全文获取类型
收费全文 | 188篇 |
免费 | 6篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 45篇 |
金属工艺 | 5篇 |
机械仪表 | 7篇 |
建筑科学 | 13篇 |
能源动力 | 22篇 |
轻工业 | 15篇 |
水利工程 | 2篇 |
无线电 | 12篇 |
一般工业技术 | 38篇 |
冶金工业 | 3篇 |
自动化技术 | 30篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 9篇 |
2020年 | 3篇 |
2019年 | 6篇 |
2018年 | 11篇 |
2017年 | 9篇 |
2016年 | 9篇 |
2015年 | 5篇 |
2014年 | 4篇 |
2013年 | 35篇 |
2012年 | 16篇 |
2011年 | 11篇 |
2010年 | 4篇 |
2009年 | 10篇 |
2008年 | 10篇 |
2007年 | 6篇 |
2006年 | 9篇 |
2005年 | 5篇 |
2004年 | 4篇 |
2003年 | 3篇 |
2002年 | 3篇 |
2001年 | 1篇 |
2000年 | 4篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1982年 | 3篇 |
1981年 | 1篇 |
排序方式: 共有194条查询结果,搜索用时 15 毫秒
11.
Synthesis and characterization of PMMA composites activated with starch for immobilization of L‐asparaginase 下载免费PDF全文
Poly (methyl methacrylate) (PMMA)–starch composites were prepared by emulsion polymerization technique for L‐asparaginase (L‐ASNase) immobilization as highly activated support. The hydroxide groups on the prepared composites offer a very simple, mild and firm combination for enzyme immobilization. The pure PMMA and PMMA‐starch composites were characterized as structural, thermal and morphological. PMMA‐starch composites were found to have better thermal stability and more hydrophilic character than pure PMMA. L‐ASNase was immobilized onto PMMA‐starch composites contained the different ratio of starch (1, 3, 5, and 10 wt %). Immobilized L‐ASNase showed better performance as compared to the native enzyme in terms of thermal stability and pH. Km value of immobilized enzyme decreased approximately eightfold compared with the native enzyme. In addition to, immobilized L‐ASNase was found to retain 60% of activity after 1‐month storage period at 4 °C. Therefore, PMMA‐starch composites can be provided more advantageous in terms of enzymatic affinity, thermal, pH and storage stability as L‐ASNase immobilization matrix. © 2016 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2016 , 133, 43421. 相似文献
12.
Davinder Kaur Suleyman Uslu Mimoza Durresi Arjan Durresi 《Computational Intelligence》2024,40(1):e12618
This study introduces a comprehensive framework designed for detecting and mitigating fake and potentially threatening user communities within 5G social networks. Leveraging geo-location data, community trust dynamics, and AI-driven community detection algorithms, this framework aims to pinpoint users posing potential harm. Including an artificial control model facilitates the selection of suitable community detection algorithms, coupled with a trust-based strategy to effectively identify and filter potential attackers. A distinctive feature of this framework lies in its ability to consider attributes that prove challenging for malicious users to emulate, such as the established trust within the community, geographical location, and adaptability to diverse attack scenarios. To validate its efficacy, we illustrate the framework using synthetic social network data, demonstrating its ability to distinguish potential malicious users from trustworthy ones. 相似文献
13.
The consumer decision process is a widely accepted model covering consumer activities, and accordingly contains five interrelated stages: problem recognition, information search, evaluation of alternatives, purchase, and post-purchase evaluation. In order to help consumers deal with challenges associated with all these stages, mobile information systems bring significant capabilities, as in other application domains. However, related prior research is mostly restricted to the individual stages of the process. Since the stages are interrelated, and the data collected in one are also valuable for another, we propose a mobile framework designed to provide assistance in all stages of the Consumer Decision Process, named MobileCDP. A prototype is also implemented and evaluated to show the applicability of the framework. Experiments show that the functions provided by the prototype are useful, well integrated, and easy to use. Moreover, statistical analysis of the results proves that the prototype reduces time, costs, and cognitive effort of the user. 相似文献
14.
Hiding biometric data 总被引:5,自引:0,他引:5
Jain A.K. Uludag U. 《IEEE transactions on pattern analysis and machine intelligence》2003,25(11):1494-1498
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of security/integrity of biometric data extremely critical. We introduce two applications of an amplitude modulation-based watermarking method, in which we hide a user's biometric data in a variety of images. This method has the ability to increase the security of both the hidden biometric data (e.g., eigen-face coefficients) and host images (e.g., fingerprints). Image adaptive data embedding methods used in our scheme lead to low visibility of the embedded signal. Feature analysis of host images guarantees high verification accuracy on watermarked (e.g., fingerprint) images. 相似文献
15.
In this study, an automated adaptive mesh control scheme, based on local mesh modifications, is developed for the finite element
simulations of 3D metal-forming processes. Error indicators are used to control the mesh discretization errors, and an h-adaptive procedure is conducted. The mesh size field used in the h-adaptive procedure is processed to control the discretization and geometric approximation errors of the evolving workpiece
mesh. Industrial problems are investigated to demonstrate the capabilities of the developed scheme. 相似文献
16.
