全文获取类型
收费全文 | 213篇 |
免费 | 9篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 46篇 |
金属工艺 | 1篇 |
机械仪表 | 1篇 |
建筑科学 | 25篇 |
能源动力 | 20篇 |
轻工业 | 7篇 |
水利工程 | 6篇 |
石油天然气 | 2篇 |
无线电 | 11篇 |
一般工业技术 | 37篇 |
冶金工业 | 27篇 |
自动化技术 | 38篇 |
出版年
2023年 | 1篇 |
2022年 | 5篇 |
2021年 | 4篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 4篇 |
2017年 | 6篇 |
2016年 | 6篇 |
2015年 | 2篇 |
2014年 | 4篇 |
2013年 | 12篇 |
2012年 | 12篇 |
2011年 | 16篇 |
2010年 | 16篇 |
2009年 | 21篇 |
2008年 | 22篇 |
2007年 | 7篇 |
2006年 | 16篇 |
2005年 | 8篇 |
2004年 | 4篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 5篇 |
1997年 | 3篇 |
1996年 | 9篇 |
1995年 | 5篇 |
1994年 | 1篇 |
1992年 | 2篇 |
1988年 | 1篇 |
1979年 | 1篇 |
1976年 | 3篇 |
1973年 | 1篇 |
排序方式: 共有223条查询结果,搜索用时 15 毫秒
201.
Assaf Klar Raphael Linker 《Tunnelling and Underground Space Technology incorporating Trenchless Technology Research》2010,25(5):575-586
Cross-borders smuggling tunnels enable unmonitored movement of people, drugs and weapons and pose a very serious threat to homeland security. Recent advances in strain measurements using optical fibers allow the development of smart underground security fences that could detect the excavation of smuggling tunnels. This paper presents the first stages in the development of such a fence using Brillouin optical time domain reflectometry (BOTDR). Two fiber optic layouts are considered and evaluated in a feasibility study that includes evaluation of false detection and sensitivity: (1) horizontally laid fiber buried at a shallow depth, and (2) fibers embedded in vertical mini-piles. In the simulation study, two different ground displacement models are used in order to evaluate the robustness of the system against imperfect modeling. In both cases, soil–fiber and soil-structure interactions are considered. Measurement errors, and surface disturbances (obtained from a field test) are also included in the calibration and validation stages of the system. The proposed detection system is based on wavelet decomposition of the BOTDR signal, followed by a neural network that is trained to recognize the tunnel signature in the wavelet coefficients. The results indicate that the proposed system is capable of detecting even small tunnel (0.5 m diameter) as deep as 20 m (under the horizontal fiber) or as far as 10 m aside from the mini-pile (vertical fiber), if the volume loss is greater than 0.5%. 相似文献
202.
Petar Sabev VarbanovJi?í Jaromír Klemeš Ferenc Friedler 《Computers & Chemical Engineering》2011,35(5):943-948
Large amounts of thermal energy are transferred between fluids for heating or cooling in industry as well as in the residential and service sectors. Typical examples are crude oil preheating, ethylene plants, pulp and paper plants, breweries, plants with exothermic and endothermic reactions, space heating, and cooling or refrigeration of food and beverages. Heat exchangers frequently operate under varying conditions. Their appropriate use in flexible heat exchanger networks as well as maintenance/reliability related calculations requires adequate models for estimating their dynamic behaviour. Cell-based dynamic models are very often used to represent heat exchangers with varying arrangements. The current paper describes a direct method and a visualisation technique for determining the number of the modelling cells and their size. 相似文献
203.
204.
205.
Object
The aim of this work was to understand biophysical substrate underpinning contrast in diffusional kurtosis imaging (DKI) in white matter, using the composite hindered and restricted model of diffusion (CHARMED).Materials and methods
A theoretical relationship between the kurtosis function K and the CHARMED parameters, i.e., the restricted volume fraction RF and the axonal longitudinal diffusivity D was derived for the propagator used in the CHARMED model. Evidence for a similar correlation between these measures was then investigated in vivo across different WM regions in five healthy young subjects that underwent a CHARMED protocol at 3T.Results
Our theoretical treatment shows that K has an increasing trend for both increasing RF values and increasing D. In vivo, a significant positive correlation (P?0.001) was found between the kurtosis orthogonal to the fibre orientation K ⊥ and RF. A multilinear regression showed that K ⊥ values are better explained by a mixed contribution of both RF and D.Conclusions
The CHARMED model was used to understand whether and where DKI contrast can be explained in terms of the underlying axonal geometry. This work demonstrates that the information contained in DKI overlaps with the information extracted by CHARMED in areas of higher intra-voxel directional coherence. 相似文献206.
