全文获取类型
收费全文 | 338篇 |
免费 | 14篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 87篇 |
金属工艺 | 10篇 |
机械仪表 | 12篇 |
建筑科学 | 14篇 |
能源动力 | 14篇 |
轻工业 | 35篇 |
水利工程 | 3篇 |
石油天然气 | 1篇 |
无线电 | 23篇 |
一般工业技术 | 105篇 |
冶金工业 | 26篇 |
原子能技术 | 1篇 |
自动化技术 | 24篇 |
出版年
2024年 | 1篇 |
2023年 | 10篇 |
2022年 | 12篇 |
2021年 | 9篇 |
2020年 | 8篇 |
2019年 | 19篇 |
2018年 | 12篇 |
2017年 | 26篇 |
2016年 | 21篇 |
2015年 | 10篇 |
2014年 | 10篇 |
2013年 | 28篇 |
2012年 | 24篇 |
2011年 | 21篇 |
2010年 | 27篇 |
2009年 | 19篇 |
2008年 | 11篇 |
2007年 | 7篇 |
2006年 | 9篇 |
2005年 | 8篇 |
2004年 | 11篇 |
2003年 | 6篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 8篇 |
1997年 | 5篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1972年 | 1篇 |
1965年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有358条查询结果,搜索用时 15 毫秒
1.
Mohammed Amin Salih Venkatachalam K. Hubálovský S. Trojovský P. Prabu P. 《Mobile Networks and Applications》2022,27(3):1050-1059
Mobile Networks and Applications - 5G/6G communication are first generation high speed wireless communication network which integrates the aerial data, terrestrial data and maritime data via... 相似文献
2.
Wireless Personal Communications - This paper considers half-duplex cooperative spectrum sharing scheme where both primary and secondary systems mutually cooperate with each other to exploit... 相似文献
3.
Senthilkumar M. Vasundhara M. G. Kalavathi G. K. 《International Journal of Mechanics and Materials in Design》2019,15(3):611-627
International Journal of Mechanics and Materials in Design - The resonant frequency of electromechanical energy harvester should be tuned to ambient frequency so as to maximize the harvester power.... 相似文献
4.
The present study was carried out to evaluate the effects of ozone on rice grains for the following three conditions: saturation time, decay rate, and half-life of ozone. Experiments were performed in different bed thicknesses (5 and 10 cm) and moisture content (11.4 and 14.2% wb) at atmospheric conditions. The lowest saturation time of ozone was 119 min, with the concentration of 516 ppm for rice grains ozonated at 5-cm bed thickness with 11.4% (wb) moisture content. The decay rate kinetics of ozone obtained were consistent with a first-order model. Regarding the half-life of ozone, the lowest value obtained was 6.78 min for rice grains ozonated at 10-cm bed thickness with 14.2% (wb) moisture content. 相似文献
5.
C Mao R Vig TK Venkatachalam EA Sudbeck FM Uckun 《Canadian Metallurgical Quarterly》1998,8(16):2213-2218
6.
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code (ECEMAC) has been used to aggregate the parameters generated from the wearable sensor devices of the patient. The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO. Aggregation scheme will reduce the number of transmissions over the network. The aggregated data are preprocessed at edge node to remove the noise for better diagnosis. Edge node will reduce the overhead of cloud server. The aggregated data are forward to cloud server for central storage and diagnosis. This proposed smart diagnosis will reduce the transmission cost through aggregation scheme which will reduce the energy of the system. Energy cost for proposed system for 300 nodes is 0.34μJ. Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme (SPPDA), concealed data aggregation scheme for multiple application (CDAMA) and secure aggregation scheme (ASAS) are 1.3 μJ, 0.81 μJ and 0.51 μJ respectively. The optimization approaches and encryption method will ensure the data privacy. 相似文献
7.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI. 相似文献
8.
Z Dong Y Patel P Saikumar JM Weinberg MA Venkatachalam 《Canadian Metallurgical Quarterly》1998,78(6):657-668
Studies during the past decade have led to the recognition of a fundamental, widely expressed mechanism of structural damage in energy-deprived cells, which is suppressed by physiologic levels of glycine and is independent of Ca2+ availability or alterations of cytosolic free Ca2+. To gain insight into this process, Madin-Darby canine kidney (MDCK) cells were depleted of adenosine triphosphate (ATP) by a mitochondrial uncoupler in glucose-free medium, and intracellular free Ca2+ was clamped at 100 nM to avoid calcium cytotoxicity. Although the ATP-depleted cells swelled and blebbed and their plasma membranes appeared to be under tension, they nevertheless became permeable to macromolecules. The plasma membranes of these cells retained structural continuity, as determined by morphologic observations, and confocal microscopy of a plasma membrane protein label (Biotin: Ultra Avidin-Texas Red) and a lipid label (NBD-sphingomyelin). Using fluoresceinated dextrans of graded molecular size, membrane permselectivity was examined noninvasively by confocal microscopy. Measured as inside/outside ratios of fluorescence intensity, the permeability indices showed progressively greater restriction to diffusion of increasingly larger dextran molecules across plasma membranes, with sharp break-points between 70,000 and 145,000 daltons (d). The results indicated that the membranes behaved as if they were perforated by water-filled channels or "pores," with size-exclusion limits of molecular dimensions. The membrane defects evolved from small pores permeable only to propidium iodide (668 d) and the smallest dextran (4,000 d), before enlarging with time to become permeable to larger dextrans. Inclusion of glycine during ATP depletion did not affect cell swelling or blebbing but completely prevented the development of permeability defects. Treatment of cells before ATP depletion with a membrane-impermeant homobifunctional "nearest neighbor" cross-linking agent, 3,3' dithiobis(sulfosuccinimidylpropionate), suppressed the development of permeability defects, even in the absence of glycine. These observations suggest that the cellular abnormality that is suppressed by glycine involves rearrangement of plasma membrane proteins to form water-filled pores large enough to leak macromolecules. 相似文献
9.
Cognitive Radio Network (CRN) is an intelligent wireless communication system that adapts itself to variations in the incoming radio frequency stimuli by modifying the operating parameters. Using the spectrum sensing techniques, the idle channels are detected, and allocated to the Secondary Users (SUs). The existing cooperative spectrum sensing techniques such as centralized sensing technique, Distributed sensing technique, and External sensing technique exploit efficient prediction models for allocating the frequency spectrum to SUs. For an optimal assignment of the channel using channel parameters, the channel estimation techniques such as pilot-assisted channel estimation, blind and semi blind estimation technique, and decision directed channel estimation technique are analyzed. The flexible nature of the CRN introduces various security attacks such as Primary User Emulation Attack, Objective Function Attack, Jamming Attack, Spectrum Sensing Data Falsification (SSDF), Control Channel Saturation DoS Attack (CCSD), Selfish Channel Negotiation (SCN), Sinkhole Attacks, HELLO Flood Attacks and Lion Attack. From the surveyed results, it is observed that the existing spectrum sensing, and prediction-based techniques consume more energy, and minimal data transmission rate for detecting the idle channel. Further, the end-to-end delay, energy consumption, end-to-end delay, and bandwidth are not minimized by the existing techniques. 相似文献
10.
Dhineshbabu Nattanmai Raman Karunakaran Gopalu Suriyaprabha Rangaraj Manivasakan Palanisamy Rajendran Venkatachalam 《纳微快报(英文)》2014,6(1):46-54
Nano-Micro Letters - Magnesia (MgO) nanoparticles were produced from magnesite ore (MgCO3) using ball mill. The crystalline size, morphology and specific SSA were characterized by X-ray diffraction... 相似文献