全文获取类型
收费全文 | 253篇 |
免费 | 8篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 2篇 |
综合类 | 2篇 |
化学工业 | 64篇 |
金属工艺 | 6篇 |
机械仪表 | 3篇 |
建筑科学 | 8篇 |
能源动力 | 11篇 |
轻工业 | 21篇 |
水利工程 | 1篇 |
无线电 | 72篇 |
一般工业技术 | 28篇 |
冶金工业 | 6篇 |
原子能技术 | 1篇 |
自动化技术 | 39篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 12篇 |
2021年 | 10篇 |
2020年 | 9篇 |
2019年 | 11篇 |
2018年 | 14篇 |
2017年 | 8篇 |
2016年 | 9篇 |
2015年 | 11篇 |
2014年 | 7篇 |
2013年 | 17篇 |
2012年 | 14篇 |
2011年 | 11篇 |
2010年 | 9篇 |
2009年 | 17篇 |
2008年 | 14篇 |
2007年 | 10篇 |
2006年 | 6篇 |
2005年 | 2篇 |
2004年 | 6篇 |
2003年 | 5篇 |
2002年 | 8篇 |
2001年 | 7篇 |
2000年 | 1篇 |
1999年 | 8篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 5篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有264条查询结果,搜索用时 562 毫秒
1.
Maher M. Osman Mounir M. Abd El-Malek Aida B. Tadros Atef M. Michael 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》1995,62(1):46-52
4-Amino-3-thio-1,24-triazolidine (L1) and 4-amino-5-thio-1,3,4-thiadiazole (LII) as well as their metal complexes of the general formulae MLI·2H2O and MLIICl (M; Pb(II), Cd(II) and Zn(II)) were prepared. With Sn(II), we obtained Sn(LI)2·2H2O and SnLIICl, respectively. The structures of the compounds were identified through elemental analysis, and IR and UV spectra measurements, in addition to thermal analysis in case of the metal complexes. The antifouling properties of the compounds were tested by their incorporation into paint formulations which were applied to PVC substrates and tested in water from Alexandria western harbour. When the compounds were added at 17·5% by volume, the coated panels were fouled after 3 months of immersion. The addition of 6·7% by volume of tributyltin oxide to 15·8% of the prepared compounds in one formulation elevated the paint efficiency and prevented fouling for 11 months. Paint containing solely tributyltin oxide at the same concentration was inactive against algae. 相似文献
2.
CAS-BUS: A Test Access Mechanism and a Toolbox Environment for Core-Based System Chip Testing 总被引:2,自引:0,他引:2
As System on a Chip (SoC) testing faces new challenges, some new test architectures must be developed. This paper describes a Test Access Mechanism (TAM) named CAS-BUS that solves some of the new problems the test industry has to deal with. This TAM is scalable, flexible and dynamically reconfigurable. The CAS-BUS architecture is compatible with the IEEE P1500 standard proposal in its current state of development, and is controlled by Boundary Scan features.This basic CAS-BUS architecture has been extended with two independent variants. The first extension has been designed in order to manage SoC made up with both wrapped cores and non wrapped cores with Boundray Scan features. The second deals with a test pin expansion method in order to solve the I/O bandwidth problem. The proposed solution is based on a new compression/decompression mechanism which provides significant results in case of non correlated test patterns processing. This solution avoids TAM performance degradation.These test architectures are based on the CAS-BUS TAM and allow trade-offs to optimize both test time and area overhead. A tool-box environment is provided, in order to automatically generate the needed component to build the chosen SoC test architecture. 相似文献
3.
A different newly designed cationic exchange polymer membrane and anionic exchange polymer membrane were introduced, and also the transport properties of these polymeric membranes were investigated in this study. The transport properties of these polymer membranes in contact with ferrocene redox derivatives were estimated by using electrochemical techniques such as cyclicvoltammetry, chronopotentiometry, and chronoamperometry techniques, respectively. The used ferrocene redox substances, which have different functional groups, were (Ferrocenylmethyl) trimethylamonium iodide, FcMA, Ferrocenedimethanol, FcDM, and Ferrocene carboxylic acid, FcCA. It indicated that the performance of a membrane depended on the content of polymer gel, anionic exchange polymer site (20 wt % and 50 wt %) or cationic polymer exchange site (20 wt % and 50 wt %), and the efficiency of the functional groups of cationic and anionic exchange polymer site as well. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci, 2008 相似文献
4.
