首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   475篇
  免费   35篇
电工技术   3篇
化学工业   116篇
金属工艺   10篇
机械仪表   18篇
建筑科学   30篇
能源动力   34篇
轻工业   54篇
水利工程   7篇
石油天然气   4篇
无线电   36篇
一般工业技术   87篇
冶金工业   43篇
原子能技术   1篇
自动化技术   67篇
  2023年   23篇
  2022年   28篇
  2021年   49篇
  2020年   26篇
  2019年   27篇
  2018年   24篇
  2017年   27篇
  2016年   23篇
  2015年   17篇
  2014年   21篇
  2013年   36篇
  2012年   12篇
  2011年   24篇
  2010年   13篇
  2009年   14篇
  2008年   16篇
  2007年   7篇
  2006年   10篇
  2005年   4篇
  2004年   6篇
  2003年   2篇
  2002年   8篇
  2001年   2篇
  2000年   10篇
  1999年   5篇
  1998年   10篇
  1997年   5篇
  1996年   11篇
  1995年   4篇
  1994年   4篇
  1993年   5篇
  1992年   2篇
  1991年   7篇
  1990年   3篇
  1989年   3篇
  1988年   1篇
  1987年   4篇
  1986年   2篇
  1984年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
  1974年   1篇
  1973年   2篇
  1972年   1篇
排序方式: 共有510条查询结果,搜索用时 15 毫秒
501.
Ginger and its health claims: molecular aspects   总被引:4,自引:0,他引:4  
Recent research has rejuvenated centuries-old traditional herbs to cure various ailments by using modern tools like diet-based therapy and other regimens. Ginger is one of the classic examples of an herb used for not only culinary preparations but also for unique therapeutic significance owing to its antioxidant, antimicrobial, and anti-inflammatory potential. The pungent fractions of ginger, namely gingerols, shogaols, paradols, and volatile constituents like sesquiterpenes and monoterpenes, are mainly attributed to the health-enhancing perspectives of ginger. This review elucidates the health claims of ginger and the molecular aspects and targets, with special reference to anticancer perspectives, immunonutrition, antioxidant potential, and cardiovascular cure. The molecular targets involved in chemoprevention like the inhibition of NF-κB activation via impairing nuclear translocation, suppresses cIAP1 expression, increases caspase-3/7 activation, arrests cell cycle in G2 + M phases, up-regulates Cytochrome-c, Apaf-1, activates PI3K/Akt/I kappaB kinases IKK, suppresses cell proliferation, and inducts apoptosis and chromatin condensation. Similarly, facts are presented regarding the anti-inflammatory response of ginger components and molecular targets including inhibition of prostaglandin and leukotriene biosynthesis and suppression of 5-lipoxygenase. Furthermore, inhibition of phosphorylation of three mitogen-activated protein kinases (MAPKs), extracellular signal-regulated kinases 1 and 2 (ERK1/2), and c-Jun N-terminal kinase (JNK) are also discussed. The role of ginger in reducing the extent of cardiovascular disorders, diabetes mellitus, and digestive problems has also been described in detail. Although, current review articles summarized the literature pertaining to ginger and its components. However, authors are still of the view that further research should be immediately carried out for meticulousness.  相似文献   
502.
503.
For modern high-tech flexible energy storage devices, it becomes important to synthesize micro-/nanostructures as per the required shape and morphology with superior physical and electro-active characteristics. This work shares the fabrication and characterization of ZnSn(OH)6 (Zinc hydroxystannate [ZHS]) prepared by facile microwave-assisted technique and furthermore converted into flexible sheets by employing lignocelluloses (LC) known as natural fibers, collected from Carica papaya leaf petiole as a substrate to provide the flexible matrix. X-ray diffraction measurements confirm the successful crystalline structure of ZHS. Scanning electron microscopy and transmission electron microscopy showed the solid spherical structure of ZHS microspheres. Fourier transform infrared spectrometry and Raman spectroscopy confirmed the composite formation of ZHS and LC-based composite sheets (ZHS/LC sheets). Electrochemical measurements that is, cyclic voltammetry (CV), Galvanostatic charge/discharge, and electrochemical impedance (EIS) spectroscopy revealed the electroactive behavior of ZHS/LC paper sheets as working electrode for energy storage applications. CV measurements revealed the specific capacitance of 100 F/g and EIS measurements confirmed the decrease in the resistance of LC fiber after the growth of ZHS microspheres. Presented flexible ZHS based paper sheets will be highly feasible for the modern bendable/flexible/disposable energy storage applications.  相似文献   
504.
