全文获取类型
收费全文 | 296篇 |
免费 | 18篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 4篇 |
综合类 | 1篇 |
化学工业 | 92篇 |
金属工艺 | 4篇 |
机械仪表 | 11篇 |
建筑科学 | 1篇 |
能源动力 | 8篇 |
轻工业 | 12篇 |
石油天然气 | 3篇 |
无线电 | 41篇 |
一般工业技术 | 59篇 |
冶金工业 | 35篇 |
自动化技术 | 44篇 |
出版年
2023年 | 3篇 |
2022年 | 15篇 |
2021年 | 15篇 |
2020年 | 10篇 |
2019年 | 11篇 |
2018年 | 15篇 |
2017年 | 14篇 |
2016年 | 14篇 |
2015年 | 14篇 |
2014年 | 7篇 |
2013年 | 25篇 |
2012年 | 15篇 |
2011年 | 23篇 |
2010年 | 9篇 |
2009年 | 15篇 |
2008年 | 12篇 |
2007年 | 16篇 |
2006年 | 11篇 |
2005年 | 5篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 2篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 3篇 |
1998年 | 15篇 |
1997年 | 9篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1985年 | 4篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1980年 | 2篇 |
1978年 | 3篇 |
排序方式: 共有315条查询结果,搜索用时 31 毫秒
1.
Madhu H. C. Edachery Vimal Lijesh K. P. Perugu Chandra Shekhar Kailas Satish V. 《Metallurgical and Materials Transactions A》2020,51(8):4086-4099
Metallurgical and Materials Transactions A - Hybrid nanocomposites have potential as wear-resistant materials. However, synthesizing these nanocomposites by conventional molten state methods result... 相似文献
2.
Discrimination of simple visual attributes can improve significantly with practice. We have trained human observers to perform peripherally presented tasks involving the localization of short line segments and examined the specificity of the learning for the visual location, orientation, and geometric arrangement of the trained stimulus. Several weeks of training resulted in dramatic threshold reductions. The learning was specific for the orientation and location of the trained stimulus, indicating the involvement of the earliest cortical stages in the visual pathway where the orientation and location of stimuli are mapped with highest resolution. Furthermore, improvement was also specific for both the configuration of the trained stimulus and the attribute of the stimulus that was under scrutiny during training. This degree of specificity suggests that the learning cannot be achieved by cortical recruitment alone, as proposed in current models, but is likely to involve a refinement of lateral interactions within the cortex and possibly a gating of lower level changes by attentional mechanisms. 相似文献
3.
Ronak A. Kapadia Simant R. Upreti Ali Lohi Ioannis Chatzis 《Journal of Petroleum Science and Engineering》2006,51(3-4):214-222
In this work, a mathematical model is developed and simulated to determine gas dispersion along with solubility during the vapor extraction (Vapex) of live oil from a laboratory scale physical model. The physical model is a rectangular block of homogenous porous medium saturated with heavy oil and bitumen. At a given temperature and pressure, the block is initially exposed on its side to a solvent gas, which diffuses into the medium and gets absorbed. The absorption of gas reduces the viscosity of heavy oil and bitumen causing it to drain under gravity. The low-viscosity “live oil” is produced at the bottom of the porous block. The production of live oil with time is accompanied by the shrinkage of oil in the block as well as its increased exposure to gas from top. These phenomena of Vapex are described by the mathematical model, which is used to calculate live oil production with various values of gas solubility and dispersion. Their optimal values are determined for the vapor extraction of Cold Lake bitumen with butane by matching calculated live oil production with its experimental values published earlier. 相似文献
4.
F Kapadia 《Canadian Metallurgical Quarterly》1998,74(872):330-335
There is presently considerable ambiguity and confusion relating to ventilator terminology. This can be eliminated using a simple approach, visualising mechanical ventilation as an inspiratory pump, and defining trigger, limit, and cycling in this context. The trigger is the signal that starts a breath by opening the inspiratory valve, the limit is the factor which controls the way gas flows into the lung, and the cycle is the signal that stops the breath by closing the inspiratory valve and opening the expiratory valve. By identifying these three basic parameters, one can precisely dissect and interpret any of the vast ventilatory terminology. 相似文献
5.
