首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   836篇
  免费   40篇
  国内免费   2篇
电工技术   9篇
化学工业   173篇
金属工艺   6篇
机械仪表   20篇
建筑科学   30篇
矿业工程   3篇
能源动力   46篇
轻工业   81篇
水利工程   16篇
石油天然气   5篇
无线电   123篇
一般工业技术   104篇
冶金工业   13篇
原子能技术   2篇
自动化技术   247篇
  2023年   9篇
  2022年   35篇
  2021年   47篇
  2020年   26篇
  2019年   24篇
  2018年   30篇
  2017年   36篇
  2016年   40篇
  2015年   28篇
  2014年   55篇
  2013年   76篇
  2012年   68篇
  2011年   66篇
  2010年   55篇
  2009年   63篇
  2008年   43篇
  2007年   41篇
  2006年   34篇
  2005年   24篇
  2004年   25篇
  2003年   15篇
  2002年   11篇
  2001年   5篇
  2000年   2篇
  1999年   4篇
  1998年   3篇
  1997年   1篇
  1996年   3篇
  1995年   2篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   3篇
  1983年   1篇
排序方式: 共有878条查询结果,搜索用时 15 毫秒
1.
The application of the diophantine frequency synthesis (DFS) methodology is presented and certain practical aspects of it are illustrated through the design and frequency planning of two forward DFS synthesizers each using two Integer-N phase-locked loops (PLLs). Both synthesizers achieve frequency resolution about 100 times times better that their constituent PLLs without compromising hopping speed performance or spectral purity.  相似文献   
2.
3.
A contact probe test was developed to characterize the surface stickiness of a tomato pulp droplet at various moisture contents and temperatures. To provide tomato pulp samples with different moisture contents, tomato powder produced by a laboratory spray dryer was wetted to seven different moisture levels. The instantaneous tensile force curve was recorded during the probe withdrawal from which the maximum tensile force and other useful information were obtained and cross-examined against images of bonding, debonding, and failure of the material. Generally, at higher moisture contents tomato pulp exhibited cohesive failure followed by semi-adhesive failure, but when moisture content decreased to a certain level, a peak tensile pressure was observed and the failure was adhesive. In addition, higher temperatures shifted the points of adhesive failure toward lower moisture content.  相似文献   
4.
Cognitive radio systems dynamically reconfigure the algorithms and parameters they use, in order to adapt to the changing environment conditions. However, reaching proper reconfiguration decisions presupposes a way of knowing, with high enough assurance, the capabilities of the alternate configurations, especially in terms of achievable transmission capacity and coverage. The present paper addresses this problem, firstly, by specifying a complete process for extracting estimations of the capabilities of candidate configurations, in terms of transmission capacity and coverage, and, secondly, by enhancing these estimations with the employment of a machine learning technique. The technique is based on the use of Bayesian Networks, in conjunction with an effective learning and adaptation strategy, and aims at extracting and exploiting knowledge and experience, in order to reach robust (i.e. stable and reliable) estimations of the configurations' capabilities. Comprehensive results of the proposed method are presented, in order to validate its functionality. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
5.
Slab casting for hot rolled steel and strip casting using the twin roll casting (TRC) method are compared in terms of inclusions evolution. There are differences of the processes, mainly the use of casting flux in CC of slabs, or pool shapes and sizes in terms of TRC, particularly when roll diameters vary. The inclusion evolution of alumina in a low carbon steel grade was estimated. By modelling particle growth rate, coagulation and deposition, an ‘agglomeration index’ was created to describe the probability of clogging in the SEN. Similarly the growth of secondary alumina precipitation during cooling of the melt in the pool by Stokes collision and turbulent collision was estimated in terms of forming large particles which are able to float‐up. Influences of melt superheat or caster size were taken into account.  相似文献   
6.
This contribution deals with advanced educational technologies needed to equip customers from higher education institutions, research and industry with efficient tools supporting their work and operating new skills‐training methods. The challenges are reducing the training costs, improving quality and increasing the number of graduates in engineering departments. The concept of a Virtual Lab based on the combination of various teaching methods and tools is presented. Principles of mathematisation in metallurgical education and training are discussed. An example of online course designed in the form of Virtual Lab is demonstrated.  相似文献   
7.
Dendrimers have attracted immense attention during the last decade due to their interesting properties both from a basic and an applied research viewpoint. Encapsulation of metal nanoparticles for catalysis, drug delivery and light harvesting are only some applications of dendrimers that are breaking new ground. A novel application of dendrimer technology is described in the present paper that relates to industrial water treatment. Industrial water systems often suffer from undesirable inorganic deposits. These can form either in the bulk or on metallic surfaces, such as heat exchangers or pipelines. Silica (SiO2) scale formation and deposition is a major problem in high‐silica‐containing cooling waters. Scale prevention rather than removal is highly desired. In this paper, benchtop screening tests on various silica inhibition chemistries are reported, with emphasis on materials with a dendrimeric structure. Specifically, the inhibition properties of commercially available STARBURST® polyaminoamide (PAMAM) dendrimers generations 0.5, 1, 1.5, 2, and 2.5 are investigated in detail together with other commonly‐used scale inhibitors. Experimental results show that inhibition efficiency largely depends on structural features of PAMAM dendrimers such as generation number and nature of the end groups. PAMAM dendrimers are effective inhibitors of silica scale growth at 40 ppm dosage levels. PAMAM dendrimers also act as silica nucleators, forming SiO2–PAMAM composites. This occurs because the SiO2 formed by incomplete inhibition interacts with cationic PAMAM‐1 and ‐2. The general scope of silica formation and inhibition in industrial waters is also discussed. Copyright © 2005 Society of Chemical Industry  相似文献   
8.
Interactive Television (ITV) applications gratify entertainment needs and leisure activities in a relaxed domestic context. Then, the mentality of efficiency and task completion implied by many user interface heuristics may not be suitable for design and expert evaluation of ITV. In line with the contemporary movement towards the design of the user experience of computing systems, a set of design principles for ITV applications has been developed. Instead of information technology, the field of communication science was explored, which has accumulated an extensive theory of TV usage and viewer behavior. For the empirical validation, the principles were employed in the design of an interactive music TV application. The results suggest that a small set of generic principles could support the systematic design of ITV applications and produce a design rationale that is traceable and comparable to alternative solutions, during the process of early product development. In addition, the principles could be refined into specific guidelines and further employed to support expert evaluation techniques.  相似文献   
9.
Smart card technology has evolved over the last few years following notable improvements in the underlying hardware and software platforms. Advanced smart card microprocessors, along with robust smart card operating systems and platforms, contribute towards a broader acceptance of the technology. These improvements have eliminated some of the traditional smart card security concerns. However, researchers and hackers are constantly looking for new issues and vulnerabilities. In this article we provide a brief overview of the main smart card attack categories and their corresponding countermeasures. We also provide examples of well-documented attacks on systems that use smart card technology (e.g. satellite TV, EMV, proximity identification) in an attempt to highlight the importance of the security of the overall system rather than just the smart card.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号