首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   369篇
  免费   18篇
  国内免费   1篇
电工技术   5篇
综合类   1篇
化学工业   65篇
金属工艺   9篇
机械仪表   8篇
建筑科学   12篇
能源动力   22篇
轻工业   21篇
无线电   44篇
一般工业技术   90篇
冶金工业   19篇
原子能技术   3篇
自动化技术   89篇
  2024年   4篇
  2023年   19篇
  2022年   19篇
  2021年   23篇
  2020年   25篇
  2019年   17篇
  2018年   15篇
  2017年   29篇
  2016年   16篇
  2015年   12篇
  2014年   18篇
  2013年   39篇
  2012年   15篇
  2011年   28篇
  2010年   11篇
  2009年   17篇
  2008年   16篇
  2007年   18篇
  2006年   8篇
  2005年   11篇
  2004年   5篇
  2003年   4篇
  2002年   2篇
  2000年   1篇
  1999年   2篇
  1998年   2篇
  1997年   3篇
  1996年   3篇
  1995年   5篇
  1994年   1篇
排序方式: 共有388条查询结果,搜索用时 13 毫秒
321.
The ball indentation technique based on deforming a material with a spherical indenter is an useful non-destructive tool for evaluating mechanical properties from a very small volume of material. In this work, the indentation test carried out using a 1.0 mm diameter tungsten carbide ball to penetration depths of around 100–200 μm is modeled using finite element (FE) method and analyzed for three steels having different yield stress and strain hardening exponent. The FE generated load–depth curve is compared and verified with the experimental load–depth data for the three materials. The role of the contact friction at the indenter–specimen interface on both the load—depth plot and indentation profile are examined. The development of pile-up/sink-in during indentation and its dependence on strain hardening characteristics of the material, contact friction and indentation depth are analyzed using the FE model. The indentation profiles obtained from simulation are compared with experimental profiles and the implication of pile-up phenomenon on accurate evaluation of stress–strain values from the experimental indentation load–depth data is discussed.  相似文献   
322.
Cutting fluids play a significant role in machining operations, impact shop productivity, tool life and quality of work. The reduction in the consumption rate of the cutting fluid leads to the minimization of production cost and environmental hazards. This could be achieved by the enhancement of its thermal and tribological properties with the inclusion of suitable additives in the cutting fluid. In recent years various nanoparticles were used as additives in the conventional cutting fluid to enhance its properties. In the present work, silver nanoparticles was synthesized, characterized, dispersed in cutting fluid and experimented in a turning operation. Heat carrying capacities of the cutting fluid, cutting forces during machining process and surface finish of the work piece were assessed by suitable instruments for cutting fluids with and without silver nanoparticles under different machining conditions. From the experimental results, it was observed that inclusion of silver nanoparticles in cutting fluid showed a significant reduction in tool tip temperature, cutting force and surface roughness of the work piece.  相似文献   
323.
The mechanism of fiber length degradation during twin screw extrusion compounding and methods to reduce it through process and machine design are extremely important in discontinuous fiber reinforced composites. Fiber damage along the screw and the extruder die are determined for three screw designs with different mixing sections. The pellet quality, wet-out, and fiber dispersion in the extruded strands are compared. The fiber orientation distributions in the screw are determined to identify regions of higher fiber interaction. The fiber damage during subsequent injection molding has also been determined. The tensile, flexural, and impact properties of the tensile bars are compared. It is found that the residence time, fill-up, and the intesity of mixing during extrusion compounding have a predominant effect on fiber length degradation. The screw designs were seen to have a greater effect on the fiber damage in the 40 wt% glass-filled polymer than the 30 wt% glass-filled polymer. However, the mechanical properties of the 30 wt% glass-filled polymer showed an increasing trend compared to the 40 wt% glass filled polymer. A screw design that provides a balance of the fiber length, wet-out, and fiber dispersion was noted to give consistent mechanical properties.  相似文献   
324.
