全文获取类型
收费全文 | 586篇 |
免费 | 29篇 |
国内免费 | 11篇 |
专业分类
电工技术 | 3篇 |
综合类 | 3篇 |
化学工业 | 176篇 |
金属工艺 | 23篇 |
机械仪表 | 13篇 |
建筑科学 | 23篇 |
能源动力 | 46篇 |
轻工业 | 86篇 |
水利工程 | 4篇 |
石油天然气 | 5篇 |
无线电 | 46篇 |
一般工业技术 | 88篇 |
冶金工业 | 20篇 |
原子能技术 | 1篇 |
自动化技术 | 89篇 |
出版年
2024年 | 6篇 |
2023年 | 14篇 |
2022年 | 39篇 |
2021年 | 74篇 |
2020年 | 35篇 |
2019年 | 41篇 |
2018年 | 53篇 |
2017年 | 23篇 |
2016年 | 28篇 |
2015年 | 16篇 |
2014年 | 31篇 |
2013年 | 44篇 |
2012年 | 32篇 |
2011年 | 38篇 |
2010年 | 23篇 |
2009年 | 22篇 |
2008年 | 18篇 |
2007年 | 18篇 |
2006年 | 7篇 |
2005年 | 8篇 |
2004年 | 5篇 |
2003年 | 6篇 |
2002年 | 5篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 5篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 4篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1988年 | 2篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1956年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有626条查询结果,搜索用时 0 毫秒
1.
Dielectric and thermal characteristics of gel grown single crystals of ytterbium tartrate trihydrate
Dielectric and thermal characteristics of gel grown single crystals of ytterbium tartrate trihydrate have been carried out.
The dielectric constant has been measured as a function of frequency in the range 2 kHz–1 MHz and temperature range 30–300 °C.
The dielectric constant increases with temperature, attains a peak near 215 °C, and then decreases as the temperature exceeds
215 °C. The dielectric anomaly at 215 °C is suggested to be due to phase transition brought about in the material. The dielectric
behaviour of the material is correlated with the results on thermal analysis. Thermogravimetric and differential thermal analysis
have been used to study the thermal characteristics of the material. The experimental results show that the material is thermally
stable up to 200 °C. The decomposition process occurs in two stages until ytterbium oxide is formed at 700 °C. The non-isothermal
kinetic parameters e.g., activation energy and the frequency factor have been evaluated for each stage of thermal decomposition
by using the integral method, applying the Coats–Redfern approximation. 相似文献
2.
A study was undertaken to examine the sensitivity of a wastewater population of coliphage, total coliforms and total flora present in raw sewage and secondary effluent after irradiating with similar doses delivered by a high-energy electron beam and y -radiation. The electron beam study was conducted on a large scale at the Virginia Key Wastewater Treatment Plant, Miami, Fla. The facility is equipped with a 1.5 MeV, 50 mA electron accelerator, with a wastewater flow rate of 8 ls−1. Concurrent y-radiation studies were conducted at laboratory scale using a 5000 Ci, 60Co y -source. Three logs reduction of all three test organisms were observed at an electron beam dose of 500 krads, while at least four logs reduction were observed at the same dose utilizing the y-source. 相似文献
3.
Autonomous mapping of HL7 RIM and relational database schema 总被引:1,自引:0,他引:1
Shagufta Umer Muhammad Afzal Maqbool Hussain Khalid Latif Hafiz Farooq Ahmad 《Information Systems Frontiers》2012,14(1):5-18
Healthcare systems need to share information within and across the boundaries in order to provide better care to the patients.
For this purpose, they take advantage of the full potential of current state of the art in healthcare standards providing
interoperable solutions. HL7 V3 specification is an international message exchange and interoperability standard. HL7 V3 messages
exchanged between healthcare applications are ultimately recorded into local healthcare databases, mostly in relational databases.
In order to bring these relational databases in compliance with HL7, mappings between HL7 RIM (Reference Information Model)
and relational database schema are required. Currently, RIM and database mapping is largely performed manually, therefore
it is tedious, time consuming, error prone and expensive process. It is a challenging task to determine all correspondences
between RIM and schema automatically because of extreme heterogeneity issues in healthcare databases. To reduce the amount
of manual efforts as much as possible, autonomous mapping approaches are required. This paper proposes a technique that addresses
the aforementioned mapping issue and aligns healthcare databases to HL7 V3 RIM specifications. Furthermore, the proposed technique
has been implemented as a working application and tested on real world healthcare systems. The application loads the target
healthcare schema and then identifies the most appropriate match for tables and the associated fields in the schema by using
domain knowledge and the matching rules defined in the Mapping Knowledge Repository. These rules are designed to handle the
complexity of semantics found in healthcare databases. The GUI allows users to view and edit/re-map the correspondences. Once
all the mappings are defined, the application generates Mapping Specification, which contains all the mapping information
i.e. database tables and fields with associated RIM classes and attributes. In order to enable the transactions, the application
is facilitated with the autonomous code generation from the Mapping Specification. The Code Generator component focuses primarily
on generating custom classes and hibernate mapping files against the runtime system to retrieve and parse the data from the
data source—thus allows bi-directional HL7 to database communication, with minimum programming required. Our experimental
results show 35–65% accuracy on real laboratory systems, thus demonstrating the promise of the approach. The proposed scheme
is an effective step in bringing the clinical databases in compliance with RIM, providing ease and flexibility. 相似文献
4.
