首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   173篇
  免费   9篇
  国内免费   2篇
化学   85篇
晶体学   1篇
力学   13篇
数学   62篇
物理学   23篇
  2022年   3篇
  2021年   9篇
  2020年   7篇
  2019年   1篇
  2018年   1篇
  2017年   2篇
  2016年   6篇
  2015年   14篇
  2014年   3篇
  2013年   16篇
  2012年   15篇
  2011年   11篇
  2010年   9篇
  2009年   5篇
  2008年   7篇
  2007年   18篇
  2006年   10篇
  2005年   7篇
  2004年   4篇
  2003年   2篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1999年   4篇
  1997年   3篇
  1996年   2篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1988年   1篇
  1983年   2篇
  1982年   2篇
  1981年   1篇
  1978年   1篇
  1977年   1篇
  1974年   1篇
  1970年   2篇
  1969年   2篇
  1968年   1篇
排序方式: 共有184条查询结果,搜索用时 0 毫秒
181.
The combination of ultrasound irradiation and catalytic wet peroxide oxidation was used as a means to degrade phenol. Direct and indirect irradiation were employed, while experiments in the absence of ultrasound were used as reference. A mixed (Al-Fe) pillared clay named FAZA, was used as a catalyst in the form of powder, extrudates and crushed extrudates. Ultrasound was found to clearly enhance the extrudates performance, increasing the conversion at 4h by more than 6 times under direct and almost 11 times under indirect irradiation. This observation is attributed to the reduction of diffusion resistance within the catalyst pores. The overall sonication-catalytic wet peroxide oxidation process appears very promising for environmental purposes.  相似文献   
182.
Local grid refinement aims to optimise the relationship between accuracy of the results and number of grid nodes. In the context of the finite volume method no single local refinement criterion has been globally established as optimum for the selection of the control volumes to subdivide, since it is not easy to associate the discretisation error with an easily computable quantity in each control volume. Often the grid refinement criterion is based on an estimate of the truncation error in each control volume, because the truncation error is a natural measure of the discrepancy between the algebraic finite-volume equations and the original differential equations. However, it is not a straightforward task to associate the truncation error with the optimum grid density because of the complexity of the relationship between truncation and discretisation errors. In the present work several criteria based on a truncation error estimate are tested and compared on a regularised lid-driven cavity case at various Reynolds numbers. It is shown that criteria where the truncation error is weighted by the volume of the grid cells perform better than using just the truncation error as the criterion. Also it is observed that the efficiency of local refinement increases with the Reynolds number. The truncation error is estimated by restricting the solution to a coarser grid and applying the coarse grid discrete operator. The complication that high truncation error develops at grid level interfaces is also investigated and several treatments are tested.  相似文献   
183.
Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of software vulnerabilities. Vulnerability prediction is a mechanism that facilitates the identification (and, in turn, the mitigation) of vulnerabilities early enough during the software development cycle. The scientific community has recently focused a lot of attention on developing Deep Learning models using text mining techniques for predicting the existence of vulnerabilities in software components. However, there are also studies that examine whether the utilization of statically extracted software metrics can lead to adequate Vulnerability Prediction Models. In this paper, both software metrics- and text mining-based Vulnerability Prediction Models are constructed and compared. A combination of software metrics and text tokens using deep-learning models is examined as well in order to investigate if a combined model can lead to more accurate vulnerability prediction. For the purposes of the present study, a vulnerability dataset containing vulnerabilities from real-world software products is utilized and extended. The results of our analysis indicate that text mining-based models outperform software metrics-based models with respect to their F2-score, whereas enriching the text mining-based models with software metrics was not found to provide any added value to their predictive performance.  相似文献   
184.
ChemInform is a weekly Abstracting Service, delivering concise information at a glance that was extracted from about 100 leading journals. To access a ChemInform Abstract of an article which was published elsewhere, please select a “Full Text” option. The original article is trackable via the “References” option.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号