Frequent hemodialysis is associated with increased vascular access adverse events. We hypothesized that bacteremia would be more frequent in patients with central venous catheter (CVC) than arteriovenous fistula or arteriovenous graft (AVF/AVG) in nocturnal home hemodialysis (NHHD). We reviewed blood culture reports and concurrent clinical data for a cohort of one hundred eighty‐seven NHHD patients between January 1, 2006 and June 30, 2012. The primary outcome was time to first bacteremia, technique failure, or death after commencing NHHD. Types of bacteremia and clinical consequences were analyzed. Analyses were adjusted for a priori defined confounders. One hundred eighty‐seven patients were included with a total follow up of six hundred five patient years. Initial vascular access was AVF in seventy‐eight (42%) patients, AVG in eleven (6%) patients, and CVC in ninety‐eight (52%) patients. A total of 79.3% of patients with a CVC reached the composite endpoint of bacteremia, technique failure, or death in the study period; 44.5% of patients with an AVF or AVG reached this composite endpoint. Adjusted time to first bacteremia, technique failure, or death was significantly shorter in patients with initial CVC access (hazard ratio 2.42, 95% confidence interval 1.50–3.90, p < 0.001). Risk factors for bacteremia were comorbid status quantified by the Charlson Comorbidity Index (p < 0.001) and diabetes (p < 0.001). Coagulase negative staphylococcus was the commonest organism cultured accounting for 51.4% bacteremias. The second commonest organism was staphylococcus aureus (20.3% bacteremias). Patients undergoing NHHD with a CVC have a shorter duration to first infection, technique failure, or death than those with permanent vascular access.  相似文献   
325.
The autonomous driving aims at ensuring the vehicle to effectively sense the environment and use proper strategies to navigate the vehicle without the interventions of humans. Hence, there exist a prediction of the background scenes and that leads to discontinuity between the predicted and planned outputs. An optimal prediction engine is required that suitably reads the background objects and make optimal decisions. In this paper, the author(s) develop an autonomous model for vehicle driving using ensemble model for large Sport Utility Vehicles (SUVs) that uses three different modules involving (a) recognition model, (b) planning model and (c) prediction model. The study develops a direct realization method for an autonomous vehicle driving. The direct realization method is designed as a behavioral model that incorporates three different modules to ensure optimal autonomous driving. The behavioral model includes recognition, planning and prediction modules that regulates the input trajectory processing of input video datasets. A deep learning algorithm is used in the proposed approach that helps in the classification of known or unknown objects along the line of sight. This model is compared with conventional deep learning classifiers in terms of recall rate and root mean square error (RMSE) to estimate its efficacy. Simulation results on different traffic environment shows that the Ensemble Convolutional Network Reinforcement Learning (E-CNN-RL) offers increased accuracy of 95.45%, reduced RMSE and increased recall rate than existing Ensemble Convolutional Neural Networks (CNN) and Ensemble Stacked CNN.  相似文献   
326.
Intrusion detection systems (IDS) are one of the most promising ways for securing data and networks; In recent decades, IDS has used a variety of categorization algorithms. These classifiers, on the other hand, do not work effectively unless they are combined with additional algorithms that can alter the classifier’s parameters or select the optimal sub-set of features for the problem. Optimizers are used in tandem with classifiers to increase the stability and with efficiency of the classifiers in detecting invasion. These algorithms, on the other hand, have a number of limitations, particularly when used to detect new types of threats. In this paper, the NSL KDD dataset and KDD Cup 99 is used to find the performance of the proposed classifier model and compared; These two IDS dataset is preprocessed, then Auto Cryptographic Denoising (ACD) adopted to remove noise in the feature of the IDS dataset; the classifier algorithms, K-Means and Neural network classifies the dataset with adam optimizer. IDS classifier is evaluated by measuring performance measures like f-measure, recall, precision, detection rate and accuracy. The neural network obtained the highest classifying accuracy as 91.12% with drop-out function that shows the efficiency of the classifier model with drop-out function for KDD Cup99 dataset. Explaining their power and limitations in the proposed methodology that could be used in future works in the IDS area.  相似文献   
327.
