首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   479篇
  免费   28篇
  国内免费   3篇
电工技术   7篇
综合类   3篇
化学工业   163篇
金属工艺   18篇
机械仪表   18篇
建筑科学   3篇
矿业工程   7篇
能源动力   29篇
轻工业   18篇
水利工程   1篇
石油天然气   1篇
无线电   64篇
一般工业技术   89篇
冶金工业   34篇
原子能技术   1篇
自动化技术   54篇
  2024年   3篇
  2023年   6篇
  2022年   7篇
  2021年   16篇
  2020年   13篇
  2019年   19篇
  2018年   27篇
  2017年   23篇
  2016年   21篇
  2015年   18篇
  2014年   32篇
  2013年   45篇
  2012年   39篇
  2011年   34篇
  2010年   21篇
  2009年   20篇
  2008年   19篇
  2007年   12篇
  2006年   15篇
  2005年   8篇
  2004年   10篇
  2003年   8篇
  2002年   14篇
  2001年   3篇
  2000年   2篇
  1999年   3篇
  1998年   12篇
  1997年   6篇
  1996年   8篇
  1995年   4篇
  1994年   4篇
  1993年   3篇
  1991年   6篇
  1990年   2篇
  1988年   2篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1983年   2篇
  1981年   1篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1976年   1篇
  1975年   1篇
  1974年   2篇
  1973年   2篇
  1971年   3篇
  1970年   1篇
  1967年   1篇
排序方式: 共有510条查询结果,搜索用时 17 毫秒
1.
Catalysis Letters - An environmentally benign process for synthesizing 4-methoxyphenol through methylation of hydroquinone using polystyrene immobilized Bronsted acidic ionic liquid is presented....  相似文献   
2.
激光光束质量诊断技术的进展   总被引:1,自引:0,他引:1  
巩马理  金锋 《激光杂志》1995,16(4):145-147,153
本文介绍了激光光束质量诊断技术近年来的进展,以及国际标准化组织推荐的聚集光束测量法,指出了该技术的发展方向。  相似文献   
3.
韩马利 《机床电器》2002,29(4):18-19
本文通过数控机床的故障实例,分析了光栅故障现象及原因和解决的办法。  相似文献   
4.
Summary A new general procedure for preparation of functionalized oligopolysiloxanes of predetermined molecular weight is described. It utilizes heterogeneously catalyzed siloxane equilibration polymerization reactions which do not require troublesome and sometimes difficult post-preparative work-up procedures usually encountered with the well known homogeneously catalyzed corresponding reactions. The method is described using as example the preparation of , -telechelic vinyldimethylsiloxy-oligopolydimethylsiloxanes from octamethylcyclotetrasiloxane and 1,3-divinyltetramethyldisiloxane, but reference to the preparations of trimethylsiloxy-, dimethylsiloxy-and carboxypropyldimethylsiloxyoligopolydimethylsiloxanes, oligopolymethylhydridosiloxanes or their copolymers is also made.  相似文献   
5.
Mass transfer studies were carried out in a bubble column using the chemical method. Catalytic oxidation of sodium sulfite was chosen for the studies and the corresponding specific rates of oxidation were obtained using a stirred cell. Laser Doppler anemometer (LDA) was used to measure the instantaneous velocities in the same stirred cell as well as in bubble columns (100 and i.d.). An efficient algorithm based on the multiresolution analysis of the velocity-time data using wavelets was used for the isolation of data belonging to the gas and liquid phases. Eddy isolation model was used for the characterization of the eddy motion including the estimation of the energy dissipation rate. Using the knowledge of eddy motion, a methodology was developed for the prediction of true mass transfer coefficient (kL) in a stirred cell as well as in bubble columns. The predicted values of kL have been compared with the experimental values obtained by the chemical method.  相似文献   
6.

