首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   451篇
  免费   21篇
  国内免费   4篇
电工技术   16篇
综合类   1篇
化学工业   109篇
金属工艺   11篇
机械仪表   12篇
建筑科学   13篇
能源动力   55篇
轻工业   19篇
水利工程   2篇
石油天然气   6篇
无线电   38篇
一般工业技术   97篇
冶金工业   32篇
原子能技术   6篇
自动化技术   59篇
  2023年   6篇
  2022年   20篇
  2021年   24篇
  2020年   28篇
  2019年   18篇
  2018年   18篇
  2017年   31篇
  2016年   23篇
  2015年   18篇
  2014年   27篇
  2013年   40篇
  2012年   33篇
  2011年   30篇
  2010年   18篇
  2009年   11篇
  2008年   10篇
  2007年   12篇
  2006年   8篇
  2005年   6篇
  2004年   9篇
  2003年   8篇
  2002年   2篇
  2001年   8篇
  2000年   7篇
  1999年   4篇
  1998年   10篇
  1997年   9篇
  1996年   5篇
  1995年   2篇
  1994年   5篇
  1993年   6篇
  1990年   3篇
  1988年   2篇
  1987年   2篇
  1985年   1篇
  1984年   2篇
  1983年   5篇
  1982年   1篇
  1980年   1篇
  1976年   2篇
  1970年   1篇
排序方式: 共有476条查询结果,搜索用时 15 毫秒
1.
The case-based learning (CBL) approach has gained attention in medical education as an alternative to traditional learning methodology. However, current CBL systems do not facilitate and provide computer-based domain knowledge to medical students for solving real-world clinical cases during CBL practice. To automate CBL, clinical documents are beneficial for constructing domain knowledge. In the literature, most systems and methodologies require a knowledge engineer to construct machine-readable knowledge. Keeping in view these facts, we present a knowledge construction methodology (KCM-CD) to construct domain knowledge ontology (i.e., structured declarative knowledge) from unstructured text in a systematic way using artificial intelligence techniques, with minimum intervention from a knowledge engineer. To utilize the strength of humans and computers, and to realize the KCM-CD methodology, an interactive case-based learning system(iCBLS) was developed. Finally, the developed ontological model was evaluated to evaluate the quality of domain knowledge in terms of coherence measure. The results showed that the overall domain model has positive coherence values, indicating that all words in each branch of the domain ontology are correlated with each other and the quality of the developed model is acceptable.  相似文献   
2.
Clean Technologies and Environmental Policy - The concentration of any disinfectant is a major parameter which is used to evaluate the quality of water. Chlorine is the most common disinfecting...  相似文献   
3.
The non-uniformity of the air temperatures and the slow flow rate at the plane collector exit constitute the main cause of the limitations of the solar drying systems. In order to obtain an uniform and a variable flow rate for different uses, a hot air generator using concentrated solar radiation is proposed. To improve the thermal efficiency of the generator, a study of the influence of different shape parameters is realized. The generator is simulated in the laboratory while investigating the flow induced by a circular disc heated uniformly by Joule effect at constant temperature. This disc is placed at the entrance of an open ended vertical cylinder of a larger diameter. Thermal radiation emitted by the hot disc heats the cylinder wall. The heating of the fluid at the cylinder-inlet generates a thermosiphon flow around the one created by the hot disc. The comparison of the velocity and the temperature profiles of the resulting flow permits to determine the influence of the cylinder height, the vertical source-cylinder spacing and the radius ratio, on the resulting flow at the system exit. Thus, a judicious choice of the shape parameters entails an improvement of the flow rate as well as the thermal flux absorbed by the air and a good homogenization of the air temperature at the generator exit.  相似文献   
4.
针对当前大型互联网站提升用户体验的需求,本研究创造性地提出基于本体的用户行为分析引擎的思想,它通过上下文感知技术,实时获取用户访问页面时的上下文信息(以下也称为动态行为),基于本体对用户行为建模,建立基于规则的上下文推理算法,对监测到的动态用户行为进行实时推理,及时反馈结果信息给用户。实验表明:本研究理论上独辟蹊径,设计实现上结合了云存储技术,能够一定程度改善用户体验效果。  相似文献   
5.
Real-Time Systems - Heterogeneous MPSoCs are being used more and more, from cellphones to critical embedded systems. Most of those systems offer heterogeneous sets of identical cores. In this...  相似文献   
6.
