全文获取类型
收费全文 | 5735篇 |
免费 | 504篇 |
国内免费 | 64篇 |
专业分类
电工技术 | 66篇 |
综合类 | 25篇 |
化学工业 | 1343篇 |
金属工艺 | 81篇 |
机械仪表 | 275篇 |
建筑科学 | 108篇 |
矿业工程 | 8篇 |
能源动力 | 350篇 |
轻工业 | 744篇 |
水利工程 | 69篇 |
石油天然气 | 30篇 |
武器工业 | 1篇 |
无线电 | 746篇 |
一般工业技术 | 1295篇 |
冶金工业 | 94篇 |
原子能技术 | 53篇 |
自动化技术 | 1015篇 |
出版年
2024年 | 37篇 |
2023年 | 217篇 |
2022年 | 510篇 |
2021年 | 787篇 |
2020年 | 481篇 |
2019年 | 533篇 |
2018年 | 498篇 |
2017年 | 407篇 |
2016年 | 417篇 |
2015年 | 255篇 |
2014年 | 310篇 |
2013年 | 419篇 |
2012年 | 255篇 |
2011年 | 315篇 |
2010年 | 183篇 |
2009年 | 147篇 |
2008年 | 99篇 |
2007年 | 98篇 |
2006年 | 39篇 |
2005年 | 30篇 |
2004年 | 42篇 |
2003年 | 30篇 |
2002年 | 23篇 |
2001年 | 10篇 |
2000年 | 13篇 |
1999年 | 14篇 |
1998年 | 18篇 |
1997年 | 10篇 |
1996年 | 11篇 |
1995年 | 18篇 |
1994年 | 7篇 |
1993年 | 10篇 |
1992年 | 8篇 |
1991年 | 7篇 |
1990年 | 1篇 |
1989年 | 6篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1986年 | 1篇 |
1985年 | 6篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1961年 | 1篇 |
排序方式: 共有6303条查询结果,搜索用时 15 毫秒
71.
Babar Zaman Muhammad Riaz Saddam Akbar Abbasi 《Quality and Reliability Engineering International》2016,32(2):663-671
There are two main types of variations, namely, common and special causes leading to in‐control and out‐of‐control states, respectively. Control charts are popular tools used to differentiate between these two states of a process. Implementation of runs rules schemes with control charts is an attractive approach for process monitoring. This study is designed to describe the methodology of runs rules schemes and discuss their implementation for different types of control charts. We have considered memory‐less charts, namely, , S, and R charts for our study purposes. It is examined that the efficiency gain depends on the number of decision points utilized to implement a given rule. Moreover, superiority of runs rules schemes may vary for different types of location and dispersion charts. An application example using a dataset is also included in the study for practical considerations. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
72.
Mu'azu Ramat Abujiya Muhammad Riaz Muhammad Hisyam Lee 《Quality and Reliability Engineering International》2016,32(3):1149-1165
The combined application of a Shewhart chart and cumulative sum (CUSUM) control chart is an effective tool for the detection of all sizes of process shifts as the scheme combines the advantages of a CUSUM at detecting small to moderate shifts and Shewhart for the quick detection of very large shifts. This article proposes new combined Shewhart–CUSUM S charts based on the extreme variations of ranked set sampling technique, for efficient monitoring of changes in the process dispersion. Using Monte Carlo simulations, the combined scheme is designed to minimize the average extra quadratic loss over the entire process shift domain. The results show that the combined Shewhart–CUSUM S charts uniformly outperform several other procedures for detecting increases and decreases in the process variability. Moreover, the proposed scheme can detect changes that are small enough to escape the Shewhart S chart or fairly large to escape detection by the CUSUM S chart. Numerical example is given to illustrate the practical application of the proposed scheme using real industrial data. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
73.
