全文获取类型
收费全文 | 216篇 |
免费 | 8篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 67篇 |
金属工艺 | 13篇 |
机械仪表 | 4篇 |
建筑科学 | 1篇 |
能源动力 | 10篇 |
轻工业 | 9篇 |
无线电 | 32篇 |
一般工业技术 | 41篇 |
冶金工业 | 25篇 |
原子能技术 | 1篇 |
自动化技术 | 20篇 |
出版年
2024年 | 1篇 |
2023年 | 6篇 |
2022年 | 11篇 |
2021年 | 7篇 |
2020年 | 11篇 |
2019年 | 6篇 |
2018年 | 10篇 |
2017年 | 11篇 |
2016年 | 6篇 |
2015年 | 7篇 |
2014年 | 6篇 |
2013年 | 8篇 |
2012年 | 12篇 |
2011年 | 16篇 |
2010年 | 8篇 |
2009年 | 11篇 |
2008年 | 11篇 |
2007年 | 17篇 |
2006年 | 8篇 |
2005年 | 3篇 |
2004年 | 5篇 |
2003年 | 1篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1998年 | 5篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1993年 | 6篇 |
1992年 | 5篇 |
1990年 | 1篇 |
1988年 | 2篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有224条查询结果,搜索用时 31 毫秒
1.
Gladson S. Chrisben Prasad P. Siva Manickam Bhaskar 《Analog Integrated Circuits and Signal Processing》2021,109(3):571-583
Analog Integrated Circuits and Signal Processing - As the 5G era beckons in the world of communication and information technology, there is a surge in demand for battery-operated, mobile wireless... 相似文献
2.
M Manickam M Ramanathan MA Jahromi JP Chansouria AB Ray 《Canadian Metallurgical Quarterly》1997,60(6):609-610
Glucose levels in rats with hyperglycemia induced by streptozotocin were determined after i.p. administration of marsupsin (1), pterosupin (2), and pterostilbene (3), three important phenolic constituents of the heartwood of Pterocarpus marsupium. Marsupsin and pterostilbene significantly lowered the blood glucose level of hyperglycemic rats, and the effect was comparable to that of 1,1-dimethylbiguanide (metformin). 相似文献
3.
Protagonists of electronic data interchange (EDI), a specific form of inter organizational systems (IOS), claim that it has the potential to dramatically alter the exchange of business documents and business operations (particularly material procurement and sales functions) in a number of industries. Drawing upon past research on innovation diffusion and information systems (IS) implementation, this study examines the role of key innovation and organizational factors in influencing the extent to which EDI is diffused within organizations, and whether more extensive diffusion leads to improved organizational outcomes. Two senior executives (one from the IS and the other from selling/buying function) from over 200 large American companies participated in the field study. The path analyses results indicate that compatibility and relative advantage (two of the three classical innovation attributes), championing, scope for use of EDI within the firm's task environments, and being an early adopter determine the extent to which EDI gets internally diffused through greater integration with other IS applications within the organization. Technical compatibility, top management support and being an early adopter emerge as the key variables influencing the extent to which EDI gets externally diffused through greater external diffusion of business transactions with trading partners. The results also indicate that greater internal as well as external diffusion of EDI facilitates improved organizational outcomes that was measured on six dimensions such as implementation success, organizational performance, influence on market structure, standardization of transactions, etc 相似文献
4.
Clones are generally considered bad programming practice in software engineering folklore. They are identified as a bad smell?(Fowler et?al. 1999) and a major contributor to project maintenance difficulties. Clones inherently cause code bloat, thus increasing project size and maintenance costs. In this work, we try to validate the conventional wisdom empirically to see whether cloning makes code more defect prone. This paper analyses the relationship between cloning and defect proneness. For the four medium to large open source projects that we studied, we find that, first, the great majority of bugs are not significantly associated with clones. Second, we find that clones may be less defect prone than non-cloned code. Third, we find little evidence that clones with more copies are actually more error prone. Fourth, we find little evidence to support the claim that clone groups that span more than one file or directory are more defect prone than collocated clones. Finally, we find that developers do not need to put a disproportionately higher effort to fix clone dense bugs. Our findings do not support the claim that clones are really a “bad smell”?(Fowler et?al. 1999). Perhaps we can clone, and breathe easily, at the same?time. 相似文献
5.
Electrochemical cell current requirements for toxic organic waste destruction in Ce(IV)-mediated electrochemical oxidation process 总被引:1,自引:0,他引:1
Vasily V. Kokovkin Sang Joon Chung Subramanian Balaji Manickam Matheswaran Il-Shik Moon 《Korean Journal of Chemical Engineering》2007,24(5):749-756
The electrochemical cell for cerium oxidation and reactor for organic destruction are the most important operation units for
the successful working mediated electrochemical oxidation (MEO) process. In this study, electrochemical cells with DSA electrodes
of two types, single stack and double stack connected in series, were used. The performances towards the electrochemical generation
of Ce(IV) in nitric acid media at 80 °C were studied. The current-voltage curves and cerium electrolysis kinetics showed the
dependence on number of cell stacks needed to be connected in series for the destruction of a given quantity of organic pollutant.
The presence of an optimum region for Ce(III) oxidation with a contribution of oxygen evolution, especially at low Ce(III)
concentration (high conversion ratios), was found. The cells were applied for the Ce(IV) regeneration during the organic destruction.
