首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   509篇
  免费   9篇
  国内免费   9篇
电工技术   8篇
综合类   4篇
化学工业   117篇
金属工艺   21篇
机械仪表   9篇
建筑科学   14篇
矿业工程   3篇
能源动力   26篇
轻工业   17篇
水利工程   20篇
石油天然气   7篇
无线电   47篇
一般工业技术   99篇
冶金工业   20篇
原子能技术   2篇
自动化技术   113篇
  2024年   17篇
  2023年   19篇
  2022年   33篇
  2021年   45篇
  2020年   39篇
  2019年   41篇
  2018年   46篇
  2017年   34篇
  2016年   38篇
  2015年   15篇
  2014年   26篇
  2013年   30篇
  2012年   34篇
  2011年   42篇
  2010年   18篇
  2009年   8篇
  2008年   6篇
  2007年   5篇
  2006年   5篇
  2005年   2篇
  2004年   3篇
  2003年   2篇
  2002年   1篇
  2000年   1篇
  1999年   1篇
  1998年   4篇
  1996年   1篇
  1994年   1篇
  1993年   2篇
  1991年   2篇
  1987年   4篇
  1985年   1篇
  1982年   1篇
排序方式: 共有527条查询结果,搜索用时 0 毫秒
81.
In this study, the possibility of copper recovery from flotation tailing of Mazraeh copper mine was investigated. Magnetic separation method was used for concentration of non-magnetic minerals, especially copper bearing minerals, from iron minerals. As a result, copper grade increased up to 0.18% and its recovery reached 86%. Due to mineral’s oxidized surface, accompanied oxide minerals and large quantities of fine particles (i.e. about 80% and 57% were finer than 37 and 15 μm in the sample, respectively), flotation of copper was very difficult. In this regard, the effects of important factors including solution pH, type and collector dosage, dispersant, impeller speed, type of frother, percent solid and surface sulfurization were studied. It was concluded that copper recovery of 52% and copper grade of 2.7% could be obtained under following conditions: pH: 11, Collector: Z11 with 40 g/t, Impeller speed: 1400 rpm, Frother: A65, percent solid: 10% and surface sulfurization by Na2S with 1000 g/t. On the other hand, the addition of sodium silicate as a dispersant showed a negative effect on the flotation performance.  相似文献   
82.
Ultra-fine nanoparticles, mono-dispersed nanospheres and nanorods of Y(OH)3 and Y2O3 were successfully prepared via electrodeposition from chloride bath at different temperatures of 10, 25, 40 and 80 °C followed by heat-treatments at 600 °C in dry air atmosphere. Thermal behavior of the hydroxide samples was investigated by differential scanning calorimetry (DSC) and thermogravimetric (TG) analysis. The structural and morphological characteristics of the products were determined by X-ray diffraction (XRD), FT-IR, scanning and transmission electron microscopy (SEM and TEM). Effects of bath temperature on the mechanism of base electrogeneration and deposit formation on the cathode surface were proposed and discussed. The results showed that the crystal structure, composition and morphology of the products are mainly affected by the temperature of electrodeposition bath.  相似文献   
83.
    
The evolution of new SARS-CoV-2 variants around the globe has made the COVID-19 pandemic more worrisome, further pressuring the health care system and immunity. Novel variations that are unique to the receptor-binding motif (RBM) of the receptor-binding domain (RBD) spike glycoprotein, i. e. L452R-E484Q, may play a different role in the B.1.617 (also known as G/452R.V3) variant's pathogenicity and better survival compared to the wild type. Therefore, a thorough analysis is needed to understand the impact of these mutations on binding with host receptor (RBD) and to guide new therapeutics development. In this study, we used structural and biomolecular simulation techniques to explore the impact of specific mutations (L452R-E484Q) in the B.1.617 variant on the binding of RBD to the host receptor ACE2. Our analysis revealed that the B.1.617 variant possesses different dynamic behaviours by altering dynamic-stability, residual flexibility and structural compactness. Moreover, the new variant had altered the bonding network and structural-dynamics properties significantly. MM/GBSA technique was used, which further established the binding differences between the wild type and B.1.617 variant. In conclusion, this study provides a strong impetus to develop novel drugs against the new SARS-CoV-2 variants.  相似文献   
84.
    
The 1-octyl-3-methylimidazolium chloride, [C_8 mim][Cl] ionic liquid(IL) was used as a novel surfactant in n-heptane/water system. The interfacial tensions(IFT) were measured and corresponding variations were investigated. An IFT reduction of 80.8% was appropriate under the IL CMC of about 0.1 mol·L~(-1) and stronger effects were achieved when magnetite nanoparticles and salts were present profoundly under alkaline p Hs.The equilibrium IFT data were accurately simulated with the Frumkin adsorption model. Hereafter, the saturated surface concentration, equilibrium constant and interaction parameter were obtained and their variations were demonstrated. Further, emulsion stability and contact angle of oil/water interface over quartz surface were studied. The oil/water emulsion stability was hardly changed with nanoparticles; however, the stability of oil/water + IL emulsions was significantly improved. It was also revealed that the presence of sodium and calcium chloride electrolytes fortifies the IL impact, whereas sodium sulfate weakens. From dynamic IFT data and fitting with kinetic models, it was found that the IL migration toward interface follows the mixed diffusion–kinetic control model. Consequently, the IL diffusion coefficient and the appropriate activation energy were determined.  相似文献   
85.
    