In this paper, a novel cancellable biometrics technique called Multi-Biometric-Feature-Hashing (MBFH) is proposed. The MBFH strategy is utilized to actualize a single direction (non-invertibility) biometric shape. MBFH is a typical model security conspire that is distinguished in the utilization of this protection insurance framework in numerous sorts of biometric feature strategies (retina, palm print, Hand Dorsum, fingerprint). A more robust and accurate multilingual biological structure in expressing human loneliness requires a different format to record clients with inseparable comparisons from individual biographical sources. This may raise worries about their utilization and security when these spread out designs are subverted as everybody is acknowledged for another biometric attribute.The proposed structure comprises of four sections: input multi-biometric acquisition, feature extraction, Multi-Exposure Fusion (MEF) and secure hashing calculation (SHA-3). Multimodal biometrics systems that are more powerful and precise in human-unmistakable evidence require various configurations to store a comparative customer that can be contrasted with biometric wellsprings of people. Disparate top words, biometrics graphs can’t be denied and change to another request for positive Identifications (IDs) while settling. Cancellable biometrics is may be the special procedure used to recognize this issue.  相似文献   
505.
Component-based software engineering is concerned with the development of software that can satisfy the customer prerequisites through reuse or independent development. Coupling and cohesion measurements are primarily used to analyse the better software design quality, increase the reliability and reduced system software complexity. The complexity measurement of cohesion and coupling component to analyze the relationship between the component module. In this paper, proposed the component selection framework of Hexa-oval optimization algorithm for selecting the suitable components from the repository. It measures the interface density modules of coupling and cohesion in a modular software system. This cohesion measurement has been taken into two parameters for analyzing the result of complexity, with the help of low cohesion and high cohesion. In coupling measures between the component of inside parameters and outside parameters. The final process of coupling and cohesion, the measured values were used for the average calculation of components parameter. This paper measures the complexity of direct and indirect interaction among the component as well as the proposed algorithm selecting the optimal component for the repository. The better result is observed for high cohesion and low coupling in component-based software engineering.  相似文献   
506.
A drying droplet containing colloidal particles can consolidate into a spherical assembly called a supraparticle. Such supraparticles are inherently porous due to the spaces between the constituent primary particles. Here, the emergent, hierarchical porosity in spray-dried supraparticles is tailored via three distinct strategies acting at different length scales. First, mesopores (<10 nm) are introduced via the primary particles. Second, the interstitial pores are tuned from the meso- (35 nm) to the macro scale (250 nm) by controlling the primary particle size. Third, defined macropores (>100 nm) are introduced via templating polymer particles, which can be selectively removed by calcination. Combining all three strategies creates hierarchical supraparticles with fully tailored pore size distributions. Moreover, another level of the hierarchy is added by fabricating supra-supraparticles, using the supraparticles themselves as building blocks, which provide additional pores with micrometer dimensions. The interconnectivity of the pore networks within all supraparticle types is investigated via detailed textural and tomographic analysis. This work provides a versatile toolbox for designing porous materials with precisely tunable, hierarchical porosity from the meso- (3 nm) to the macroscale (≈10 µm) that can be utilized for applications in catalysis, chromatography, or adsorption.  相似文献   
507.
Changes in peak flow response time governed by rainfall and physical configurations of watersheds have been the topic of many studies, but other factors are also important. We aimed to analyze the dynamics in the lag time (TL) of peak flow for a tropical watershed (Kecha) and its sub-watersheds (Dokmit, Zenjero Maderia, and Wotit Minch) in Ethiopia, as influenced by land-use changes from 1982 to 2017 and the implementation of soil and water conservation (SWC) practices since 2011. Layered maps of land use, soil type, and SWC practices were used to determine the curve number, and the Natural Resource Conservation Service hydrologic model was used to estimate TL. We compared the estimated values against measured median values of TL for 30 rainfall–runoff events. The estimated TL of 1982, 2005, and 2017 varied from 9 to 19 min, 8 to 18 min, and 10 to 22 min, respectively, in the Dokmit, Zenjero Maderia, and Wotit Minch sub-watersheds. The smallest (8 min) and greatest (22 min) values of TL were observed during 2005 and 2017, respectively. These results are likely attributable to the increased amount of cultivated area at the expense of bushland and forest in 2005 as compared to 1982, and the implementation of SWC practices in 2011–2017. Dokmit had the lowest TL values of the three sub-watersheds, most likely because of its greater coverage of grazing and cultivated lands and degraded Nitic Luvisol. The variation in TL values among the sub-watersheds was related to changes in both land use and SWC practices but also to the presence of degraded areas inherited from past human activities. Overall, such spatiotemporal flow response time analysis can provide useful information for the proper design of sustainable development strategies for particular niches in tropical regions of Ethiopia and elsewhere.  相似文献   
508.
