首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5828篇
  免费   358篇
  国内免费   46篇
电工技术   75篇
综合类   20篇
化学工业   1643篇
金属工艺   125篇
机械仪表   221篇
建筑科学   155篇
矿业工程   4篇
能源动力   377篇
轻工业   557篇
水利工程   85篇
石油天然气   36篇
无线电   559篇
一般工业技术   1076篇
冶金工业   293篇
原子能技术   83篇
自动化技术   923篇
  2024年   23篇
  2023年   113篇
  2022年   325篇
  2021年   398篇
  2020年   301篇
  2019年   330篇
  2018年   360篇
  2017年   300篇
  2016年   327篇
  2015年   197篇
  2014年   323篇
  2013年   536篇
  2012年   310篇
  2011年   318篇
  2010年   279篇
  2009年   249篇
  2008年   173篇
  2007年   147篇
  2006年   135篇
  2005年   97篇
  2004年   74篇
  2003年   72篇
  2002年   55篇
  2001年   42篇
  2000年   36篇
  1999年   37篇
  1998年   77篇
  1997年   62篇
  1996年   46篇
  1995年   53篇
  1994年   25篇
  1993年   34篇
  1992年   30篇
  1991年   25篇
  1990年   24篇
  1989年   22篇
  1988年   15篇
  1987年   30篇
  1986年   30篇
  1985年   22篇
  1984年   30篇
  1983年   26篇
  1982年   16篇
  1981年   8篇
  1980年   14篇
  1979年   13篇
  1978年   12篇
  1977年   11篇
  1976年   14篇
  1975年   8篇
排序方式: 共有6232条查询结果,搜索用时 22 毫秒
141.
Ball end magnetorheological finishing is a unique process that utilizes a magnetically controlled ball of polishing fluid at the tip of the rotating tool to finish workpiece of different materials and shapes. The aim of this research is to study the effect of polishing fluid volume on finishing spot size and the surface finish associated with it. A magnetostatic simulation is done to find the variation of flux density in the working gap and on the workpiece surface. The maximum limit of the polishing fluid volume is selected on the basis of area of threshold magnetic flux density (minimum value required for finishing) region on the workpiece surface. The surface characteristics and the diameter of the finished spot are analyzed by varying the fluid volume. The surface obtained with high fluid volume is poorly finished and has scratch marks as the excess fluid flows out from the working gap and forms a thick ring at the periphery of the tool tip. Contrary to this, if the fluid volume is too less, then it merely rotates over the workpiece surface without causing any finishing action. An optimum range of fluid volume produces a good quality surface finish with constant finished spot size.  相似文献   
142.
Mixing sand or soil with small pieces of tire is common practice in civil engineering applications. Although the properties of the soil are changed, it is environmentally friendly and sometimes economical. Nevertheless, the mechanical behavior of such mixtures is still not fully understood and more numerical investigations are required. This paper presents a novel approach for the modeling of sand–tire mixtures based on the discrete element method. The sand grains are represented by rigid agglomerates whereas the tire grains are represented by deformable agglomerates. The approach considers both grain shape and deformability. The micromechanical parameters of the contact law are calibrated based on experimental results from the literature. The effects of tire content and confining pressure on the stress–strain response are investigated in detail by performing numerical triaxial compression tests. The main results indicate that both strength and stiffness of the samples decrease with increasing tire content. A tire contact of 40% is identified as the boundary between rubber-like and sand-like behavior.  相似文献   
143.
Conventional hepatitis B vaccine contains alum but is less effective to induce Th1 response. Selenium nanoparticles and Bacillus Calmette–Guerin were reported as immune modulators. In this study, SeNPs were extracted from Mycobacterium bovis and characterised. SeNPs were mixed with HBs‐Ag and administered to the mice to investigate he immune response pattern. With an addition of Se ions at a sub‐inhibitory concentration to the Sauton medium broth after 24 h, SeNPs were extracted from M. bovis and characterised by Fourier transform infrared spectroscopy, dynamic light scattering, atomic forcemicroscopy, energy dispersive X‐ray spectrum, transmission electron microscopy, and thermogravimetric analysis. Furthermore, female inbred BALB/c mice were injected subcutaneously on the first, 14th, 28th day with 100 and 200 µg doses of that SeNPs supplemented with HBs‐Ag vaccine. Later, the total antibody, isotypes of Immunoglobulin G1, Interlukin 4, and interferon‐γ were measured by enzye‐linked immunosorbent assay. The size of the SeNPs was <150 nm. Level of total antibody and immunoglobulin G2a increased significantly in the group that received 200 µg/ml nano selenium extracted from M. bovis. SeNPs in dose of 200 µg coated with organic materials of M. bovis could induce an influential immune response in relation to the conventional HBs‐Ag vaccine.Inspec keywords: selenium, nanoparticles, nanofabrication, microorganisms, Fourier transform spectra, infrared spectra, light scattering, atomic force microscopy, X‐ray chemical analysis, transmission electron microscopy, thermal analysis, nanomedicineOther keywords: biosynthesis, selenium nanoparticles, Mycobacterium bovis, enhnced immune response, HBs antigens, Bacillus Calmette‐Guerin, immune modulators, biogenic SeNPs, immune response pattern, Sauton medium broth, Fourier transform infrared spectroscopy, dynamic light scattering, atomic force microscopy, energy dispersive X‐ray spectrum, transmission electron microscopy, thermogravimetric analysis, female inbred BALB/c mice, antibody, IgG1 isotype, IgG2a isotype, IL4 isotype, interferon‐γ, enzyme‐linked immunosorbent assay, bacterium, time 24 h, time 14 day, time 28 day, Se  相似文献   
144.
