首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   564篇
  免费   32篇
  国内免费   2篇
电工技术   12篇
化学工业   123篇
金属工艺   8篇
机械仪表   15篇
建筑科学   47篇
能源动力   26篇
轻工业   35篇
水利工程   2篇
石油天然气   7篇
无线电   70篇
一般工业技术   100篇
冶金工业   39篇
原子能技术   5篇
自动化技术   109篇
  2024年   4篇
  2023年   11篇
  2022年   27篇
  2021年   32篇
  2020年   29篇
  2019年   32篇
  2018年   44篇
  2017年   28篇
  2016年   36篇
  2015年   23篇
  2014年   22篇
  2013年   39篇
  2012年   32篇
  2011年   32篇
  2010年   34篇
  2009年   33篇
  2008年   30篇
  2007年   15篇
  2006年   16篇
  2005年   11篇
  2004年   7篇
  2003年   10篇
  2002年   7篇
  2001年   3篇
  2000年   1篇
  1999年   5篇
  1998年   4篇
  1997年   4篇
  1996年   7篇
  1995年   4篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1988年   1篇
  1987年   1篇
  1984年   1篇
  1983年   1篇
  1981年   1篇
  1980年   1篇
  1977年   1篇
  1976年   1篇
  1974年   1篇
排序方式: 共有598条查询结果,搜索用时 15 毫秒
1.
2.

In wireless sensor networks (WSNs), the appearance of coverage holes over a large target field is mostly possible. Those holes reduce network performance and may affect the network efficiency. Several approaches were proposed to heal coverage holes in WSNs, but they still suffer from some weaknesses. In this paper we suggest a distributed algorithm, named hybrid hole healing algorithm (3HA), to find the minimum effective patching positions to deploy additional nodes to cover the holes. A hole manager node of each hole is responsible for operating the 3HA algorithm which requires two phases. The first phase finds all candidate patching positions using a Voronoi diagram. It takes all Voronoi vertices within the hole as the initial patching positions list. The second phase reduces as much as possible this list based on integer linear programming and on a probabilistic sensor model. The 3HA algorithm repeats the above phases in rounds, until all Voronoi vertices are covered. Simulation results show that our solution offers a high coverage ratio for various forms and sizes of holes and reduces the number of additional sensors when compared to some algorithms like the Perimeter-based, the Delaunay triangulation-based, the Voronoi-based, and the Trees-based coverage hole healing methods.

  相似文献   
3.
Wireless Personal Communications - In the formulating of power control for wireless networks, the radio channel is commonly formulated using static models of optimization or game theory. In these...  相似文献   
4.
Results from applying the model on a sample of contractors, the majority of whom were international and operating in Egypt, reinforces the credibility of the developed methodology, claim the authors.  相似文献   
5.
With more than 25 million people affected, heart failure (HF) is a global threat. As energy production pathways are known to play a pivotal role in HF, we sought here to identify key metabolic changes in ischemic- and non-ischemic HF by using a multi-OMICS approach. Serum metabolites and mRNAseq and epigenetic DNA methylation profiles were analyzed from blood and left ventricular heart biopsy specimens of the same individuals. In total we collected serum from n = 82 patients with Dilated Cardiomyopathy (DCM) and n = 51 controls in the screening stage. We identified several metabolites involved in glycolysis and citric acid cycle to be elevated up to 5.7-fold in DCM (p = 1.7 × 10−6). Interestingly, cardiac mRNA and epigenetic changes of genes encoding rate-limiting enzymes of these pathways could also be found and validated in our second stage of metabolite assessment in n = 52 DCM, n = 39 ischemic HF and n = 57 controls. In conclusion, we identified a new set of metabolomic biomarkers for HF. We were able to identify underlying biological cascades that potentially represent suitable intervention targets.  相似文献   
6.
The discovery of eco-friendly, rapid, and cost-effective compounds to control diseases caused by microbes and insects are the main challenges. Herein, the magnesium oxide nanoparticles (MgO-NPs) are successfully fabricated by harnessing the metabolites secreted by Penicillium chrysogenum. The fabricated MgO-NPs were characterized using UV-Vis, XRD, TEM, DLS, EDX, FT-IR, and XPS analyses. Data showed the successful formation of crystallographic, spherical, well-dispersed MgO-NPs with sizes of 7–40 nm at a maximum wavelength of 250 nm. The EDX analysis confirms the presence of Mg and O ions as the main components with weight percentages of 13.62% and 7.76%, respectively. The activity of MgO-NPs as an antimicrobial agent was investigated against pathogens Staphylococcus aureus, Bacillus subtilis, Pseudomonas aeruginosa, Escherichia coli, and Candida albicans, and exhibited zone of inhibitions of 12.0 ± 0.0, 12.7 ± 0.9, 23.3 ± 0.8, 17.7 ± 1.6, and 14.7 ± 0.6 mm respectively, at 200 µg mL−1. The activity is decreased by decreasing the MgO-NPs concentration. The biogenic MgO-NPs exhibit high efficacy against different larvae instar and pupa of Anopheles stephensi, with LC50 values of 12.5–15.5 ppm for I–IV larvae instar and 16.5 ppm for the pupa. Additionally, 5 mg/cm2 of MgO-NPs showed the highest protection percentages against adults of Anopheles stephensi, with values of 100% for 150 min and 67.6% ± 1.4% for 210 min.  相似文献   
7.
As part of the face recognition task in a robust security system, we propose a novel approach for the illumination recovery of faces with cast shadows and specularities. Given a single 2D face image, we relight the face object by extracting the nine spherical harmonic bases and the face spherical illumination coefficients by using the face spherical spaces properties. First, an illumination training database is generated by computing the properties of the spherical spaces out of face albedo and normal values estimated from 2D training images. The training database is then discriminately divided into two directions in terms of the illumination quality and light direction of each image. Based on the generated multi-level illumination discriminative training space, we analyze the target face pixels and compare them with the appropriate training subspace using pre-generated tiles. When designing the framework, practical real-time processing speed and small image size were considered. In contrast to other approaches, our technique requires neither 3D face models nor restricted illumination conditions for the training process. Furthermore, the proposed approach uses one single face image to estimate the face albedo and face spherical spaces. In this work, we also provide the results of a series of experiments performed on publicly available databases to show the significant improvements in the face recognition rates.  相似文献   
8.
The solubility of CO2 in triethylene glycol monomethyl ether (TEGMME) has been measured at 40, 70 and 100°C at pressures up to 8.8 MPa. The results were correlated with the Peng-Robinson (1976) equation of state. The interaction parameters and Henry's constants were derived.  相似文献   
9.
This article is devoted to the assessment of Tunisian agricultural production and food trade balance water-equivalent. A linear regression model relating annual rainfall to crop yields is developed to estimate the agricultural production water-equivalent. Its implementation is based on national data for crop and animal production, leading to food demand water-equivalent quantification. Results highlight the relationship between agricultural and water policies and provide a picture of food security in the country in relation to local agricultural production, and to virtual water fluxes related to foodstuffs trade balance.  相似文献   
10.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号