首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   384篇
  免费   28篇
  国内免费   3篇
电工技术   5篇
综合类   1篇
化学工业   120篇
金属工艺   8篇
机械仪表   3篇
建筑科学   15篇
能源动力   19篇
轻工业   24篇
水利工程   5篇
石油天然气   1篇
无线电   52篇
一般工业技术   80篇
冶金工业   28篇
原子能技术   2篇
自动化技术   52篇
  2024年   1篇
  2023年   15篇
  2022年   21篇
  2021年   30篇
  2020年   25篇
  2019年   15篇
  2018年   20篇
  2017年   21篇
  2016年   23篇
  2015年   15篇
  2014年   21篇
  2013年   29篇
  2012年   20篇
  2011年   32篇
  2010年   13篇
  2009年   8篇
  2008年   21篇
  2007年   13篇
  2006年   20篇
  2005年   10篇
  2004年   6篇
  2003年   5篇
  2002年   6篇
  2001年   7篇
  2000年   1篇
  1999年   1篇
  1998年   3篇
  1997年   1篇
  1996年   4篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
  1989年   1篇
  1983年   1篇
  1977年   1篇
排序方式: 共有415条查询结果,搜索用时 551 毫秒
1.
The current study establishes the unprecedented involvement in the evolution and production of novel core–shell nanocomposites composed of nanosized titanium dioxide and aniline‐o‐phenylenediamine copolymer. TiO2@copoly(aniline and o‐phenylenediamine) (TiO2@PANI‐o‐PDA) core–shell nanocomposites were chemically synthesized in a molar ratio of 5:1 of the particular monomers and several weights of nano‐TiO2 via oxidative copolymerization. The construction of the TiO2@PANI‐o‐PDA core–shell nanocomposites was ascertained from Fourier transform IR spectroscopy, UV–visible spectroscopy and XRD. A reasonable thermal behavior for the original copolymer and the TiO2@PANI‐o‐PDA core–shell nanocomposites was investigated. The bare PANI‐o‐PDA copolymer was thermally less stable than the TiO2@PANI‐o‐PDA nanocomposites. The core–shell feature of the nanocomposites was found to have core and shell sizes of 17 nm and 19–26 nm, respectively. In addition, it was found that the addition of a high ratio of TiO2 nanoparticles increases the electrical conductivity and consequently lowers the electrical resistivity of the TiO2@PANI‐o‐PDA core–shell nanocomposites. The hybrid photocatalysts exhibit a dramatic photocatalytic efficacy of methylene blue degradation under solar light irradiation. A plausible interpretation of the photocatalytic degradation results of methylene blue is also demonstrated. Our setup introduces a facile, inexpensive, unique and efficient technique for developing new core–shell nanomaterials with various required functionalities and colloidal stabilities. © 2018 Society of Chemical Industry  相似文献   
2.
3.
4.
Pretreatment of high manganese hot metal is suggested to produce hot metal suitable for further processing to steel in conventional LD converter and rich manganese slags satisfy the requirements for the production of silicomanganese alloys. Manganese distribution between slag and iron represents the efficiency of manganese oxidation from hot metal. The present study has been done to investigate the effect of temperature, slag basicity and composition of oxidizer mixture on the distribution coefficient of manganese between slag and iron. Ferrous oxide activity was determined in molten synthetic slag mixtures of FeO‐MnO‐SiO2–CaO–MgO‐Al2O3. The investigated slags had chemical compositions similar to either oxidizer mixture or slags expected to result from the treatment of high manganese hot metal. The technique used to measure the ferrous oxide activity in the investigated slag systems was the well established one of gas‐slag‐metal equilibration in which molten slags contained in armco iron crucibles are exposed to a flowing gas mixture with a known oxygen potential until equilibrium has been attained. After equilibration, the final chemical analysis of the slags gave compositions having a particular ferrous oxide activity corresponding to the oxygen potential of the gas mixture. The determined values of ferrous oxide activity were used to calculate the equilibrium distribution of manganese between slag and iron. Higher manganese distribution between slag and iron was found to be obtained by using oxidizer containing high active iron oxide under acidic slag and relatively low temperature of about 1350°C.  相似文献   
5.
Unsaturated polyester resin (UP) was prepared from glycolyzed oligomer of poly(ethylene terephthalate) (PET) waste based on diethylene glycol (DEG). New diacrylate and dimethacrylate vinyl ester resins prepared from glycolysis of PET with tetraethylene glycol were blended with UP to study the mechanical characteristics of the cured UP. The vinyl ester resins were used as crosslinking agents for unsaturated polyester resin diluted with styrene, using free‐radical initiator and accelerator. The mechanical properties of the cured UP resins were evaluated. The compressive properties of the cured UP/styrene resins in the presence of different vinyl ester concentrations were evaluated. Increasing the vinyl ester content led to a pronounced improvement in the compression strength. The chemical resistances of the cured resins were evaluated through hot water, solvents, acid, and alkali resistance measurements. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 103: 3175–3182, 2007  相似文献   
6.
Multimedia Tools and Applications - This paper suggests an IoT based smart farming system along with an efficient prediction method called WPART based on machine learning techniques to predict crop...  相似文献   
7.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
8.
Multidimensional Systems and Signal Processing - Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the...  相似文献   
9.
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats.  相似文献   
10.
Brain-computer interfaces (BCIs) records brain activity using electroencephalogram (EEG) headsets in the form of EEG signals; these signals can be recorded, processed and classified into different hand movements, which can be used to control other IoT devices. Classification of hand movements will be one step closer to applying these algorithms in real-life situations using EEG headsets. This paper uses different feature extraction techniques and sophisticated machine learning algorithms to classify hand movements from EEG brain signals to control prosthetic hands for amputated persons. To achieve good classification accuracy, denoising and feature extraction of EEG signals is a significant step. We saw a considerable increase in all the machine learning models when the moving average filter was applied to the raw EEG data. Feature extraction techniques like a fast fourier transform (FFT) and continuous wave transform (CWT) were used in this study; three types of features were extracted, i.e., FFT Features, CWT Coefficients and CWT scalogram images. We trained and compared different machine learning (ML) models like logistic regression, random forest, k-nearest neighbors (KNN), light gradient boosting machine (GBM) and XG boost on FFT and CWT features and deep learning (DL) models like VGG-16, DenseNet201 and ResNet50 trained on CWT scalogram images. XG Boost with FFT features gave the maximum accuracy of 88%.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号