首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   834篇
  免费   70篇
  国内免费   7篇
电工技术   10篇
综合类   4篇
化学工业   157篇
金属工艺   26篇
机械仪表   23篇
建筑科学   53篇
矿业工程   2篇
能源动力   86篇
轻工业   65篇
水利工程   5篇
石油天然气   14篇
无线电   108篇
一般工业技术   142篇
冶金工业   51篇
原子能技术   4篇
自动化技术   161篇
  2023年   25篇
  2022年   31篇
  2021年   37篇
  2020年   22篇
  2019年   36篇
  2018年   41篇
  2017年   32篇
  2016年   34篇
  2015年   21篇
  2014年   54篇
  2013年   76篇
  2012年   37篇
  2011年   54篇
  2010年   28篇
  2009年   56篇
  2008年   36篇
  2007年   32篇
  2006年   35篇
  2005年   19篇
  2004年   18篇
  2003年   14篇
  2002年   25篇
  2001年   12篇
  2000年   15篇
  1999年   6篇
  1998年   9篇
  1997年   12篇
  1996年   15篇
  1995年   7篇
  1994年   6篇
  1993年   11篇
  1992年   7篇
  1991年   5篇
  1990年   6篇
  1989年   2篇
  1987年   4篇
  1986年   2篇
  1985年   3篇
  1984年   2篇
  1983年   2篇
  1982年   3篇
  1981年   2篇
  1979年   4篇
  1976年   1篇
  1973年   2篇
  1971年   1篇
  1970年   1篇
  1969年   3篇
  1968年   1篇
  1961年   1篇
排序方式: 共有911条查询结果,搜索用时 62 毫秒
11.
Effects of feeding early in life a diet high in either long chain (LCT) or medium chain triglyceride (MCT) were studied on the development of adipose tissue in post-weanling rats. The diets were similar in calorie distribution and identical in nutrients except for type of fat. The caloric distribution of the two diets by percent was LCT (corn oil)/protein/carbohydrate, 70/18/12 and MCT/corn oil/protein/carbohydrate, 66/4/18/12. Male littermates with less than 5% weight difference were pair-fed the two diets randomly at age 18–20 days. One-fourth of the rats were killed at 10, 16, 22 and 28 weeks of age and analyzed for adipose depots and adipose tissue cellularity. Results showed that the LCT-fed rats were significantly heavier, with larger epididymal, retroperitoneal, omental and subcutaneous fat pads than the respective pair-fed MCT rats. Also, LCT-fed rats had larger size and number of adipocytes than MCT-fed littermates. It is concluded that the type of fat in the diet, namely LCT or MCT, when fed early in life can influence the development of adipose tissue. MCT appears less lipogenic than LCT. The mechanism for the diminished adiposity of MCT-fed rats is related to extensive oxidation of MCT and its enhancement of thermogenesis leading to lessened energy efficiency. Presented at the symposium on “Specialty Lipids and Their Biofunctionality” at the annual meeting of the American Oil Chemists' Society, Philadelphia, May 1985.  相似文献   
12.
Power plants in Kuwait use gas turbines (GT) only for a few hours to produce power at peak load times. Peak loadoccurs in the summer due to the air-conditioning load. As an example, the average number of operating hours for six gas turbines in the Doha East power plant was 16 in the summer of 2001. There is little concern about efficiency of these GT since they work for a very short time during the year. However, a recent increase in desalted seawater demand suggests the use of these GT to operate reverse osmosis (RO) desalting systems all year around. The summer outside design temperature in Kuwait for air-conditioning calculations is 48°C dry bulb temperature (DBT), and 28°C wet bulb temperature (WBT); but the ambient temperature can easily reach 60°C. Gas turbine power output and efficiency are drastically reduced by the increase in temperature of intake air to the gas turbine's compressor, especially during harsh Kuwaiti summer conditions. Thus, it is essential to investigate cooling of air intake to the GT compressor. The performance of a typical GT unit and its ability to produce desalted waterby a RO desalting system at different ambient temperatures are presented. Calculation of needed capacities for the cooling of intake air to the GT compressor was performed for evaporative cooling, single and multiple mechanical vapor compression cycles, and combined indirect evaporation cooling with the refrigeration system. The improvements of power output and efficiency due to the cooling of air intake of the GT and the resulting increase in desalted water are also presented.  相似文献   
13.
Multimedia Tools and Applications - This study presents an unsupervised novel algorithm for color image segmentation, object detection and tracking based on unsupervised learning step followed with...  相似文献   
14.

Security threats are crucial challenges that deter Mixed reality (MR) communication in medical telepresence. This research aims to improve the security by reducing the chances of types of various attacks occurring during the real-time data transmission in surgical telepresence as well as reduce the time of the cryptographic algorithm and keep the quality of the media used. The proposed model consists of an enhanced RC6 algorithm in combination. Dynamic keys are generated from the RC6 algorithm mixed with RC4 to create dynamic S-box and permutation table, preventing various known attacks during the real-time data transmission. For every next session, a new key is created, avoiding possible reuse of the same key from the attacker. The results obtained from our proposed system are showing better performance compared to the state of art. The resistance to the tested attacks is measured throughout the entropy, Pick to Signal Noise Ratio (PSNR) is decreased for the encrypted image than the state of art, structural similarity index (SSIM) closer to zero. The execution time of the algorithm is decreased for an average of 20%. The proposed system is focusing on preventing the brute force attack occurred during the surgical telepresence data transmission. The paper proposes a framework that enhances the security related to data transmission during surgeries with acceptable performance.

