全文获取类型
收费全文 | 427篇 |
免费 | 11篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 10篇 |
综合类 | 1篇 |
化学工业 | 78篇 |
金属工艺 | 6篇 |
机械仪表 | 4篇 |
建筑科学 | 3篇 |
矿业工程 | 2篇 |
能源动力 | 22篇 |
轻工业 | 22篇 |
水利工程 | 6篇 |
石油天然气 | 4篇 |
无线电 | 46篇 |
一般工业技术 | 101篇 |
冶金工业 | 58篇 |
原子能技术 | 6篇 |
自动化技术 | 71篇 |
出版年
2024年 | 3篇 |
2023年 | 6篇 |
2022年 | 12篇 |
2021年 | 23篇 |
2020年 | 13篇 |
2019年 | 18篇 |
2018年 | 17篇 |
2017年 | 15篇 |
2016年 | 20篇 |
2015年 | 8篇 |
2014年 | 18篇 |
2013年 | 27篇 |
2012年 | 22篇 |
2011年 | 26篇 |
2010年 | 15篇 |
2009年 | 22篇 |
2008年 | 24篇 |
2007年 | 23篇 |
2006年 | 11篇 |
2005年 | 4篇 |
2004年 | 18篇 |
2003年 | 12篇 |
2002年 | 5篇 |
2001年 | 4篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 4篇 |
1996年 | 7篇 |
1995年 | 1篇 |
1994年 | 4篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 4篇 |
1986年 | 10篇 |
1985年 | 4篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1973年 | 2篇 |
排序方式: 共有440条查询结果,搜索用时 15 毫秒
81.
Dash Bodhisattva Rup Suvendu Mohapatra Anjali Majhi Banshidhar Swamy M. N. S. 《Multimedia Tools and Applications》2018,77(12):15221-15250
Multimedia Tools and Applications - This paper proposes an ensemble of multi-layer perceptron (MLP) networks for side information (SI) generation in distributed video coding (DVC). In the proposed... 相似文献
82.
83.
Ranjita Kumari Swain Vikas Panthi Durga Prasad Mohapatra Prafulla Kumar Behera 《Innovations in Systems and Software Engineering》2014,10(3):165-180
Due to the large size and complexity of software, exhaustive testing becomes impossible. Hence, testing must be done in an optimized way keeping in mind factors, such as requirements of the customer, cost and time. For this, there is a need to generate test cases and exercise them to gain maximum throughput by uncovering defects. Test case/scenario prioritization is a well known and efficient technique to ensure the software quality. Prioritization of test scenarios helps in early detection of bugs. In this paper, we present an integrated approach and a prioritization technique to generate cluster-level test scenarios from UML communication and activity diagrams. In our approach, we first construct a tree representation of communication diagrams, and then a tree representation of activity diagrams. We convert them into an intermediate tree named as COMMACT tree. We, then carry out a post-order traversal of the constructed tree for selecting conditional predicates from the intermediate tree. Then, we propose an algorithm to generate test scenarios from the constructed tree. Next, the necessary information, such as method-activity sequence, associated objects, and constraint conditions is extracted from test scenario. The test sequences are a set of theoretical paths starting from initialization to end, while taking conditions (pre- and post-condition) into consideration. Each generated test sequence corresponds to a particular scenario of the considered use case. The third phase is to generate test scenarios from the tree satisfying the message–activity path test adequacy criteria. Preliminary results obtained on a case-study indicate that the technique is effective in extracting the critical scenarios from the communication and activity diagrams. Our approach generates redundant test scenarios and still achieves adequate test coverage. 相似文献
84.
Sunil Ranjan Mohapatra K. Rajagopal Jitendra Sharma 《Geotextiles and Geomembranes》2017,45(3):131-141
In this paper, series of three-dimensional (3-d) numerical modeling of geosynthetic-encased granular columns were performed both in model and prototype scale using FLAC3D software to understand the lateral load carrying capacity of ordinary and geosynthetic encased granular columns (OGC and EGC). In the first part of the study, numerical modeling of direct shear tests were carried out. The soil in the direct shear box was reinforced with two different diameters of granular columns (50 mm and 100 mm) and three different patterns of arrangement (single, triangular and square) to study the effect of group confinement. The numerical simulations were carried out at four different confining pressures namely 15, 30, 45 and 75 kPa. From the numerical simulations it was observed that higher shear stresses are mobilized inside the granular column due to geosynthetic encasement and the magnitude of shear stress increases with increase in the normal pressure. It was found that the tensile forces in the geosynthetic encasement were mobilized both in circumferential and vertical directions, which helps in mobilizing additional confinement in the granular column. In the second part, the influence of the geosynthetic encasement of granular column treated soft ground was demonstrated through 3-dimensional slope stability analyses. 相似文献
85.
Jatinder Pal Singh Satish Kumar S.K. Mohapatra 《International Journal of Hydrogen Energy》2017,42(31):20133-20137
In this paper three-dimensional fluid flow characteristics of slurry pipeline has been studied using commercial Computational Fluid Dynamics (CFD) code FLUENT at different velocities and solid concentrations. An Euler-Lagrange multiphase approach was used to simulate the flow of bottom ash slurry in a 50 mm diameter straight pipeline. Simulations were carried out with bottom ash at velocity range of 1–3 ms–1. The solid concentration of bottom ash particles was varied from 40 to 60% (by weight). The simulations were carried out using SST k-ω turbulence model and the results obtained were compared with experimental results. It was found that the SST k-ω turbulence model shows good agreement with experimental data. Numerical simulation results show that the pressure drop in pipeline increases non-linearly with increase in velocity and solid concentration. 相似文献
86.
