首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   188篇
  免费   6篇
电工技术   2篇
化学工业   45篇
金属工艺   5篇
机械仪表   7篇
建筑科学   13篇
能源动力   22篇
轻工业   15篇
水利工程   2篇
无线电   12篇
一般工业技术   38篇
冶金工业   3篇
自动化技术   30篇
  2024年   1篇
  2023年   1篇
  2022年   4篇
  2021年   9篇
  2020年   3篇
  2019年   6篇
  2018年   11篇
  2017年   9篇
  2016年   9篇
  2015年   5篇
  2014年   4篇
  2013年   35篇
  2012年   16篇
  2011年   11篇
  2010年   4篇
  2009年   10篇
  2008年   10篇
  2007年   6篇
  2006年   9篇
  2005年   5篇
  2004年   4篇
  2003年   3篇
  2002年   3篇
  2001年   1篇
  2000年   4篇
  1998年   2篇
  1997年   1篇
  1995年   1篇
  1991年   1篇
  1989年   1篇
  1987年   1篇
  1982年   3篇
  1981年   1篇
排序方式: 共有194条查询结果,搜索用时 15 毫秒
11.
Poly (methyl methacrylate) (PMMA)–starch composites were prepared by emulsion polymerization technique for L‐asparaginase (L‐ASNase) immobilization as highly activated support. The hydroxide groups on the prepared composites offer a very simple, mild and firm combination for enzyme immobilization. The pure PMMA and PMMA‐starch composites were characterized as structural, thermal and morphological. PMMA‐starch composites were found to have better thermal stability and more hydrophilic character than pure PMMA. L‐ASNase was immobilized onto PMMA‐starch composites contained the different ratio of starch (1, 3, 5, and 10 wt %). Immobilized L‐ASNase showed better performance as compared to the native enzyme in terms of thermal stability and pH. Km value of immobilized enzyme decreased approximately eightfold compared with the native enzyme. In addition to, immobilized L‐ASNase was found to retain 60% of activity after 1‐month storage period at 4 °C. Therefore, PMMA‐starch composites can be provided more advantageous in terms of enzymatic affinity, thermal, pH and storage stability as L‐ASNase immobilization matrix. © 2016 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2016 , 133, 43421.  相似文献   
12.
This study introduces a comprehensive framework designed for detecting and mitigating fake and potentially threatening user communities within 5G social networks. Leveraging geo-location data, community trust dynamics, and AI-driven community detection algorithms, this framework aims to pinpoint users posing potential harm. Including an artificial control model facilitates the selection of suitable community detection algorithms, coupled with a trust-based strategy to effectively identify and filter potential attackers. A distinctive feature of this framework lies in its ability to consider attributes that prove challenging for malicious users to emulate, such as the established trust within the community, geographical location, and adaptability to diverse attack scenarios. To validate its efficacy, we illustrate the framework using synthetic social network data, demonstrating its ability to distinguish potential malicious users from trustworthy ones.  相似文献   
13.
The consumer decision process is a widely accepted model covering consumer activities, and accordingly contains five interrelated stages: problem recognition, information search, evaluation of alternatives, purchase, and post-purchase evaluation. In order to help consumers deal with challenges associated with all these stages, mobile information systems bring significant capabilities, as in other application domains. However, related prior research is mostly restricted to the individual stages of the process. Since the stages are interrelated, and the data collected in one are also valuable for another, we propose a mobile framework designed to provide assistance in all stages of the Consumer Decision Process, named MobileCDP. A prototype is also implemented and evaluated to show the applicability of the framework. Experiments show that the functions provided by the prototype are useful, well integrated, and easy to use. Moreover, statistical analysis of the results proves that the prototype reduces time, costs, and cognitive effort of the user.  相似文献   
14.
Hiding biometric data   总被引:5,自引:0,他引:5  
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of security/integrity of biometric data extremely critical. We introduce two applications of an amplitude modulation-based watermarking method, in which we hide a user's biometric data in a variety of images. This method has the ability to increase the security of both the hidden biometric data (e.g., eigen-face coefficients) and host images (e.g., fingerprints). Image adaptive data embedding methods used in our scheme lead to low visibility of the embedded signal. Feature analysis of host images guarantees high verification accuracy on watermarked (e.g., fingerprint) images.  相似文献   
15.
In this study, an automated adaptive mesh control scheme, based on local mesh modifications, is developed for the finite element simulations of 3D metal-forming processes. Error indicators are used to control the mesh discretization errors, and an h-adaptive procedure is conducted. The mesh size field used in the h-adaptive procedure is processed to control the discretization and geometric approximation errors of the evolving workpiece mesh. Industrial problems are investigated to demonstrate the capabilities of the developed scheme.  相似文献   
16.