Social networking platforms provide a vital source for disseminatinginformation across the globe, particularly in case of disaster. These platformsare great mean to find out the real account of the disaster. Twitter is an exampleof such platform, which has been extensively utilized by scientific community dueto its unidirectional model. It is considered a challenging task to identify eyewitness tweets about the incident from the millions of tweets shared by twitter users.Research community has proposed diverse sets of techniques to identify eyewitness account. A recent state-of-the-art approach has proposed a comprehensive setof features to identify eyewitness account. However, this approach suffers somelimitation. Firstly, automatically extracting the feature-words remains a perplexingtask against each feature identified by the approach. Secondly, all identified features were not incorporated in the implementation. This paper has utilized the language structure, linguistics, and word relation to achieve automatic extraction offeature-words by creating grammar rules. Additionally, all identified features wereimplemented which were left out by the state-of-the-art model. A genericapproach is taken to cover different types of disaster such as earthquakes, floods,hurricanes, and wildfires. The proposed approach was then evaluated for all disaster-types, including earthquakes, floods, hurricanes, and fire. Based on the staticdictionary, the Zahra et al. approach was able to produce an F-Score value of0.92 for Eyewitness identification in the earthquake category. The proposedapproach secured F-Score values of 0.81 in the same category. This score canbe considered as a significant score without using a static dictionary.  相似文献   
86.
    
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
87.
    
In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with the purpose of inducing confusion in cryptosystems. For the last decade, most of the work on designing S-boxes over the points of elliptic curves has been published. The main purpose of these studies is to hide data and improve the security levels of crypto algorithms. In this work, we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers (GI). The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters. But the prime field dependent on the Elliptic curve (EC) provides one S-box at a time by fixing three parameters and . The newly designed pair of S-boxes are assessed by various tests like nonlinearity, bit independence criterion, strict avalanche criterion, linear approximation probability, and differential approximation probability.  相似文献   
88.
    
There are many optimization problems in different branches of science that should be solved using an appropriate methodology. Population-based optimization algorithms are one of the most efficient approaches to solve this type of problems. In this paper, a new optimization algorithm called All Members-Based Optimizer (AMBO) is introduced to solve various optimization problems. The main idea in designing the proposed AMBO algorithm is to use more information from the population members of the algorithm instead of just a few specific members (such as best member and worst member) to update the population matrix. Therefore, in AMBO, any member of the population can play a role in updating the population matrix. The theory of AMBO is described and then mathematically modeled for implementation on optimization problems. The performance of the proposed algorithm is evaluated on a set of twenty-three standard objective functions, which belong to three different categories: unimodal, high-dimensional multimodal, and fixed-dimensional multimodal functions. In order to analyze and compare the optimization results for the mentioned objective functions obtained by AMBO, eight other well-known algorithms have been also implemented. The optimization results demonstrate the ability of AMBO to solve various optimization problems. Also, comparison and analysis of the results show that AMBO is superior and more competitive than the other mentioned algorithms in providing suitable solution.  相似文献   
89.
    
The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for classifying COVID-CT images. Secondly, an alpha fusion attack is generated to fool the classification model. The alpha fusion attack is tested in the last phase on a modified LSTM-based CNN (CNN-MLSTM) model and other pre-trained models. The results of CNN models show that the accuracy of these models dropped greatly after the alpha-fusion attack. The highest F1 score before the attack was achieved is 97.45 And after the attack lowest F1 score recorded is 22%. Results elucidate the performance in terms of accuracy, precision, F1 score and Recall.  相似文献   
90.
         下载免费PDF全文
This study proposes a novel combined primary and secondary control approach for direct current microgrids, specifically in islanded mode. In primary control, this approach establishes an appropriate load power sharing between the distributed energy resources based on their rated power. Simultaneously, it considers the load voltage deviation and provides satisfactory voltage regulation in the secondary control loop. The proposed primary control is based on an efficient droop mechanism that only deploys the local variable measurements, so as to overcome the side effects caused by communication delays. In the case of secondary control, two different methods are devised. In the first, low bandwidth communication links are used to establish the minimum required data transfer between the converters. The effect of communication delay is further explored. The second method excludes any communication link and only uses local variables. Accordingly, a self-sufficient control loop is devised without any communication requirement. The proposed control notions are investigated in MATLAB/Simulink platform to highlight system performance. The results demonstrate that both proposed approaches can effectively compensate for the voltage deviation due to the primary control task. Detailed comparisons of the two methods are also provided.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号