全文获取类型
收费全文 | 174篇 |
免费 | 17篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 35篇 |
金属工艺 | 7篇 |
机械仪表 | 9篇 |
建筑科学 | 6篇 |
能源动力 | 5篇 |
轻工业 | 36篇 |
水利工程 | 4篇 |
石油天然气 | 1篇 |
无线电 | 22篇 |
一般工业技术 | 24篇 |
冶金工业 | 4篇 |
自动化技术 | 38篇 |
出版年
2024年 | 1篇 |
2023年 | 7篇 |
2022年 | 22篇 |
2021年 | 15篇 |
2020年 | 8篇 |
2019年 | 9篇 |
2018年 | 9篇 |
2017年 | 12篇 |
2016年 | 18篇 |
2015年 | 7篇 |
2014年 | 16篇 |
2013年 | 12篇 |
2012年 | 11篇 |
2011年 | 9篇 |
2010年 | 10篇 |
2009年 | 6篇 |
2008年 | 4篇 |
2007年 | 2篇 |
2006年 | 1篇 |
2005年 | 6篇 |
2001年 | 1篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有192条查询结果,搜索用时 64 毫秒
1.
2.
Faraz Montazersadgh Hao Zhang Anas Alkayal Benjamin Buckley Ben W.Kolosz Bing Xu Jin Xuan 《Frontiers of Chemical Science and Engineering》2021,15(1):208-219
Utilizing CO2 in an electro-chemical process and synthesizing value-added chemicals are amongst the few viable and scalable pathways in carbon capture and utilization technologies.CO2 electro-reduction is also counted as one of the main options entailing less fossil fuel consumption and as a future electrical energy storage strategy.The current study aims at developing a new electrochemical platform to produce low-carbon e-biofuel through multifunctional electrosynthesis and integrated co-valorisation of biomass feedstocks with captured CO2.In this approach,CO2 is reduced at the cathode to produce drop-in fuels(e.g.,methanol)while value-added chemicals(e.g.,selective oxidation of alcohols,aldehydes,carboxylic acids and amines/amides)are produced at the anode.In this work,a numerical model of a continuous-flow design considering various anodic and cathodic reactions was built to determine the most techno-economically feasible configurations from the aspects of energy efficiency,environment impact and economical values.The reactor design was then optimized via parametric analysis. 相似文献
3.
Anas Hatim Said Belkouch Mohamed El Aakif Moha M’rabet Hassani Noureddine Chabini 《Multimedia Tools and Applications》2013,67(3):667-685
The Discrete Cosine Transform (DCT) is one of the most widely used techniques for image compression. Several algorithms are proposed to implement the DCT-2D. The scaled SDCT algorithm is an optimization of the DCT-1D, which consists in gathering all the multiplications at the end. In this paper, in addition to the hardware implementation on an FPGA, an extended optimization has been performed by merging the multiplications in the quantization block without having an impact on the image quality. A simplified quantization has been performed also to keep higher the performances of the all chain. Tests using MATLAB environment have shown that our proposed approach produces images with nearly the same quality of the ones obtained using the JPEG standard. FPGA-based implementations of this proposed approach is presented and compared to other state of the art techniques. The target is an an Altera Cyclone II FPGA using the Quartus synthesis tool. Results show that our approach outperforms the other ones in terms of processing-speed, used resources and power consumption. A comparison has been done between this architecture and a distributed arithmetic based architecture. 相似文献
4.
Anas El Husseini Abdallah M’Hamed Bachar El Hassan Mounir Mokhtari 《Personal and Ubiquitous Computing》2013,17(5):1013-1023
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people. 相似文献
5.
Tarek Sheltami Anas Al-Roubaiey Elhadi Shakshuki Ashraf Mahmoud 《Multimedia Systems》2009,15(5):273-282
Mobile Ad-hoc NETworks (MANET) are infrastructureless networks where self-configuring mobile nodes are connected by wireless
links. Because of its decentralized operation, these nodes rely on each other to store and forward packets. Video transmission
over MANETs is more challenging than over conventional wireless networks due to rapid topology changes and lack of central
administration. Most of the proposed MANET protocols assume that all nodes are working within a cooperative and friendly network
context. However, misbehaving nodes that exhibit abnormal behaviors can disrupt the network operation and affect the network
availability by refusing to cooperate to route packets due to their selfish or malicious behavior. In this paper, we examine
the effect of packet dropping attacks on video transmission over MANETs. We also study the effects of mitigation using intrusion
detection systems to MANET in presence of video traffic. To the best of our knowledge, this is the first attempt to study
multimedia over such environments. We propose a novel intrusion detection system, which is an adaptive acknowledgment scheme
(AACK) with the ability to detect misbehaved nodes and avoid them in other transmissions. The aim of AACK scheme is to overcome
watchdog weaknesses due to collisions and limited transmission power and also to improve TWOACK scheme. To demonstrate the
performance of our proposed scheme, simulation experiments are performed. The results of our experiments show that MPEG4 is
more suitable for our simulation environment than H264 video traffic. The simulation results show that AACK scheme provides
better network performance with less overhead than other schemes; it also shows that AACK outperforms both TWOACK and watchdog
in video transmission applications in the presence of misbehaving nodes. 相似文献
6.