Scheduling periodic tasks onto a multiprocessor architecture under several constraints such as performance, cost, energy, and reliability is a major challenge in embedded systems. In this paper, we present an Integer Linear Programming (ILP) based framework that maps a given task set onto an Heterogeneous Multiprocessor System-on-Chip (HMPSoC) architecture. Our framework can be used with several objective functions; minimizing energy consumption, minimizing cost (i.e., the number of heterogeneous processors), and maximizing reliability of the system under performance constraints. We use Dynamic Voltage Scaling (DVS) for reducing energy consumption while we employ task duplication to maximize reliability. We illustrate the effectiveness of our approach through several experiments, each with a different number of tasks to be scheduled. We also propose two heuristics based on Earliest Deadline First (EDF) algorithm for minimizing energy under performance and cost constraints. Our experiments on generated task sets show that ILP-based method reduces the energy consumption up to 62% percent against a method that does not apply DVS. Heuristic methods obtain promising results when compared to optimal results generated by our ILP-based method.  相似文献   
17.
18.
There are many strengthening methods made with steel cross members for strengthening the structures with inadequate earthquake behavior. This type of strengthening methods is also effective in buckling of the cross members in the behavior of the structural frames. This buckling may cause partial or complete collapse of the structure. Thus, it is quite important to prevent and limit the formation of buckling in steel crosses. At the TEC 2018, the insulation unit is defined as the elements that can exhibit flexible behavior on the horizontal direction and rigid behavior on the vertical direction under the effect of earthquake loads. The basic principle of using insulation units is that these members can dissipate energy in the carrier system. The originality of this study is to experimentally investigate the damper behavior created by using cylindrical rubber wedges, which can be easily found in the automotive industry, in combination with steel plates and bolts. In this experimental study, the contribution of seismic insulators to the structural element to be strengthened was investigated. The insulators used in this study are considered by analogy with lead-core rubber insulators. As such seismic lead-core rubber insulators move under the influence of lateral loads, the lead core inside makes plastic deformation, thus increasing the damping rate. In this insulator study, it is aimed to use U plates or bolts instead of lead core. While vertical loads are covered by rubber support, horizontal loads will be damped due to plastic deformation of U plates or bolts. The five types of seismic dampers were used as 10 B-type rubber wedge mounted damper (SR), 2 U-type steel plates damper (SP), 10 M6 steel bolted damper (SB), 2 U-type steel plates and 10 B-type rubber wedge mounted damper (SPR), 10 M6 steel bolted, and 10 C-type rubber wedge mounted damper (SBR). These specimens were tested under lateral loading and constant vertical loading. The results obtained at the end of the tests shall be compared considering the strength, stiffness, and dissipated energy capacities of the specimens.  相似文献   
19.
In mobile sensor networks (MSNs), sensor data is generally transferred via mobile sensor nodes by multi-hop fashion. Because of the mobility of the nodes in the network, the efficient routing protocols are needed to ensure end-to-end route reliability while incurring minimal power consumption and packet delay. In this study, we developed a new routing protocol to meet these requirements for MSNs based on a cross-layer interaction among five reference layers (application, transport, network, MAC and physical). The proposed protocol primarily exploits the idea of interaction among these five layers all-in-one protocol. Its primary goals are (i) to discover the most reliable route in network, (ii) to sustain the route reliability and (iii) to be energy efficient and delay aware. It has been designed, modeled and simulated by using OPNET Modeler simulation software. The simulation results of the proposed protocol have been compared to three well known routing protocols (i.e., AODV, Leach-Mobile, CBR-Mobile). According to the obtained results, the proposed protocol outperforms its counterparts in terms of route reliability and end-to-end delay performances.  相似文献   
20.
Suleyman Karsli   《Renewable Energy》2007,32(10):1645-1660
This paper presents a performance analysis of four types of air heating flat plate solar collectors: a finned collector with an angle of 75°, a finned collector with an angle of 70°, a collector with tubes, and a base collector. In this study, the first and second laws of efficiencies were determined for the collectors and comparisons were made among them. The results showed that the efficiency depends on the solar radiation and the construction of the solar air collectors. The temperature rise varied almost linearly with the incident radiation. The first law of efficiency changed between 26% and 80% for collector-I, between 26% and 42% for collector-II, between 70% and 60% for collector-III, and between 26% and 64% for collector-IV. The values of second law efficiency varied from 0.27 to 0.64 for all collectors? The highest collector efficiency and air temperature rise were achieved by the finned collector with angle of 75°, whereas the lowest values were obtained for the base collector. The effectiveness order of the collectors was determined as the finned collector with angle of 75°, the finned collector with angle of 70°, the collector with tubes, and the base collector.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号