  相似文献   
15.
Titanium aluminides have become promising materials for high-temperature applications, but the relatively poor oxidation resistance and elevated- temperature strength of these alloys limit their application to temperatures lower than 1000 °C. Niobium addition improves the properties of titanium aluminide. However, the mechanical, metallurgical, and corrosion properties of Ti- Al- Nb may be improved by treatment with a laser beam. Consequently, the present study examines the properties of Ti- 15Al- 20Nb alloy subjected to the Nd:YAG laser melting process. Hardness in the surface region increases to twice the base material hardness, and corrosion resistance improves considerably after laser treatment.  相似文献   
16.
Many recent software engineering papers have examined duplicate issue reports. Thus far, duplicate reports have been considered a hindrance to developers and a drain on their resources. As a result, prior research in this area focuses on proposing automated approaches to accurately identify duplicate reports. However, there exists no studies that attempt to quantify the actual effort that is spent on identifying duplicate issue reports. In this paper, we empirically examine the effort that is needed for manually identifying duplicate reports in four open source projects, i.e., Firefox, SeaMonkey, Bugzilla and Eclipse-Platform. Our results show that: (i) More than 50 % of the duplicate reports are identified within half a day. Most of the duplicate reports are identified without any discussion and with the involvement of very few people; (ii) A classification model built using a set of factors that are extracted from duplicate issue reports classifies duplicates according to the effort that is needed to identify them with a precision of 0.60 to 0.77, a recall of 0.23 to 0.96, and an ROC area of 0.68 to 0.80; and (iii) Factors that capture the developer awareness of the duplicate issue’s peers (i.e., other duplicates of that issue) and textual similarity of a new report to prior reports are the most influential factors in our models. Our findings highlight the need for effort-aware evaluation of approaches that identify duplicate issue reports, since the identification of a considerable amount of duplicate reports (over 50 %) appear to be a relatively trivial task for developers. To better assist developers, research on identifying duplicate issue reports should put greater emphasis on assisting developers in identifying effort-consuming duplicate issues.  相似文献   
17.
The goal of this paper is to describe a novel fault tolerant tracking control (FTTC) strategy based on robust fault estimation and compensation of simultaneous actuator and sensor faults. Within the framework of fault tolerant control (FTC) the challenge is to develop an FTTC design strategy for nonlinear systems to tolerate simultaneous actuator and sensor faults that have bounded first time derivatives. The main contribution of this paper is the proposal of a new architecture based on a combination of actuator and sensor Takagi-Sugeno (T-S) proportional state estimators augmented with proportional and integral feedback (PPI) fault estimators together with a T-S dynamic output feedback control (TSDOFC) capable of time-varying reference tracking. Within this architecture the design freedom for each of the T-S estimators and the control system are available separately with an important consequence on robust L 2 norm fault estimation and robust L 2 norm closed-loop tracking performance. The FTTC strategy is illustrated using a nonlinear inverted pendulum example with time-varying tracking of a moving linear position reference.  相似文献   
18.
Changes in operational environment of the process industry such as decreasing selling prices, increased competition between companies and new legislation, set requirements for performance and effectiveness of the industrial production lines and processes. For the basis of this study, a life cycle profit (LCP) model of a pulp process was constructed using different kind of process information including chemical consumptions and production levels of material and energy flows in unit processes. However, all the information needed in the creation of relevant LCP model was not directly provided by information systems of the plant. In this study, neural networks was used to model pulp bleaching process and fill out missing information and furthermore to create estimators for the alkaline chemical consumption. A data-based modelling approach was applied using an example, where factors affecting the sodium hydroxide consumption in the bleaching stage were solved. The results showed that raw process data can be refined into new valuable information using computational methods and moreover to improve the accuracy of life cycle profit models.  相似文献   
19.

We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.

  相似文献   
20.

The World Wide Web(WWW) comprises a wide range of information, and it is mainly operated on the principles of keyword matching which often reduces accurate information retrieval. Automatic query expansion is one of the primary methods for information retrieval, and it handles the vocabulary mismatch problem often faced by the information retrieval systems to retrieve an appropriate document using the keywords. This paper proposed a novel approach of hybrid COOT-based Cat and Mouse Optimization (CMO) algorithm named as hybrid COOT-CMO for the appropriate selection of optimal candidate terms in the automatic query expansion process. To improve the accuracy of the Cat and Mouse Optimization (CMO) algorithm, the parameters are tuned with the help of the Coot algorithm. The best suitable expanded query is identified from the available expanded query sets also known as candidate query pools. All feasible combinations in this candidate query pool should be obtained from the top retrieved documents. Benchmark datasets such as the GOV2 Test Collection, the Cranfield Collections, and the NTCIR Test Collection are utilized to assess the performance of the proposed hybrid COOT-CMO method for automatic query expansion. This proposed method surpasses the existing state-of-the-art techniques using many performance measures such as F-score, precision, and mean average precision (MAP).

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号