全文获取类型
收费全文 | 380篇 |
免费 | 14篇 |
专业分类
电工技术 | 10篇 |
综合类 | 1篇 |
化学工业 | 69篇 |
金属工艺 | 6篇 |
机械仪表 | 7篇 |
建筑科学 | 12篇 |
能源动力 | 8篇 |
轻工业 | 14篇 |
无线电 | 70篇 |
一般工业技术 | 86篇 |
冶金工业 | 56篇 |
原子能技术 | 2篇 |
自动化技术 | 53篇 |
出版年
2024年 | 3篇 |
2023年 | 7篇 |
2022年 | 12篇 |
2021年 | 15篇 |
2020年 | 14篇 |
2019年 | 12篇 |
2018年 | 17篇 |
2017年 | 11篇 |
2016年 | 12篇 |
2015年 | 10篇 |
2014年 | 9篇 |
2013年 | 16篇 |
2012年 | 7篇 |
2011年 | 17篇 |
2010年 | 10篇 |
2009年 | 18篇 |
2008年 | 11篇 |
2007年 | 10篇 |
2006年 | 13篇 |
2005年 | 11篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 3篇 |
2001年 | 8篇 |
2000年 | 6篇 |
1999年 | 9篇 |
1998年 | 13篇 |
1997年 | 13篇 |
1996年 | 12篇 |
1995年 | 11篇 |
1994年 | 6篇 |
1993年 | 4篇 |
1992年 | 9篇 |
1991年 | 5篇 |
1990年 | 8篇 |
1989年 | 6篇 |
1988年 | 7篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1983年 | 4篇 |
1982年 | 1篇 |
1980年 | 2篇 |
1979年 | 7篇 |
1978年 | 2篇 |
1976年 | 4篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1970年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有394条查询结果,搜索用时 0 毫秒
391.
Anjan Gudigar U. Raghavendra Tejaswi N. Rao Jyothi Samanth Venkatesan Rajinikanth Suresh Chandra Satapathy Edward J. Ciaccio Chan Wai Yee U. Rajendra Acharya 《International journal of imaging systems and technology》2023,33(2):483-494
Intracranial tumors arise from constituents of the brain and its meninges. Glioblastoma (GBM) is the most common adult primary intracranial neoplasm and is categorized as high-grade astrocytoma according to the World Health Organization (WHO). The survival rate for 5 and 10 years after diagnosis is under 10%, contributing to its grave prognosis. Early detection of GBM enables early intervention, prognostication, and treatment monitoring. Computer-aided diagnostics (CAD) is a computerized process that helps to differentiate between GBM and low-grade gliomas (LGG), using the perceptible analysis of magnetic resonance (MR) of the brain. This study proposes a framework consisting of a feature fusion algorithm with cascaded autoencoders (CAEs), referred to as FFCAEs. Here we utilized two CAEs and extracted the relevant features from multiple CAEs. Inspired by the existing work on fusion algorithms, the obtained features are then fused by using a novel fusion algorithm. Finally, the resultant fused features are classified with the Softmax classifier to arrive at an average classification accuracy of 96.7%, which is 2.45% more than the previously best-performing model. The method is shown to be efficacious thus, it can be useful as a utility program for doctors. 相似文献
392.
V. Gopalan S. Rajarajan M. Wilson J. Venkatesan M. Elango S. Natarajan S. Rajakumar 《Materialwissenschaft und Werkstofftechnik》2023,54(2):215-228
In the past years studies were conducted on natural fibre reinforced polymer composites to observe their mechanical properties in order to decide their industrial applications. These composites have already been used in many applications from aerospace to sporting equipment. These green composites can be used as a replacement for synthetic composites. This is because the natural fibres are eco-friendly, biodegradable, renewable, etc. In this work, an attempt is made to reinforce fly ash, coir fibre and sugarcane fibre with epoxy polymer matrix. Central composite design under response surface methodology (RSM), one of the approaches of design of experiments (DOE) is used to determine optimum sample preparation conditions of fly ash, coir fibre and sugarcane fibre. Both tensile and flexural (three-point bending) tests are conducted on these fabricated composites to determine their materialistic characteristics. Analysis of variance (ANOVA) is carried out using Minitab software to find the influence of fly ash, coir fibre, sugarcane fibre on composites. Regression equations obtained from analysis of variance is used to calculate values. Experimental and calculated values are compared and their error % are calculated and tabulated. Response surface optimization study is carried to find the optimized parameters of composites. It is observed that, increase in wt.% of coir fibre and decrease in wt.% of fly ash and sugarcane fibre, increases yield stress and these parameters have mixed impact on ultimate tensile stress. The addition of fly ash, coir fibre and sugarcane fibre in low percentages increases Young's modulus. Increase in wt.% of fly ash and coir fibre and decrease in wt.% of sugarcane, increases flexural modulus and flexural stress. 相似文献
393.
This research investigates the controllability of linear and non-linear fractional dynamical systems with distributed delays in control using the -Caputo fractional derivative. For controllability of linear systems, the positive definiteness of Grammian matrix, which is characterized by Mittag–Leffler functions, is used to provide necessary and sufficient conditions. For the controllability of non-linear systems, the iterative technique with the completeness of is used to obtain sufficient conditions. Using the -Caputo fractional derivative, this study is new since it investigates the ideas of controllability. A couple of numerical results are offered to explain the theoretical results. 相似文献
394.
Jaya Singh Ashish Gimekar Subramanian Venkatesan 《International Journal of Communication Systems》2023,36(12):e4189
Internet of Things (IoT) specifies a transparent and coherent integration of assorted and composite nodes. Unification of these nodes with large resources and servers has brought advancement in technology for industrial and government services. The industrial IoT (IIoT), with smart nodes, enhance the development and manufacturing of industrial process, which is on demand now. However, the security concern is substantial, and it is required to control to perform prosperous assimilation of IIoT. Authentication of these smart nodes and establishing mutual trust among them is essential to keep vulnerabilities and potential risks out. Hence, this paper presents an efficient lightweight secure authentication protocol from the perspective of human-centered IIoT. This proposed scheme assumes a registration center which simply generates public and secret information for a node when it initially joins the network. Once registration is done, the registration center is not needed anymore, and advanced processes like mutual authentication, secure key exchange, and communications are independently done by nodes involved. Furthermore, we show that this scheme can reduce exponential computations and computational overhead and resolves various possible attacks. 相似文献