A novel image encryption framework is proposed in this article. A new chaotic map and a pseudorandom bit generator are proposed. Apart from this, a novel image encryption system is designed based on the proposed map and the proposed pseudorandom bit generator. These three are the major contributions of this work that makes a complete cryptosystem. The proposed new chaotic map is proposed which will be known as the ‘RCM map’ and its chaotic property is studied based on Devaney’s theory. The proposed pseudorandom bit generator is tested using the NIST test suite. The proposed method is simple to implement and does not involve any highly complex operations. Moreover, the proposed method is completely lossless, and therefore cent percent of data can be recovered from the encrypted image. The decryption process is also simple to implement i.e. just reverse of the encryption procedure. A scrambling algorithm is also proposed to further enhance the security of the overall system. The simulation, detailed analysis, and comparative studies of the proposed overall image encryption framework will help to understand the strengths and weaknesses of it. The experimental results are very promising and show the prospects of chaos theory and its usage in the field of data security.

  相似文献   
7.
Cloud computing is becoming a key factor in the market day by day. Therefore, many companies are investing or going to invest in this sector for development of large data centers. These data centers not only consume more energy but also produce greenhouse gases. Because of large amount of power consumption, data center providers go for different types of power generator to increase the profit margin which indirectly affects the environment. Several studies are carried out to reduce the power consumption of a data center. One of the techniques to reduce power consumption is virtualization. After several studies, it is stated that hardware plays a very important role. As the load increases, the power consumption of the CPU is also increased. Therefore, by extending the study of virtualization to reduce the power consumption, a hardware-based algorithm for virtual machine provisioning in a private cloud can significantly improve the performance by considering hardware as one of the important factors.  相似文献   
8.
Query optimizers rely on statistical models that succinctly describe the underlying data. Models are used to derive cardinality estimates for intermediate relations, which in turn guide the optimizer to choose the best query execution plan. The quality of the resulting plan is highly dependent on the accuracy of the statistical model that represents the data. It is well known that small errors in the model estimates propagate exponentially through joins, and may result in the choice of a highly sub-optimal query execution plan. Most commercial query optimizers make the attribute value independence assumption: all attributes are assumed to be statistically independent. This reduces the statistical model of the data to a collection of one-dimensional synopses (typically in the form of histograms), and it permits the optimizer to estimate the selectivity of a predicate conjunction as the product of the selectivities of the constituent predicates. However, this independence assumption is more often than not wrong, and is considered to be the most common cause of sub-optimal query execution plans chosen by modern query optimizers. We take a step towards a principled and practical approach to performing cardinality estimation without making the independence assumption. By carefully using concepts from the field of graphical models, we are able to factor the joint probability distribution over all the attributes in the database into small, usually two-dimensional distributions, without a significant loss in estimation accuracy. We show how to efficiently construct such a graphical model from the database using only two-way join queries, and we show how to perform selectivity estimation in a highly efficient manner. We integrate our algorithms into the PostgreSQL DBMS. Experimental results indicate that estimation errors can be greatly reduced, leading to orders of magnitude more efficient query execution plans in many cases. Optimization time is kept in the range of tens of milliseconds, making this a practical approach for industrial-strength query optimizers.  相似文献   
9.
This paper investigates the stabilization of uncertain networked control systems (NCSs) with actuator saturation and cyberattacks. The cyberattacks are governed by a set of independent random variables satisfying Bernoulli distribution. To relieve the network bandwidth load effectively, an event-triggered communication strategy is proposed. By employing Lyapunov stability theory and stochastic analysis techniques, a stability criterion is obtained for the system with actuator saturation and cyberattacks. Moreover, the desired controller gain is derived by solving some matrix inequalities. Finally, the validity and applicability of the criteria are verified through numerical examples.  相似文献   
10.
The purpose of this work was to explore a new feature extraction method for classifying paddy seeds using a feature extraction algorithm to achieve the area ratio, horizontal–slant and front–rear angles and find whether the proposed features have high discriminating power. Another objective was to find the smallest feature set that can ensure highly accurate recognition of seeds. A total of a 100 image features were extracted, and features having significant discriminating power were identified based on the analysis of variance (ANOVA). From the 100 features, 14 features were found to have high discriminating power and from these features, six were selected as the proposed features. Experimental results show that the proposed features and removal of redundant features enhanced the discriminating power of the feature set, and that the proposed features have an excellent discriminating property for seeds. The presented features resulted in the highest classification accuracy (98.8%) when compared to other methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号