Suleyman Tosun 《The Journal of supercomputing》2012,62(1):265-289
Scheduling periodic tasks onto a multiprocessor architecture under several constraints such as performance, cost, energy, and reliability is a major challenge in embedded systems. In this paper, we present an Integer Linear Programming (ILP) based framework that maps a given task set onto an Heterogeneous Multiprocessor System-on-Chip (HMPSoC) architecture. Our framework can be used with several objective functions; minimizing energy consumption, minimizing cost (i.e., the number of heterogeneous processors), and maximizing reliability of the system under performance constraints. We use Dynamic Voltage Scaling (DVS) for reducing energy consumption while we employ task duplication to maximize reliability. We illustrate the effectiveness of our approach through several experiments, each with a different number of tasks to be scheduled. We also propose two heuristics based on Earliest Deadline First (EDF) algorithm for minimizing energy under performance and cost constraints. Our experiments on generated task sets show that ILP-based method reduces the energy consumption up to 62% percent against a method that does not apply DVS. Heuristic methods obtain promising results when compared to optimal results generated by our ILP-based method. 相似文献
17.
18.
Fatih Suleyman Balik Fatih Bahadir 《The Structural Design of Tall and Special Buildings》2023,32(13):e2044
There are many strengthening methods made with steel cross members for strengthening the structures with inadequate earthquake behavior. This type of strengthening methods is also effective in buckling of the cross members in the behavior of the structural frames. This buckling may cause partial or complete collapse of the structure. Thus, it is quite important to prevent and limit the formation of buckling in steel crosses. At the TEC 2018, the insulation unit is defined as the elements that can exhibit flexible behavior on the horizontal direction and rigid behavior on the vertical direction under the effect of earthquake loads. The basic principle of using insulation units is that these members can dissipate energy in the carrier system. The originality of this study is to experimentally investigate the damper behavior created by using cylindrical rubber wedges, which can be easily found in the automotive industry, in combination with steel plates and bolts. In this experimental study, the contribution of seismic insulators to the structural element to be strengthened was investigated. The insulators used in this study are considered by analogy with lead-core rubber insulators. As such seismic lead-core rubber insulators move under the influence of lateral loads, the lead core inside makes plastic deformation, thus increasing the damping rate. In this insulator study, it is aimed to use U plates or bolts instead of lead core. While vertical loads are covered by rubber support, horizontal loads will be damped due to plastic deformation of U plates or bolts. The five types of seismic dampers were used as 10 B-type rubber wedge mounted damper (SR), 2 U-type steel plates damper (SP), 10 M6 steel bolted damper (SB), 2 U-type steel plates and 10 B-type rubber wedge mounted damper (SPR), 10 M6 steel bolted, and 10 C-type rubber wedge mounted damper (SBR). These specimens were tested under lateral loading and constant vertical loading. The results obtained at the end of the tests shall be compared considering the strength, stiffness, and dissipated energy capacities of the specimens. 相似文献
19.
Suleyman Cakici Ismail Erturk Sedat Atmaca Alper Karahan 《Wireless Personal Communications》2014,77(3):2235-2254
In mobile sensor networks (MSNs), sensor data is generally transferred via mobile sensor nodes by multi-hop fashion. Because of the mobility of the nodes in the network, the efficient routing protocols are needed to ensure end-to-end route reliability while incurring minimal power consumption and packet delay. In this study, we developed a new routing protocol to meet these requirements for MSNs based on a cross-layer interaction among five reference layers (application, transport, network, MAC and physical). The proposed protocol primarily exploits the idea of interaction among these five layers all-in-one protocol. Its primary goals are (i) to discover the most reliable route in network, (ii) to sustain the route reliability and (iii) to be energy efficient and delay aware. It has been designed, modeled and simulated by using OPNET Modeler simulation software. The simulation results of the proposed protocol have been compared to three well known routing protocols (i.e., AODV, Leach-Mobile, CBR-Mobile). According to the obtained results, the proposed protocol outperforms its counterparts in terms of route reliability and end-to-end delay performances. 相似文献
20.
This paper presents a performance analysis of four types of air heating flat plate solar collectors: a finned collector with an angle of 75°, a finned collector with an angle of 70°, a collector with tubes, and a base collector. In this study, the first and second laws of efficiencies were determined for the collectors and comparisons were made among them. The results showed that the efficiency depends on the solar radiation and the construction of the solar air collectors. The temperature rise varied almost linearly with the incident radiation. The first law of efficiency changed between 26% and 80% for collector-I, between 26% and 42% for collector-II, between 70% and 60% for collector-III, and between 26% and 64% for collector-IV. The values of second law efficiency varied from 0.27 to 0.64 for all collectors? The highest collector efficiency and air temperature rise were achieved by the finned collector with angle of 75°, whereas the lowest values were obtained for the base collector. The effectiveness order of the collectors was determined as the finned collector with angle of 75°, the finned collector with angle of 70°, the collector with tubes, and the base collector. 相似文献