A. Mounir EL Sayed A. Yamauchi N. A. Darwish A. A. Abd EL‐Mageed S. F. Halim 《应用聚合物科学杂志》2008,109(5):2988-2993
The charged mosaic polymer membrane (CMM) without reinforcement and the composite charged mosaic polymer membrane (CCMM) with reinforcement were investigated in terms of salt and water transport (permeability). The composite charged mosaic polymer membrane (CCMM) with reinforcement showed a unique transport behavior such as preferential material transport Lp and ω. Water permeability coefficient, Lp and salt permeability coefficient, ω were estimated by taking account of active layer thickness of composite polymer gel. The Lp and ω values of CCMM with reinforcement were larger than those of CMM without reinforcement. On the other hand, the reflection coefficient of CCMM, σ, showed negative value, which suggested preferential material transport to solvent transport. © 2008 Wiley Periodicals, Inc. J Appl Polym Sci, 2008 相似文献
5.
Ramzi Guesmi Mohamed Amine Ben Farah Abdennaceur Kachouri Mounir Samet 《Multimedia Tools and Applications》2016,75(8):4753-4769
This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication. 相似文献
6.
Lamia?Ben?HamoudaEmail author Mounir?Ayadi Nicolas?Langlois 《International Journal of Control, Automation and Systems》2016,14(2):443-451
This paper proposes a Fuzzy Fault Tolerant Predictive Control (FFTPC) with integral action method for a class of nonlinear systems. The Takagi-Sugeno (T-S) fuzzy approach is introduced as a modelling technique in order to consider the active control methods adapted to linear models. The proposed control strategy is based on a combination between Parallel Distributed Compensation (PDC) control law and Model Predictive Control (MPC) where the T-S fuzzy aspect uses the Unmeasurable Premise Variables (UPV). A T-S fuzzy observer provides an L2 norm estimation of system state vector and faults. The controller and observer gains are obtained by solving Linear Matrix Inequalities (LMIs) derived from the Lyapunov theory. The validity of the proposed Fault Tolerant Control (FTC) strategy is illustrated through an application to a Diesel Engine Air Path (DEAP) system. 相似文献
7.
Anas El Husseini Abdallah M’Hamed Bachar El Hassan Mounir Mokhtari 《Personal and Ubiquitous Computing》2013,17(5):1013-1023
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people. 相似文献
8.
Numerical simulation has been performed to improve the performance of Cu2ZnSnS4 (CZTS) solar cells by replacing CdS with Zn1–xSnxO buffer layer. The influences of thickness, donor concentration and defect density of buffer layers on the performance of CZTS solar cells were investigated. It has been found that Zn1–xSnxO buffer layer for Sn content of 0.20 is better for CZTS solar cell. A higher efficiency can be achieved with thinner buffer layer. The optimized solar cell demonstrated a maximum power conversion efficiency of 13%. 相似文献
9.
Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion detection is performed based on two tiers. In the first tier, a Deep Convolution Neural Network (DCNN) analyzes the data packets by extracting packet flow features to classify the packets as normal, malicious, and suspicious. In the second tier, the suspicious packets are classified as normal or malicious using the Generative Adversarial Network (GAN). Finally, intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization (IMO) is used for attack path discovery by considering several metrics, and the Graph cut utilized algorithm for attack scenario reconstruction (ASR). UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator (NS-3.26). Compared with previous performance metrics such as energy consumption, storage overhead accuracy, response time, attack detection rate, precision, recall, and F-measure. The simulation result shows that the proposed MZWB method achieves high performance than existing works 相似文献
10.
Mounir Bousbia-Salah Maamar Bettayeb Allal Larbi 《Journal of Intelligent and Robotic Systems》2011,64(3-4):387-400
This paper presents a navigation aid for the blind based on a microcontroller with synthetic speech output. The system consists of two vibrators, two ultrasonic sensors mounted on the user??s shoulders and another one integrated into the cane. It is able to give information to the blind about urban walking routes and to provide real-time information on the distance of over-hanging obstacles within 6 m along the travel path ahead of the user. The suggested system can then sense the surrounding environment via sonar sensors and sending vibro-tactile feedback to the user of the position of the closest obstacles in range. For the ultrasonic cane, it is used to detect any obstacle on the ground. Experimental results show the effectiveness of the proposed system for blind navigation. 相似文献