首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1046篇
  免费   76篇
  国内免费   9篇
工业技术   1131篇
  2024年   4篇
  2023年   12篇
  2022年   28篇
  2021年   69篇
  2020年   76篇
  2019年   81篇
  2018年   108篇
  2017年   90篇
  2016年   81篇
  2015年   35篇
  2014年   55篇
  2013年   100篇
  2012年   67篇
  2011年   84篇
  2010年   49篇
  2009年   39篇
  2008年   24篇
  2007年   20篇
  2006年   23篇
  2005年   14篇
  2004年   9篇
  2003年   4篇
  2002年   14篇
  2001年   3篇
  2000年   3篇
  1999年   4篇
  1998年   10篇
  1997年   2篇
  1996年   5篇
  1995年   4篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   5篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1982年   1篇
  1970年   1篇
排序方式: 共有1131条查询结果,搜索用时 825 毫秒
1.
For the first time in this study, Zinc oxide nanoparticles were biosynthesized by the eco-friendly and cost-effective procedure using Amygdalus scoparia stem bark extract then used as antibacterial, antifungal, anticancer, and anti-diabetic agents. The characterization techniques confirmed the biosynthesis, crystalline nature, structure, size, elemental composition of ZnO NPs and bioactive compounds that exist in A. scoparia extract accounting for Zn2+ ion reduction, capping and stabilization of ZnO NPs. The ZnO NPs displayed remarkable inhibitory activity against E. coli, E. aerigenes, S. aureus, P. oryzae, F. thapsinum, and F. semitectum compared to antibiotic standards. The ZnO NPs showed significant inhibitory effects on cancer cell lines, while it had no toxic effect on Vero normal cell line. The ZnO NPs (30 mg/kg)-treated diabetic rats showed significantly higher levels of insulin and lower AST, ALT and blood glucose compared with the STZ induced diabetic group and other treated groups (P < 0.05). The ZnO NPs- and extract-treated rats showed significantly higher levels of IR, GluT2, and GCK expression and lower TNFα expression compared with the STZ induced diabetic rats. Our findings showed that ZnO NPs represented an outstanding performance for biological applications.  相似文献   
2.
Salehi  Maryam  Zavarian  Ali Asghar  Arman  Ali  Hafezi  Fatemeh  Rad  Ghasem Amraee  Mardani  Mohsen  Hamze  Kooros  Luna  Carlos  Naderi  Sirvan  Ahmadpourian  Azin 《SILICON》2018,10(6):2743-2749
Silicon - The characterization of ion beam current density distribution and beam uniformity is crucial for improving broad-beam ion source technologies. The design of the broad ion beam extraction...  相似文献   
3.
Ni interlayers were introduced prior to dissimilar friction welding of Ti6Al4V base material to three cemented carbide substrates. The fracture strength of Ti6Al4V/(WC-6 wt% Co) welds were poor and were markedly improved when 20-µm thick Ni interlayers were introduced prior to dissimilar friction welding. These results were only produced when the (WC-6 wt% Co) cermet was electroplated prior to friction welding. When the Ti6Al4V alloy was electroplated prior to friction welding, fractured WC particles and cracking were observed in the (WC-Co) carbide substrate. The fracture strengths of Ti6Al4V/(WC-11 wt% Co) and Ti6Al4V/(WC-24 wt% Co) welds were not improved when 20-µm thick Ni interlayers were introduced prior to friction welding. During mechanical testing, the Ni layer retained at the dissimilar joint interface created a region of weakness.  相似文献   
4.
In this paper, we present a new methodology for analysis of all-optical fiber-optic code-division multiple-access (FO-CDMA) networks. In this analysis, we propose statistical models, based on photon-counting techniques, for some basic elements of the network, such as splitters, combiners, star couplers, and FO-CDMA passive encoders/decoders. By following the statistical variation of the photon-count of the string of pulses that constitutes the address sequence in an FO-CDMA network, we will be able to reveal the quantum-limited optical signal-to-noise ratio (OSNR) required at the transmitter output to meet the performance limits. Moreover, considering receiver thermal noise and source extinction ratio, we explore the role of using an optical preamplifier before the detector and the dependence of the performance on the transmitted power and the weight of the employed optical orthogonal codes (OOCs).  相似文献   
5.
The effect of thermal annealing on the electrical and optical characteristics of ITO films prepared by reactive sputtering and thermal evaporation have been studied. The effect of the thermal annealing is to improve the conductivity and the optical transmission in the shorter wavelength region. The conductivity of the films increases with annealing temperature, this behaviour is associated with grain growth in the film.  相似文献   
6.
On the basis of the energy supply and demand, this paper assesses the environmental damage from air pollution in Iran using the Extern-E study that has extended over 10 years and is still in progress in the European Union (EU) commission. Damage costs were transferred from Western European practice to the conditions of Iran by scaling according to GDP per capital measured in PPP terms.  相似文献   
7.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
8.

Most of the commonly used hydrological models do not account for the actual evapotranspiration (ETa) as a key contributor to water loss in semi-arid/arid regions. In this study, the HEC-HMS (Hydrologic Engineering Center Hydrologic Modeling System) model was calibrated, modified, and its performance in simulating runoff resulting from short-duration rainfall events was evaluated. The model modifications included integrating spatially distributed ETa, calculated using the surface energy balance system (SEBS), into the model. Evaluating the model’s performance in simulating runoff showed that the default HEC-HMS model underestimated the runoff with root mean squared error (RMSE) of 0.14 m3/s (R2?=?0.92) while incorporating SEBS ETa into the model reduced RMSE to 0.01 m3/s (R2?=?0.99). The integration of HECHMS and SEBS resulted in smaller and more realistic latent heat flux estimates translated into a lower water loss rate and a higher magnitude of runoff simulated by the HECHMS model. The difference between runoff simulations using the default and modified model translated into an average of 95,000 m3 runoff per rainfall event (equal to seasonal water requirement of ten-hectare winter wheat) that could be planned and triggered for agricultural purposes, flood harvesting, and groundwater recharge in the region. The effect of ETa on the simulated runoff volume is expected to be more pronounced during high evaporative demand periods, longer rainfall events, and larger catchments. The outcome of this study signifies the importance of implementing accurate estimates of evapotranspiration into a hydrological model.

  相似文献   
9.

In recent years, due to the drastic rise in the number of vehicles and the lack of sufficient infrastructure, traffic jams, air pollution, and fuel consumption have increased in cities. The optimization of timing for traffic lights is one of the solutions for the mentioned problems. Many methods have been introduced to deal with these problems, including reinforcement learning. Although a great number of learning-based methods have been used in traffic signal control, they suffer from poor performance and slow learning convergence. In this paper, a transfer learning-based method for traffic signal control has been proposed. Multi-agent system has also been used for modelling the traffic network and transfer learning has been used to make reinforcement learning agents transfer their experience to each other. Furthermore, a classifier has been utilized to classify the transferred experiences. The results show that using the proposed method leads to a significant improvement on average delay time and convergence time of the learning process.

  相似文献   
10.
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号