首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   296篇
  免费   18篇
  国内免费   1篇
电工技术   4篇
综合类   1篇
化学工业   92篇
金属工艺   4篇
机械仪表   11篇
建筑科学   1篇
能源动力   8篇
轻工业   12篇
石油天然气   3篇
无线电   41篇
一般工业技术   59篇
冶金工业   35篇
自动化技术   44篇
  2023年   3篇
  2022年   15篇
  2021年   15篇
  2020年   10篇
  2019年   11篇
  2018年   15篇
  2017年   14篇
  2016年   14篇
  2015年   14篇
  2014年   7篇
  2013年   25篇
  2012年   15篇
  2011年   23篇
  2010年   9篇
  2009年   15篇
  2008年   12篇
  2007年   16篇
  2006年   11篇
  2005年   5篇
  2004年   5篇
  2003年   3篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1999年   3篇
  1998年   15篇
  1997年   9篇
  1996年   2篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1989年   3篇
  1988年   2篇
  1987年   1篇
  1985年   4篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1980年   2篇
  1978年   3篇
排序方式: 共有315条查询结果,搜索用时 31 毫秒
1.
Metallurgical and Materials Transactions A - Hybrid nanocomposites have potential as wear-resistant materials. However, synthesizing these nanocomposites by conventional molten state methods result...  相似文献   
2.
Discrimination of simple visual attributes can improve significantly with practice. We have trained human observers to perform peripherally presented tasks involving the localization of short line segments and examined the specificity of the learning for the visual location, orientation, and geometric arrangement of the trained stimulus. Several weeks of training resulted in dramatic threshold reductions. The learning was specific for the orientation and location of the trained stimulus, indicating the involvement of the earliest cortical stages in the visual pathway where the orientation and location of stimuli are mapped with highest resolution. Furthermore, improvement was also specific for both the configuration of the trained stimulus and the attribute of the stimulus that was under scrutiny during training. This degree of specificity suggests that the learning cannot be achieved by cortical recruitment alone, as proposed in current models, but is likely to involve a refinement of lateral interactions within the cortex and possibly a gating of lower level changes by attentional mechanisms.  相似文献   
3.
In this work, a mathematical model is developed and simulated to determine gas dispersion along with solubility during the vapor extraction (Vapex) of live oil from a laboratory scale physical model. The physical model is a rectangular block of homogenous porous medium saturated with heavy oil and bitumen. At a given temperature and pressure, the block is initially exposed on its side to a solvent gas, which diffuses into the medium and gets absorbed. The absorption of gas reduces the viscosity of heavy oil and bitumen causing it to drain under gravity. The low-viscosity “live oil” is produced at the bottom of the porous block. The production of live oil with time is accompanied by the shrinkage of oil in the block as well as its increased exposure to gas from top. These phenomena of Vapex are described by the mathematical model, which is used to calculate live oil production with various values of gas solubility and dispersion. Their optimal values are determined for the vapor extraction of Cold Lake bitumen with butane by matching calculated live oil production with its experimental values published earlier.  相似文献   
4.
There is presently considerable ambiguity and confusion relating to ventilator terminology. This can be eliminated using a simple approach, visualising mechanical ventilation as an inspiratory pump, and defining trigger, limit, and cycling in this context. The trigger is the signal that starts a breath by opening the inspiratory valve, the limit is the factor which controls the way gas flows into the lung, and the cycle is the signal that stops the breath by closing the inspiratory valve and opening the expiratory valve. By identifying these three basic parameters, one can precisely dissect and interpret any of the vast ventilatory terminology.  相似文献   
5.
Some new amphoteric ion exchangers have been synthesized by condensing salicylic acid, p-hydroxybenzoic acid, sulfosalicylic acid, gallic acid, 3-hydroxy-2-naphthoic acid, β-resorcylic acid, and resacetophenone with epichlorohydrin employing ethylenediamine as a crosslinking agent. Some of the physicochemical properties, such as moisture content, true density, apparent density, void volume fraction, concentration of ionogenic groups, exchange capacity, rate of exchange, pH-titration curves, pK values, isoionic point, thermal stability, oxidation resistance, and swelling behavior in different solvents, have been investigated.  相似文献   
6.
The mechanical, electrical, and thermal expansion properties of carbon nanotube(CNT)-based silver and silver–palladium(10:1, w/w) alloy nanocomposites are reported. To tailor the properties of silver, CNTs were incorporated into a silver matrix by a modified molecular level-mixing process. CNTs interact weakly with silver because of their non-reactive nature and lack of mutual solubility. Therefore, palladium was utilized as an alloying element to improve interfacial adhesion. Comparative microstructural characterizations and property evaluations of the nanocomposites were performed. The structural characterizations revealed that decorated type-CNTs were dispersed, embedded, and anchored into the silver matrix. The experimental results indicated that the modification of the silver and silver–palladium nanocomposite with CNT resulted in increases in the hardness and Young's modulus along with concomitant decreases in the electrical conductivity and the coefficient of thermal expansion(CTE). The hardness and Young's modulus of the nanocomposites were increased by 30%?40% whereas the CTE was decreased to 50%-60% of the CTE of silver. The significantly improved CTE and the mechanical properties of the CNT-reinforced silver and silver–palladium nanocomposites are correlated with the intriguing properties of CNTs and with good interfacial adhesion between the CNTs and silver as a result of the fabrication process and the contact action of palladium as an alloying element.  相似文献   
7.
Vimal Singh 《Automatica》2008,44(1):282-285
A novel criterion for the global asymptotic stability of a class of digital filters utilizing single saturation nonlinearity is presented. An example showing the effectiveness of the present criterion is given.  相似文献   
8.
The Journal of Supercomputing - The Internet of Medical Things (IoMT) is a bionetwork of allied medical devices, sensors, wearable biosensor devices, etc. It is gradually reforming the healthcare...  相似文献   
9.
Vimal Singh 《Automatica》2010,46(2):475-4311
A criterion for the global asymptotic stability of fixed-point state-space digital filters using two’s complement arithmetic is presented. The criterion is a modified form of a well-known criterion due to Mills, Mullis, and Roberts. The criterion is in the form of linear matrix inequality and, hence, computationally tractable. An example shows the effectiveness of the modified criterion.  相似文献   
10.
Since computer hardware and Internet is growing so fast today, security threats of malicious executable code are getting more serious. Basically, malicious executable codes are categorized into three kinds – virus, Trojan Horse, and worm. Current anti-virus products cannot detect all the malicious codes, especially for those unseen, polymorphism malicious executable codes. The newly developed virus will create the damages before it has been found and updated in database. The basic idea of the proposed system is, it will analyze the behavior of the malicious codes and based on the behavior signature of the malicious code content filtering mechanism will be used to filter out contents, so that, the system will be secured from the future communication processes. The behavior of the code is analyzed using the function extraction technology. The function extraction technology will replace the function codes into algebraic expressions. Based on the behavior of the malicious codes, it will be categorized into different kinds of malicious codes. The detected malicious code will be prevented from execution. Based on the type of malicious code, appropriate security mechanism will be used for further communication.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号