首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   584篇
  免费   46篇
  国内免费   4篇
电工技术   25篇
化学工业   134篇
金属工艺   24篇
机械仪表   18篇
建筑科学   7篇
矿业工程   1篇
能源动力   39篇
轻工业   43篇
水利工程   3篇
石油天然气   3篇
无线电   69篇
一般工业技术   101篇
冶金工业   21篇
原子能技术   15篇
自动化技术   131篇
  2024年   3篇
  2023年   17篇
  2022年   30篇
  2021年   62篇
  2020年   31篇
  2019年   32篇
  2018年   51篇
  2017年   34篇
  2016年   40篇
  2015年   24篇
  2014年   31篇
  2013年   42篇
  2012年   27篇
  2011年   33篇
  2010年   26篇
  2009年   17篇
  2008年   18篇
  2007年   12篇
  2006年   19篇
  2005年   13篇
  2004年   3篇
  2003年   6篇
  2002年   5篇
  2001年   2篇
  2000年   7篇
  1999年   2篇
  1998年   5篇
  1997年   7篇
  1996年   7篇
  1995年   5篇
  1994年   9篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1989年   1篇
  1986年   1篇
  1983年   2篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1975年   1篇
排序方式: 共有634条查询结果,搜索用时 10 毫秒
1.
2.
In compressive sampling theory, the least absolute shrinkage and selection operator (LASSO) is a representative problem. Nevertheless, the non-differentiable constraint impedes the use of Lagrange programming neural networks (LPNNs). We present in this article the -LPNN model, a novel algorithm that tackles the LASSO minimization together with the underlying theory support. First, we design a sequence of smooth constrained optimization problems, by introducing a convenient differentiable approximation to the non-differentiable -norm constraint. Next, we prove that the optimal solutions of the regularized intermediate problems converge to the optimal sparse signal for the LASSO. Then, for every regularized problem from the sequence, the -LPNN dynamic model is derived, and the asymptotic stability of its equilibrium state is established as well. Finally, numerical simulations are carried out to compare the performance of the proposed -LPNN algorithm with both the LASSO-LPNN model and a standard digital method.  相似文献   
3.
Best Estimate computer codes have been, so far, developed for safety analysis of nuclear power plants and were extensively validated against a large set of separate effects and integral test facilities experimental data relevant to such kind of reactors. Their application to research reactors is not fully straightforward. Modelling problems generally emerge when applying existing models to low pressure and more particularly to subcooled flow boiling situations. The objective of the present work is to investigate the RELAP5/3.2 system code capabilities in predicting phenomena that could be encountered under abnormal research reactor’s operating conditions. For this purpose, the separate effect related to the static onset of flow instability is investigated. The cases considered herein are the flow excursion tests performed at the Oak Ridge National Laboratory thermal hydraulic test loop (THTL) as well as some representative Whittle and Forgan (W & F) experiments. The simulation results are presented and the capabilities of RELAP5/Mod 3.2 in predicting this critical phenomenon are discussed.  相似文献   
4.
The LiPO3-Y(PO3)3 system has been studied for the first time. Microdifferential thermal analysis (μ-DTA), infrared spectroscopy (IR) and X-ray diffraction were used to investigate the liquidus and solidus relations. The only new compound observed within this system is LiY(PO3)4, melting incongruently at 1104 K. An eutectic appears at 4±1 mol% Y(PO3)3 at 933 K. LiY(PO3)4 crystallizes in the monoclinic system C2/c with a unit cell: a=16.201(4) Å, b=7.013(2) Å, c=9.573(2) Å, β=125.589(9)°, Z=4 and V=884.5 Å3, which is isostructural to LiNd(PO3)4. The infrared absorption spectrum indicates that this salt is a chain polyphosphate.  相似文献   
5.
Conventional enzyme-linked immunosorbent assay (ELISA) is a gold standard for screening antibodies and testing for protein or antigen presence. A significant limitation of this assay resides in the fact that only one analyte can be assessed per microplate well. Here, we describe and investigate a new technology consisting of an automated ELISA system in which up to 10 analytes can be measured within one single well, thus improving productivity, accuracy, and repeatability by reducing the amount of human labor required. Another strength of the platform is that a user can load any necessary sets/subsets of beads to perform required assays, with improved flexibility compared to manufactured-loaded arrays for multiplex analysis. We also demonstrate that this system can be used to determine the pathogenicity (i.e., presence of Shiga toxins) and serotype (i.e., Escherichia coli O157) of E. coli isolates.  相似文献   
6.
Iron-silicide was produced with a mechanical alloying process and consolidated through vacuum hot pressing. The as-milled powders were of metastable state and fully transformed into the ß-FeSi2 phase through subsequent isothermal annealing. The as-consolidated iron silicides consisted of an untransformed mixture of α-Fe2Si5 and ?-FeSi phases and a partially transformed β-FeSi2 phase was found in the low density compact. Isothermal annealing was carried out to induce transformation into a thermoelectric semiconducting β-FeSi2 phase. The transformation behavior of the β-FeSi2 was investigated utilizing DTA, SEM, and XRD analyses. Isothermal annealing at 830°C in vacuum led to a thermoelectric semiconducting β-FeSi2 phase transformation, but some residual metallic α and ?-phases were unavoidable even after 96 hours of annealing. The iron silicide microstructures were investigated using SEM and TEM. The mechanical and thermoelectric properties of the β-FeSi2 materials before and after isothermal annealing are characterized in this study.  相似文献   
7.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious.  相似文献   
8.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
9.
The Resource Constrained Project Scheduling Problem is one of the most intensively investigated scheduling problems. It requires scheduling a set of interrelated activities, while considering precedence relationships, and limited renewable resources allocation. The objective is to minimize the project duration. We propose a new destructive lower bound for this challenging ${\mathcal {NP}}$ -hard problem. Starting from a previously suggested LP model, we propose several original valid inequalities that aim at tightening the model representation. These new inequalities are based on precedence constraints, incompatible activity subsets, and nonpreemption constraints. We present the results of an extensive computational study that was carried out on 2,040 benchmark instances of PSPLIB, with up to 120 activities, and that provide strong evidence that the new proposed lower bound exhibits an excellent performance. In particular, we report the improvement of the best known lower bounds of 5 instances.  相似文献   
10.
Multimedia Tools and Applications - The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services....  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号