全文获取类型
收费全文 | 667篇 |
免费 | 48篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 10篇 |
综合类 | 2篇 |
化学工业 | 202篇 |
金属工艺 | 14篇 |
机械仪表 | 26篇 |
建筑科学 | 17篇 |
矿业工程 | 3篇 |
能源动力 | 46篇 |
轻工业 | 84篇 |
水利工程 | 17篇 |
石油天然气 | 21篇 |
无线电 | 36篇 |
一般工业技术 | 87篇 |
冶金工业 | 35篇 |
原子能技术 | 9篇 |
自动化技术 | 111篇 |
出版年
2023年 | 16篇 |
2022年 | 28篇 |
2021年 | 38篇 |
2020年 | 27篇 |
2019年 | 36篇 |
2018年 | 42篇 |
2017年 | 32篇 |
2016年 | 33篇 |
2015年 | 24篇 |
2014年 | 26篇 |
2013年 | 79篇 |
2012年 | 53篇 |
2011年 | 44篇 |
2010年 | 26篇 |
2009年 | 21篇 |
2008年 | 15篇 |
2007年 | 22篇 |
2006年 | 15篇 |
2005年 | 13篇 |
2004年 | 7篇 |
2003年 | 9篇 |
2002年 | 9篇 |
2001年 | 9篇 |
2000年 | 5篇 |
1999年 | 6篇 |
1998年 | 12篇 |
1997年 | 5篇 |
1996年 | 4篇 |
1993年 | 3篇 |
1991年 | 5篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1980年 | 5篇 |
1977年 | 2篇 |
1976年 | 6篇 |
1975年 | 4篇 |
1974年 | 3篇 |
1973年 | 1篇 |
1972年 | 2篇 |
1971年 | 1篇 |
1969年 | 1篇 |
1967年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有720条查询结果,搜索用时 15 毫秒
1.
With lower costs and greater availability, heavy fuel oil appears as an attractive alternative to the conventional gas oil used in industrial gas turbines. However, higher levels of radiation and smoke are expected, and this note reports on some preliminary tests made with a combustion chamber burning fuels of different carbon content, ranging from kerosine to a 25% blend of residual fuel oil in gas oil, at a chamber pressure of 10 atm*. The combustion rig was equipped with a total-radiation pyrometer and black-body furnace capable of measurement at different axial stations along the spray-stabilized flame. The presence of the residual fuel oil in the gas oil was found to promote significant increases in the mean levels of radiation, emissivity and smoke density, with a modest increase in liner temperature. 相似文献
2.
Bahareh ZIBANEZHAD Kamran ZAMANIFAR Razieh Sadat SADJADY Yousef RASTEGARI 《浙江大学学报(英文版)(C辑:计算机与电子)》2011,12(9)
With the growing use of service-oriented architecture for designing next generation software systems,the service composition problem and its execution complexity have become even more important in resp... 相似文献
3.
Salam Al-E’mari Mohammed Anbar Yousef Sanjalawe Selvakumar Manickam Iznan Hasbullah 《计算机系统科学与工程》2022,40(1):87-102
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology. 相似文献
4.
Faranak Mavandadnejad Mohammad Hossein Yazdi Seyed Mehdi Hassanzadeh Mehdi Mahdavi Mohammad Ali Faramarzi Hamidreza PazokiToroudi Ahmad Reza Shahverdi 《IET nanobiotechnology / IET》2018,12(1):57
Conventional hepatitis B vaccine contains alum but is less effective to induce Th1 response. Selenium nanoparticles and Bacillus Calmette–Guerin were reported as immune modulators. In this study, SeNPs were extracted from Mycobacterium bovis and characterised. SeNPs were mixed with HBs‐Ag and administered to the mice to investigate he immune response pattern. With an addition of Se ions at a sub‐inhibitory concentration to the Sauton medium broth after 24 h, SeNPs were extracted from M. bovis and characterised by Fourier transform infrared spectroscopy, dynamic light scattering, atomic forcemicroscopy, energy dispersive X‐ray spectrum, transmission electron microscopy, and thermogravimetric analysis. Furthermore, female inbred BALB/c mice were injected subcutaneously on the first, 14th, 28th day with 100 and 200 µg doses of that SeNPs supplemented with HBs‐Ag vaccine. Later, the total antibody, isotypes of Immunoglobulin G1, Interlukin 4, and interferon‐γ were measured by enzye‐linked immunosorbent assay. The size of the SeNPs was <150 nm. Level of total antibody and immunoglobulin G2a increased significantly in the group that received 200 µg/ml nano selenium extracted from M. bovis. SeNPs in dose of 200 µg coated with organic materials of M. bovis could induce an influential immune response in relation to the conventional HBs‐Ag vaccine.Inspec keywords: selenium, nanoparticles, nanofabrication, microorganisms, Fourier transform spectra, infrared spectra, light scattering, atomic force microscopy, X‐ray chemical analysis, transmission electron microscopy, thermal analysis, nanomedicineOther keywords: biosynthesis, selenium nanoparticles, Mycobacterium bovis, enhnced immune response, HBs antigens, Bacillus Calmette‐Guerin, immune modulators, biogenic SeNPs, immune response pattern, Sauton medium broth, Fourier transform infrared spectroscopy, dynamic light scattering, atomic force microscopy, energy dispersive X‐ray spectrum, transmission electron microscopy, thermogravimetric analysis, female inbred BALB/c mice, antibody, IgG1 isotype, IgG2a isotype, IL4 isotype, interferon‐γ, enzyme‐linked immunosorbent assay, bacterium, time 24 h, time 14 day, time 28 day, Se 相似文献
5.