Crowd management becomes a global concern due to increased population in urban areas. Better management of pedestrians leads to improved use of public places. Behavior of pedestrian’s is a major factor of crowd management in public places. There are multiple applications available in this area but the challenge is open due to complexity of crowd and depends on the environment. In this paper, we have proposed a new method for pedestrian’s behavior detection. Kalman filter has been used to detect pedestrian’s using movement based approach. Next, we have performed occlusion detection and removal using region shrinking method to isolate occluded humans. Human verification is performed on each human silhouette and wavelet analysis and particle gradient motion are extracted for each silhouettes. Gray Wolf Optimizer (GWO) has been utilized to optimize feature set and then behavior classification has been performed using the Extreme Gradient (XG) Boost classifier. Performance has been evaluated using pedestrian’s data from avenue and UBI-Fight datasets, where both have different environment. The mean achieved accuracies are 91.3% and 85.14% over the Avenue and UBI-Fight datasets, respectively. These results are more accurate as compared to other existing methods.  相似文献   
145.
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms.  相似文献   
146.
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes.  相似文献   
147.
Continuous improvements in very-large-scale integration (VLSI) technology and design software have significantly broadened the scope of digital signal processing (DSP) applications. The use of application-specific integrated circuits (ASICs) and programmable digital signal processors for many DSP applications have changed, even though new system implementations based on reconfigurable computing are becoming more complex. Adaptable platforms that combine hardware and software programmability efficiency are rapidly maturing with discrete wavelet transformation (DWT) and sophisticated computerized design techniques, which are much needed in today’s modern world. New research and commercial efforts to sustain power optimization, cost savings, and improved runtime effectiveness have been initiated as initial reconfigurable technologies have emerged. Hence, in this paper, it is proposed that the DWT method can be implemented on a field-programmable gate array in a digital architecture (FPGA-DA). We examined the effects of quantization on DWT performance in classification problems to demonstrate its reliability concerning fixed-point math implementations. The Advanced Encryption Standard (AES) algorithm for DWT learning used in this architecture is less responsive to resampling errors than the previously proposed solution in the literature using the artificial neural networks (ANN) method. By reducing hardware area by 57%, the proposed system has a higher throughput rate of 88.72%, reliability analysis of 95.5% compared to the other standard methods.  相似文献   
148.
A substitution box (S-Box) is a crucial component of contemporary cryptosystems that provide data protection in block ciphers. At the moment, chaotic maps are being created and extensively used to generate these S-Boxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical attempts. In this paper, the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking approach. The projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their working makes both of these dynamic in nature. The tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic fort. Values of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique S-Box. Comparative analysis and exploration confirmed that the projected chaotic map exhibits a significant amount of chaotic complexity. The security assessment in terms of bijectivity, nonlinearity, bits independence, strict avalanche, linear approximation probability, and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several assaults. The proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security applications. The comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security.  相似文献   
149.
A brain tumor is a mass or growth of abnormal cells in the brain. In children and adults, brain tumor is considered one of the leading causes of death. There are several types of brain tumors, including benign (non-cancerous) and malignant (cancerous) tumors. Diagnosing brain tumors as early as possible is essential, as this can improve the chances of successful treatment and survival. Considering this problem, we bring forth a hybrid intelligent deep learning technique that uses several pre-trained models (Resnet50, Vgg16, Vgg19, U-Net) and their integration for computer-aided detection and localization systems in brain tumors. These pre-trained and integrated deep learning models have been used on the publicly available dataset from The Cancer Genome Atlas. The dataset consists of 120 patients. The pre-trained models have been used to classify tumor or no tumor images, while integrated models are applied to segment the tumor region correctly. We have evaluated their performance in terms of loss, accuracy, intersection over union, Jaccard distance, dice coefficient, and dice coefficient loss. From pre-trained models, the U-Net model achieves higher performance than other models by obtaining 95% accuracy. In contrast, U-Net with ResNet-50 outperforms all other models from integrated pre-trained models and correctly classified and segmented the tumor region.  相似文献   
150.
This research aims to develop a method for the amalgamation of graphene nanoplatelets in glass/epoxy composites. The poor interface bonding between the fiber and matrix is critical and hinders the full performance of the composites. Glass fabric and epoxy were used as reinforcement and matrix in the composite, respectively. Graphene nanoplatelets were utilized as an additional nano-materials filler for the composites. Glass/graphene/epoxy and glass/epoxy composites were fabricated via vacuum infusion molding. The new method of applying graphene nanoplatelets as secondary reinforcement in the composite was developed based on proper functionalization in the sonication process. The physical, tensile, flexural, and short beam interlaminar properties of fabricated composites were examined to analyze the method's effectiveness. The results showed that density decreased by around 5 %; however, thickness increased by around 34 % after introducing graphene nanoplatelets into the composites. The tensile strength and modulus of the composites declined by approximately 19 %, on the other hand, flexural strength and modulus increased by around 63.3 % and 8.3 %, respectively, after the addition of graphene nanoplatelets into the composites. Moreover, interlaminar shear strength of the composite was enhanced by approximately 50 %.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号