首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   276篇
  免费   12篇
电工技术   4篇
化学工业   89篇
金属工艺   4篇
机械仪表   17篇
建筑科学   3篇
能源动力   13篇
轻工业   33篇
水利工程   2篇
石油天然气   11篇
无线电   14篇
一般工业技术   49篇
冶金工业   9篇
原子能技术   6篇
自动化技术   34篇
  2023年   8篇
  2022年   39篇
  2021年   29篇
  2020年   17篇
  2019年   13篇
  2018年   14篇
  2017年   8篇
  2016年   19篇
  2015年   5篇
  2014年   13篇
  2013年   27篇
  2012年   9篇
  2011年   12篇
  2010年   9篇
  2009年   8篇
  2008年   7篇
  2007年   6篇
  2006年   2篇
  2005年   2篇
  2004年   4篇
  2003年   2篇
  2002年   8篇
  2001年   1篇
  2000年   3篇
  1999年   1篇
  1998年   3篇
  1997年   5篇
  1996年   4篇
  1994年   3篇
  1991年   1篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1984年   1篇
  1977年   1篇
排序方式: 共有288条查询结果,搜索用时 15 毫秒
1.
Journal of Communications Technology and Electronics - This paper implements mathematically rigorous extended trial function algorithm to address cubic–quartic optical solitons in...  相似文献   
2.
This paper describes a research effort in the area of collision avoidance path planning for robotic manipulators. A robotic arm with known geometry is to perform a spatial manipulation in the presence of known obstacles in its workspace. The task is to generate a series of waypoints for its path to pass through which will guarantee a safe, collision-free trajectory from its predefined starting point to its predefined goal position.This is an important topic in the area of automated manufacturing. Automated factories are becoming increasingly important for the goals of greater manufacturing efficiency, better equipment utilization, and lower overall manufacturing costs. Robotic devices, including manipulator arms and assembly devices, are finding more uses in these factories.The approach is to discretize the robot's workspace into a transition network. The optimal path through this network, in terms of angular displacement of the manipulator's joints, is generated by dynamic programming. While this approach has been used previously, this paper adds the innovation of variable-node spacing, with the node density in various parts of the network reflecting the need for precise position control in each local area of the workspace. In this way, precise motion control is possible without an undue computational burden.  相似文献   
3.
The interpretation of way-finding symbols for healthcare facilities in a multicultural community was assessed in a cross-sectional study. One hundred participants recruited from Al Ain city in the United Arab Emirates were asked to interpret 28 healthcare symbols developed at Hablamos Juntos (such as vaccinations and laboratory) as well as 18 general-purpose symbols (such as elevators and restrooms). The mean age was 27.6 years (16–55 years) of whom 84 (84%) were females. Healthcare symbols were more difficult to comprehend than general-purpose signs. Symbols referring to abstract concepts were the most misinterpreted including oncology, diabetes education, outpatient clinic, interpretive services, pharmacy, internal medicine, registration, social services, obstetrics and gynecology, pediatrics and infectious diseases. Interpretation rates varied across cultural backgrounds and increased with higher education and younger age. Signage within healthcare facilities should be tested among older persons, those with limited literacy and across a wide range of cultures.  相似文献   
4.
Multimedia Tools and Applications - Various technologies have been utilized today for recognizing client or user in the indoor areas. These technologies incorporate RSSI, Bluetooth Low Energy...  相似文献   
5.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity.  相似文献   
6.
Neural Computing and Applications - Feature selection (FS) is one of the basic data preprocessing steps in data mining and machine learning. It is used to reduce feature size and increase model...  相似文献   
7.
Abstract

The main brackish groundwater resources in the State of Kuwait are the groundwater located in the Kuwait Group and the Dammam limestone aquifers. Most of the groundwater used in the State of Kuwait is for irrigation, some part of it is used for domestic purposes and for small scale industries. Since rainfall is seasonal and is less than the annual evaporation, the recharge from rainfall is negligible. Water levels in both the aquifers are highly affected by the pumping rate from each well. The groundwater is extracted heavily resulting in decline of water levels and the deterioration of groundwater quality though there is underflow from Saudi Arabia. Improvement of the groundwater management is essential for maintaining long-term productivity of the aquifers in the State of Kuwait.  相似文献   
8.
Protein stability is the most crucial factor in protein pharmaceutical preparations. Various techniques were applied for producing stable protein formulations such as spray-drying and freeze-drying. However, heating and freezing stresses are disadvantages for proteins using these methods, respectively. Accordingly, excipients have been used to preserve therapeutic effects of proteins during processing and for long period of time. Therefore, influences of Copovidone, Eudragit® RL-PO and Kollicoat® MAE-30 DP (as excipients) on stability and integrity of lysozyme (as a model protein) in spray-dried and freeze-dried forms were investigated. Protein formulations in both dried forms were prepared without and with the addition of mentioned excipients at different concentrations. Protein formulations were characterized for yield determination, morphology using scanning electron microscopic (SEM), thermal analysis by Differential Scanning Calorimetry (DSC), secondary structure stability using Fourier transform infrared (FT-IR) spectroscopy and biological activity. All protein formulations were subjected to a stability study as solid protein formulations for 3 weeks at 24?°C/76% relative humidity and aqueous protein samples were stored at 50?°C for 30?min in a water bath. Results showed that Copovidone successfully preserved integrity and biological activity of lysozyme before and after storage in both spray-dried and freeze-dried forms with more advantage for using higher concentration of the same excipient. Smooth spheres of spray-dried lysozyme formulations with Copovidone were smaller than spray-dried lysozyme without and with Kollicoat® MAE-30 DP, which affected %yield produced. Copovidone has demonstrated valuable protection ability for lysozyme.  相似文献   
9.
10.
Neural Computing and Applications - Cardiovascular diseases (CVD) are the most widely spread diseases all over the world among the common chronic diseases. CVD represents one of the main causes of...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号