首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   586篇
  免费   29篇
  国内免费   11篇
电工技术   3篇
综合类   3篇
化学工业   176篇
金属工艺   23篇
机械仪表   13篇
建筑科学   23篇
能源动力   46篇
轻工业   86篇
水利工程   4篇
石油天然气   5篇
无线电   46篇
一般工业技术   88篇
冶金工业   20篇
原子能技术   1篇
自动化技术   89篇
  2024年   6篇
  2023年   14篇
  2022年   39篇
  2021年   74篇
  2020年   35篇
  2019年   41篇
  2018年   53篇
  2017年   23篇
  2016年   28篇
  2015年   16篇
  2014年   31篇
  2013年   44篇
  2012年   32篇
  2011年   38篇
  2010年   23篇
  2009年   22篇
  2008年   18篇
  2007年   18篇
  2006年   7篇
  2005年   8篇
  2004年   5篇
  2003年   6篇
  2002年   5篇
  2001年   2篇
  2000年   3篇
  1999年   1篇
  1998年   5篇
  1997年   2篇
  1996年   2篇
  1995年   4篇
  1993年   1篇
  1991年   1篇
  1988年   2篇
  1986年   1篇
  1985年   2篇
  1983年   2篇
  1982年   2篇
  1981年   4篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
  1956年   1篇
  1954年   1篇
排序方式: 共有626条查询结果,搜索用时 0 毫秒
1.
Dielectric and thermal characteristics of gel grown single crystals of ytterbium tartrate trihydrate have been carried out. The dielectric constant has been measured as a function of frequency in the range 2 kHz–1 MHz and temperature range 30–300 °C. The dielectric constant increases with temperature, attains a peak near 215 °C, and then decreases as the temperature exceeds 215 °C. The dielectric anomaly at 215 °C is suggested to be due to phase transition brought about in the material. The dielectric behaviour of the material is correlated with the results on thermal analysis. Thermogravimetric and differential thermal analysis have been used to study the thermal characteristics of the material. The experimental results show that the material is thermally stable up to 200 °C. The decomposition process occurs in two stages until ytterbium oxide is formed at 700 °C. The non-isothermal kinetic parameters e.g., activation energy and the frequency factor have been evaluated for each stage of thermal decomposition by using the integral method, applying the Coats–Redfern approximation.  相似文献   
2.
A study was undertaken to examine the sensitivity of a wastewater population of coliphage, total coliforms and total flora present in raw sewage and secondary effluent after irradiating with similar doses delivered by a high-energy electron beam and y -radiation. The electron beam study was conducted on a large scale at the Virginia Key Wastewater Treatment Plant, Miami, Fla. The facility is equipped with a 1.5 MeV, 50 mA electron accelerator, with a wastewater flow rate of 8 ls−1. Concurrent y-radiation studies were conducted at laboratory scale using a 5000 Ci, 60Co y -source. Three logs reduction of all three test organisms were observed at an electron beam dose of 500 krads, while at least four logs reduction were observed at the same dose utilizing the y-source.  相似文献   
3.
Autonomous mapping of HL7 RIM and relational database schema   总被引:1,自引:0,他引:1  
Healthcare systems need to share information within and across the boundaries in order to provide better care to the patients. For this purpose, they take advantage of the full potential of current state of the art in healthcare standards providing interoperable solutions. HL7 V3 specification is an international message exchange and interoperability standard. HL7 V3 messages exchanged between healthcare applications are ultimately recorded into local healthcare databases, mostly in relational databases. In order to bring these relational databases in compliance with HL7, mappings between HL7 RIM (Reference Information Model) and relational database schema are required. Currently, RIM and database mapping is largely performed manually, therefore it is tedious, time consuming, error prone and expensive process. It is a challenging task to determine all correspondences between RIM and schema automatically because of extreme heterogeneity issues in healthcare databases. To reduce the amount of manual efforts as much as possible, autonomous mapping approaches are required. This paper proposes a technique that addresses the aforementioned mapping issue and aligns healthcare databases to HL7 V3 RIM specifications. Furthermore, the proposed technique has been implemented as a working application and tested on real world healthcare systems. The application loads the target healthcare schema and then identifies the most appropriate match for tables and the associated fields in the schema by using domain knowledge and the matching rules defined in the Mapping Knowledge Repository. These rules are designed to handle the complexity of semantics found in healthcare databases. The GUI allows users to view and edit/re-map the correspondences. Once all the mappings are defined, the application generates Mapping Specification, which contains all the mapping information i.e. database tables and fields with associated RIM classes and attributes. In order to enable the transactions, the application is facilitated with the autonomous code generation from the Mapping Specification. The Code Generator component focuses primarily on generating custom classes and hibernate mapping files against the runtime system to retrieve and parse the data from the data source—thus allows bi-directional HL7 to database communication, with minimum programming required. Our experimental results show 35–65% accuracy on real laboratory systems, thus demonstrating the promise of the approach. The proposed scheme is an effective step in bringing the clinical databases in compliance with RIM, providing ease and flexibility.  相似文献   
4.
