首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   543篇
  免费   34篇
  国内免费   4篇
工业技术   581篇
  2023年   14篇
  2022年   24篇
  2021年   30篇
  2020年   22篇
  2019年   29篇
  2018年   19篇
  2017年   24篇
  2016年   28篇
  2015年   20篇
  2014年   21篇
  2013年   57篇
  2012年   40篇
  2011年   36篇
  2010年   21篇
  2009年   16篇
  2008年   13篇
  2007年   19篇
  2006年   14篇
  2005年   13篇
  2004年   5篇
  2003年   9篇
  2002年   9篇
  2001年   7篇
  2000年   4篇
  1999年   5篇
  1998年   12篇
  1997年   5篇
  1996年   4篇
  1993年   3篇
  1991年   3篇
  1989年   2篇
  1988年   3篇
  1987年   6篇
  1986年   3篇
  1985年   3篇
  1984年   2篇
  1982年   2篇
  1981年   2篇
  1980年   5篇
  1977年   2篇
  1976年   6篇
  1975年   4篇
  1974年   3篇
  1973年   1篇
  1972年   2篇
  1971年   1篇
  1969年   1篇
  1967年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有581条查询结果,搜索用时 0 毫秒
1.
With lower costs and greater availability, heavy fuel oil appears as an attractive alternative to the conventional gas oil used in industrial gas turbines. However, higher levels of radiation and smoke are expected, and this note reports on some preliminary tests made with a combustion chamber burning fuels of different carbon content, ranging from kerosine to a 25% blend of residual fuel oil in gas oil, at a chamber pressure of 10 atm*. The combustion rig was equipped with a total-radiation pyrometer and black-body furnace capable of measurement at different axial stations along the spray-stabilized flame. The presence of the residual fuel oil in the gas oil was found to promote significant increases in the mean levels of radiation, emissivity and smoke density, with a modest increase in liner temperature.  相似文献   
2.
With the growing use of service-oriented architecture for designing next generation software systems,the service composition problem and its execution complexity have become even more important in resp...  相似文献   
3.
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.  相似文献   
4.
This work is focused on the study of combined heat and mass transfer or double-diffusive convection near a vertical truncated cone embedded in a fluid-saturated porous medium in the presence of thermal radiation, magnetic field and variable viscosity effects. The viscosity of the fluid is assumed to be an inverse linear function of the fluid temperature. A boundary-layer analysis is employed to derive the non-dimensional governing equations. The governing equations for this investigation are transformed into a set of non-similar equations and solved numerically using the fourth-order Runge–Kutta integration scheme with the Newton–Raphson shooting technique. Comparisons with previously published work on special cases of the problem are performed and the results are found to be in excellent agreement. A parametric study illustrating the influence of the radiation parameter, magnetic field parameter, viscosity-variation parameter, buoyancy ratio and the Lewis number on the fluid velocity, temperature and solute concentration profiles as well as the Nusselt number and Sherwood number is conducted. The results of this parametric study are shown graphically and the physical aspects of the problem are highlighted and discussed.  相似文献   
5.
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme.  相似文献   
6.
A method of tuning for PI controllers with one-way lead/lag decoupling tuning is demonstrated for 2×2 input-output systems, based on finite frequency response data. The frequency response estimates are obtained from closed loop tests using an identification technique based on bandpass filters. The open-loop frequency response is calculated and used to tune PI controllers and to fit lead-lag compensators for decoupling by weighted least-squares. Separate optimization of the PI controllers and the lead-lag compensator is preferred. The tuning takes into account violations of desired multivariable robustness criteria. The method is illustrated by application to a paper machine headbox simulation and by experiments in distillation column temperature control.  相似文献   
7.
8.
