首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   310篇
  免费   25篇
电工技术   9篇
综合类   1篇
化学工业   106篇
金属工艺   2篇
机械仪表   16篇
建筑科学   11篇
能源动力   34篇
轻工业   22篇
石油天然气   11篇
无线电   8篇
一般工业技术   59篇
冶金工业   23篇
原子能技术   1篇
自动化技术   32篇
  2023年   6篇
  2022年   9篇
  2021年   13篇
  2020年   13篇
  2019年   18篇
  2018年   17篇
  2017年   20篇
  2016年   12篇
  2015年   11篇
  2014年   14篇
  2013年   39篇
  2012年   18篇
  2011年   17篇
  2010年   19篇
  2009年   8篇
  2008年   6篇
  2007年   8篇
  2006年   5篇
  2005年   10篇
  2004年   4篇
  2003年   5篇
  2002年   5篇
  2001年   7篇
  2000年   1篇
  1999年   1篇
  1998年   15篇
  1997年   6篇
  1996年   4篇
  1995年   1篇
  1993年   3篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1988年   2篇
  1986年   3篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1978年   1篇
  1975年   1篇
  1970年   1篇
排序方式: 共有335条查询结果,搜索用时 15 毫秒
1.
Pattern Analysis and Applications - Efficient high-dimensional analyses of hyperspectral datasets and their utilization within classification algorithms is a popular topic in the field of data...  相似文献   
2.
3.
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.  相似文献   
4.
5.
In this paper, we develop a joint quality control and preventive maintenance policy for a production system producing conforming and nonconforming units. The considered system consists of one machine which must supply another production line operating on a just-in-time basis. Each lot produced by the machine is subject to a quality control. According to the proportion l of nonconforming units observed and compared to a threshold value l m , one decides to undertake or not maintenance actions on the system. In order to palliate perturbations caused by the stopping of the machine for preventive and corrective maintenance actions of random durations, a buffer stock h is built up to ensure the continuous supply of the subsequent production line. The proposed strategy is modelled using simulation and experimental design. This approach allows to generate a second order response surface allowing to easily determine the optimal rate, lm*{l_{m}^*}, of nonconforming units on the basis of which preventive maintenance actions should be performed, and the optimal size, h*, of the buffer stock to be built. These values minimize the total cost per time unit which includes the costs related to maintenance, quality and inventory.  相似文献   
6.
In this paper we consider the block replacement policy (BRP) for a system operating over a random time horizon. Under such a policy, a system is replaced by a new one either at failure or at a given time interval. The optimality criterion is the expected total replacements cost. Conditions under which an optimal replacement period exits are given. It is shown that BRP over an infinite time horizon is obtained as a particular case of the present work. A numerical example is given to illustrate the proposed replacement model.  相似文献   
7.
Relaxation oscillations occur when a capacitor is inserted in series with a field emission tube, a DC high-voltage power supply, and a ballast resistor. The waveform of these oscillations is highly reproducible with a dominant frequency of 200 MHz and a decay time of 20 ns. The peak current as high as 320 mA has been observed although the tungsten emitter is only rated for 10 microA. We have shown that these oscillations are due to a displacement current, charging of the anode-tip capacitance, and are not of a field emission origin. We conclude that the effects of displacement current should be considered in measurements of field emission with microsecond pulses, where high-current densities can be observed.  相似文献   
8.
The authors aimed to examine a multivariate statistical analysis approach for monitoring the hydrocarbon potentiality of source rocks in the North Western Desert to recognize the potentiality of source rocks and subsequently investigate the maturation level of the proven potential source formations for oil preservation. To achieve this aim, they applied multivariate statistics analysis (principle component analysis [PCA], cluster analysis, and correlation coefficient) and Rock-Eval pyrolysis analyses. The results showed that both PCA and cluster analyses have showed two types of source rocks. The first is classified as poor to fair source rock and immature to marginally mature source rock, the second is considered as fair to good source rock and mature to post mature source rock. PCA extracted two independent factors, which explained 81.87% of the total variance. The first type of source rock was responsible for 50% of the total variance and was best represented by variables TOC, S2, OI, and Ro, and the second one was responsible for 31.65% of the total variance and was represented by the HI variable. Pearson correlation coefficient showed a significant positive correlation between TOC and S2 or Ro. A positive correlation between S2 and HI or OI and also between OI and Ro was observed, while no significant correlation was noticed between HI and Ro.  相似文献   
9.
Abstract: A very simple method is proposed to produce hydroxytyrosol, a commercially unavailable compound with well‐known biological properties which justify a potential commercial application. The 2‐phase Chemlali olive pomace is selected as substrate for chemical treatment. Different conditions of chemical treatment, including concentration of acid and alkaline solutions, time and temperature, were assayed. A high amount of hydroxytyrosol (1360 mg/kg of fresh 2‐phase olive pomace) was obtained using water bath after treatment at 80 °C for 90 min with 1 M of H3PO4. However, treatment of 2‐phase Chemlali olive pomace using autoclave apparatus could produce a large amount of hydroxytyrosol (1993.60 and 1515.88 mg/kg of fresh alperujo, 1 M acid and basic catalyst, respectively). By taking into consideration practical and economic aspects, acid‐catalyzed treatment was more effective using autoclave conditions, whereas the alkali catalyzed conditions were not very suitable. This study could provide useful information for industry to produce the potentially bioactive compound. Practical Application: The 2‐phase Chemlali olive pomace is selected as substrate for chemical treatment. Treatment of “alperujo” using water bath or autoclave apparatus was carried out. A high amount of hydroxytyrosol was obtained using autoclave apparatus.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号