全文获取类型
收费全文 | 314篇 |
免费 | 16篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 9篇 |
化学工业 | 75篇 |
金属工艺 | 16篇 |
机械仪表 | 18篇 |
建筑科学 | 8篇 |
能源动力 | 14篇 |
轻工业 | 20篇 |
水利工程 | 2篇 |
石油天然气 | 2篇 |
无线电 | 39篇 |
一般工业技术 | 31篇 |
冶金工业 | 43篇 |
原子能技术 | 4篇 |
自动化技术 | 53篇 |
出版年
2024年 | 4篇 |
2023年 | 6篇 |
2022年 | 21篇 |
2021年 | 13篇 |
2020年 | 16篇 |
2019年 | 16篇 |
2018年 | 21篇 |
2017年 | 29篇 |
2016年 | 16篇 |
2015年 | 12篇 |
2014年 | 15篇 |
2013年 | 29篇 |
2012年 | 21篇 |
2011年 | 14篇 |
2010年 | 9篇 |
2009年 | 13篇 |
2008年 | 9篇 |
2007年 | 10篇 |
2006年 | 4篇 |
2005年 | 4篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 8篇 |
2000年 | 1篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 6篇 |
1981年 | 6篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1972年 | 1篇 |
1966年 | 2篇 |
1965年 | 1篇 |
排序方式: 共有334条查询结果,搜索用时 15 毫秒
1.
The fracture strength of HF-etched samples was measured as a function of field-assisted K-Na ion exchange depth, as well as the severity of abrasion. As expected, the more severe the abrasion, the greater the depth required to make the strength insensitive to abrasion. An abrasion-independent weakening mechanism that increased with exchange depth was also found to be operative. 相似文献
2.
In this paper, a graphics processor unit (GPU) accelerated particle filtering algorithm is presented with an introduction to a novel resampling technique. The aim remains in the mitigation of particle impoverishment as well as computational burden, problems which are commonly associated with classical (systematic) resampled particle filtering. The proposed algorithm employs a priori-space dependent distribution in addition to the likelihood, and hence is christened as dual distribution dependent (D3) resampling method. Simulation results exhibit lesser values for root mean square error (RMSE) in comparison to that for systematic resampling. D3 resampling is shown to improve particle diversity after each iteration, thereby affecting the overall quality of estimation. However, computational burden is significantly increased owing to few excessive computations within the newly formulated resampling framework. With a view to obtaining parallel speedup we introduce a CUDA version of the proposed method for necessary acceleration by GPU. The GPU programming model is detailed in the context of this paper. Implementation issues are discussed along with illustration of empirical computational efficiency, as obtained by executing the CUDA code on Quadro 2000 GPU. The GPU enabled code has a speedup of 3 and 4 over the sequential executions of systematic and D3 resampling methods respectively. Performance both in terms of RMSE and running time have been elaborated with respect to different selections for threads per block towards effective implementations. It is in this context that, we further introduce a cost to performance metric (CPM) for assessing the algorithmic efficiency of the estimator, involving both quality of estimation and running time as comparative factors, transformed into a unified parameter for assessment. CPM values for estimators obtained from all such different choices for threads per block have been determined and a final value for the chosen parameter is resolved for generation of a holistic effective estimator. 相似文献
3.
Discriminative models are used to analyze the differences between two classes and to identify class-specific patterns. Most of the existing discriminative models depend on using the entire feature space to compute the discriminative patterns for each class. Co-clustering has been proposed to capture the patterns that are correlated in a subset of features, but it cannot handle discriminative patterns in labeled datasets. In certain biological applications such as gene expression analysis, it is critical to consider the discriminative patterns that are correlated only in a subset of the feature space. The objective of this paper is twofold: first, it presents an algorithm to efficiently find arbitrarily positioned co-clusters from complex data. Second, it extends this co-clustering algorithm to discover discriminative co-clusters by incorporating the class information into the co-cluster search process. In addition, we also characterize the discriminative co-clusters and propose three novel measures that can be used to evaluate the performance of any discriminative subspace pattern-mining algorithm. We evaluated the proposed algorithms on several synthetic and real gene expression datasets, and our experimental results showed that the proposed algorithms outperformed several existing algorithms available in the literature. 相似文献
4.
