首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   433篇
  免费   19篇
  国内免费   2篇
电工技术   1篇
化学工业   40篇
金属工艺   5篇
机械仪表   11篇
建筑科学   18篇
能源动力   7篇
轻工业   98篇
水利工程   8篇
石油天然气   1篇
无线电   52篇
一般工业技术   89篇
冶金工业   53篇
自动化技术   71篇
  2022年   4篇
  2021年   11篇
  2020年   3篇
  2019年   3篇
  2018年   12篇
  2017年   7篇
  2016年   9篇
  2015年   11篇
  2014年   13篇
  2013年   30篇
  2012年   30篇
  2011年   32篇
  2010年   16篇
  2009年   13篇
  2008年   22篇
  2007年   34篇
  2006年   28篇
  2005年   27篇
  2004年   30篇
  2003年   24篇
  2002年   25篇
  2001年   2篇
  2000年   2篇
  1999年   9篇
  1998年   8篇
  1997年   5篇
  1996年   7篇
  1995年   9篇
  1994年   8篇
  1993年   3篇
  1990年   3篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1985年   3篇
  1983年   1篇
  1981年   2篇
  1978年   1篇
  1977年   1篇
  1974年   1篇
排序方式: 共有454条查询结果,搜索用时 865 毫秒
81.
The Journal of Supercomputing - The exponential growth in the number of Internet of things (IoT) devices and their potential in many applications in a vast number of domains fuelled the development...  相似文献   
82.

In this paper, we propose a reversible data hiding scheme that exploits the centroid formula. Specifically, we use it to define a centroid boundary vector and a centroid state codebook CSCB. Initially, our centroid boundary vectors and CSCBs are the same as the side match vector quantization (SMVQ) algorithm’s boundary vectors and state codebooks SCBs. For each VQ index, the proposed scheme exploits the centroid formula to update its centroid boundary vector and the corresponding CSCB. The updating is coupled with a heuristic to select the best state codebook (i.e., either SCB or CSCB) for each VQ index, which generates a highly compressible distribution of index values. Our experimental results show that the proposed scheme can embed n = 1, 2, 3, and 4 bit per index (bpi) at bit rates of 0.332, 0.394, 0.457, and 0.519 bit per pixel (bpp), respectively, for the main codebook size N = 256. These results confirm that the proposed scheme improves recent VQ and SMVQ based reversible data hiding schemes.