Emergence of Antibiotic Resistance in Listeria monocytogenes Isolated from Food Products: A Comprehensive Review 下载免费PDF全文
Amin N. Olaimat Murad A. Al‐Holy Hafiz M. Shahbaz Anas A. Al‐Nabulsi Mahmoud H. Abu Ghoush Tareq M. Osaili Mutamed M. Ayyash Richard A. Holley 《Comprehensive Reviews in Food Science and Food Safety》2018,17(5):1277-1292
Listeria monocytogenes is an opportunistic pathogen that has been involved in several deadly illness outbreaks. Future outbreaks may be more difficult to manage because of the emergence of antibiotic resistance among L. monocytogenes strains isolated from food products. The present review summarizes the available evidence on the emergence of antibiotic resistance among L. monocytogenes strains isolated from food products and the possible ways this resistance has developed. Furthermore, the resistance of food L. monocytogenes isolates to antibiotics currently used in the treatment of human listeriosis such as penicillin, ampicillin, tetracycline, and gentamicin, has been documented. Acquisition of movable genetic elements is considered the major mechanism of antibiotic resistance development in L. monocytogenes. Efflux pumps have also been linked with resistance of L. monocytogenes to some antibiotics including fluoroquinolones. Some L. monocytogenes strains isolated from food products are intrinsically resistant to several antibiotics. However, factors in food processing chains and environments (from farm to table) including extensive or sub‐inhibitory antibiotics use, horizontal gene transfer, exposure to environmental stresses, biofilm formation, and presence of persister cells play crucial roles in the development of antibiotic resistance by L. monocytogenes. 相似文献
7.
8.
This paper studies the behavior of the low‐complexity switch‐and‐examine diversity combining (SEC) and switch‐and‐examine diversity combining with post‐examine selection (SECps) antenna selection schemes with interference. In this paper, we first derive the cumulative distribution function (CDF) of the end‐to‐end (e2e) signal‐to‐interference plus noise ratio at the selection scheme combiner output. This CDF is then used to derive closed‐form expressions for the e2e outage and symbol error probabilities for the independent nonidentically distributed and independent identically distributed cases of diversity branches. In the analysis, the channels of the desired user and the interferers are assumed to follow Rayleigh distribution. Furthermore, to have more details about the system insights, the performance is evaluated at the high signal‐to‐noise ratio (SNR) values where the diversity order and coding gain are derived and analyzed. The derived analytical and asymptotic results are validated via a comparison with Monte‐Carlo simulations. Main findings show that with interference power does not scale with average SNR; the system can still achieve performance gain when more receive antennas are used. This happens at the values of switching threshold that are close to average SNR. Also, results illustrate that the interference is noticeably affecting the gain achieved in system performance when more antennas are used. Furthermore, findings show that the SECps selection scheme outperforms the conventional SEC scheme when more antennas are added with the switching threshold is much larger than the average SNR. Finally, findings show that the SEC and SECps antenna selection schemes are efficient for systems which operate at the range of low SNR values and this makes them attractive candidates to be implemented in the emerging mobile broadband communication systems. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
9.
Philipp von Witzendorff Manuel Stompe Anas Moalem Srecko Cvetkovic Oliver Suttmann Ludger Overmeyer Lutz Rissing 《Precision Engineering》2014
The ultra-precision dicing of hard and brittle materials causes high wear on the abrasive tool which results in the deterioration of blade cross section as well as the decrease of diamond grain exposure. Resin-bonded diamond blades are used due to their in-process self-sharpening capability. Nevertheless, the shape of the blade cross section generated by self-sharpening is random which leads to poor accuracy when precise grooves need to be produced. Metal-bonded diamond blades feature higher tool lifetime and shape accuracy compared to resin-bonded blades, but are not capable of performing self-sharpening. In this study, the laser dressing of metal-bonded diamond blades is investigated to enable their use in the ultra-precision dicing of hard and brittle materials by continuous laser dressing. We investigated laser dressing with and without the presence of cooling water. The sharpness (grain exposure) after dressing is measured by the cutting face surface roughness. The dicing performance is evaluated by observing the dicing results in terms of cutting depth consistency and by monitoring the spindle power during dicing. Dicing blades which have been laser dressed in an environment with coolant feature less grain exposure than dicing blades which have been laser dressed in dry condition. The dicing results show an improvement in the sharpness and durability of laser-dressed dicing blades in comparison with new or conventionally dressed blades. The ability to apply and perform laser dressing on a dicing machine in an environment with coolant shows the feasibility of laser technology for continuous dressing. 相似文献