A study was done of jute composite using a polymer matrix of epoxidized Novolac resin (ENR), diglycidyl ether of bisphenol A (DGEBA)–based epoxy, and their blends with different weight percentages of the resins. It was found that on blending ENR with DGEBA, the storage modulii at room temperature are enhanced by about 100% or more in the case of 30 and 40% ENR‐containing matrices, whereas the enhancement in the case of 20 and 12% ENR‐containing matrices is only 50% that of the pure matrix. It was also observed that the tan δ peak heights of the composites containing 30 and 40% ENR are closer to that of 20% ENR‐containing composite. The probable explanation drawn on the basis of experimental findings of DMA and mechanical analysis is that by blending ENR with DGEBA epoxy it is possible to manufacture jute composites with increased stiffness without sacrificing their ductility. © 2002 Wiley Periodicals, Inc. J Appl Polym Sci 85: 2800–2807, 2002 相似文献
5.
A commercially available, densely sintered alpha silicon carbide was tested in air from room temperature to 1700°C using a modified instrumented pendulum unit and standard Charpy size test specimens. The resistance heated silicon carbide specimens exhibited only elastic behavior, even at 1700°C. A compliance analysis of the test revealed a linear elastic decrease of the absorbed impact energy and also a decrease of the fracture stress of the silicon carbide with increasing temperature. 相似文献
6.
In this work, one step process of synthesis of silver nanoparticles (Agnp) embedded in insitu formed calcium alginate (CA) beads is stated. CA, formed from the reaction between sodium alginate and calcium hydroxide, acts as reducing and stabilizing agent as well as support for nanoparticles. The reaction mechanism for the formation and stabilization of Agnp is proposed where the vicinal dihydroxy groups of alginate are assumed to act as the reducing agent for Ag+ to Ag°. Transmission electron microscopy (TEM), x‐ray diffraction (XRD), UV‐vis spectroscopy, field emission scanning electron microscopy (FESEM), and atomic absorption spectroscopy (AAS) were used to characterize the Agnp. The formation of spherical nanoparticles with average size range of 4‐5 nm was confirmed by TEM. Catalytic activity of this nano silver‐calcium alginate (Agnp‐CA) composite was evaluated in the reduction of p‐nitrophenol. Concentrations of sodium alginate, calcium hydroxide, and AgNO3 are found to be the parameters that critically affect the synthesis of Agnp. The efficacy of the catalyst is expressed on the basis of suitable reaction parameters. Both pseudo‐homogeneous and heterogeneous kinetic models are proposed for the reaction to find the best model and the Eley‐Riedel model is found to fit well with the experimental data. The novelty of this work is that the tandem process of CA bead formation, Agnp formation, and Agnp entrapment in CA have been transformed into a single‐step process. Moreover, elaborations of each step of the ionic mechanisms of Agnp formation and p‐NP reduction with Agnp and the establishment of a heterogeneous kinetic model for the reaction are reported for the first time here. 相似文献
7.
8.
Anirban Sengupta Chandan Mazumdar Aditya Bagchi 《Journal of Network and Systems Management》2011,19(3):319-342
From information security point of view, an enterprise is considered as a collection of assets and their interrelationships.
These interrelationships may be built into the enterprise information infrastructure, as in the case of connection of hardware
elements in network architecture, or in the installation of software or in the information assets. As a result, access to
one element may enable access to another if they are connected. An enterprise may specify conditions on the access of certain
assets in certain mode (read, write etc.) as policies. The interconnection of assets, along with specified policies, may lead
to managerial vulnerabilities in the enterprise information system. These vulnerabilities, if exploited by threats, may cause
disruption to the normal functioning of information systems. This paper presents a formal methodology for detection of managerial
vulnerabilities of, and threats to, enterprise information systems in linear time. 相似文献
9.
Sumit Misra Sanjoy Kumar Saha Chandan Mazumdar 《Innovations in Systems and Software Engineering》2017,13(4):261-269
Multiple data streams coming out of a complex system form the observable state of the system. The streams may correspond to various sensors attached with the system or outcome of internal processes. Such stream data may consist of multiple attributes and may differ in terms of their frequency of generation and observation. The streams may have dependency among themselves. One will have to rely on such data streams for monitoring the health of the system or to take any corrective measure. Predicting the value of certain stream data is an important task that can help one to take decision and act accordingly. In this work, a simple but generic visualization of a complex system is presented and thereafter a linear regression-based dynamic model for short-term prediction is proposed. The model is based on the past history of the attributes of multiple streams as suggested by the domain experts. But, it automatically determines the meaningful attributes and reformulates the model. The model is also re-computed if the prediction error exceeds the allowable tolerance. All these make the model dynamic. Experiment is carried out with stock market data streams to predict the close value well in advance. It is observed that in terms of quality of prediction and performance metric, the proposed model is quite effective. 相似文献
10.