The efficient application of current methods of shadow detection in video is hindered by the difficulty in defining their parameters or models and/or their application domain dependence. This paper presents a new shadow detection and removal method that aims to overcome these inefficiencies. It proposes a semi-supervised learning rule using a new variant of co-training technique for shadow detection and removal in uncontrolled scenes. The new variant both reduces the run-time through a periodical execution of a co-training process according to a novel temporal framework, and generates a more generic prediction model for an accurate classification. The efficiency of the proposed method is shown experimentally on a testbed of videos that were recorded by a static camera and that included several constraints, e.g., dynamic changes in the natural scene and various visual shadow features. The conducted experimental study produced quantitative and qualitative results that highlighted the robustness of our shadow detection method and its accuracy in removing cast shadows. In addition, the practical usefulness of the proposed method was evaluated by integrating it in a Highway Control and Management System software called RoadGuard.  相似文献   
5.
Fast and accurate moving object segmentation in dynamic scenes is the first step in many computer vision applications. In this paper, we propose a new background modeling method for moving object segmentation based on dynamic matrix and spatio-temporal analyses of scenes. Our method copes with some challenges related to this field. A new algorithm is proposed to detect and remove cast shadow. A comparative study by quantitative evaluations shows that the proposed approach can detect foreground robustly and accurately from videos recorded by a static camera and which include several constraints. A Highway Control and Management System called RoadGuard is proposed to show the robustness of our method. In fact, our system has the ability to control highway by detecting strange events that can happen like vehicles suddenly stopped in roads, parked vehicles in emergency zones or even illegal conduct such as going out from the road. Moreover, RoadGuard is capable of managing highways by saving information about the date and time of overloaded roads.  相似文献   
6.
This paper proposes a new feature extraction technique using wavelet based sub-band parameters (WBSP) for classification of unaspirated Hindi stop consonants. The extracted acoustic parameters show marked deviation from the values reported for English and other languages, Hindi having distinguishing manner based features. Since acoustic parameters are difficult to be extracted automatically for speech recognition. Mel Frequency Cepstral Coefficient (MFCC) based features are usually used. MFCC are based on short time Fourier transform (STFT) which assumes the speech signal to be stationary over a short period. This assumption is specifically violated in case of stop consonants. In WBSP, from acoustic study, the features derived from CV syllables have different weighting factors with the middle segment having the maximum. The wavelet transform has been applied to splitting of signal into 8 sub-bands of different bandwidths and the variation of energy in different sub-bands is also taken into account. WBSP gives improved classification scores. The number of filters used (8) for feature extraction in WBSP is less compared to the number (24) used for MFCC. Its classification performance has been compared with four other techniques using linear classifier. Further, Principal components analysis (PCA) has also been applied to reduce dimensionality.  相似文献   
7.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT.  相似文献   
8.
Zhang  Jian  Yang  Xiaokun  Deng  Hui  Qiao  Keke  Farooq  Umar  Ishaq  Muhammad  Yi  Fei  Liu  Huan  Tang  Jiang  Song  Haisheng 《纳微快报(英文)》2017,9(3):1-8
Nano-Micro Letters - A NiFe2O4/expanded graphite (NiFe2O4/EG) nanocomposite was prepared via a simple and inexpensive synthesis method. Its lithium storage properties were studied with the goal of...  相似文献   
9.
Linux malware can pose a significant threat—its (Linux) penetration is exponentially increasing—because little is known or understood about Linux OS vulnerabilities. We believe that now is the right time to devise non-signature based zero-day (previously unknown) malware detection strategies before Linux intruders take us by surprise. Therefore, in this paper, we first do a forensic analysis of Linux executable and linkable format (ELF) files. Our forensic analysis provides insight into different features that have the potential to discriminate malicious executables from benign ones. As a result, we can select a features’ set of 383 features that are extracted from an ELF headers. We quantify the classification potential of features using information gain and then remove redundant features by employing preprocessing filters. Finally, we do an extensive evaluation among classical rule-based machine learning classifiers—RIPPER, PART, C4.5 Rules, and decision tree J48—and bio-inspired classifiers—cAnt Miner, UCS, XCS, and GAssist—to select the best classifier for our system. We have evaluated our approach on an available collection of 709 Linux malware samples from vx heavens and offensive computing. Our experiments show that ELF-Miner provides more than 99% detection accuracy with less than 0.1% false alarm rate.  相似文献   
10.
Plants have various self-defense mechanisms against biotic attacks, involving both physical and chemical barriers. Physical barriers include spines, trichomes, and cuticle layers, whereas chemical barriers include secondary metabolites (SMs) and volatile organic compounds (VOCs). Complex interactions between plants and herbivores occur. Plant responses to insect herbivory begin with the perception of physical stimuli, chemical compounds (orally secreted by insects and herbivore-induced VOCs) during feeding. Plant cell membranes then generate ion fluxes that create differences in plasma membrane potential (Vm), which provokes the initiation of signal transduction, the activation of various hormones (e.g., jasmonic acid, salicylic acid, and ethylene), and the release of VOCs and SMs. This review of recent studies of plant–herbivore–infection interactions focuses on early and late plant responses, including physical barriers, signal transduction, SM production as well as epigenetic regulation, and phytohormone responses.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号