Sania Naz Javeed Akhtar Muhammad Fayyaz Chaudhary Muhammad Zia 《IET nanobiotechnology / IET》2018,12(7):968
In this work, the authors report a facile low‐temperature wet‐chemical route to prepare morphology‐tailored hierarchical structures (HS) of copper oxide. The preparation of copper oxide collides was carried out using varying concentrations of copper acetate and a reducing agent at a constant temperature of 50°C. The prepared HS of CuO were characterised by powdered X‐rays diffraction that indicates phase pure having monoclinic structures. The morphology was further confirmed by field‐emission scanning electron microscope. It reveals a difference in shape and size of copper oxide HS by changing the concentration of reactants. In order to evaluate the effect of H2 O2 on CuO NPs, the prepared CuO are modified by treatment with H2 O2. In general trend, CuOH2 O2 collide showed enhanced protein kinase inhibition, antibacterial (maximum zone 16.34 mm against Staphylococcus aureus) and antifungal activities in comparison to unmodified CuO collides. These results reveal that CuO HS exhibit antimicrobial properties and can be used as a potential candidate in pharmaceutical industries.Inspec keywords: molecular biophysics, antibacterial activity, X‐ray diffraction, microorganisms, copper compounds, nanofabrication, nanoparticles, narrow band gap semiconductors, field emission scanning electron microscopy, enzymes, nanomedicine, particle size, semiconductor growthOther keywords: unmodified CuO collides, low‐temperature synthesis, morphology‐tailored hierarchical structures, copper acetate, reducing agent, monoclinic structures, copper oxide HS, CuO NPs, Staphylococcus aureus, biological activity, copper oxide, powdered X‐ray diffraction, field‐emission scanning electron microscopy, facile low‐temperature wet‐chemical method, protein kinase inhibition, antibacterial activity, antifungal activity, antimicrobial properties, pharmaceutical industries, temperature 50.0 degC, CuO 相似文献
74.
Kai Wang Haifeng Lin Bing Ni Haoyi Li Muhammad Aurang Zeb Gul Sial Haozhou Yang Jing Zhuang Xun Wang 《Nano Research》2018,11(6):3175-3181
Construction of macro-materials with highly oriented microstructures and well-connected interfaces between building blocks is significant for a variety of applications. However, it is still challenging to confine the desired structures. Thus, well-defined building blocks would be crucial to address this issue. Herein, we present a facile process based on 1.8 nm Pd nanoclusters (NCs) to achieve centimeter-size assemblages with aligned honeycomb structures, where the diameter of a single tubular moiety is ~4 μm. Layered and disordered porous assemblages were also obtained by modulating the temperature in this system. The reconciled interactions between the NCs were crucial to the assemblages. As a comparison, 14 nm Pd nanoparticles formed only aggregates. This work highlights the approach of confining the size of the building blocks in order to better control the assembly process and improve the stability of the structures. 相似文献
75.
Yongjie Yang Shanshan Tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad 《计算机、材料和连续体(英文)》2023,74(1):801-815
With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed. A distributed architecture based on an intrusion detection system (IDS) ensures that a dynamic, scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is available. In this study, we examined the time-related aspects of network traffic data. We presented an intrusion detection model based on a two-layered bidirectional long short-term memory (Bi-LSTM) with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark dataset. We showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy, precision, recall and F1 score. 相似文献
76.
Iftikhar Ahmad Ambreen Shahnaz Muhammad Asfand-e-Yar Wajeeha Khalil Yasmin Bano 《计算机、材料和连续体(英文)》2023,74(1):279-293
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms. 相似文献
77.
Sajjad Ahmad Imran Raza M. Hasan Jamal Sirojiddin Djuraev Soojung Hur Imran Ashraf 《计算机、材料和连续体(英文)》2023,74(2):2363-2377
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes. 相似文献
78.
