首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   151篇
  免费   3篇
电工技术   2篇
化学工业   22篇
金属工艺   6篇
机械仪表   4篇
建筑科学   5篇
能源动力   5篇
轻工业   8篇
石油天然气   1篇
无线电   27篇
一般工业技术   32篇
冶金工业   9篇
原子能技术   2篇
自动化技术   31篇
  2023年   6篇
  2022年   7篇
  2021年   17篇
  2020年   1篇
  2019年   7篇
  2018年   7篇
  2017年   10篇
  2016年   11篇
  2015年   5篇
  2014年   5篇
  2013年   10篇
  2012年   6篇
  2011年   8篇
  2010年   8篇
  2009年   4篇
  2008年   7篇
  2007年   3篇
  2006年   1篇
  2005年   1篇
  2004年   2篇
  2003年   3篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   4篇
  1998年   1篇
  1997年   3篇
  1996年   3篇
  1994年   1篇
  1992年   1篇
  1989年   1篇
  1988年   3篇
  1987年   1篇
  1984年   1篇
  1974年   1篇
  1973年   1篇
  1967年   1篇
排序方式: 共有154条查询结果,搜索用时 15 毫秒
1.
Neurodegenerative diseases (NDs) including Alzheimer’s disease, Parkinson’s disease, amyotrophic lateral sclerosis, and Huntington’s disease are incurable and affect millions of people worldwide. The development of treatments for this unmet clinical need is a major global research challenge. Computer-aided drug design (CADD) methods minimize the huge number of ligands that could be screened in biological assays, reducing the cost, time, and effort required to develop new drugs. In this review, we provide an introduction to CADD and examine the progress in applying CADD and other molecular docking studies to NDs. We provide an updated overview of potential therapeutic targets for various NDs and discuss some of the advantages and disadvantages of these tools.  相似文献   
2.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
3.
The differential transform method (DTM) is an analytical and numerical method for solving a wide variety of differential equations and usually gets the solution in a series form. In this paper, we propose a reliable new algorithm of DTM, namely multi-step DTM, which will increase the interval of convergence for the series solution. The multi-step DTM is treated as an algorithm in a sequence of intervals for finding accurate approximate solutions for systems of differential equations. This new algorithm is applied to Lotka–Volterra, Chen and Lorenz systems. Then, a comparative study between the new algorithm, multi-step DTM, classical DTM and the classical Runge–Kutta method is presented. The results demonstrate reliability and efficiency of the algorithm developed.  相似文献   
4.
We report on a recycling project in which α-Al2O3 was produced from aluminum cans because no such work has been reported in literature. Heated aluminum cans were mixed with 8.0 M of H2SO4 solution to form an Al2(SO4)3 solution. The Al2(SO4)3 salt was contained in a white semi-liquid solution with excess H2SO4; some unreacted aluminum pieces were also present. The solution was filtered and mixed with ethanol in a ratio of 2:3, to form a white solid of Al2(SO4)3·18H2O. The Al2(SO4)3·18H2O was calcined in an electrical furnace for 3 h at temperatures of 400–1400 °C. The heating and cooling rates were 10 °C/min. XRD was used to investigate the phase changes at different temperatures and XRF was used to determine the elemental composition in the alumina produced. A series of different alumina compositions, made by repeated dehydration and desulfonation of the Al2(SO4)3·18H2O, is reported. All transitional alumina phases produced at low temperatures were converted to α-Al2O3 at high temperatures. The X-ray diffraction results indicated that the α-Al2O3 phase was realized when the calcination temperature was at 1200 °C or higher.  相似文献   
5.
Ibrahim  I. T.  Attallah  K. H.  Elsaid  M.  Fahmy  M. H.  Abo Zaid  L. A. 《Radiochemistry》2019,61(2):220-225
Radiochemistry - Aspirin, one of nonsteroidal anti-inflammatory analgesic drugs, was labeled with 125I with a labeling yield of 85.5% under the following conditions: pH 9, 100 mg of the substrate,...  相似文献   
6.
7.
