首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   367篇
  免费   22篇
  国内免费   2篇
电工技术   2篇
综合类   2篇
化学工业   63篇
金属工艺   10篇
机械仪表   12篇
建筑科学   3篇
能源动力   44篇
轻工业   18篇
水利工程   2篇
无线电   48篇
一般工业技术   87篇
冶金工业   12篇
原子能技术   5篇
自动化技术   83篇
  2024年   1篇
  2023年   9篇
  2022年   33篇
  2021年   29篇
  2020年   23篇
  2019年   18篇
  2018年   19篇
  2017年   17篇
  2016年   17篇
  2015年   21篇
  2014年   23篇
  2013年   36篇
  2012年   25篇
  2011年   15篇
  2010年   19篇
  2009年   17篇
  2008年   13篇
  2007年   11篇
  2006年   7篇
  2005年   7篇
  2004年   4篇
  2003年   1篇
  2002年   8篇
  2001年   2篇
  2000年   3篇
  1999年   1篇
  1998年   1篇
  1997年   2篇
  1996年   2篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   2篇
  1981年   1篇
排序方式: 共有391条查询结果,搜索用时 15 毫秒
71.
The level of oleic acid is an important parameter in determining seed nutritional quality and oil stability. The level of oleic acid in peanut is genetically controlled by a pair of fatty acid desaturase genes (FAD2A and FAD2B), but the environmental conditions of the production sites can also have a significant effect. To investigate the effect of gene and environment interaction, 45 accessions were grown at three locations for 2 years. Environmental data were collected; individual plants were genotyped with functional SNP markers from FAD2A and FAD2B; and seed level of oleic acid was determined by gas chromatography. Three FAD2A/FAD2B genotypes (448G/no insertion 442A, 448A/no insertion 442A, and 448A/insertion 442A) were identified and designated as G/W, A/W, and A/A, respectively. A/A genotype averaged the highest level of oleic acid (80.0%), followed by A/W (56.0%), and then G/W (40.7%). Analysis of gene and environment interaction revealed that oleic acid phenotype plasticity could be explained by the interaction of FAD2 genotype and photothermal time, which quantified environmental conditions. The A/W genotype was the most sensitive to photothermal time changes. The oleic acid plasticity revealed in this study would be useful for breeders, farmers, and product processors.  相似文献   
72.
In this research work, we have characterized and simulated a well-known hole transport material (HTM) for perovskite solar cell (PSC) and conductive polyme  相似文献   
73.
Abstract

Thermal mixing behavior of shear-thinning fluids with the specified heat flux boundary condition at mixing zone walls is studied numerically to investigate the effect of Reynolds number (10 to 50), power-law index (0.6161 to 1), Nusselt number (104 to 106) for external air flows and dimensionless ambient temperature (?2.7 to 1.3). The temperature is a passive tracer that quantifies the degree of mixing in this study. Detailed kinematics shows the formation of recirculation zones at the mixing channel walls. Length required to achieve the well mixed condition (i.e., a flat temperature profile across the channel height) is shorter at low Reynolds number, convective heat transfer coefficient and ambient temperature, and high power-law index values. In the impingement zone, a faster reduction in mixing index has been observed with respect to mixing length at high power-law index and low Reynolds numbers, while Nusselt number and ambient temperature exert only a weak influence. Under appropriate conditions, significant energy exchange between the system and surroundings can occur and has been analyzed in detail in this work. This work finds its applications in the improved mixing as practiced in the processing and production of food-stuffs, fine chemicals, personal care products, etc.  相似文献   
74.
Wireless Networks - One of the biggest challenges in political mayhem is visible during the election process where no stone is kept unturned in order to gain the power. Further, due to poll...  相似文献   
75.
The authors compare the subband compression capabilities of eight filter sets (consisting of linear-phase quadrature mirror filters (QMFs), perfect reconstruction filters, and nonlinear phase wavelets) at different bit rates, using-a filter-based bit allocation procedure. Using DPCM and PCM in HDTV subband coding, it is found that QMFs have an edge over the rest.  相似文献   
76.
Ultra-wideband (UWB) disc monopole antenna with crescent shaped slot for double band-notched features is presented. Planned antenna discards worldwide interoperability for microwave access (WiMAX) band (3.3–3.6 GHz) and wireless local area network (WLAN) band (5–6 GHz). Defected ground compact electromagnetic band gap (DG-CEBG) designs are used to accomplish band notches in WiMAX and WLAN bands. Defected ground planes are utilised to achieve compactness in electromagnetic band gap (EBG) structures. The proposed WiMAX and WLAN DG-CEBG designs show a compactness of around 46% and 50%, respectively, over mushroom EBG structures. Parametric analyses of DG-CEBG design factors are carried out to control the notched frequencies. Stepwise notch transition from upper to lower frequencies is presented with incremental inductance augmentation. The proposed antenna is made-up on low-cost FR-4 substrate of complete extents as (42 × 50 × 1.6) mm3.Fabricated sample antenna shows excellent consistency in simulated and measured outcomes.  相似文献   
77.
Multimedia Tools and Applications - An efficient way of using Embedded Zero-trees of Wavelet (EZW) architecture for video compression, termed as “Two Threshold EZW”, has been introduced...  相似文献   
78.
In this digital day and age, we are becoming increasingly dependent on multimedia content, especially digital images and videos, to provide a reliable proof of occurrence of events. However, the availability of several sophisticated yet easy-to-use content editing software has led to great concern regarding the trustworthiness of such content. Consequently, over the past few years, visual media forensics has emerged as an indispensable research field, which basically deals with development of tools and techniques that help determine whether or not the digital content under consideration is authentic, i.e., an actual, unaltered representation of reality. Over the last two decades, this research field has demonstrated tremendous growth and innovation. This paper presents a comprehensive and scrutinizing bibliography addressing the published literature in the field of passive-blind video content authentication, with primary focus on forgery/tamper detection, video re-capture and phylogeny detection, and video anti-forensics and counter anti-forensics. Moreover, the paper intimately analyzes the research gaps found in the literature, provides worthy insight into the areas, where the contemporary research is lacking, and suggests certain courses of action that could assist developers and future researchers explore new avenues in the domain of video forensics. Our objective is to provide an overview suitable for both the researchers and practitioners already working in the field of digital video forensics, and for those researchers and general enthusiasts who are new to this field and are not yet completely equipped to assimilate the detailed and complicated technical aspects of video forensics.  相似文献   
79.
80.
With the evolution of large number of social networking sites in which various users share the information at various levels in Peer-to-Peer (P2P) manner, there is a need of efficient P2P collaborative mechanisms to achieve efficiency and accuracy at each level. To achieve high level of accuracy and scalability, a distributed collaborative filtering (CF) approach for P2P service selection and recovery is proposed in this paper. The proposed approach is different from the traditional centralized approaches as both user and network views are modelled and an estimation of the service recovery time is included if some of the services are failed during execution. A novel Context Aware P2P Service Selection and Recovery (CAPSSR) algorithm is proposed. To filter the relevant contents for user needs, a new Distributed Filtering Metric (DFM) is included in the algorithm which selects the contents based upon the user input. The performance of the proposed algorithm is evaluated with traditional centralized algorithm with respect to scalability and accuracy. The results obtained show that the proposed approach is better than the existing approaches in terms of accuracy and scalability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号