Ali A. Badran Loay M. Assaf Khaled S. Kayed Fadi A. Ghaith Mohammad I. Hammash 《Desalination》2004,164(1):77-85
An experimental study for an inverted trickle solar still was performed. The still was basically composed of an inclined absorber plate painted black on the top. Saline water flowed at the backside of the plate and was kept attached to the plate. The water flow rate was kept low so that its temperature was raised to produce vapor. Condensation took place in another compartment where a heat exchanger was placed to provide heat recovery. The still was tested using brackish water of 6000 ppm salinity during the month of November at 47° and 32° tilt angles. The condensate obtained was 2.8 and 2 L/d at the above angles, respectively. This represents an 18% increase in this kind of output over previous work, which is due to reduction in the salinity of feed water. However, the intermediate header production, which is saline water of reduced salinity (3600 ppm), was also reduced by 13%. A computer simulation program was developed to predict the performance of the still. 相似文献
207.
E I el Agamy R Ruppanner A Ismail C P Champagne R Assaf 《The Journal of dairy research》1992,59(2):169-175
Lysozyme (LZ), lactoferrin (LF), lactoperoxidase (LP), immunoglobulin G and secretory immunoglobulin A were extracted from camel milk. The activity of these protective proteins was assayed against Lactococcus lactis subsp. cremoris, Escherichia coli, Staphylococcus aureus, Salmonella typhimurium and rotavirus. Comparative activities of egg white LZ, bovine LZ and bovine LF are also presented. The antibacterial activity spectrum of camel milk LZ was similar to that of egg white LZ, and differed from bovine milk LZ. Bovine and camel milk LF antibacterial activity spectra were similar. The camel milk LP was bacteriostatic against the Gram-positive strains and was bactericidal against Gram-negative cultures. The immunoglobulins had little effect against the bacteria but high titres of antibodies against rotavirus were found in camel milk. The LP system was ineffective against rotavirus. 相似文献
208.
This paper introduces an algorithm which can determine the technology structure containing given chemical technological steps and producing given final products from given initial inlet materials.
With the aid of the algorithm all solutions of the problem or the solution with minimal sum of weights can be obtained. In the latter the user assigns weight factors to the different technological steps. It is also possible to determine all solutions haveing a sum of weights not greater than a limit given by the user. The algorithm and the datastructure introduced provide grounds for designing technologies with multi-component materials and recirculations. 相似文献
209.
We consider data dissemination in a peer-to-peer network, where each user wishes to obtain some subset of the available information objects. In most of the modern algorithms for such data dissemination, the users periodically obtain samples of peer IDs (possibly with some summary of their content). They then use the samples for connecting to other peers and downloading data pieces from them. For a set O of information objects, we call a sample of peers, containing at least k possible providers for each object oO, a k-sample.In order to balance the load, the k-samples should be fair, in the sense that for every object, its providers should appear in the sample with equal probability. Also, since most algorithms send fresh samples frequently, the size of the k-samples should be as small as possible, to minimize communication overhead. We describe in this paper two novel techniques for generating fair and small k-samples in a P2P setting. The first is based on a particular usage of uniform sampling and has the advantage that it allows to build on standard P2P uniform sampling tools. The second is based on non-uniform sampling and requires more particular care, but is guaranteed to generate the smallest possible fair k-sample. The two algorithms exploit available dependencies between information objects to reduce the sample size, and are proved, both theoretically and experimentally, to be extremely effective. 相似文献
210.
Arik Friedman Ran Wolff Assaf Schuster 《The VLDB Journal The International Journal on Very Large Data Bases》2008,17(4):789-804
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in the learning examples. Our extension provides a tool that measures the amount
of anonymity retained during data mining. We show that our model can be applied to various data mining problems, such as classification,
association rule mining and clustering. We describe two data mining algorithms which exploit our extension to guarantee they
will generate only k-anonymous output, and provide experimental results for one of them. Finally, we show that our method contributes new and
efficient ways to anonymize data and preserve patterns during anonymization. 相似文献