全文获取类型
收费全文 | 543篇 |
免费 | 34篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 6篇 |
综合类 | 1篇 |
化学工业 | 147篇 |
金属工艺 | 12篇 |
机械仪表 | 19篇 |
建筑科学 | 16篇 |
矿业工程 | 3篇 |
能源动力 | 40篇 |
轻工业 | 77篇 |
水利工程 | 16篇 |
石油天然气 | 15篇 |
无线电 | 30篇 |
一般工业技术 | 62篇 |
冶金工业 | 34篇 |
原子能技术 | 7篇 |
自动化技术 | 96篇 |
出版年
2023年 | 14篇 |
2022年 | 24篇 |
2021年 | 30篇 |
2020年 | 22篇 |
2019年 | 29篇 |
2018年 | 19篇 |
2017年 | 24篇 |
2016年 | 28篇 |
2015年 | 20篇 |
2014年 | 21篇 |
2013年 | 57篇 |
2012年 | 40篇 |
2011年 | 36篇 |
2010年 | 21篇 |
2009年 | 16篇 |
2008年 | 13篇 |
2007年 | 19篇 |
2006年 | 14篇 |
2005年 | 13篇 |
2004年 | 5篇 |
2003年 | 9篇 |
2002年 | 9篇 |
2001年 | 7篇 |
2000年 | 4篇 |
1999年 | 5篇 |
1998年 | 12篇 |
1997年 | 5篇 |
1996年 | 4篇 |
1993年 | 3篇 |
1991年 | 3篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 5篇 |
1977年 | 2篇 |
1976年 | 6篇 |
1975年 | 4篇 |
1974年 | 3篇 |
1973年 | 1篇 |
1972年 | 2篇 |
1971年 | 1篇 |
1969年 | 1篇 |
1967年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有581条查询结果,搜索用时 0 毫秒
1.
With lower costs and greater availability, heavy fuel oil appears as an attractive alternative to the conventional gas oil used in industrial gas turbines. However, higher levels of radiation and smoke are expected, and this note reports on some preliminary tests made with a combustion chamber burning fuels of different carbon content, ranging from kerosine to a 25% blend of residual fuel oil in gas oil, at a chamber pressure of 10 atm*. The combustion rig was equipped with a total-radiation pyrometer and black-body furnace capable of measurement at different axial stations along the spray-stabilized flame. The presence of the residual fuel oil in the gas oil was found to promote significant increases in the mean levels of radiation, emissivity and smoke density, with a modest increase in liner temperature. 相似文献
2.
Bahareh ZIBANEZHAD Kamran ZAMANIFAR Razieh Sadat SADJADY Yousef RASTEGARI 《浙江大学学报(英文版)(C辑:计算机与电子)》2011,12(9)
With the growing use of service-oriented architecture for designing next generation software systems,the service composition problem and its execution complexity have become even more important in resp... 相似文献
3.
Salam Al-E’mari Mohammed Anbar Yousef Sanjalawe Selvakumar Manickam Iznan Hasbullah 《计算机系统科学与工程》2022,40(1):87-102
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology. 相似文献
4.
This work is focused on the study of combined heat and mass transfer or double-diffusive convection near a vertical truncated cone embedded in a fluid-saturated porous medium in the presence of thermal radiation, magnetic field and variable viscosity effects. The viscosity of the fluid is assumed to be an inverse linear function of the fluid temperature. A boundary-layer analysis is employed to derive the non-dimensional governing equations. The governing equations for this investigation are transformed into a set of non-similar equations and solved numerically using the fourth-order Runge–Kutta integration scheme with the Newton–Raphson shooting technique. Comparisons with previously published work on special cases of the problem are performed and the results are found to be in excellent agreement. A parametric study illustrating the influence of the radiation parameter, magnetic field parameter, viscosity-variation parameter, buoyancy ratio and the Lewis number on the fluid velocity, temperature and solute concentration profiles as well as the Nusselt number and Sherwood number is conducted. The results of this parametric study are shown graphically and the physical aspects of the problem are highlighted and discussed. 相似文献
5.
Nooshin Bigdeli Yousef Farid Karim Afshar 《Engineering Applications of Artificial Intelligence》2012,25(4):753-765
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme. 相似文献
6.
A method of tuning for PI controllers with one-way lead/lag decoupling tuning is demonstrated for 2×2 input-output systems, based on finite frequency response data. The frequency response estimates are obtained from closed loop tests using an identification technique based on bandpass filters. The open-loop frequency response is calculated and used to tune PI controllers and to fit lead-lag compensators for decoupling by weighted least-squares. Separate optimization of the PI controllers and the lead-lag compensator is preferred. The tuning takes into account violations of desired multivariable robustness criteria. The method is illustrated by application to a paper machine headbox simulation and by experiments in distillation column temperature control. 相似文献
7.
8.
Yousef M. Hijji Rajeesha Rajan Amjad M. Shraim 《International journal of molecular sciences》2022,23(21)
Interest in developing selective and sensitive metal sensors for environmental, biological, and industrial applications is mounting. The goal of this work was to develop a sensitive and selective sensor for certain metal ions in solution. The goal was achieved via (i) preparing the sensor ((E)-2-((pyridine-3-ylimino)methyl)phenol) (3APS) using microwave radiation in a short time and high yield and (ii) performing spectrophotometric titrations for 3APS with several metal ions. 3APS, a Schiff base, was prepared in 5 min and in a high yield (95%) using microwave-assisted synthesis. The compound was characterized by FTIR, XRD, NMR, and elemental analysis. Spectrophotometric titration of 3APS was performed with Al(III), Ba(II), Cd(II), Co(II), Cu(II), Fe(III), Mn(II), Ni(II), and Zn(II). 3APS showed good abilities to detect Al(III) and Fe(III) ions fluorescently and Cu(II) ion colorimetrically. The L/M stoichiometric ratio was 2:1 for Cu(II) and 1:1 for Al(III) and Fe(III). Low detection limits (μg/L) of 324, 20, and 45 were achieved for Cu(II), Al(III), and Fe(III), respectively. The detection of aluminum was also demonstrated in antiperspirant deodorants, test strips, and applications in secret writing. 3APS showed high fluorescent selectivity for Al(III) and Fe(III) and colorimetric selectivity towards Cu(II) with detection limits lower than corresponding safe drinking water guidelines. 相似文献
9.
The objectives of this study were to investigate the variability among Listeria monocytogenes strains in response to high-pressure processing, identify the most resistant strain as a potential target of pressure processing, and compare the inactivation kinetics of pressure-resistant and pressure-sensitive strains under a wide range (350 to 800 MPa) of pressure treatments. The pressure resistance of Listeria innocua and nine strains of L. monocytogenes was compared at 400 or 500 MPa and 30 degrees C. Significant variability among strains was observed. The decrease in log CFU/ml during the pressure treatment was from 1.4 to 4.3 at 400 MPa and from 3.9 to >8 at 500 MPa. L. monocytogenes OSY-8578 exhibited the greatest pressure resistance, Scott A showed the greatest pressure sensitivity, and L. innocua had intermediate resistance. On the basis of these findings, L. monocytogenes OSY-8578 is a potential target strain for high-pressure processing efficacy studies. The death kinetics of L. monocytogenes Scott A and OSY-8578 were investigated at 350 and 800 MPa. Survivors at 350 MPa were enumerated by direct plating, and survivors at 800 MPa were enumerated by the most-probable-number technique. Both pressure-resistant and pressure-sensitive strains exhibited non-first-order death behavior, and excessive pressure treatment did not eliminate the tailing phenomenon. 相似文献
10.