全文获取类型
收费全文 | 2232篇 |
免费 | 136篇 |
国内免费 | 14篇 |
专业分类
电工技术 | 52篇 |
综合类 | 7篇 |
化学工业 | 493篇 |
金属工艺 | 51篇 |
机械仪表 | 76篇 |
建筑科学 | 86篇 |
矿业工程 | 6篇 |
能源动力 | 188篇 |
轻工业 | 224篇 |
水利工程 | 17篇 |
石油天然气 | 23篇 |
无线电 | 260篇 |
一般工业技术 | 395篇 |
冶金工业 | 132篇 |
原子能技术 | 34篇 |
自动化技术 | 338篇 |
出版年
2024年 | 9篇 |
2023年 | 48篇 |
2022年 | 82篇 |
2021年 | 118篇 |
2020年 | 95篇 |
2019年 | 96篇 |
2018年 | 124篇 |
2017年 | 122篇 |
2016年 | 111篇 |
2015年 | 68篇 |
2014年 | 115篇 |
2013年 | 213篇 |
2012年 | 142篇 |
2011年 | 165篇 |
2010年 | 120篇 |
2009年 | 129篇 |
2008年 | 102篇 |
2007年 | 80篇 |
2006年 | 48篇 |
2005年 | 32篇 |
2004年 | 34篇 |
2003年 | 30篇 |
2002年 | 24篇 |
2001年 | 27篇 |
2000年 | 18篇 |
1999年 | 20篇 |
1998年 | 30篇 |
1997年 | 28篇 |
1996年 | 25篇 |
1995年 | 20篇 |
1994年 | 20篇 |
1993年 | 4篇 |
1992年 | 10篇 |
1991年 | 5篇 |
1990年 | 7篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 6篇 |
1985年 | 10篇 |
1984年 | 6篇 |
1983年 | 9篇 |
1982年 | 4篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1970年 | 1篇 |
排序方式: 共有2382条查询结果,搜索用时 15 毫秒
51.
This study proposes a two‐dimensional (2D) oscillator model of p53 network, which is derived via reducing the multidimensional two‐phase dynamics model into a model of ataxia telangiectasia mutated (ATM) and Wip1 variables, and studies the impact of p53‐regulators on cell fate decision. First, the authors identify a 6D core oscillator module, then reduce this module into a 2D oscillator model while preserving the qualitative behaviours. The introduced 2D model is shown to be an excitable relaxation oscillator. This oscillator provides a mechanism that leads diverse modes underpinning cell fate, each corresponding to a cell state. To investigate the effects of p53 inhibitors and the intrinsic time delay of Wip1 on the characteristics of oscillations, they introduce also a delay differential equation version of the 2D oscillator. They observe that the suppression of p53 inhibitors decreases the amplitudes of p53 oscillation, though the suppression increases the sustained level of p53. They identify Wip1 and P53DINP1 as possible targets for cancer therapies considering their impact on the oscillator, supported by biological findings. They model some mutations as critical changes of the phase space characteristics. Possible cancer therapeutic strategies are then proposed for preventing these mutations’ effects using the phase space approach.Inspec keywords: physiological models, cellular biophysics, cancer, difference equations, delays, enzymes, biochemistry, molecular biophysics, gamma‐rays, radiation therapyOther keywords: two‐phase dynamics model, P53 network, gamma irradiation, 2D relaxation oscillator model, ATM model, Wip1 variables, p53‐regulators, cell fate decision, excitable relaxation oscillator, Wip1 time delay, state‐dependent delay differential equation, cell cycle arrest, cell apoptosis, cancer therapies, Wip1 overexpression, Wip1 downregulation, ATM deficiency, Mdm2 overexpression, Mdm2 downregulation, mutation effects, phase space approach 相似文献
52.
Sajjad Ahmad Imran Raza M. Hasan Jamal Sirojiddin Djuraev Soojung Hur Imran Ashraf 《计算机、材料和连续体(英文)》2023,74(2):2363-2377
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes. 相似文献
53.
Shahad Alyousif Mohammed Dauwed Rafal Nader Mohammed Hasan Ali Mustafa Musa Jabar Ahmed Alkhayyat 《计算机、材料和连续体(英文)》2023,75(1):531-546
The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile devices. The computation latency can also be decreased by offloading computing duties to edge servers with a specific level of computing power. Device-to-device (D2D) collaboration can assist in processing small-scale activities that are time-sensitive in order to further reduce task delays. The task offloading performance is drastically reduced due to the variation of different performance capabilities of edge nodes. Therefore, this paper addressed this problem and proposed a new method for D2D communication. In this method, the time delay is reduced by enabling the edge nodes to exchange data samples. Simulation results show that the proposed algorithm has better performance than traditional algorithm. 相似文献
54.
