首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   398篇
  免费   23篇
  国内免费   2篇
电工技术   7篇
化学工业   103篇
金属工艺   3篇
机械仪表   7篇
建筑科学   8篇
矿业工程   3篇
能源动力   29篇
轻工业   21篇
水利工程   2篇
石油天然气   4篇
无线电   63篇
一般工业技术   67篇
冶金工业   16篇
原子能技术   22篇
自动化技术   68篇
  2024年   4篇
  2023年   3篇
  2022年   16篇
  2021年   27篇
  2020年   20篇
  2019年   26篇
  2018年   17篇
  2017年   26篇
  2016年   14篇
  2015年   15篇
  2014年   16篇
  2013年   44篇
  2012年   20篇
  2011年   25篇
  2010年   28篇
  2009年   21篇
  2008年   9篇
  2007年   11篇
  2006年   6篇
  2005年   5篇
  2004年   5篇
  2003年   3篇
  2002年   8篇
  2001年   3篇
  2000年   2篇
  1999年   3篇
  1998年   2篇
  1997年   3篇
  1996年   6篇
  1994年   3篇
  1992年   2篇
  1991年   4篇
  1987年   2篇
  1985年   2篇
  1984年   3篇
  1983年   1篇
  1982年   3篇
  1981年   3篇
  1980年   2篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
  1972年   1篇
  1958年   1篇
排序方式: 共有423条查询结果,搜索用时 31 毫秒
351.
Wireless Personal Communications - The theoretical analysis of nature inspired antenna along with measured results of fabricated prototype is presented in this work. The space between successive...  相似文献   
352.
This article deals with impact analysis of different electric vehicle (EV) charging/discharging strategies (CDS) on the operation and pollutant treatment cost of both grid accessible and remote microgrid (MG) modes. In this regard, EV demand is developed under four different scenarios, namely, uncoordinated charging model (UCM), load leveling model (LLM), maximum renewable model (MRM), and charging discharging model (CDM). A comprehensive study is performed to see the effect of these different EV charging/discharging behaviors in optimizing MG's operation. A 2m scheme of Hong's point estimate method (PEM) is applied to examine the effect of uncertainties linked with the forecasted errors in load demand, solar energy, wind energy, and grid price respectively on MG operation problem. Finally, a sensitivity analysis is performed to investigate the effect of variations in battery parameters on economics of remote MG. The study results indicate that controlled charging of EVs can substantially improve operation of MG.  相似文献   
353.
Patil  Jitendra  Tokekar  Vrinda  Rajan  Alpana  Rawat  Anil 《The Journal of supercomputing》2022,78(15):16770-16793
The Journal of Supercomputing - Discrimination of Flash crowd and Distributed Denial of Service (DDoS) traffic has been addressed already in legacy network and Software Defined Network (SDN), and...  相似文献   
354.
Silica, sharing the same tetrahedral order and many structural, thermodynamic and dynamic anomalies with water, has been speculated to have a density increase upon melting similar to water. In this work, an increase in density upon melting cristobalite silica and a shallow density maximum followed by a density minimum during cooling of silica liquid are observed in classical molecular dynamics simulations. The density maximum gradually diminishes with the increase in alkali size/content in alkali silicate glasses. The structural origin of the anomalous density maximum in silica is revealed by detailed structural analysis. During the cooling process, a range of rings with different sizes form in liquid silica, with 6-member rings being the most dominant, which cause the silica network to open up and compensate the regular volume shrinkage upon cooling. These two competing factors lead to a density maximum, but to a less extent than that observed in melting of cristobalite silica. With the increase in modifier size/content in the alkali silicate glasses, the connectivity of silica network gradually breaks down; the population of 6-member rings decrease with the increase in smaller or larger rings, therefore the density maximum becomes less obvious and eventually disappears.  相似文献   
355.
356.
Minimizing the breach detection gap (BDG) for cyber-attacks is a big concern for all organizations and governments. Cyber-attacks are discovered daily, many of which have gone undetected for days to years before the victim organizations detect and deploy the cyber defense. Cyber defense solutions are advancing to combat risks and attacks from traditional to next-generation advanced defense protection solutions. However, many individuals, organizations and businesses continue to be hit by new waves of global cyber-attacks. In this paper, we present a blockchain-enabled federated cloud computing framework that uses the Dempster–Shafer theory to reduce BDG by continuously monitoring and analyzing the network traffics against cyber-attacks. We evaluate the proposed approach using numerical results, and the proposed approach outperforms the traditional approaches.  相似文献   
357.
Neural Computing and Applications - The increasing popularity of massively online open courses (MOOCs) has been attracting a lot of learners. Despite the popularity, it has been observed that there...  相似文献   
358.
Multimedia Tools and Applications - Image segmentation is the method of partitioning an image into a group of pixels that are homogenous in some manner. The homogeneity dependents on some...  相似文献   
359.
360.
Among microbial enzymes, inulinases or fructo-furanosylhydrolases have received considerable attention in the past decade, and as a result, a variety of applications based on enzymatic hydrolysis of inulin have been documented. Inulinases are employed for generation of fructose and inulo-oligosaccharides (IOS) in a single-step reaction with specificity. The high fructose syrup can be biotransformed into value-added products such as ethanol, single cell protein, while IOS are indicated in nutraceutical industry as prebiotic. Myriad microorganisms produce inulinases, and a number of exo- and endo-inulinases have been characterized and expressed in heterologous hosts. Initially, predominated by Aspergilli, Penicillia, and some yeasts (Kluyveromyces spp.), the list of prominent inulinase producers has gradually expanded and now includes extremophilic prokaryotes and marine-derived microorganisms producing robust inulinases. The present paper summarizes important developments about microbial inulinases and their applications made in the last decade.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号