首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   426篇
  免费   41篇
  国内免费   17篇
电工技术   6篇
综合类   2篇
化学工业   97篇
金属工艺   11篇
机械仪表   28篇
建筑科学   6篇
能源动力   31篇
轻工业   52篇
水利工程   3篇
石油天然气   1篇
无线电   34篇
一般工业技术   100篇
冶金工业   29篇
原子能技术   9篇
自动化技术   75篇
  2023年   11篇
  2022年   26篇
  2021年   45篇
  2020年   29篇
  2019年   45篇
  2018年   30篇
  2017年   19篇
  2016年   41篇
  2015年   14篇
  2014年   21篇
  2013年   32篇
  2012年   23篇
  2011年   18篇
  2010年   13篇
  2009年   9篇
  2008年   11篇
  2007年   13篇
  2006年   8篇
  2005年   4篇
  2004年   1篇
  2003年   3篇
  2002年   3篇
  2001年   3篇
  2000年   3篇
  1999年   5篇
  1998年   11篇
  1997年   8篇
  1996年   6篇
  1995年   1篇
  1993年   1篇
  1992年   2篇
  1990年   4篇
  1989年   1篇
  1988年   1篇
  1987年   7篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1981年   2篇
  1976年   3篇
  1973年   2篇
排序方式: 共有484条查询结果,搜索用时 15 毫秒
1.
The effect of Co addition on the formation of Ni-Ti clusters in maraging stainless steel was studied by three dimensional atom probe (3DAP) and first-principles calculation. The cluster analysis based on the maximum separation approach showed an increase in size but a decrease in density of Ni-Ti clusters with increasing the Co content. The first-principles calculation indicated weaker Co-Ni (Co-Ti) interactions than Co-Ti (Fe-Ti) interactions, which should be the essential reason for the change of distribution characteristics of Ni-Ti clusters in bcc Fe caused by Co addition.  相似文献   
2.
Thin films of cadmium sulphide and cadmium telluride have been prepared by thermal evaporation under various conditions of deposition. These films have been characterized optically. electrically and for structure determination. The results of these characterizations along with the initial results of all thin film CdS/CdTe solar cells are presented in this paper  相似文献   
3.
1,1,1-Trichloroethane (TRI) is a commonly used industrial solvent with a considerable potential for inhalation abuse. Previous studies in our laboratory and elsewhere have shown that this agent exerts a suppressant effect on operant responding, as well as a number of additional neurobehavioral effects that are similar to those of central nervous system (CNS) depressant drugs. In an effort to provide information relevant to potential mechanisms involved in the behavioral effects and abuse potential of TRI, the present study evaluated the acute effects of this agent on the activity of the hypothalamo-pituitary-adrenal (HPA) axis . Male Sprague-Dawley rats were exposed to 3500 or 5000 ppm TRI by inhalation for 10 or 30 min. Following exposure, plasma levels of adrenocorticotropic hormone (ACTH) and corticosterone and levels of ACTH and corticotropin-releasing factor (CRF) in three brain regions--hypothalamus, hippocampus, and frontal cortex--were determined by selective radioimmunoassays. Levels of TRI in the three brain regions as well as blood were measured by headspace gas chromatography to determine the target tissue concentrations responsible for neuroendocrine changes. Uptake of TRI in blood and all brain regions was very rapid, with stable concentrations apparently achieved within 10 min and maintained for 30 min. During this time course, a significant decrease in plasma corticosterone was produced at 30 min but no significant change in plasma ACTH was observed with 3500 ppm TRI. However, after exposure to 5000 ppm, both plasma ACTH and plasma corticosterone were significantly reduced at 10 and 30 min. ACTH levels in the three brain regions were not significantly changed by TRI, while hypothalamic CRF was significantly increased during exposure to 3500 ppm. However, hypothalamic concentrations of CRF declined following 30 min at 3500 ppm and were not significantly changed by 5000 ppm. This complexity of effects on the regulation of HPA axis activity likely precluded the establishment of consistent relationships between changes in hormonal levels and blood or regional brain concentrations of the inhalant. However, these actions of TRI were strikingly similar to those previously reported for the benzodiazepines.  相似文献   
4.
OBJECTIVE: The study aimed to determine the effectiveness of prophylactic medical intervention in reducing the incidence of cystoid macular edema (CME) and the effectiveness of medical treatment for chronic CME after cataract surgery. DESIGN: The study design was a systematic review and meta-analysis of published reports of randomized clinical trials (RCTs). PARTICIPANTS: Sixteen RCTs involving 2898 eyes examining the effectiveness of medical prophylaxis of CME and 4 RCTs involving 187 eyes testing the effectiveness of medical treatment of chronic CME were used in the study. INTERVENTIONS: Medical prophylaxis of treatment (cyclo-oxygenase inhibitors or corticosteroids) versus control (placebo or active treatment) was performed. MAIN OUTCOME MEASURES: Incidence of angiographically diagnosed CME, incidence of clinically significant CME, and vision were measured. RESULTS: Thirty-six articles reported testing a prophylactic medical intervention for CME after cataract surgery. The incidence of CME varied extensively across studies and was related to the study design used. Summary odds ratios (OR) indicated that prophylactic intervention was effective in reducing the incidence of both angiographic CME (OR = 0.36; 95% confidence interval [CI] = 0.28-0.45) and clinically relevant CME (OR = 0.49; 95% CI = 0.33-0.73). There also was a statistically significant positive effect on improving vision (OR = 1.97; 95% CI = 1.14-3.41). A combination of the results of the four RCTs testing medical therapy for chronic CME indicated a treatment benefit in terms of improving final visual acuity by two or more Snellen lines (OR = 2.67; 95% CI = 1.35-5.30). Assessment of the quality of the 20 RCTs included in the meta-analyses indicated problems in the design, execution, and reporting of a number of trials. CONCLUSION: A combination of the results from RCTs indicates that medical prophylaxis for aphakic and pseudophakic CME and medical treatment for chronic CME are beneficial. Because most of the RCTs performed to date have problems related to quality, a well-designed RCT is needed to confirm this result, using clinical CME and vision as outcomes.  相似文献   
5.