This study was carried out to quantitate the expression levels of microRNA-17, -19a, -34a, -155, and -210 (miRs) expressed in nine clear cell renal cell carcinoma (ccRCC) and one chromophobe renal cell carcinoma cell line with and without sarcomatoid differentiation, and in six primary kidney tumors with matching normal kidney tissues. The data in the five non-sarcomatoid ccRCC cell lines—RC2, CAKI-1, 786-0, RCC4, and RCC4/VHL—and in the four ccRCC with sarcomatoid differentiation—RCJ41T1, RCJ41T2, RCJ41M, and UOK-127—indicated that miR-17 and -19a were expressed at lower levels relative to miR-34a, -155, and -210. Compared with RPTEC normal epithelial cells, miR-34a, miR-155, and miR-210 were expressed at higher levels, independent of the sarcomatoid differentiation status and hypoxia-inducible factors 1α and 2α (HIFs) isoform expression. In the one chromophobe renal cell carcinoma cell line, namely, UOK-276 with sarcomatoid differentiation, and expressing tumor suppressor gene TP53, miR-34a, which is a tumor suppressor gene, was expressed at higher levels than miR-210, -155, -17, and -19a. The pilot results generated in six tumor biopsies with matching normal kidney tissues indicated that while the expression of miR-17 and -19a were similar to the normal tissue expression profile, miR-210, -155, -and 34a were expressed at a higher level. To confirm that differences in the expression levels of the five miRs in the six tumor biopsies were statistically significant, the acquisition of a larger sample size is required. Data previously generated in ccRCC cell lines demonstrating that miR-210, miR-155, and HIFs are druggable targets using a defined dose and schedule of selenium-containing molecules support the concept that simultaneous and concurrent downregulation of miR-210, miR-155, and HIFs, which regulate target genes associated with increased tumor angiogenesis and drug resistance, may offer the potential for the development of a novel mechanism-based strategy for the treatment of patients with advanced ccRCC.  相似文献   
9.
This paper presents the design,implementation and testing of an embedded system that integrates solar and storage energy resources to smart homes within the smart microgrid.The proposed system provides the required home energy by installing renewable energy and storage devices.It also manages and schedules the power flow during peak and off-peak periods.In addition,a two-way communication protocol is developed to enable the home owners and the utility service provider to improve the energy flow and the consumption efficiency.The system can be an integral part for homes in a smart grid or smart microgrid power networks.A prototype for the proposed system was designed,implemented and tested by using a controlled load bank to simulate a scaled random real house consumption behavior.Three different scenarios were tested and the results and findings are reported.Moreover,data flow security among the home,home owners and utility server is developed to minimize cyber-attacks.  相似文献   
10.
Previous studies have indicated that the harmful heavy metal lead (Pb) contamination in aquatic systems has caused intelligence development disorders and nervous system function abnormalities in juveniles due to the increased permeability of the blood–brain barrier. Ionic liquids (ILs) are considered “green” organic solvents that can replace traditional organic solvents. Studies have found the presence of ILs in soil and water due to chemical applications or unintentional leakage. Therefore, what would happen if Pb interacted with ILs in a body of water? Could ILs enable Pb to more easily cross the blood–brain barrier? Therefore, we examined the combined exposure of Pb and ILs in common carp at low concentration (18.3 mg L−1 of Pb(CH3COO)2•3 H2O and 11 mg L−1 of the IL 1-methyl-3-octylimidazolium chloride, 5% of their LC50) for 28 days in the present study. The result of a neurobehavioral assay showed that chronic exposure of lead at lower concentrations significantly altered fish movement and neurobehaviors, indicating that lead exposure caused neurotoxicity in the carp. Increases in the neurotransmitter dopamine levels and injuries in the fish brain accounted for neurobehavioral abnormalities induced by lead exposure. Moreover, we also found that lead could easily cross the blood–brain barrier and caused significant bioaccumulation in the brain. Particularly, our study indicated that the ionic liquid could not synergistically promote blood–brain barrier permeability and hence failed to increase the absorption of lead in the fish brain, suggesting that the combined exposure of lead and ILs was not a synergistic effect but antagonism to the neurotoxicity. The results of this study suggested that ILs could recede the Pb induced neurotoxicity in fish.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号