findings showed that ZnO NPs represented an outstanding performance for biological applications.  相似文献   
2.
Journal of Materials Science: Materials in Electronics - The main weakness of polymer gas sensors is its stability. Here, we report stability enhancement of a 100&nbsp;nm polypyrrole (PPy) thin...  相似文献   
3.
We cross-sectionally examined the relationship between age, optic disc area, refraction, and gender and optic disc topography and retinal nerve fiber layer (RNFL) measurements, using optical imaging techniques. One eye from each of 155 Caucasian subjects (age range 23.0-80.8 y) without ocular pathology was included. Measurements were obtained by using the Heidelberg Retina Tomography (HRT), the GDx Nerve Fiber Analyzer, and the Optical Coherence Tomograph (OCT). The effects of age were small (R2 < 17%) and were limited to specific HRT, GDx, and OCT parameters. Disc area was significantly associated with most HRT parameters and isolated GDx and OCT parameters. Refraction and gender were not significantly associated with any optic disc or RNFL parameters. Although effects of age on the optic disc and RNFL are small, they should be considered in monitoring ocular disease. Optic disc area should be considered when cross-sectionally evaluating disc topography and, to a lesser extent, RNFL thickness.  相似文献   
4.
On the basis of the energy supply and demand, this paper assesses the environmental damage from air pollution in Iran using the Extern-E study that has extended over 10 years and is still in progress in the European Union (EU) commission. Damage costs were transferred from Western European practice to the conditions of Iran by scaling according to GDP per capital measured in PPP terms.  相似文献   
5.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
6.

Most of the commonly used hydrological models do not account for the actual evapotranspiration (ETa) as a key contributor to water loss in semi-arid/arid regions. In this study, the HEC-HMS (Hydrologic Engineering Center Hydrologic Modeling System) model was calibrated, modified, and its performance in simulating runoff resulting from short-duration rainfall events was evaluated. The model modifications included integrating spatially distributed ETa, calculated using the surface energy balance system (SEBS), into the model. Evaluating the model’s performance in simulating runoff showed that the default HEC-HMS model underestimated the runoff with root mean squared error (RMSE) of 0.14 m3/s (R2?=?0.92) while incorporating SEBS ETa into the model reduced RMSE to 0.01 m3/s (R2?=?0.99). The integration of HECHMS and SEBS resulted in smaller and more realistic latent heat flux estimates translated into a lower water loss rate and a higher magnitude of runoff simulated by the HECHMS model. The difference between runoff simulations using the default and modified model translated into an average of 95,000 m3 runoff per rainfall event (equal to seasonal water requirement of ten-hectare winter wheat) that could be planned and triggered for agricultural purposes, flood harvesting, and groundwater recharge in the region. The effect of ETa on the simulated runoff volume is expected to be more pronounced during high evaporative demand periods, longer rainfall events, and larger catchments. The outcome of this study signifies the importance of implementing accurate estimates of evapotranspiration into a hydrological model.

  相似文献   
7.

In recent years, due to the drastic rise in the number of vehicles and the lack of sufficient infrastructure, traffic jams, air pollution, and fuel consumption have increased in cities. The optimization of timing for traffic lights is one of the solutions for the mentioned problems. Many methods have been introduced to deal with these problems, including reinforcement learning. Although a great number of learning-based methods have been used in traffic signal control, they suffer from poor performance and slow learning convergence. In this paper, a transfer learning-based method for traffic signal control has been proposed. Multi-agent system has also been used for modelling the traffic network and transfer learning has been used to make reinforcement learning agents transfer their experience to each other. Furthermore, a classifier has been utilized to classify the transferred experiences. The results show that using the proposed method leads to a significant improvement on average delay time and convergence time of the learning process.

  相似文献   
8.
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method.  相似文献   
9.
In Classical Bayesian approach, estimation of lifetime data usually is dealing with precise information. However, in real world, some informations about an underlying system might be imprecise and represented in the form of vague quantities. In these situations, we need to generalize classical methods to vague environment for studying and analyzing the systems of interest. In this paper, we propose the Bayesian estimation of failure rate and mean time to failure based on vague set theory in the case of complete and censored data sets. To employ the Bayesian approach, model parameters are assumed to be vague random variables with vague prior distributions. This approach will be used to induce the vague Bayes estimate of failure rate and mean time to failure by introducing and applying a theorem called “Resolution Identity” for vague sets. In order to evaluate the membership degrees of vague Bayesian estimate for these quantities, a computational procedure is investigated. In the proposed method, the original problem is transformed into a nonlinear programming problem which is then divided into eight subproblems to simplifying computations.  相似文献   
10.

Wave absorbers are considered to be fundamental building blocks for the manipulation of light. Almost all optical systems exploit absorbers to realize some functions. A highly tunable wide-band THz absorber is presented herein. Utilizing a dual-bias scheme with a single graphene layer leads to greater freedom to control the absorption response, while a conventional periodic array of graphene ribbons and a layer of graphene sheet are also exploited. Also, a circuit model representation for all the constituent parts of the proposed absorber is developed with an evolved design methodology. According to the simulation results, wide-band absorption from 3.5 to 6 THz is achieved.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号