A mobile ad hoc network (MANET) is dynamic in nature and is composed of wirelessly connected nodes that perform hop-by-hop routing without the help of any fixed infrastructure. One of the important requirements of a MANET is the efficiency of energy, which increases the lifetime of the network. Several techniques have been proposed by researchers to achieve this goal and one of them is clustering in MANETs that can help in providing an energy-efficient solution. Clustering involves the selection of cluster-heads (CHs) for each cluster and fewer CHs result in greater energy efficiency as these nodes drain more power than noncluster-heads. In the literature, several techniques are available for clustering by using optimization and evolutionary techniques that provide a single solution at a time. In this paper, we propose a multi-objective solution by using multi-objective particle swarm optimization (MOPSO) algorithm to optimize the number of clusters in an ad hoc network as well as energy dissipation in nodes in order to provide an energy-efficient solution and reduce the network traffic. In the proposed solution, inter-cluster and intra-cluster traffic is managed by the cluster-heads. The proposed algorithm takes into consideration the degree of nodes, transmission power, and battery power consumption of the mobile nodes. The main advantage of this method is that it provides a set of solutions at a time. These solutions are achieved through optimal Pareto front. We compare the results of the proposed approach with two other well-known clustering techniques; WCA and CLPSO-based clustering by using different performance metrics. We perform extensive simulations to show that the proposed approach is an effective approach for clustering in mobile ad hoc networks environment and performs better than the other two approaches.  相似文献   
6.
Multimedia Tools and Applications - Conventional steganography focuses on invisibility and undetectability, as the main concern is to make the algorithms immune to steganalysis. Zero-steg-anography...  相似文献   
7.
In the design phase of business and IT system development, it is desirable to predict the properties of the system-to-be. A number of formalisms to assess qualities such as performance, reliability and security have therefore previously been proposed. However, existing prediction systems do not allow the modeler to express uncertainty with respect to the design of the considered system. Yet, in contemporary business, the high rate of change in the environment leads to uncertainties about present and future characteristics of the system, so significant that ignoring them becomes problematic. In this paper, we propose a formalism, the Predictive, Probabilistic Architecture Modeling Framework (P2AMF), capable of advanced and probabilistically sound reasoning about business and IT architecture models, given in the form of Unified Modeling Language class and object diagrams. The proposed formalism is based on the Object Constraint Language (OCL). To OCL, P2AMF adds a probabilistic inference mechanism. The paper introduces P2AMF, describes its use for system property prediction and assessment and proposes an algorithm for probabilistic inference.  相似文献   
8.

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

  相似文献   
9.
We address the problem of how a set of agents can decide to share a resource, represented as a unit-sized pie. The pie can be generated by the entire set but also by some of its subsets. We investigate a finite horizon non-cooperative bargaining game, in which the players take it in turns to make proposals on how the resource should for this purpose be allocated, and the other players vote on whether or not to accept the allocation. Voting is modelled as a Bayesian weighted voting game with uncertainty about the players’ weights. The agenda, (i.e., the order in which the players are called to make offers), is defined exogenously. We focus on impatient players with heterogeneous discount factors. In the case of a conflict, (i.e., no agreement by the deadline), no player receives anything. We provide a Bayesian subgame perfect equilibrium for the bargaining game and conduct an ex-ante analysis of the resulting outcome. We show that the equilibrium is unique, computable in polynomial time, results in an instant Pareto optimal outcome, and, under certain conditions provides a foundation for the core and also the nucleolus of the Bayesian voting game. In addition, our analysis leads to insights on how an individual’s bargained share is influenced by his position on the agenda. Finally, we show that, if the conflict point of the bargaining game changes, then the problem of determining the non-cooperative equilibrium becomes NP-hard even under the perfect information assumption. Our research also reveals how this change in conflict point impacts on the above mentioned results.  相似文献   
10.
Due to the limitation of node energy resources, the management of energy consumption is one of the most important problems of the internet of things (IoT). Therefore, many studies have tried to optimize and manage energy consumption by focusing on different techniques. Although each of these studies has improved and optimized energy consumption, there are many important problems, including maintaining traffic balance and energy consumption of network nodes. Therefore, a new method is necessary to maintain the load and energy balancing of network nodes. Therefore, this paper introduces energy and load balancing routing protocol for IoT (ELBRP) based on the development of the RPL routing protocol and the efficiency of data distribution technique. The ELBRP performance has three steps. In the first step, along with the process of sending DODAG information object (DIO) messages, the status of network nodes is evaluated. In the second step, the DODAG communication graph is formed according to the ELBRP. In the third step, data transmission is done according to the distribution technique with the goal of balancing traffic and energy. The simulation results using cooja simulator showed the superiority of ELBRP in improving energy consumption and successful delivery ratio, reducing delay and increasing the network lifetime compared to the similar methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号