首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   790篇
  免费   55篇
  国内免费   4篇
电工技术   11篇
综合类   1篇
化学工业   204篇
金属工艺   16篇
机械仪表   24篇
建筑科学   24篇
矿业工程   3篇
能源动力   60篇
轻工业   119篇
水利工程   29篇
石油天然气   16篇
无线电   56篇
一般工业技术   106篇
冶金工业   37篇
原子能技术   10篇
自动化技术   133篇
  2023年   21篇
  2022年   29篇
  2021年   40篇
  2020年   37篇
  2019年   42篇
  2018年   49篇
  2017年   43篇
  2016年   44篇
  2015年   32篇
  2014年   37篇
  2013年   80篇
  2012年   52篇
  2011年   53篇
  2010年   33篇
  2009年   31篇
  2008年   18篇
  2007年   27篇
  2006年   23篇
  2005年   18篇
  2004年   9篇
  2003年   10篇
  2002年   12篇
  2001年   8篇
  2000年   4篇
  1999年   6篇
  1998年   14篇
  1997年   6篇
  1996年   4篇
  1995年   2篇
  1993年   3篇
  1991年   3篇
  1989年   3篇
  1988年   4篇
  1987年   6篇
  1986年   6篇
  1985年   3篇
  1984年   2篇
  1982年   2篇
  1981年   2篇
  1980年   5篇
  1977年   2篇
  1976年   6篇
  1975年   4篇
  1974年   3篇
  1972年   2篇
  1971年   1篇
  1969年   1篇
  1967年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有849条查询结果,搜索用时 15 毫秒
1.
With lower costs and greater availability, heavy fuel oil appears as an attractive alternative to the conventional gas oil used in industrial gas turbines. However, higher levels of radiation and smoke are expected, and this note reports on some preliminary tests made with a combustion chamber burning fuels of different carbon content, ranging from kerosine to a 25% blend of residual fuel oil in gas oil, at a chamber pressure of 10 atm*. The combustion rig was equipped with a total-radiation pyrometer and black-body furnace capable of measurement at different axial stations along the spray-stabilized flame. The presence of the residual fuel oil in the gas oil was found to promote significant increases in the mean levels of radiation, emissivity and smoke density, with a modest increase in liner temperature.  相似文献   
2.
With the growing use of service-oriented architecture for designing next generation software systems,the service composition problem and its execution complexity have become even more important in resp...  相似文献   
3.
Although many efforts have been made to regenerate the bone lesions, existing challenges can be mitigated through the development of tissue engineering scaffolds. However, the weak control on the microstructure of constructs, limitation in preparation of patient-specific and multilayered scaffolds, restriction in the fabrication of cell-laden matrixes, and challenges in preserving the drug/growth factors' efficacy in conventional methods have led to the development of bioprinting technology for regeneration of bone defects. So in this review, conventional 3D printers are classified, then the priority of the different types of bioprinting technologies for the preparation of the cell/growth factor-laden matrixes are focused. Besides, the bio-ink compositions, including polymeric/hybrid hydrogels and cell-based bio-inks are classified according to fundamental and recent studies. Herein, different effective parameters, such as viscosity, rheological properties, cross-linking methods, biodegradation biocompatibility, are considered. Finally, different types of cells and growth factors that can encapsulate in the bio-inks to promote bone repair are discussed, and both in vitro and in vivo achievement are considered. This review provides current and future perspectives of cell-laden bioprinting technologies. The restrictions and challenges are identified, and proper strategies for the development of cell-laden matrixes and high-performance printable bio-inks are proposed.  相似文献   
4.
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.  相似文献   
5.
This paper investigates the unique pharyngeal and uvular consonants of Arabic from the point of view of automatic speech recognition (ASR). Comparisons of the recognition error rates for these phonemes are analyzed in five experiments that involve different combinations of native and non-native Arabic speakers. The most three confusing consonants for every investigated consonant are discussed. All experiments use the Hidden Markov Model Toolkit (HTK) and the Language Data Consortium (LDC) WestPoint Modern Standard Arabic (MSA) database. Results confirm that these Arabic distinct consonants are a major source of difficulty for Arabic ASR. While the recognition rate for certain of these unique consonants such as // can drop below 35% when uttered by non-native speakers, there is advantage to include non-native speakers in ASR. Besides, regional differences in pronunciation of MSA by native Arabic speakers require the attention of Arabic ASR research.  相似文献   
6.
This work is focused on the study of combined heat and mass transfer or double-diffusive convection near a vertical truncated cone embedded in a fluid-saturated porous medium in the presence of thermal radiation, magnetic field and variable viscosity effects. The viscosity of the fluid is assumed to be an inverse linear function of the fluid temperature. A boundary-layer analysis is employed to derive the non-dimensional governing equations. The governing equations for this investigation are transformed into a set of non-similar equations and solved numerically using the fourth-order Runge–Kutta integration scheme with the Newton–Raphson shooting technique. Comparisons with previously published work on special cases of the problem are performed and the results are found to be in excellent agreement. A parametric study illustrating the influence of the radiation parameter, magnetic field parameter, viscosity-variation parameter, buoyancy ratio and the Lewis number on the fluid velocity, temperature and solute concentration profiles as well as the Nusselt number and Sherwood number is conducted. The results of this parametric study are shown graphically and the physical aspects of the problem are highlighted and discussed.  相似文献   
7.
The study of critical infrastructure systems organization and behavior has drawn great attention in the recent years. This is in part due to their great influence on the ordinary life of every citizen. In this paper, we study critical infrastructures’ characteristics and propose a reference model based on the Unified Modeling Language (UML). This reference model attempts to provide suitable means for the task of modeling an infrastructure system through offering five major metamodels. We introduce each of these metamodels and explain how it is possible to integrate them into a unique representation to characterize various aspects of an infrastructure system. Based on the metamodels of UML-CI, infrastructure system knowledge bases can be built to aid the process of infrastructure system modeling, profiling, and management.  相似文献   
8.
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme.  相似文献   
9.
A method of tuning for PI controllers with one-way lead/lag decoupling tuning is demonstrated for 2×2 input-output systems, based on finite frequency response data. The frequency response estimates are obtained from closed loop tests using an identification technique based on bandpass filters. The open-loop frequency response is calculated and used to tune PI controllers and to fit lead-lag compensators for decoupling by weighted least-squares. Separate optimization of the PI controllers and the lead-lag compensator is preferred. The tuning takes into account violations of desired multivariable robustness criteria. The method is illustrated by application to a paper machine headbox simulation and by experiments in distillation column temperature control.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号