Molecular resists, such as triphenylene derivatives, are small carbon rich molecules, and thus give the potential for higher lithographic resolution and etch durability, and lower line width roughness than traditional polymeric compounds. Their main limitation to date has been poor sensitivity. A new triphenylene derivative molecular resist, with pendant epoxy groups to aid chemically amplified crosslinking, was synthesized and characterized. The sensitivity of the negative tone, pure triphenylene derivative when exposed to an electron beam with energy 20 keV was ~ 6 × 10–4 C cm–2, which increased substantially to ~ 1.5 × 10–5 C cm–2 after chemical amplification (CA) using a cationic photoinitiator. This was further improved, by the addition of a second triphenylene derivative, to ~ 7 × 10–6 C cm–2. The chemically amplified resist demonstrated a high etch durability comparable with the novolac resist SAL 601. Patterns with a minimum feature size of ~ 40 nm were realized in the resist with a 30 keV electron beam.  相似文献   
8.
Temperature profile of an ohmically heated fluid jet was determined both by experimental measurements and analytical model. Heat loss to the environment and viscous dissipation were considered negligible in the simulation results. We also assumed that electrical heating rate is zero outside the fluid jet. The model predictions yielded good agreement with the experimental infrared thermography measurements. Parameters affecting temperature distribution in the fluid jet were studied such as mass flowrate, impingement distance of the jet, heating power and specific electrical conductivity. The simulation and also experimental trials show that the principal critical process factor in fluid jet ohmic heater was the fluid level and one can deduce its great impact on the thermal treatment. This study can be used for designing and controlling this ohmic heater to ensure thermal sterilization and safety of ohmically heated food products.  相似文献   
9.
With the increased consumer interest in fibre‐enriched functional foods, industrial‐scale methods for functional fibre production are demanded. The development of a food‐grade fibre preparation method at lab scale that is feasible for industrial scale‐up is a pre‐requisite. This paper describes two lab‐scale fibre preparation methods that have potential to be scaled up to industrial setting for the production of fruit fibres containing desired bioactives and functionality. The two methods, one aqueous and the other ethanolic, were used to isolate fibres from Granny Smith apples (Malus domestica Borkh cv. ‘Granny Smith’). In the aqueous method, ground apple tissues were suspended in HEPES buffer (20 mM, pH 6.5), and then mechanically ruptured using an Ultra‐Turrax and ring grinder. Between steps, the cell‐wall materials were washed with the HEPES buffer. In the ethanolic method, ground apple tissues were stirred in 72% ethanol at 4 °C, filtered, re‐suspended in 72% ethanol and then washed. Microscopic examination and chemical analysis were performed on the resultant fibres. The aqueous method produced natural and uniform dietary fibres in the form of plant cell walls containing 0.282 g uronic acid per g dried fibre. By comparisons, the ethanolic method produced crude fibres containing only 0.182 g uronic acid per g dried fibre, the lower uronic acid content indicating the presence of impurities. Thus, the aqueous method appeared to be advantageous in terms of the retained pectic polysaccharide content and cost‐effectness for industrial scale‐up. Further characterisation using Folin‐Ciocalteu assay and high performance liquid chromatography indicates that the fibres obtained by the aqueous method contained significant amounts of phenolic compounds (2.6 mg catechin equivalent per g dried fibre). These results suggest that fibres obtained by the aqueous method may be more suitable for functional food applications where fibres with high pectic polysaccharide and beneficial phenolic antioxidants are preferred.  相似文献   
10.
Digital watermarking can be used as data hiding technique to interleave medical images with patient information before transmitting and storing applications. While digital image watermarking and lossy compression methods have been widely studied, much less attention has been paid to their application in medical imaging situations, due partially to speculations on loss in viewer performance caused by degradation of image information. This article describes an hybrid data hiding/compression system, adapted to medical imaging. The central contribution is to integrate blind watermarking, based on turbo trellis-coded quantization, to JP3D encoder. The latter meets conformity condition, with respect to its antecedents JPEG2000 coders. Thus, the watermark embedding can be applied on two-dimensional as well as volumetric images. Results of our method applied to magnetic resonance and computed tomography medical images have shown that our watermarking scheme is robust to JP3D compression attacks and can provide relative high data embedding rate whereas keep a relative lower distortion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号