Salma Kammoun Jarraya Mohamed Hammami Hanêne Ben-Abdallah 《Multimedia Tools and Applications》2016,75(18):10949-10977
The efficient application of current methods of shadow detection in video is hindered by the difficulty in defining their parameters or models and/or their application domain dependence. This paper presents a new shadow detection and removal method that aims to overcome these inefficiencies. It proposes a semi-supervised learning rule using a new variant of co-training technique for shadow detection and removal in uncontrolled scenes. The new variant both reduces the run-time through a periodical execution of a co-training process according to a novel temporal framework, and generates a more generic prediction model for an accurate classification. The efficiency of the proposed method is shown experimentally on a testbed of videos that were recorded by a static camera and that included several constraints, e.g., dynamic changes in the natural scene and various visual shadow features. The conducted experimental study produced quantitative and qualitative results that highlighted the robustness of our shadow detection method and its accuracy in removing cast shadows. In addition, the practical usefulness of the proposed method was evaluated by integrating it in a Highway Control and Management System software called RoadGuard. 相似文献
5.
Mohamed Hammami Salma Kammoun Jarraya Hanene Ben-Abdallah 《Multimedia Tools and Applications》2013,63(3):899-926
Fast and accurate moving object segmentation in dynamic scenes is the first step in many computer vision applications. In this paper, we propose a new background modeling method for moving object segmentation based on dynamic matrix and spatio-temporal analyses of scenes. Our method copes with some challenges related to this field. A new algorithm is proposed to detect and remove cast shadow. A comparative study by quantitative evaluations shows that the proposed approach can detect foreground robustly and accurately from videos recorded by a static camera and which include several constraints. A Highway Control and Management System called RoadGuard is proposed to show the robustness of our method. In fact, our system has the ability to control highway by detecting strange events that can happen like vehicles suddenly stopped in roads, parked vehicles in emergency zones or even illegal conduct such as going out from the road. Moreover, RoadGuard is capable of managing highways by saving information about the date and time of overloaded roads. 相似文献
6.
This paper proposes a new feature extraction technique using wavelet based sub-band parameters (WBSP) for classification of unaspirated Hindi stop consonants. The extracted acoustic parameters show marked deviation from the values reported for English and other languages, Hindi having distinguishing manner based features. Since acoustic parameters are difficult to be extracted automatically for speech recognition. Mel Frequency Cepstral Coefficient (MFCC) based features are usually used. MFCC are based on short time Fourier transform (STFT) which assumes the speech signal to be stationary over a short period. This assumption is specifically violated in case of stop consonants. In WBSP, from acoustic study, the features derived from CV syllables have different weighting factors with the middle segment having the maximum. The wavelet transform has been applied to splitting of signal into 8 sub-bands of different bandwidths and the variation of energy in different sub-bands is also taken into account. WBSP gives improved classification scores. The number of filters used (8) for feature extraction in WBSP is less compared to the number (24) used for MFCC. Its classification performance has been compared with four other techniques using linear classifier. Further, Principal components analysis (PCA) has also been applied to reduce dimensionality. 相似文献
7.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT. 相似文献
8.
Zhang Jian Yang Xiaokun Deng Hui Qiao Keke Farooq Umar Ishaq Muhammad Yi Fei Liu Huan Tang Jiang Song Haisheng 《纳微快报(英文)》2017,9(3):1-8
Nano-Micro Letters - A NiFe2O4/expanded graphite (NiFe2O4/EG) nanocomposite was prepared via a simple and inexpensive synthesis method. Its lithium storage properties were studied with the goal of... 相似文献
9.
Linux malware can pose a significant threat—its (Linux) penetration is exponentially increasing—because little is known or
understood about Linux OS vulnerabilities. We believe that now is the right time to devise non-signature based zero-day (previously
unknown) malware detection strategies before Linux intruders take us by surprise. Therefore, in this paper, we first do a
forensic analysis of Linux executable and linkable format (ELF) files. Our forensic analysis provides insight into different
features that have the potential to discriminate malicious executables from benign ones. As a result, we can select a features’
set of 383 features that are extracted from an ELF headers. We quantify the classification potential of features using information
gain and then remove redundant features by employing preprocessing filters. Finally, we do an extensive evaluation among classical
rule-based machine learning classifiers—RIPPER, PART, C4.5 Rules, and decision tree J48—and bio-inspired classifiers—cAnt
Miner, UCS, XCS, and GAssist—to select the best classifier for our system. We have evaluated our approach on an available
collection of 709 Linux malware samples from vx heavens and offensive computing. Our experiments show that ELF-Miner provides more than 99% detection accuracy with less than 0.1% false alarm rate. 相似文献
10.
Plants have various self-defense mechanisms against biotic attacks, involving both physical and chemical barriers. Physical barriers include spines, trichomes, and cuticle layers, whereas chemical barriers include secondary metabolites (SMs) and volatile organic compounds (VOCs). Complex interactions between plants and herbivores occur. Plant responses to insect herbivory begin with the perception of physical stimuli, chemical compounds (orally secreted by insects and herbivore-induced VOCs) during feeding. Plant cell membranes then generate ion fluxes that create differences in plasma membrane potential (Vm), which provokes the initiation of signal transduction, the activation of various hormones (e.g., jasmonic acid, salicylic acid, and ethylene), and the release of VOCs and SMs. This review of recent studies of plant–herbivore–infection interactions focuses on early and late plant responses, including physical barriers, signal transduction, SM production as well as epigenetic regulation, and phytohormone responses. 相似文献