This work is focused on the study of combined heat and mass transfer or double-diffusive convection near a vertical truncated cone embedded in a fluid-saturated porous medium in the presence of thermal radiation, magnetic field and variable viscosity effects. The viscosity of the fluid is assumed to be an inverse linear function of the fluid temperature. A boundary-layer analysis is employed to derive the non-dimensional governing equations. The governing equations for this investigation are transformed into a set of non-similar equations and solved numerically using the fourth-order Runge–Kutta integration scheme with the Newton–Raphson shooting technique. Comparisons with previously published work on special cases of the problem are performed and the results are found to be in excellent agreement. A parametric study illustrating the influence of the radiation parameter, magnetic field parameter, viscosity-variation parameter, buoyancy ratio and the Lewis number on the fluid velocity, temperature and solute concentration profiles as well as the Nusselt number and Sherwood number is conducted. The results of this parametric study are shown graphically and the physical aspects of the problem are highlighted and discussed. 相似文献
6.
Farzad Hashemzadeh Iraj Hassanzadeh Mahdi Tavakoli Ghasem Alizadeh 《Journal of Intelligent and Robotic Systems》2012,68(3-4):245-259
In this paper, we introduce a new adaptive controller design scheme for nonlinear telerobotic systems with varying time delays where the delays and their variation rates are unknown. The designed controller has the ability to synchronize the state behaviors of the local and the remote robots. In this paper, asymptotic stability in the presence of varying time delays is of interest. Using the proposed controller, asymptotic stability of the bilateral telerobotic system subject to any bounded yet unknown varying delay with a bounded yet unknown rate of change can be guaranteed. Besides the varying time delay, the proposed adaptive controller has the ability to adapt to the parameter variations in the local and the remote robots’ dynamics. It is shown that position and velocity errors between the local and the remote manipulators converge to the zero asymptotically, thus ensuring teleoperation transparency. Experimental and simulation results with a pair of PHANToM haptic devices and a pair of planar manipulators under varying time delays in the communication channel demonstrate the effectiveness of the proposed scheme. 相似文献
7.
Nooshin Bigdeli Yousef Farid Karim Afshar 《Engineering Applications of Artificial Intelligence》2012,25(4):753-765
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme. 相似文献
8.
Saman Hassanzadeh Amin Guoqing Zhang 《Expert systems with applications》2012,39(8):6782-6791
Reverse logistics consists of all operations related to the reuse of products. External suppliers are one of the important members of reverse logistics and closed loop supply chain (CLSC) networks. However in CLSC network configuration models, suppliers are assessed based on purchasing cost and other factors such as on-time delivery are ignored. In this research, a general closed loop supply chain network is examined that includes manufacturer, disassembly, refurbishing, and disposal sites. Meanwhile, it is managed by the manufacturer. We propose an integrated model which has two phases. In the first phase, a framework for supplier selection criteria in RL is proposed. Besides, a fuzzy method is designed to evaluate suppliers based on qualitative criteria. The output of this stage is the weight of each supplier according to each part. In the second phase, we propose a multi objective mixed-integer linear programming model to determine which suppliers and refurbishing sites should be selected (strategic decisions), and find out the optimal number of parts and products in CLSC network (tactical decisions). The objective functions maximize profit and weights of suppliers, and one of them minimizes defect rates. To our knowledge, this model is the first effort to consider supplier selection, order allocation, and CLSC network configuration, simultaneously. The mathematical programming model is validated through numerical analysis. 相似文献
9.
A method of tuning for PI controllers with one-way lead/lag decoupling tuning is demonstrated for 2×2 input-output systems, based on finite frequency response data. The frequency response estimates are obtained from closed loop tests using an identification technique based on bandpass filters. The open-loop frequency response is calculated and used to tune PI controllers and to fit lead-lag compensators for decoupling by weighted least-squares. Separate optimization of the PI controllers and the lead-lag compensator is preferred. The tuning takes into account violations of desired multivariable robustness criteria. The method is illustrated by application to a paper machine headbox simulation and by experiments in distillation column temperature control. 相似文献
10.