Software-defined networking (SDN) algorithms are gaining increasing interest and are making networks flexible and agile. The basic idea of SDN is to move the control planes to more than one server’s named controllers and limit the data planes to numerous sending network components, enabling flexible and dynamic network management. A distinctive characteristic of SDN is that it can logically centralize the control plane by utilizing many physical controllers. The deployment of the controller—that is, the controller placement problem (CPP)—becomes a vital model challenge. Through the advancements of blockchain technology, data integrity between nodes can be enhanced with no requirement for a trusted third party. Using the latest developments in blockchain technology, this article designs a novel sea turtle foraging optimization algorithm for the controller placement problem (STFOA-CPP) with blockchain-based intrusion detection in an SDN environment. The major intention of the STFOA-CPP technique is the maximization of lifetime, network connectivity, and load balancing with the minimization of latency. In addition, the STFOA-CPP technique is based on the sea turtles’ food-searching characteristics of tracking the odour path of dimethyl sulphide (DMS) released from food sources. Moreover, the presented STFOA-CPP technique can adapt with the controller’s count mandated and the shift to controller mapping to variable network traffic. Finally, the blockchain can inspect the data integrity, determine significantly malicious input, and improve the robust nature of developing a trust relationship between several nodes in the SDN. To demonstrate the improved performance of the STFOA-CPP algorithm, a wide-ranging experimental analysis was carried out. The extensive comparison study highlighted the improved outcomes of the STFOA-CPP technique over other recent approaches.  相似文献   
509.
Age estimation using forensics odontology is an important process in identifying victims in criminal or mass disaster cases. Traditionally, this process is done manually by human expert. However, the speed and accuracy may vary depending on the expertise level of the human expert and other human factors such as level of fatigue and attentiveness. To improve the recognition speed and consistency, researchers have proposed automated age estimation using deep learning techniques such as Convolutional Neural Network (CNN). CNN requires many training images to obtain high percentage of recognition accuracy. Unfortunately, it is very difficult to get large number of samples of dental images for training the CNN due to the need to comply to privacy acts. A promising solution to this problem is a technique called Generative Adversarial Network (GAN). GAN is a technique that can generate synthetic images that has similar statistics as the training set. A variation of GAN called Conditional GAN (CGAN) enables the generation of the synthetic images to be controlled more precisely such that only the specified type of images will be generated. This paper proposes a CGAN for generating new dental images to increase the number of images available for training a CNN model to perform age estimation. We also propose a pseudo-labelling technique to label the generated images with proper age and gender. We used the combination of real and generated images to train Dental Age and Sex Net (DASNET), which is a CNN model for dental age estimation. Based on the experiment conducted, the accuracy, coefficient of determination (R2) and Absolute Error (AE) of DASNET have improved to 87%, 0.85 and 1.18 years respectively as opposed to 74%, 0.72 and 3.45 years when DASNET is trained using real, but smaller number of images.  相似文献   
510.
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker will not be able to decipher the encrypted data, and even if the attacker tries to tamper with the data, the attacker will not have access to the original data. In this paper, various data security techniques are developed, which can be used to protect the data from attackers completely. First, a customized American Standard Code for Information Interchange (ASCII) table is developed. The value of each Index is defined in a customized ASCII table. When an attacker tries to decrypt the data, the attacker always tries to apply the predefined ASCII table on the Ciphertext, which in a way, can be helpful for the attacker to decrypt the data. After that, a radix 64-bit encryption mechanism is used, with the help of which the number of cipher data is doubled from the original data. When the number of cipher values is double the original data, the attacker tries to decrypt each value. Instead of getting the original data, the attacker gets such data that has no relation to the original data. After that, a Hill Matrix algorithm is created, with the help of which a key is generated that is used in the exact plain text for which it is created, and this Key cannot be used in any other plain text. The boundaries of each Hill text work up to that text. The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms. Then, the Kasiski test is used to verify the validity of the proposed algorithm and found that, if the proposed algorithm is used for data encryption, so an attacker cannot break the proposed algorithm security using any technique or algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号