Muhammad Aadil Siddiqui M. H. Md Khir Zaka Ullah Muath Al Hasan Abdul Saboor Saeed Ahmed Magsi 《计算机、材料和连续体(英文)》2023,75(2):2859-2871
One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness. The rapid and accurate identification mechanism for lard adulteration in meat products is highly necessary, for developing a mechanism trusted by consumers and that can be used to make a definitive diagnosis. Fourier Transform Infrared Spectroscopy (FTIR) is used in this work to identify lard adulteration in cow, lamb, and chicken samples. A simplified extraction method was implied to obtain the lipids from pure and adulterated meat. Adulterated samples were obtained by mixing lard with chicken, lamb, and beef with different concentrations (10%–50% v/v). Principal component analysis (PCA) and partial least square (PLS) were used to develop a calibration model at 800–3500 cm−1. Three-dimension PCA was successfully used by dividing the spectrum in three regions to classify lard meat adulteration in chicken, lamb, and beef samples. The corresponding FTIR peaks for the lard have been observed at 1159.6, 1743.4, 2853.1, and 2922.5 cm−1, which differentiate chicken, lamb, and beef samples. The wavenumbers offer the highest determination coefficient R2 value of 0.846 and lowest root mean square error of calibration (RMSEC) and root mean square error prediction (RMSEP) with an accuracy of 84.6%. Even the tiniest fat adulteration up to 10% can be reliably discovered using this methodology. 相似文献
55.
Sujan Kumar Roy Md. Khademul Islam Molla Keikichi Hirose Md. Kamrul Hasan 《International Journal of Speech Technology》2011,14(4):339-349
A novel and robust pitch estimation method is presented in this paper. The basic idea is to reshape the speech signal using
a combination of the dominant harmonic modification (DHM) and data adaptive time domain filtering techniques. The noisy speech
signal is filtered within the ranges of fundamental frequencies to obtain the pre-filtered signal (PFS). The dominant harmonic
(DH) of the PFS is determined and enhanced its amplitude. Normalized autocorrelation function (NACF) is applied to that modified
signal. Then empirical mode decomposition (EMD) based data adaptive time domain filtering is applied to the NACF signal. Partial
reconstruction is performed in EMD domain. The pitch period is determined from the partially reconstructed signal. The experimental
results show that the proposed method performs better than the other recently developed methods for noisy and clean speech
signals in terms of gross and fine pitch errors. 相似文献
56.
This paper presents a new algorithm for de-noising global positioning system (GPS) and inertial navigation system (INS) data and estimates the INS error using wavelet multi-resolution analysis algorithm (WMRA)-based genetic algorithm (GA) with a well-designed structure appropriate for practical and real time implementations because of its very short training time and elevated accuracy. Different techniques have been implemented to de-noise and estimate the INS and GPS errors. Wavelet de-noising is one of th... 相似文献
57.
In wireless communication reception, the reliability of orthogonal frequency division multiplexing (OFDM) is limited because of the time-varying nature of the channel. This causes inter-carrier interference (ICI) and increases inaccuracies in channel tracking. This can effectively be avoided at the cost of power loss and bandwidth expansion by inserting a cyclic prefix guard interval before each block of parallel data symbols. However, this guard interval decreases the spectral efficiency of the OFDM system as the corresponding amount. Recently, it was found that based on Haar-orthonormal wavelets, discrete wavelet-based OFDM (DWT-OFDM) is capable of reducing the inter symbol interference (ISI) and ICI, which are caused by the loss in orthogonality between the carriers. DWT-OFDM can also support much higher spectrum efficiency than discrete Fourier-based OFDM (DFT-OFDM). In this paper the DFT-OFDM is replaced by Multiwavelets OFDM (DMWT-OFDM) in order to further reduce the level of interference and increase spectral efficiency. It is found that proposed Multiwavelet design achieves much lower bit error rates, increases signal to noise power ratio (SNR), and can be used as an alternative to the conventional OFDM. The proposed OFDM system was modeled tested, and its performance was found under different channel conditions. 相似文献
58.
Multiobjective evolutionary clustering of Web user sessions: a case study in Web page recommendation
G. Nildem Demir A. Şima Uyar Şule Gündüz-Öğüdücü 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2010,14(6):579-597
In this study, we experiment with several multiobjective evolutionary algorithms to determine a suitable approach for clustering
Web user sessions, which consist of sequences of Web pages visited by the users. Our experimental results show that the multiobjective
evolutionary algorithm-based approaches are successful for sequence clustering. We look at a commonly used cluster validity
index to verify our findings. The results for this index indicate that the clustering solutions are of high quality. As a
case study, the obtained clusters are then used in a Web recommender system for representing usage patterns. As a result of
the experiments, we see that these approaches can successfully be applied for generating clustering solutions that lead to
a high recommendation accuracy in the recommender model we used in this paper. 相似文献
59.
In this paper we introduce a goal programming formulation for the multi-group classification problem. Although a great number of mathematical programming models for two-group classification problems have been proposed in the literature, there are few mathematical programming models for multi-group classification problems. Newly proposed multi-group mathematical programming model is compared with other conventional multi-group methods by using different real data sets taken from the literature and simulation data. A comparative analysis on the real data sets and simulation data shows that our goal programming formulation may suggest efficient alternative to traditional statistical methods and mathematical programming formulations for the multi-group classification problem. 相似文献
60.
Cellular automata are used to model dynamical phenomena by focusing on their local behavior which depends on the neighboring cells in order to express their global behavior. The geometrical structure of the models suggests the algebraic structure of cellular automata. After modeling the dynamical phenomena, it is sometimes an important problem to be able to move backwards in order to understand it better. This is only possible if cellular automata is reversible. In this paper, 2D finite cellular automata defined by local rules based on hexagonal cell structure are studied. Rule matrix of the hexagonal finite cellular automaton is obtained. The rank of rule matrices representing the 2D hexagonal finite cellular automata via an algorithm is computed. It is a well known fact that determining the reversibility of a 2D cellular automata is a very difficult problem in general. Here, the reversibility problem of this family of 2D hexagonal cellular automata is also resolved completely. 相似文献