  相似文献   
83.
With odors as conditioned stimuli (CSs) and CO?-enriched air as the unconditioned stimulus, participants learned to exhibit respiratory responses and somatic complaints on presentation of only the odor CS+. Studied was whether complaints during CS+-only trials were inferred from the conditioned somatic responses or were based on activated memory of the complaints during acquisition. Participants (N?=?56) were either attentionally directed away or not from the complaints during acquisition, and the effects on somatic complaints during test were studied. Respiratory responses, heart rate, and somatic complaints were measured. No physiological conditioning effects were found. However, more complaints were reported to the CS+ than to the CS– odor, but only when the CS+ was foul smelling. This effect was modulated by the attention manipulation, showing that the learned complaints during the test phase were based on memory of the acquisition complaints and not on physiological responses during the test. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
84.
85.
A semi-mechanistic model for predicting the flow behavior of a typical commercial dual-phase steel containing 20 vol pct of ‘as quenched’ martensite and varying amounts of retained austenite has been developed in this paper. Assuming that up to 20 vol pct of austenite with different degrees of mechanical stability can be retained as a result of certain thermomechanical treatments in a steel of appropriate low carbon low alloy chemistry, expressions for composite flow stress and strain have been derived. The model takes into account the work hardening of the individual microconstituents(viz., ferrite-@#@ α, retained austenite- γ r, and martensite -α′) and the extra hardening of ferrite caused by accommodation dislocations surrounding the ‘as quenched’ as well as the strain-induced r→ α′) martensite. Load transfer between the phases has been accounted for using an intermediate law of mixtures which also considers the relative hardness of the soft and the hard phases. From the derived expressions, the flow behavior of dual phase steels can be predicted if the properties of the individual microconstituents are known. Versatility of the model for application to other commercial steels containing a metastable phase is discussed.  相似文献   
86.
Our objective was to determine the maximum tolerated dose and toxicity of i.v. edatrexate with p.o. leucovorin. Thirty-one adults with advanced solid tumors received edatrexate as a 2-h infusion, once a week for 3 weeks, recycled every 28 days. p.o. leucovorin (10 mg/m2, every 6 h for 10 doses) began 24 h later. All had urinary alkalinization and p.o. hydration. Nine dosage levels ranging from 120 to 3750 mg/m2 were explored. Fatigue, epistaxis, nausea/emesis, mucositis, rash, myalgias, leukopenia, thrombocytopenia, and transient elevations of serum aspartate transferase were observed. Leukoencephalopathy with clinical manifestations occurred in two patients (one had prior cranial irradiation). Pharmacokinetic studies carried out at the 120- and 1080-mg/m2 dose levels revealed no significant difference in the elimination half-life at the two dose levels studied and no significant intrapatient variability between day 1 and day 8 edatrexate administration. Serum edatrexate levels measured using a dihydrofolate reductase inhibition assay correlated with those by high-performance liquid chromatography. Three major and two minor antitumor responses occurred. The maximum tolerated dose was 3750 mg/m2, with grade 3 or 4 leukopenia (one patient), stomatitis (one patient), and leukoencephalopathy (one patient). Because of the occurrence of leukoencephalopathy, further study of high-dose edatrexate with leucovorin rescue is not recommended.  相似文献   
87.
Sexual fantasy.     
This article reviews the research literature on sexual fantasy, a central aspect of human sexual behavior. Topics include (a) gender similarities and differences in the incidence, frequency, and content of sexual fantasies and how they relate to sociocultural and sociobiological theories of sexual behavior; (b) the association between frequency or content of sexual fantasies and variables such as age, sexual adjustment and satisfaction, guilt, sexual orientation, personality, and sexual experience; and (c) "deviant" sexual fantasies (i.e., what they are, whether they play a role in the commission of sexual crimes, and whether they can be modified). The article ends with a summary of major findings and suggestions for future research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
88.
EFFECT OF Cr ON MICROSTRUCTURE OF Ti_3Al+TiAl ALLOYS   总被引:3,自引:0,他引:3  
郑运荣  赵林岩 《金属学报》1994,30(3):97-103
研究了Ti-44.9Al(at.-%)和Ti-44.3Al-3Cr(at.-%)合金的铸态组织及其在热处理过程中的变化。结果表明:Cr增加了Ti-Al合金中TiAl(γ)相的含量,促使Ti3Al(α2)相由片状变成块状;加速了α2+γ片状组织的不连续粗化过程,形成了尺寸较小的新生α2+γ晶。因此,加Cr和1150℃长时热处理是细化α2+γ两相合金铸态粗晶组织的有效途径;Cr促进有序体心立方β2相的  相似文献   
89.

Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In many use cases, the internet of things (IoT) devices do not know the fog nodes in advance. Moreover, as the fog nodes are often placed in open publicly available places, they can be easily captured. Therefore, it should be ensured that even if the key material is leaked from the fog devices, the previously generated session keys and the identity of the devices can be kept secret, i.e. satisfying anonymity, unlinkability, perfect forward secrecy and resistance against stolen devices attack. Such demands require a multi-factor authentication scheme, which is typically done by providing input of the user with password or biometric data. However, in real use case scenarios, IoT devices should be able to automatically start the process without requiring such manual interaction and also fog devices need to autonomously operate. Therefore, this paper proposes a physical unclonable function (PUF) based mutual authentication scheme, being the first security scheme for a fog architecture, capable of providing simultaneously all these suggested security features. In addition, we also show the resistance against other types of attacks like synchronization and known session specific temporary information attack. Moreover, the scheme only relies on symmetric key based operations and thus results in very good performance, compared to the other fog based security systems proposed in literature.

  相似文献   
90.
Secure online communication is a necessity in today’s digital world. This paper proposes a novel reversible data hiding technique based on side match vector quantization (SMVQ). The proposed scheme classifies SMVQ indices as Case 1 or 2 based on the value of the first state codeword’s side match distortion (SMD) and a predefined threshold t. The proposed scheme uses this classification to switch between compression codes designed for Cases 1 and 2 SMVQ indices. The length of these compression codes is controlled by the parameter ?. Thus, with the selection of appropriate ? and t values, the proposed scheme achieves good compression, creating spaces to embed secret information. The embedding algorithm can embed n secret bits into each SMVQ index, where n = 1, 2, 3, or 4. The experimental results show that the proposed scheme obtains the embedding rates of 1, 2, 3, or 4 bit per index (bpi) at the average bit rates of 0.340, 0.403, 0.465, or 0.528 bit per pixel (bpp) for the codebook size 256. This improves the performance of recent VQ and SMVQ-based data hiding schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号