Some new amphoteric ion exchangers have been synthesized by condensing salicylic acid, p-hydroxybenzoic acid, sulfosalicylic acid, gallic acid, 3-hydroxy-2-naphthoic acid, β-resorcylic acid, and resacetophenone with epichlorohydrin employing ethylenediamine as a crosslinking agent. Some of the physicochemical properties, such as moisture content, true density, apparent density, void volume fraction, concentration of ionogenic groups, exchange capacity, rate of exchange, pH-titration curves, pK values, isoionic point, thermal stability, oxidation resistance, and swelling behavior in different solvents, have been investigated. 相似文献
6.
The mechanical, electrical, and thermal expansion properties of carbon nanotube(CNT)-based silver and silver–palladium(10:1, w/w) alloy nanocomposites are reported. To tailor the properties of silver, CNTs were incorporated into a silver matrix by a modified molecular level-mixing process. CNTs interact weakly with silver because of their non-reactive nature and lack of mutual solubility. Therefore, palladium was utilized as an alloying element to improve interfacial adhesion. Comparative microstructural characterizations and property evaluations of the nanocomposites were performed. The structural characterizations revealed that decorated type-CNTs were dispersed, embedded, and anchored into the silver matrix. The experimental results indicated that the modification of the silver and silver–palladium nanocomposite with CNT resulted in increases in the hardness and Young's modulus along with concomitant decreases in the electrical conductivity and the coefficient of thermal expansion(CTE). The hardness and Young's modulus of the nanocomposites were increased by 30%?40% whereas the CTE was decreased to 50%-60% of the CTE of silver. The significantly improved CTE and the mechanical properties of the CNT-reinforced silver and silver–palladium nanocomposites are correlated with the intriguing properties of CNTs and with good interfacial adhesion between the CNTs and silver as a result of the fabrication process and the contact action of palladium as an alloying element. 相似文献
7.
Vimal Singh 《Automatica》2008,44(1):282-285
A novel criterion for the global asymptotic stability of a class of digital filters utilizing single saturation nonlinearity is presented. An example showing the effectiveness of the present criterion is given. 相似文献
8.
Nayak Janmenjoy Meher Saroj K. Souri Alireza Naik Bighnaraj Vimal S. 《The Journal of supercomputing》2022,78(13):14866-14891
The Journal of Supercomputing - The Internet of Medical Things (IoMT) is a bionetwork of allied medical devices, sensors, wearable biosensor devices, etc. It is gradually reforming the healthcare... 相似文献
9.
Vimal Singh 《Automatica》2010,46(2):475-4311
A criterion for the global asymptotic stability of fixed-point state-space digital filters using two’s complement arithmetic is presented. The criterion is a modified form of a well-known criterion due to Mills, Mullis, and Roberts. The criterion is in the form of linear matrix inequality and, hence, computationally tractable. An example shows the effectiveness of the modified criterion. 相似文献
10.
K. Vimal Kumar 《Computers & Security》2009,28(1-2):77-84
Since computer hardware and Internet is growing so fast today, security threats of malicious executable code are getting more serious. Basically, malicious executable codes are categorized into three kinds – virus, Trojan Horse, and worm. Current anti-virus products cannot detect all the malicious codes, especially for those unseen, polymorphism malicious executable codes. The newly developed virus will create the damages before it has been found and updated in database. The basic idea of the proposed system is, it will analyze the behavior of the malicious codes and based on the behavior signature of the malicious code content filtering mechanism will be used to filter out contents, so that, the system will be secured from the future communication processes. The behavior of the code is analyzed using the function extraction technology. The function extraction technology will replace the function codes into algebraic expressions. Based on the behavior of the malicious codes, it will be categorized into different kinds of malicious codes. The detected malicious code will be prevented from execution. Based on the type of malicious code, appropriate security mechanism will be used for further communication. 相似文献