The cell and reactor processes were fitted in a simple model proposed and used to calculate the current needed in terms of
Ce(III) oxidation rate and the number of cell stacks required for maintaining Ce(IV)/Ce(III) ratio at the same level during
the organic destruction. This consideration was based on the kinetic model previously developed by us for the organic destruction
in the MEO process. 相似文献
6.
While instant messaging (IM) has been very popular among teenagers and college students for social and recreation communication, its use in corporate settings has been limited. We examined the factors that influence the intention to use and actual use of IM. A research model was developed based on diffusion of innovation and Socio-psychological theories. The model examined the influence of seven variables in three belief structures (the attitudinal, normative, and control). The model was empirically validated using a field survey of 349 respondents. The results indicated that five of the seven variables explained about 41% of the variance in the intention to use IM. The five significant variables were: utilitarian beliefs, hedonic beliefs, subjective norms, critical mass, and ease of use. Affiliation motivation was not significant and social belief had a negative impact on intention. As expected, intention to use had a significant influence on actual usage. 相似文献
7.
Adnan Hasan Bdair Aighuraibawi Selvakumar Manickam Rosni Abdullah Zaid Abdi Alkareem Alyasseri Ayman Khallel Dilovan Asaad Zebari Hussam Mohammed Jasim Mazin Mohammed Abed Zainb Hussein Arif 《计算机系统科学与工程》2023,47(1):553-574
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS. 相似文献
8.
Salam Al-E’mari Mohammed Anbar Yousef Sanjalawe Selvakumar Manickam Iznan Hasbullah 《计算机系统科学与工程》2022,40(1):87-102
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology. 相似文献
9.
In this study, nanocomposite powder consisting of zirconia and titania (Zr–Ti) have been synthesised by sol–gel method, with the aim of protecting Ti‐6Al‐4V surface. A simple and low cost electrophoretic deposition (EPD) technique has been employed for coating the nanocomposite material on Ti‐6Al‐4V. The prepared nanocomposite powder was characterised for its functional groups, phase purity, surface topography by Fourier transform infrared spectroscopy, powder X‐ray diffraction and scanning electron microscopy. Further, the biocompatibility nature of the composite powder was studied by [3‐(4, 5‐dimethylthiazol‐2‐yl)‐2, 5‐diphenyltetrazolium bromide] colorimetric assay and fluorescence analysis with MG63 osteoblast cell lines. The electrochemical behaviour of composite coating was investigated by potentiodynamic polarization and electrochemical impedance method. The results obtained from the electrochemical techniques indicate more corrosion resistance behaviour with increase of R ct value with the corresponding decrease in R dl values. From the above findings, the composite coating acts as a barrier layer against corrosion by preventing the leaching of metal ions from a dense and defect free coating. A scratch test analyser was used to assess the integrity of the coating; the lower traction force value of composite coating with increase in load has confirmed the presence of thick adherent layer on the substrate.Inspec keywords: zirconium compounds, titanium compounds, titanium alloys, aluminium alloys, vanadium alloys, nanofabrication, nanocomposites, nanoparticles, sol‐gel processing, electrophoretic coating techniques, surface topography, Fourier transform infrared spectra, X‐ray diffraction, scanning electron microscopy, X‐ray chemical analysis, fluorescence, cellular biophysics, biomedical materials, electrochemical impedance spectroscopy, corrosion resistance, corrosion protection, corrosion protective coatings, adhesionOther keywords: in‐situ fabrication, zirconium‐titanium nanocomposite powder, biomedical applications, zirconia, titania, sol‐gel method, electrophoretic deposition, EPD, functional groups, phase purity, surface topography, Fourier transform infrared spectroscopy, powder X‐ray diffraction, scanning electron microscopy, energy dispersive X‐ray analysis, biocompatibility, 3‐(4, 5‐dimethylthiazol‐2‐yl)‐2,5‐diphenyltetrazolium bromide colorimetric assay, acridine range fluorescence analysis, MG63 osteoblast cell lines, electrochemical behaviour, composite coating, potentiodynamic polarization, electrochemical impedance spectroscopy, corrosion resistance, barrier layer, leaching, defect free coating layer, scratch test analysis, adherent layer, TiAlV‐ZrO2 ‐TiO2 相似文献
10.
P. Madhu I. Neethi Manickam H. Kanagasabapathy 《Energy Sources, Part A: Recovery, Utilization, and Environmental Effects》2016,38(15):2161-2169
New and renewable fuels are the major alternatives to conventional fossil fuels. Biomass in the form of agricultural residues is becoming popular among new renewable energy sources, especially given its wide potential and abundant usage. This study deals with the characterization of the pyrolysis oil obtained from palmyra palm fruit bunch (Borassus flabellifer) produced by flash pyrolysis in the maximum yield. The pyrolysis oil was analyzed to determine its elemental composition and heating value. The chemical composition of the pyrolysis oil and fractions was investigated using various chromatographic techniques such as Fourier transform infra-red (FTIR) spectroscopy, gas chromatography–mass spectroscopy (GC-MS), and 1H NMR spectroscopy. The bio-oil product was presented as an environmentally friendly green biofuel candidate. The analytical results showed that the pyrolysis bio-oils were very complex mixtures of organic compounds and contained a lot of nitrogenated and oxygenated compounds such as, phenols, aliphatic hydrocarbons, pyridines, amines, ketones, and so on. 相似文献