首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   538篇
  免费   27篇
电工技术   9篇
化学工业   113篇
金属工艺   7篇
机械仪表   4篇
建筑科学   36篇
矿业工程   2篇
能源动力   49篇
轻工业   35篇
水利工程   1篇
石油天然气   10篇
无线电   64篇
一般工业技术   80篇
冶金工业   54篇
原子能技术   4篇
自动化技术   97篇
  2024年   3篇
  2023年   8篇
  2022年   16篇
  2021年   26篇
  2020年   21篇
  2019年   20篇
  2018年   28篇
  2017年   17篇
  2016年   28篇
  2015年   19篇
  2014年   16篇
  2013年   24篇
  2012年   30篇
  2011年   34篇
  2010年   32篇
  2009年   32篇
  2008年   29篇
  2007年   16篇
  2006年   19篇
  2005年   14篇
  2004年   13篇
  2003年   10篇
  2002年   12篇
  2001年   6篇
  2000年   6篇
  1999年   9篇
  1998年   10篇
  1997年   6篇
  1996年   11篇
  1995年   10篇
  1994年   2篇
  1993年   5篇
  1992年   4篇
  1991年   4篇
  1990年   5篇
  1988年   3篇
  1986年   1篇
  1985年   5篇
  1984年   2篇
  1983年   1篇
  1980年   2篇
  1979年   1篇
  1977年   3篇
  1974年   1篇
  1972年   1篇
排序方式: 共有565条查询结果,搜索用时 468 毫秒
561.
The effect of gamma radiation on the thermal behavior and crystalline structure of low density polyethylene (LDPE) has been investigated using differential scanning calorimetry (DSC) and X‐ray diffraction techniques (XRD). Gamma irradiation was carried out in atmospheric air to a maximum dose of 883 kGy. DSC results of the heating run from room temperature up to 150 °C showed that the melting temperature (Tm), and onset temperature of LDPE film decrease linearly with increasing irradiation dose. However, upon cooling LDPE film from 150 °C to room temperature, the crystallization temperature (Tc) and onset temperature were found to decrease non‐linearly with increasing irradiation dose up to 500 kGy and then tended to level off. The change in heat of fusion (ΔHf) with irradiation dose was found to proceed with different behaviour, two stages, with a kink at irradiation dose of about 500 kGy, being observed. This suggests the occurrence of degradation and crosslinking at low and high doses, respectively. However, parameters of the X‐ray diffraction pattern such as number of diffraction patterns, peak position (2θ) and width of the diffraction pattern, support the results of DSC measurements. © 2000 Society of Chemical Industry  相似文献   
562.
Residual strength tests are commonly used to characterize the high-temperature mechanical properties of concrete materials. In these tests, the specimens are heated to a target temperature in a furnace and then cooled down to room temperature, followed by mechanical testing at room temperature. This research investigates the influence of the cooling method on the residual strength of Strain Hardening Cementitious Composites (SHCC) after exposure to 400°C and 600°C. Two types of cooling methods — furnace-cooling (within a closed furnace) and water-cooling (immersed in a water tank) — were adopted. Four different SHCC previously investigated by the authors for high-temperature residual mechanical and bond behavior with steel were studied. Two different specimen sizes were tested under uniaxial compression and flexure to characterize the residual compressive strength and modulus of rupture. The effect of the cooling method was prominent for the normalized residual modulus of rupture at 400°C, but not at 600°C. The cooling method had no effect on the normalized residual compressive strength of any material at either of the two temperatures, except one of the SHCC (PVA-SC) at 400°C. Specimen size also had no effect on the normalized residual compressive strength and modulus of rupture irrespective of the cooling method.  相似文献   
563.
Modification at the 5’’-position of 4,5-disubstituted aminoglycoside antibiotics (AGAs) to circumvent inactivation by aminoglycoside modifying enzymes (AMEs) is well known. Such modifications, however, unpredictably impact activity and affect target selectivity thereby hindering drug development. A survey of 5’’-modifications of the 4,5-AGAs and the related 5-O-furanosyl apramycin derivatives is presented. In the neomycin and the apralog series, all modifications were well-tolerated, but other 4,5-AGAs require a hydrogen bonding group at the 5’’-position for maintenance of antibacterial activity. The 5’’-amino modification resulted in parent-like activity, but reduced selectivity against the human cytosolic decoding A site rendering this modification unfavorable in paromomycin, propylamycin, and ribostamycin. Installation of a 5’’-formamido group and, to a lesser degree, a 5’’-ureido group resulted in parent-like activity without loss of selectivity. These lessons will aid the design of next-generation AGAs capable of circumventing AME action while maintaining high antibacterial activity and target selectivity.  相似文献   
564.
Smart and multifunctional fiber reinforced polymer (FRP) composites with energy storage, sensing, and heating capabilities have gained significant interest for automotive, civil, and aerospace applications. However, achieving smart and multifunctional capabilities in an FRP composite while maintaining desired mechanical properties remains challenging. Here, a novel approach for layer-by-layer (LBL) deposition of 2D material (graphene and molybdenum disulfide, MoS2)-based heterostructure onto glass fiber fabric using a highly scalable manufacturing technique at a remarkable speed of ≈150 m min−1 is reported. This process enables the creation of smart textiles with integrated energy storage, sensing, and heating functionalities. This methodology combines gel-based electrolyte with a vacuum resin infusion technique, resulting in an efficient and stable smart FRP composite with an areal capacitance of up to ≈182 µF cm2 at 10 mV s−1. The composite exhibits exceptional cyclic stability, maintaining ≈90% capacitance after 1000 cycles. Moreover, the smart composite demonstrates joule heating, reaching from ≈24 to ≈27 °C within 120 s at 25 V. Additionally, the smart composite displays strain sensitivity by altering electrical resistance with longitudinal strain, enabling structural health monitoring. These findings highlight the potential of smart composites for multifunctional applications and provide an important step toward realizing their actual real-world applications.  相似文献   
565.
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker will not be able to decipher the encrypted data, and even if the attacker tries to tamper with the data, the attacker will not have access to the original data. In this paper, various data security techniques are developed, which can be used to protect the data from attackers completely. First, a customized American Standard Code for Information Interchange (ASCII) table is developed. The value of each Index is defined in a customized ASCII table. When an attacker tries to decrypt the data, the attacker always tries to apply the predefined ASCII table on the Ciphertext, which in a way, can be helpful for the attacker to decrypt the data. After that, a radix 64-bit encryption mechanism is used, with the help of which the number of cipher data is doubled from the original data. When the number of cipher values is double the original data, the attacker tries to decrypt each value. Instead of getting the original data, the attacker gets such data that has no relation to the original data. After that, a Hill Matrix algorithm is created, with the help of which a key is generated that is used in the exact plain text for which it is created, and this Key cannot be used in any other plain text. The boundaries of each Hill text work up to that text. The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms. Then, the Kasiski test is used to verify the validity of the proposed algorithm and found that, if the proposed algorithm is used for data encryption, so an attacker cannot break the proposed algorithm security using any technique or algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号