全文获取类型
收费全文 | 584篇 |
免费 | 46篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 25篇 |
化学工业 | 134篇 |
金属工艺 | 24篇 |
机械仪表 | 18篇 |
建筑科学 | 7篇 |
矿业工程 | 1篇 |
能源动力 | 39篇 |
轻工业 | 43篇 |
水利工程 | 3篇 |
石油天然气 | 3篇 |
无线电 | 69篇 |
一般工业技术 | 101篇 |
冶金工业 | 21篇 |
原子能技术 | 15篇 |
自动化技术 | 131篇 |
出版年
2024年 | 3篇 |
2023年 | 17篇 |
2022年 | 30篇 |
2021年 | 62篇 |
2020年 | 31篇 |
2019年 | 32篇 |
2018年 | 51篇 |
2017年 | 34篇 |
2016年 | 40篇 |
2015年 | 24篇 |
2014年 | 31篇 |
2013年 | 42篇 |
2012年 | 27篇 |
2011年 | 33篇 |
2010年 | 26篇 |
2009年 | 17篇 |
2008年 | 18篇 |
2007年 | 12篇 |
2006年 | 19篇 |
2005年 | 13篇 |
2004年 | 3篇 |
2003年 | 6篇 |
2002年 | 5篇 |
2001年 | 2篇 |
2000年 | 7篇 |
1999年 | 2篇 |
1998年 | 5篇 |
1997年 | 7篇 |
1996年 | 7篇 |
1995年 | 5篇 |
1994年 | 9篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1986年 | 1篇 |
1983年 | 2篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1975年 | 1篇 |
排序方式: 共有634条查询结果,搜索用时 10 毫秒
1.
2.
Anis Zeglaoui Anouar Houmia Maher Mejai Radhouane Aloui 《International Journal of Adaptive Control and Signal Processing》2021,35(9):1842-1859
In compressive sampling theory, the least absolute shrinkage and selection operator (LASSO) is a representative problem. Nevertheless, the non-differentiable constraint impedes the use of Lagrange programming neural networks (LPNNs). We present in this article the -LPNN model, a novel algorithm that tackles the LASSO minimization together with the underlying theory support. First, we design a sequence of smooth constrained optimization problems, by introducing a convenient differentiable approximation to the non-differentiable -norm constraint. Next, we prove that the optimal solutions of the regularized intermediate problems converge to the optimal sparse signal for the LASSO. Then, for every regularized problem from the sequence, the -LPNN dynamic model is derived, and the asymptotic stability of its equilibrium state is established as well. Finally, numerical simulations are carried out to compare the performance of the proposed -LPNN algorithm with both the LASSO-LPNN model and a standard digital method. 相似文献
3.
Best Estimate computer codes have been, so far, developed for safety analysis of nuclear power plants and were extensively validated against a large set of separate effects and integral test facilities experimental data relevant to such kind of reactors. Their application to research reactors is not fully straightforward. Modelling problems generally emerge when applying existing models to low pressure and more particularly to subcooled flow boiling situations. The objective of the present work is to investigate the RELAP5/3.2 system code capabilities in predicting phenomena that could be encountered under abnormal research reactor’s operating conditions. For this purpose, the separate effect related to the static onset of flow instability is investigated. The cases considered herein are the flow excursion tests performed at the Oak Ridge National Laboratory thermal hydraulic test loop (THTL) as well as some representative Whittle and Forgan (W & F) experiments. The simulation results are presented and the capabilities of RELAP5/Mod 3.2 in predicting this critical phenomenon are discussed. 相似文献
4.
The LiPO3-Y(PO3)3 system has been studied for the first time. Microdifferential thermal analysis (μ-DTA), infrared spectroscopy (IR) and X-ray diffraction were used to investigate the liquidus and solidus relations. The only new compound observed within this system is LiY(PO3)4, melting incongruently at 1104 K. An eutectic appears at 4±1 mol% Y(PO3)3 at 933 K. LiY(PO3)4 crystallizes in the monoclinic system C2/c with a unit cell: a=16.201(4) Å, b=7.013(2) Å, c=9.573(2) Å, β=125.589(9)°, Z=4 and V=884.5 Å3, which is isostructural to LiNd(PO3)4. The infrared absorption spectrum indicates that this salt is a chain polyphosphate. 相似文献
5.
Clotilde LM Bernard C Sequera DE Karmali A Fusellier A Carter JM 《Journal of laboratory automation》2012,17(4):309-314
Conventional enzyme-linked immunosorbent assay (ELISA) is a gold standard for screening antibodies and testing for protein or antigen presence. A significant limitation of this assay resides in the fact that only one analyte can be assessed per microplate well. Here, we describe and investigate a new technology consisting of an automated ELISA system in which up to 10 analytes can be measured within one single well, thus improving productivity, accuracy, and repeatability by reducing the amount of human labor required. Another strength of the platform is that a user can load any necessary sets/subsets of beads to perform required assays, with improved flexibility compared to manufactured-loaded arrays for multiplex analysis. We also demonstrate that this system can be used to determine the pathogenicity (i.e., presence of Shiga toxins) and serotype (i.e., Escherichia coli O157) of E. coli isolates. 相似文献
6.
Iron-silicide was produced with a mechanical alloying process and consolidated through vacuum hot pressing. The as-milled powders were of metastable state and fully transformed into the ß-FeSi2 phase through subsequent isothermal annealing. The as-consolidated iron silicides consisted of an untransformed mixture of α-Fe2Si5 and ?-FeSi phases and a partially transformed β-FeSi2 phase was found in the low density compact. Isothermal annealing was carried out to induce transformation into a thermoelectric semiconducting β-FeSi2 phase. The transformation behavior of the β-FeSi2 was investigated utilizing DTA, SEM, and XRD analyses. Isothermal annealing at 830°C in vacuum led to a thermoelectric semiconducting β-FeSi2 phase transformation, but some residual metallic α and ?-phases were unavoidable even after 96 hours of annealing. The iron silicide microstructures were investigated using SEM and TEM. The mechanical and thermoelectric properties of the β-FeSi2 materials before and after isothermal annealing are characterized in this study. 相似文献
7.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious. 相似文献
8.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent. 相似文献
9.
The Resource Constrained Project Scheduling Problem is one of the most intensively investigated scheduling problems. It requires scheduling a set of interrelated activities, while considering precedence relationships, and limited renewable resources allocation. The objective is to minimize the project duration. We propose a new destructive lower bound for this challenging ${\mathcal {NP}}$ -hard problem. Starting from a previously suggested LP model, we propose several original valid inequalities that aim at tightening the model representation. These new inequalities are based on precedence constraints, incompatible activity subsets, and nonpreemption constraints. We present the results of an extensive computational study that was carried out on 2,040 benchmark instances of PSPLIB, with up to 120 activities, and that provide strong evidence that the new proposed lower bound exhibits an excellent performance. In particular, we report the improvement of the best known lower bounds of 5 instances. 相似文献
10.
Rehman Hafeez Ur Ghani Anwar Chaudhry Shehzad Ashraf Alsharif Mohammed H. Nabipour Narjes 《Multimedia Tools and Applications》2021,80(11):16907-16931
Multimedia Tools and Applications - The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services.... 相似文献