首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   753篇
  免费   40篇
  国内免费   3篇
电工技术   3篇
化学工业   173篇
金属工艺   26篇
机械仪表   34篇
建筑科学   10篇
能源动力   38篇
轻工业   47篇
水利工程   3篇
石油天然气   3篇
无线电   118篇
一般工业技术   175篇
冶金工业   77篇
原子能技术   6篇
自动化技术   83篇
  2024年   1篇
  2023年   15篇
  2022年   36篇
  2021年   36篇
  2020年   22篇
  2019年   24篇
  2018年   29篇
  2017年   39篇
  2016年   25篇
  2015年   17篇
  2014年   31篇
  2013年   58篇
  2012年   39篇
  2011年   48篇
  2010年   27篇
  2009年   33篇
  2008年   29篇
  2007年   33篇
  2006年   22篇
  2005年   16篇
  2004年   18篇
  2003年   21篇
  2002年   14篇
  2001年   11篇
  2000年   12篇
  1999年   7篇
  1998年   25篇
  1997年   12篇
  1996年   9篇
  1995年   11篇
  1994年   4篇
  1993年   8篇
  1992年   7篇
  1991年   10篇
  1990年   6篇
  1989年   1篇
  1988年   9篇
  1987年   3篇
  1986年   4篇
  1985年   3篇
  1984年   4篇
  1983年   5篇
  1982年   3篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1976年   2篇
  1973年   2篇
  1957年   1篇
排序方式: 共有796条查询结果,搜索用时 46 毫秒
1.
Catalysis Letters - We converted agro-waste Custard Apple Peels (CAP) to ash via thermal treatment, on which Pd(OAc)2 was immobilized easily that produced a low-cost, highly efficient Pd/CAP-ash...  相似文献   
2.
3.

A large amount of data and applications need to be shared with various parties and stakeholders in the cloud environment for storage, computation, and data utilization. Since a third party operates the cloud platform, owners cannot fully trust this environment. However, it has become a challenge to ensure privacy preservation when sharing data effectively among different parties. This paper proposes a novel model that partitions data into sensitive and non-sensitive parts, injects the noise into sensitive data, and performs classification tasks using k-anonymization, differential privacy, and machine learning approaches. It allows multiple owners to share their data in the cloud environment for various purposes. The model specifies communication protocol among involved multiple untrusted parties to process owners’ data. The proposed model preserves actual data by providing a robust mechanism. The experiments are performed over Heart Disease, Arrhythmia, Hepatitis, Indian-liver-patient, and Framingham datasets for Support Vector Machine, K-Nearest Neighbor, Random Forest, Naive Bayes, and Artificial Neural Network classifiers to compute the efficiency in terms of accuracy, precision, recall, and F1-score of the proposed model. The achieved results provide high accuracy, precision, recall, and F1-score up to 93.75%, 94.11%, 100%, and 87.99% and improvement up to 16%, 29%, 12%, and 11%, respectively, compared to previous works.

  相似文献   
4.

The proposed system portrays the application space examination of a diverse cryptosystem processor with dynamic reconfiguration abilities. It is appropriate to a variety of signal processing application domains namely telecommunications, image processing, video coding and cryptographic processing. To differentiate between application spaces of the processor, the performance is correlated with cutting edge devices, taking ability to program, energy efficiency and computational potential as the important factors. In general the conventional method of computation is processed by means of Virtual Secure Circuit (VSC) on Advanced Encryption Standard (AES) and performance of the device Field Programmable Gate Array (FPGA) after implementation is analyzed in terms of delay and throughput. In the conventional method area overhead and power consumption are less where as the architecture lags in performance and throughput. It has been overcome through the fully parallel pipelined Architecture of the VSC on AES which outperforms the existing method in terms of performance and throughput. The energy efficiency and performance are considerably more important than processor that are used for general purpose, while still preserving a Convenient approach of programming that mainly bank on software oriented languages. The exploit of VSC based AES is to formulate the cryptographic processor held against Side Channel Attacks like attacks based on power supply and electromagnetic signals. Then the experimental result shows the promising outcomes when compared to previous methods.

  相似文献   
5.
Multimedia Tools and Applications - The world of electronics in particularly in the field of image processing, numerous distinguishable and noteworthy contributions have been made available....  相似文献   
6.
Neural Computing and Applications - Predicting the critical buckling loads of functionally graded material (FGM) plates using an analytical method requires solving complex equations with various...  相似文献   
7.

A fuzzy set based cost model for additive manufacturing is proposed. The model is illustrated through an example of selective laser sintering (SLS), a commonly used additive manufacturing (AM) process. Initially, a deterministic cost model is developed. It is then converted to a fuzzy set based model by considering uncertainty in build time estimation and cost components. For the specific case of SLS, a build time estimation procedure is developed as a part of the cost model. A method to evaluate the reliability of the cost estimate in AM and its significance is also introduced. The cost model is illustrated through two examples of products manufactured by SLS.

  相似文献   
8.
9.
The microstructural, mechanical, and tribological behaviors of electroplated Ni on Cu conducting substrates have been investigated in this study. The microstructural studies were performed by X-ray diffraction (XRD) analysis and scanning electron microscopy (SEM). The results showed that initially (111) with (220), (200) Ni texture components were predominant in the coating, and increasing the current density from 0.1 to 0.5 A/cm2 led to the development of a strong (111) texture. The presence of ultrafine grains coupled with a (111) Ni texture improved the coating microhardness and wear properties significantly. It was shown that with an increase in current density, wear resistance of the coatings improved significantly and the electrical resistivity increased due to the highly populated grain boundaries.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号