首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1797篇
  免费   144篇
  国内免费   16篇
电工技术   44篇
综合类   8篇
化学工业   491篇
金属工艺   80篇
机械仪表   69篇
建筑科学   87篇
矿业工程   5篇
能源动力   141篇
轻工业   138篇
水利工程   27篇
石油天然气   19篇
无线电   179篇
一般工业技术   271篇
冶金工业   78篇
原子能技术   18篇
自动化技术   302篇
  2024年   7篇
  2023年   37篇
  2022年   59篇
  2021年   111篇
  2020年   92篇
  2019年   113篇
  2018年   159篇
  2017年   140篇
  2016年   159篇
  2015年   91篇
  2014年   119篇
  2013年   201篇
  2012年   135篇
  2011年   105篇
  2010年   88篇
  2009年   60篇
  2008年   46篇
  2007年   33篇
  2006年   24篇
  2005年   12篇
  2004年   13篇
  2003年   13篇
  2002年   13篇
  2001年   12篇
  2000年   8篇
  1999年   5篇
  1998年   16篇
  1997年   7篇
  1996年   6篇
  1995年   13篇
  1994年   5篇
  1993年   4篇
  1992年   6篇
  1991年   5篇
  1990年   4篇
  1989年   6篇
  1988年   3篇
  1987年   2篇
  1986年   4篇
  1985年   3篇
  1984年   1篇
  1983年   3篇
  1982年   5篇
  1979年   3篇
  1975年   1篇
  1973年   2篇
  1970年   2篇
  1969年   1篇
排序方式: 共有1957条查询结果,搜索用时 15 毫秒
11.
Journal of Porous Materials - The present study aims to investigate the effects of iron (hydr)oxide phases formed during precipitation and the addition of different binders on the mechanical and...  相似文献   
12.
Iron is a critical metal for several vital biological processes. Most of the body’s iron is bound to hemoglobin in erythrocytes. Iron from senescent red blood cells is recycled by macrophages in the spleen, liver and bone marrow. Dietary iron is taken up by the divalent metal transporter 1 (DMT1) in enterocytes and transported to portal blood via ferroportin (FPN), where it is bound to transferrin and taken up by hepatocytes, macrophages and bone marrow cells via transferrin receptor 1 (TfR1). While most of the physiologically active iron is bound hemoglobin, the major storage of most iron occurs in the liver in a ferritin-bound fashion. In response to an increased iron load, hepatocytes secrete the peptide hormone hepcidin, which binds to and induces internalization and degradation of the iron transporter FPN, thus controlling the amount of iron released from the cells into the blood. This review summarizes the key mechanisms and players involved in cellular and systemic iron regulation.  相似文献   
13.
Wireless mesh networks (WMNs) introduce a new type of network that has been applied over the last few years. One of the most important developing issues in WMNs is multicast routing, which is a key technology that provides dissemination of data to a group of members in an efficient way. In this article, after an introduction about the structure of a WMN, multicast routing algorithms and protocols in WMNs are surveyed in a detailed and efficient manner. Moreover, effort is made to scale the study into one of the important potential capabilities of multicast routing mechanisms in WMNs, which is taking advantage of using different channels and radios association. While nodes in a single-radio mesh network operating on single-channel have restrictions for capacity, equipping mesh routers with multiple radios using multiple channels can decrease the intention of capacity problem as well as increase the aggregate bandwidth available to the network and improving the throughput. Hence, the purpose of channel assignment is to decrease the interferences while increasing the network capacity and keeping the connectivity of the network. Therefore, this article investigates the multicast protocols considering a definition of three types of WMNs, based on channel-radio association including SRSC, SRMC and MRMC. In its follow, a classification for multicast routing algorithms regarding the achieved optimal solutions will be presented. Finally, a study of MRMC and its relevant problems will be offered, considering the joint channel assignment and the multicast tree construction problem.  相似文献   
14.
The crystallinity of rigid PVC specimens, stabilized by a tin mercaptide or a lead stabilizer, has been studied. It is found that the crystallinity of rigid PVC is greatly influenced by the type of stabilizer added, and that the response of the PVC toward subsequent UV exposure was also different. The effects of unstable structures and crystallinity, after UV irradiation, on the mechanical properties of rigid PVC have been investigated.  相似文献   
15.
Reserve estimation is a key to find the correct NPV in a mining project. The most important factor in reserve estimation is the metal price. Metal price fluctuations in recent years were exaggerated, and imposed a high degree of uncertainty to the re-serve estimation, and in consequence to the whole mine planning procedure. Real option approach is an efficient method of deci-sion making in the uncertain conditions. This approach has been used for evaluation of defined natural resources projects until now. This study considering the metal price uncertainty used real option approach to prepare a methodology for reserve estimation in open pit mines. This study was done on a copper cylindrical deposit, but the achieved methodology can be adjusted for all kinds of deposits. This methodology was comprehensively described through the examples in such a manner that can be used by the mine planners.  相似文献   
16.
Trimellitic anhydride was reacted with 4,4′‐diaminodiphenyl ether in a mixture of acetic acid and pyridine (3 : 2) at room temperature and was refluxed at 90–100°C, and N,N′‐(4,4′‐diphenylether) bistrimellitimide (3) was obtained in a quantitative yield. 3 was converted into N,N′‐(4,4′‐diphenylether) bistrimellitimide diacid chloride (4) by a reaction with thionyl chloride. Then, six new poly(amide imide)s were synthesized under microwave irradiation with a domestic microwave oven through the polycondensation reactions of 4 with six different derivatives of 5,5‐disubstituted hydantoin in the presence of a small amount of a polar organic medium such as o‐cresol. The polycondensation proceeded rapidly and was completed within 7–10 min, producing a series of new poly(amide imide)s in high yields with inherent viscosities of 0.27–0.66 dL/g. The resulting poly(amide imide)s were characterized by elemental analysis, viscosity measurements, differential scanning calorimetry, thermogravimetric analysis, derivative thermogravimetry, solubility testing, and Fourier transform infrared spectroscopy. All the polymers were soluble at room temperature in polar solvents such as N,N‐dimethylacetamide, N,N‐dimethylformamide, dimethyl sulfoxide, tetrahydrofuran, and N‐methyl‐2‐pyrrolidone. © 2004 Wiley Periodicals, Inc. J Appl Polym Sci 92: 3447–3453, 2004  相似文献   
17.
This paper presents a method for reconstructing unreliable spectral components of speech signals using the statistical distributions of the clean components. Our goal is to model the temporal patterns in speech signal and take advantage of correlations between speech features in both time and frequency domain simultaneously. In this approach, a hidden Markov model (HMM) is first trained on clean speech data to model the temporal patterns which appear in the sequences of the spectral components. Using this model and according to the probabilities of occurring noisy spectral component at each states, a probability distributions for noisy components are estimated. Then, by applying maximum a posteriori (MAP) estimation on the mentioned distributions, the final estimations of the unreliable spectral components are obtained. The proposed method is compared to a common missing feature method which is based on the probabilistic clustering of the feature vectors and also to a state of the art method based on sparse reconstruction. The experimental results exhibits significant improvement in recognition accuracy over a noise polluted Persian corpus.  相似文献   
18.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
19.
The Journal of Supercomputing - Internet of Things (IoT) is an emerging paradigm that consists of numerous connected and interrelated devices with embedded sensors, exchanging data with each other...  相似文献   
20.
Journal of Intelligent Manufacturing - In recent years, driven by Industry 4.0 wave, academic research has focused on the science, engineering, and enabling technologies for intelligent and cyber...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号