The rapid deployment of wireless mesh networks across universities and enterprises, and the pervasiveness of mobile devices
equipped with Wi-Fi connectivity, has resulted in a scenario wherein end users have the option to choose from a multitude
of access points at any given location. Moreover, with the increasing availability of rich online content, there has been
a steady increase in mobile Internet traffic. Since the choice of access point that a user associates with will directly impact
his performance, it is imperative that there exist an efficient association control mechanism, in order to enhance the end
user’s experience. As part of this work, we propose Seeker, a novel framework for association control in wireless networks
that utilizes “available bandwidth” as the design metric. The goal of Seeker is to assist the mesh network in making an intelligent
decision regarding which access point a client should associate with. As part of our scheme, we implement and evaluate a passive
tool to estimate available bandwidth in wireless networks. We then describe how we use this tool to implement our association
control scheme, and evaluate it via extensive experiments on an outdoor testbed. Seeker takes into consideration the performance
of the mesh backhaul, in addition to the client-to-AP link quality, thereby achieving significant advantages over traditional
association control schemes for wireless-LANs. 相似文献
87.
Mohapatra K.K. Kanchan R.S. Baiju M.R. Tekwani P.N. Gopakumar K. 《Industrial Electronics, IEEE Transactions on》2005,52(5):1372-1382
Split-phase (six-phase) induction motor stator windings consist of two sets of three phase windings, which are spatially phase separated by 30 electrical degrees. Due to mutual cancellation of the air gap flux for all the 6n/spl plusmn/1 (n=1,3,5...) order harmonic voltages, called zero sequence components, large harmonic currents are generated in the stator phases. Only the 12n/spl plusmn/1 (n=0,1,2,3...)-order harmonic voltage components contribute toward the air gap flux and electromagnetic torque production in the machine. In this paper, a novel scheme is proposed where two six-phase induction motors are connected in series with proper phase sequence so that the zero sequence component voltages of one machine act as torque and flux producing components for the other. Thus, the two six-phase motors can be independently controlled from a single six-phase inverter. A vector control scheme for the dual motor drive is developed and experimentally verified in this paper. 相似文献
88.
S. Pramodini Devi S. Mimoda Devi N. Shantibala Devi R.K. Hemakumar Singh Manoj Mohapatra R.M. Kadam 《Inorganic chemistry communications》2008,11(12):1441-1444
EPR investigations on two solid complexes [Cu(1-amidino-O-2-methoxyethylurea)2]2(H2O)2(SO4)2 (1) and [Cu(1-amidino-O-2-ethoxyethylurea)2]2(H2O)2(SO4)2 (2) indicated the formation of ferromagnetically coupled binuclear complexes (S = 1) having the isotropic exchange interaction constant J values of 59 and 50 cm−1. The angle between the Cu–Cu direction and the parallel direction (ξ) of the complex 1 has been evaluated. The IR studies suggest the presence of tetrahedral sulfate ion in the complexes. When the EPR spectra were recorded in the temperature range 300–475 K, it was observed that the triplet-state EPR signal disappeared completely and irreversibly at ca. 450 K for complex 1 and at ca. 475 K for complex 2 with the appearance of a new signal attributable to the mononuclear complex (S = 1/2). 相似文献
89.
Charu Gupta Rakesh Kumar Singh Amar Kumar Mohapatra 《Information Security Journal: A Global Perspective》2020,29(4):183-198
ABSTRACTXML based attacks are executed in web applications through crafted XML document that forces XML parser to process un-validated documents. This leads to disclosure of sensitive information, malicious code execution and disruption of services. OWASP has included XML based attacks at number four in its top 10 list of vulnerabilities published in 2017. Most of the vulnerabilities reported using the XML document range from high to critical and require to be addressed immediately. As per the National Vulnerability Database, 152 vulnerabilities have already been reported in the first five months of the year 2019. A varied number of XML vulnerabilities and their classification exist but are limited to a specific vulnerability. In this paper, the authors have proposed a classification of XML based vulnerabilities based on exhaustive literature survey. The approach/strategies to mitigate these vulnerabilities are also presented. The work will help the web developers for proposing secure parsers that will thwart such attacks. 相似文献
90.
Subhasri Subudhi Apurba Mahapatra Manoranjan Mandal Sonali Das Kadambinee Sa Injamul Alam 《组合铁电体》2020,205(1):61-65
AbstractHerein, we reported the effect of cobalt (Co) doping on the optical band gap of LaFeO3 (LFO). The Co doped nanoparticles were prepared by a simple sol-gel technique with composition LaFe1–xCoxO3by varying content ratio of x?=?0, 0.4, 0.5 and 0.6. Structure of the LFO and Co doped LFO nanoparticles have been investigated by X-ray diffraction (XRD) pattern. Whereas, surface morphology of LFO and Co doped LFO has been ascertained by scanning electron microscopy (SEM). The observed optical properties investigated by UV-Vis spectroscopy suggest decrease in band gap with Co doping in LFO, which can be useful for optoelectronic applications. 相似文献