首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1182篇
  免费   78篇
  国内免费   5篇
电工技术   28篇
综合类   4篇
化学工业   248篇
金属工艺   28篇
机械仪表   64篇
建筑科学   15篇
矿业工程   1篇
能源动力   90篇
轻工业   128篇
水利工程   3篇
石油天然气   4篇
无线电   115篇
一般工业技术   218篇
冶金工业   59篇
原子能技术   17篇
自动化技术   243篇
  2024年   6篇
  2023年   23篇
  2022年   80篇
  2021年   111篇
  2020年   69篇
  2019年   78篇
  2018年   81篇
  2017年   64篇
  2016年   67篇
  2015年   44篇
  2014年   68篇
  2013年   83篇
  2012年   57篇
  2011年   67篇
  2010年   45篇
  2009年   38篇
  2008年   27篇
  2007年   28篇
  2006年   35篇
  2005年   25篇
  2004年   17篇
  2003年   18篇
  2002年   19篇
  2001年   8篇
  2000年   14篇
  1999年   12篇
  1998年   25篇
  1997年   10篇
  1996年   9篇
  1995年   4篇
  1994年   13篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1989年   2篇
  1986年   1篇
  1985年   2篇
  1983年   1篇
  1980年   2篇
  1978年   1篇
  1977年   2篇
  1975年   1篇
  1973年   1篇
排序方式: 共有1265条查询结果,搜索用时 15 毫秒
1.
Garzan oil field is located at the south east of Turkey. It is a mature oil field and the reservoir is fractured carbonate reservoir. After producing about 1% original oil in place (OOIP) reservoir pressure started to decline. Waterflooding was started in order to support reservoir pressure and also to enhance oil production in 1960. Waterflooding improved the oil recovery but after years of flooding water breakthrough at the production wells was observed. This increased the water/oil ratio at the production wells. In order to enhance oil recovery again different techniques were investigated. Chemical enhanced oil recovery (EOR) methods are gaining attention all over the world for oil recovery. Surfactant injection is an effective way for interfacial tension (IFT) reduction and wettability reversal. In this study, 31 different types of chemicals were studied to specify the effects on oil production. This paper presents solubility of surfactants in brine, IFT and contact angle measurements, imbibition tests, and lastly core flooding experiments. Most of the chemicals were incompatible with Garzan formation water, which has high divalent ion concentration. In this case, the usage of 2-propanol as co-surfactant yielded successful results for stability of the selected chemical solutions. The results of the wettability test indicated that both tested cationic and anionic surfactants altered the wettability of the carbonate rock from oil-wet to intermediate-wet. The maximum oil recovery by imbibition test was reached when core was exposed 1-ethly ionic liquid after imbibition in formation water. Also, after core flooding test, it is concluded that considerable amount of oil can be recovered from Garzan reservoir by waterflooding alone if adverse effects of natural fractures could be eliminated.  相似文献   
2.
3.
In compressive sampling theory, the least absolute shrinkage and selection operator (LASSO) is a representative problem. Nevertheless, the non-differentiable constraint impedes the use of Lagrange programming neural networks (LPNNs). We present in this article the -LPNN model, a novel algorithm that tackles the LASSO minimization together with the underlying theory support. First, we design a sequence of smooth constrained optimization problems, by introducing a convenient differentiable approximation to the non-differentiable -norm constraint. Next, we prove that the optimal solutions of the regularized intermediate problems converge to the optimal sparse signal for the LASSO. Then, for every regularized problem from the sequence, the -LPNN dynamic model is derived, and the asymptotic stability of its equilibrium state is established as well. Finally, numerical simulations are carried out to compare the performance of the proposed -LPNN algorithm with both the LASSO-LPNN model and a standard digital method.  相似文献   
4.
Multimedia Tools and Applications - The world is facing many problems including that of traffic congestion. To highlight the issue of traffic congestion worldwide specially in urban areas and to...  相似文献   
5.
Metal Science and Heat Treatment - The effect of solid boronizing at 950°C for 2 and 4 h on the phase composition, microstructure, hardness and abrasive wear of steel AISI 304L is studied...  相似文献   
6.
Best Estimate computer codes have been, so far, developed for safety analysis of nuclear power plants and were extensively validated against a large set of separate effects and integral test facilities experimental data relevant to such kind of reactors. Their application to research reactors is not fully straightforward. Modelling problems generally emerge when applying existing models to low pressure and more particularly to subcooled flow boiling situations. The objective of the present work is to investigate the RELAP5/3.2 system code capabilities in predicting phenomena that could be encountered under abnormal research reactor’s operating conditions. For this purpose, the separate effect related to the static onset of flow instability is investigated. The cases considered herein are the flow excursion tests performed at the Oak Ridge National Laboratory thermal hydraulic test loop (THTL) as well as some representative Whittle and Forgan (W & F) experiments. The simulation results are presented and the capabilities of RELAP5/Mod 3.2 in predicting this critical phenomenon are discussed.  相似文献   
7.
The LiPO3-Y(PO3)3 system has been studied for the first time. Microdifferential thermal analysis (μ-DTA), infrared spectroscopy (IR) and X-ray diffraction were used to investigate the liquidus and solidus relations. The only new compound observed within this system is LiY(PO3)4, melting incongruently at 1104 K. An eutectic appears at 4±1 mol% Y(PO3)3 at 933 K. LiY(PO3)4 crystallizes in the monoclinic system C2/c with a unit cell: a=16.201(4) Å, b=7.013(2) Å, c=9.573(2) Å, β=125.589(9)°, Z=4 and V=884.5 Å3, which is isostructural to LiNd(PO3)4. The infrared absorption spectrum indicates that this salt is a chain polyphosphate.  相似文献   
8.
Conventional enzyme-linked immunosorbent assay (ELISA) is a gold standard for screening antibodies and testing for protein or antigen presence. A significant limitation of this assay resides in the fact that only one analyte can be assessed per microplate well. Here, we describe and investigate a new technology consisting of an automated ELISA system in which up to 10 analytes can be measured within one single well, thus improving productivity, accuracy, and repeatability by reducing the amount of human labor required. Another strength of the platform is that a user can load any necessary sets/subsets of beads to perform required assays, with improved flexibility compared to manufactured-loaded arrays for multiplex analysis. We also demonstrate that this system can be used to determine the pathogenicity (i.e., presence of Shiga toxins) and serotype (i.e., Escherichia coli O157) of E. coli isolates.  相似文献   
9.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious.  相似文献   
10.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号