Narongsak Yotha Qusain Hiader Zulqurnain Sabir Muhammad Asif Zahoor Raja Salem Ben Said Qasem Al-Mdallal Thongchai Botmart Wajaree Weera 《计算机、材料和连续体(英文)》2023,74(2):2415-2430
This study aims to solve the nonlinear fractional-order mathematical model (FOMM) by using the normal and dysregulated bone remodeling of the myeloma bone disease (MBD). For the more precise performance of the model, fractional-order derivatives have been used to solve the disease model numerically. The FOMM is preliminarily designed to focus on the critical interactions between bone resorption or osteoclasts (OC) and bone formation or osteoblasts (OB). The connections of OC and OB are represented by a nonlinear differential system based on the cellular components, which depict stable fluctuation in the usual bone case and unstable fluctuation through the MBD. Untreated myeloma causes by increasing the OC and reducing the osteoblasts, resulting in net bone waste the tumor growth. The solutions of the FOMM will be provided by using the stochastic framework based on the Levenberg-Marquardt backpropagation (LVMBP) neural networks (NN), i.e., LVMBPNN. The mathematical performances of three variations of the fractional-order derivative based on the nonlinear disease model using the LVMPNN. The static structural performances are 82% for investigation and 9% for both learning and certification. The performances of the LVMBPNN are authenticated by using the results of the Adams-Bashforth-Moulton mechanism. To accomplish the capability, steadiness, accuracy, and ability of the LVMBPNN, the performances of the error histograms (EHs), mean square error (MSE), recurrence, and state transitions (STs) will be provided. 相似文献
79.
Samra Rehman Muhammad Attique Khan Majed Alhaisoni Ammar Armghan Usman Tariq Fayadh Alenezi Ye Jin Kim Byoungchol Chang 《计算机、材料和连续体(英文)》2023,75(1):697-714
Identifying fruit disease manually is time-consuming, expert-required, and expensive; thus, a computer-based automated system is widely required. Fruit diseases affect not only the quality but also the quantity. As a result, it is possible to detect the disease early on and cure the fruits using computer-based techniques. However, computer-based methods face several challenges, including low contrast, a lack of dataset for training a model, and inappropriate feature extraction for final classification. In this paper, we proposed an automated framework for detecting apple fruit leaf diseases using CNN and a hybrid optimization algorithm. Data augmentation is performed initially to balance the selected apple dataset. After that, two pre-trained deep models are fine-tuning and trained using transfer learning. Then, a fusion technique is proposed named Parallel Correlation Threshold (PCT). The fused feature vector is optimized in the next step using a hybrid optimization algorithm. The selected features are finally classified using machine learning algorithms. Four different experiments have been carried out on the augmented Plant Village dataset and yielded the best accuracy of 99.8%. The accuracy of the proposed framework is also compared to that of several neural nets, and it outperforms them all. 相似文献
80.
Mohanapriya Marimuthu Santhosh Rajendran Reshma Radhakrishnan Kalpana Rengarajan Shahzada Khurram Shafiq Ahmad Abdelaty Edrees Sayed Muhammad Shafiq 《计算机、材料和连续体(英文)》2023,74(3):4729-4745
Continuous improvements in very-large-scale integration (VLSI) technology and design software have significantly broadened the scope of digital signal processing (DSP) applications. The use of application-specific integrated circuits (ASICs) and programmable digital signal processors for many DSP applications have changed, even though new system implementations based on reconfigurable computing are becoming more complex. Adaptable platforms that combine hardware and software programmability efficiency are rapidly maturing with discrete wavelet transformation (DWT) and sophisticated computerized design techniques, which are much needed in today’s modern world. New research and commercial efforts to sustain power optimization, cost savings, and improved runtime effectiveness have been initiated as initial reconfigurable technologies have emerged. Hence, in this paper, it is proposed that the DWT method can be implemented on a field-programmable gate array in a digital architecture (FPGA-DA). We examined the effects of quantization on DWT performance in classification problems to demonstrate its reliability concerning fixed-point math implementations. The Advanced Encryption Standard (AES) algorithm for DWT learning used in this architecture is less responsive to resampling errors than the previously proposed solution in the literature using the artificial neural networks (ANN) method. By reducing hardware area by 57%, the proposed system has a higher throughput rate of 88.72%, reliability analysis of 95.5% compared to the other standard methods. 相似文献