Vertical handover gain significant importance due to the enhancements in mobility models by the Fourth Generation (4G) technologies. However, these enhancements are limited to specific scenarios and hence do not provide support for generic mobility. Similarly, various schemes are proposed based on these mobility models but most of them are suffered from the high packet loss, frequent handovers, too early and late handovers, inappropriate network selection, etc. To address these challenges, a generic vertical handover management scheme for heterogeneous wireless networks is proposed in this article. The proposed scheme works in three phases. In the first phase, a handover triggering approach is designed to identify the appropriate place for initiating handover based on the estimated coverage area of a WLAN access point or cellular base station. In the second phase, fuzzy rule based system is designed to eliminate the inappropriate networks before deciding an optimal network for handover. In the third phase, a network selection scheme is developed based on the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) decision mechanism. Various parameters such as delay, jitter, Bit Error Rate (BER), packet loss, communication cost, response time, and network load are considered for selecting an optimal network. The proposed scheme is tested in a mobility scenario with different speeds of a mobile node ranging from very low to very high. The simulation results are compared with the existing decision models used for network selection and handover triggering approaches. The proposed scheme outperforms these schemes in terms of energy consumption, handover delay and time, packet loss, good put, etc.  相似文献   
7.
The existing measurements of global solar radiation and sunshine duration for Yemen are examined. The errors of estimating solar radiation from sunshine hour measurements using Angstrom's relation are evaluated. As a simple predictor for global radiation, an average Ansgtrom relations in the form

for all stations is evaluated. Other Angstrom correlation relations are also proposed by classifying the stations under into four groups. The estimated results are compared and seem to be satisfactory in the latter case.  相似文献   
8.
It is envisaged that the application of the multilevel security (MLS) scheme will enhance flexibility and effectiveness of authorization policies in shared enterprise databases and will replace cumbersome authorization enforcement practices through complicated view definitions on a per user basis. However, the critical problem with the current model is that the belief at a higher security level is cluttered with irrelevant or inconsistent data as no mechanism for attenuation is supported. Critics also argue that it is imperative for MLS database users to theorize about the belief of others, perhaps at different security levels, an apparatus that is currently missing and the absence of which is seriously felt.The impetus for our current research is the need to provide an adequate framework for belief reasoning in MLS databases. In this paper, we show that these concepts can be captured in a F-logic style declarative query language, called MultiLog, for MLS deductive databases for which a proof theoretic, model theoretic and fixpoint semantics exist. This development is significant from a database perspective as it now enables us to compute the semantics of MultiLog databases in a bottom-up fashion. We also define a bottom-up procedure to compute unique models of stratified MultiLog databases. Finally, we establish the equivalence of MultiLog's three logical characterizations—model theory, fixpoint theory and proof theory.  相似文献   
9.
Security and imperceptibility are fundamental issues for steganography. This paper presents a multi-level steganography system based on concealing and deception. Basically, the secret image is embedded in a cover image, which in turn is embedded in another higher-level cover image. Each steganography level provides additional security, with lower levels implemented using stronger steganography methods. Furthermore, in the event that the higher level steganography is compromised, it would include misleading information to deceive the attacker that he/she is successfully eavesdropping. One challenge of hierarchical system is retaining hidden data in lower level in a higher level stenographic technique. To mitigate this issue, we designed a novel technique which combines discrete cosine transform and least significant bit (LSB). The technique objective is to maximize the capacity and invisibility of the secret image with minimal modification to the cover image (at most k-bits per block). The performance (capacity and peak signal-to-noise ratio) of the proposed method has superior performance compared with LSB since it combines the benefits of 1-bit and 3-bit LSBs. Furthermore, the paper demonstrates that the secret message is successfully embedded and extracted in two-level steganography system with peak signal-to-nose ratio greater than 20 dB.  相似文献   
10.
Hydrogenation of p‐nitrophenol (PNP) to p‐aminophenol (PAP) using NaBH4 as a reducing agent was studied as a test reaction for determining the catalytic activity of supported Pt catalysts. The initial reaction rate, which is accessible within less than 10 min via online UV‐vis spectroscopy at room temperature, ambient pressure, and in water as solvent, was applied as measure for catalytic activity. For three Pt catalysts supported on porous SiO2, porous glass, and Al2O3, respectively, significant differences in the catalytic activity by almost one order of magnitude were observed. However, especially in the case of very active catalysts, limitations of the reaction by internal or external mass transfer have to be considered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号