In recent scenario of Wireless Sensor Networks (WSNs), there are many application developed for handling sensitive and private data such as military information, surveillance data, tracking, etc. Hence, the sensor nodes of WSNs are distributed in an intimidating region, which is non-rigid to attacks. The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats. In traditional models, the solution has been made for defending the networks, only to specific attacks. However, in real-time applications, the kind of attack that is launched by the adversary is not known. Additionally, on developing a security mechanism for WSN, the resource constraints of sensor nodes are also to be considered. With that note, this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism (IDRM) for defending the sensor network from various attacks. Moreover, for efficient model design, the work includes the part of feature evaluation of some general attacks of WSNs. The IDRM also includes determination of optimal secure paths and Node security for secure routing operations. The performance of the proposed model is evaluated with respect to several factors; it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications. It is proven that the proposed IDRM produces 74% of PDR in average and a minimized packet drop of 38% when comparing with the existing works.  相似文献   
328.
Predicted air and dew point temperatures can be valuable in decision making in many areas including protecting crops from damage, avoiding heat stress on animals and humans, and in planning related to energy management. Current web-based artificial neural network (ANN) models on the Automated Environment Monitoring Network (AEMN) in Georgia predict hourly air and dew point temperature for twelve prediction horizons, using 24 models. The observed air temperature may approach the observed dew point temperature, but never goes below it. Current web based ANN models have prediction errors which, when the air and dew point temperatures are close, may cause air temperature to be predicted below the dew point temperature. Herein this error is referred to as a prediction anomaly. The goal of this research was to improve the prediction accuracy of existing air and dew point temperature ANN models by combining the two weather variables into a single ANN model for each prediction horizon. The objectives of this study were to reduce the mean absolute error (MAE) of prediction and to reduce the number of prediction anomalies. The combined models produced a reduction in the air temperature MAE for ten of twelve prediction horizons with an average reduction in MAE of 1.93 %. The combined models produced a reduction in the dew point temperature MAE for only six of twelve prediction horizons with essentially no average decrease in MAE. However, the combined models showed a marked reduction in prediction anomalies for all twelve prediction horizons with an average reduction of 34.1 %. The reduction in prediction anomalies ranged from 4.6 % at the one-hour horizon to 60.5 % at the eleven-hour horizon.  相似文献   
329.
Radhika  N.  Karthik  R.  Gowtham  S.  Ramkumar  S. 《SILICON》2019,11(1):345-354
Silicon - The objective is to fabricate Cu-10Sn alloy and its composites reinforced with varying wt% of SiC (5, 10 and 15) to investigate its dry sliding wear behaviour. Microstructural analysis...  相似文献   
330.
Ferrostatin-1 (Fer-1) is a lipophilic antioxidant that effectively blocks ferroptosis, a distinct non-apoptotic form of cell death caused by lipid peroxidation. During many infections, both pathogens and host cells are subjected to oxidative stress, but the occurrence of ferroptosis had not been investigated. We examined ferroptosis in macrophages infected with the pathogenic yeast Histoplasma capsulatum. Unexpectedly, Fer-1 not only reduced the death of macrophages infected in vitro, but inhibited the growth of H. capsulatum and related species Paracoccidioides lutzii and Blastomyces dermatitidis at concentrations under 10 μm . Other antioxidant ferroptosis inhibitors, including liproxstatin-1, did not prevent fungal growth or reduce macrophage death. Structural analysis revealed a potential similarity of Fer-1 to inhibitors of fungal sterol synthesis, and ergosterol content of H. capsulatum decreased more than twofold after incubation with Fer-1. Strikingly, additional Fer-1 analogues with slight differences from Fer-1 had limited impact on fungal growth. In conclusion, the ferroptosis inhibitor Fer-1 has unexpected antifungal potency distinct from its antiferroptotic activity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号