首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   204篇
  免费   17篇
  国内免费   2篇
电工技术   1篇
化学工业   49篇
机械仪表   1篇
建筑科学   2篇
能源动力   9篇
轻工业   13篇
石油天然气   2篇
无线电   30篇
一般工业技术   44篇
冶金工业   6篇
原子能技术   10篇
自动化技术   56篇
  2023年   1篇
  2022年   12篇
  2021年   9篇
  2020年   5篇
  2019年   5篇
  2018年   5篇
  2017年   13篇
  2016年   12篇
  2015年   11篇
  2014年   3篇
  2013年   10篇
  2012年   9篇
  2011年   25篇
  2010年   15篇
  2009年   14篇
  2008年   15篇
  2007年   9篇
  2006年   5篇
  2005年   6篇
  2004年   1篇
  2003年   4篇
  2002年   3篇
  2001年   2篇
  2000年   2篇
  1998年   3篇
  1997年   3篇
  1996年   1篇
  1994年   1篇
  1992年   3篇
  1991年   2篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1983年   2篇
  1981年   3篇
  1979年   1篇
  1978年   1篇
  1970年   1篇
排序方式: 共有223条查询结果,搜索用时 31 毫秒
121.
Basic scientific interest in using a semiconducting electrode in molecule‐based electronics arises from the rich electrostatic landscape presented by semiconductor interfaces. Technological interest rests on the promise that combining existing semiconductor (primarily Si) electronics with (mostly organic) molecules will result in a whole that is larger than the sum of its parts. Such a hybrid approach appears presently particularly relevant for sensors and photovoltaics. Semiconductors, especially Si, present an important experimental test‐bed for assessing electronic transport behavior of molecules, because they allow varying the critical interface energetics without, to a first approximation, altering the interfacial chemistry. To investigate semiconductor‐molecule electronics we need reproducible, high‐yield preparations of samples that allow reliable and reproducible data collection. Only in that way can we explore how the molecule/electrode interfaces affect or even dictate charge transport, which may then provide a basis for models with predictive power. To consider these issues and questions we will, in this Progress Report,
  • review junctions based on direct bonding of molecules to oxide‐free Si.
  • describe the possible charge transport mechanisms across such interfaces and evaluate in how far they can be quantified.
  • investigate to what extent imperfections in the monolayer are important for transport across the monolayer.
  • revisit the concept of energy levels in such hybrid systems.
  相似文献   
122.
This paper considers to what extent the second-phase volume fraction in superplastic binary alloys affect the matrix grain size stability during deformation and, through it, the flow stress at constant temperature and strain rate. It is shown for five different superplastic binary alloy systems, that at constant temperature and strain rate the flow stress will increase with the deviation of the second-phase volume fraction in the alloys from that required for maximum matrix grain size stability. A new parameter (Z) which quantifies these deviations has been introduced in this paper. The possible errors in determining the pertinent parameters in the rate equation for superplastic flow by testing alloys withZ is discussed.  相似文献   
123.
Approximating MIN 2-SAT and MIN 3-SAT   总被引:1,自引:0,他引:1  
We obtain substantially improved approximation algorithms for the MIN k-SAT problem, for k = 2,3. More specifically, we obtain a 1.1037-approximation algorithm for the MIN 2-SAT problem, improving a previous 1.5-approximation algorithm, and a 1.2136-approximation algorithm for the MIN 3-SAT problem, improving a previous 1.75-approximation algorithm for the problem. These results are obtained by adapting techniques that were previously used to obtain approximation algorithms for the MAX k-SAT problem. We also obtain some hardness of approximation results.  相似文献   
124.
A cryptographic protocol is a distributed program that can be executed by several actors. Since several runs of the protocol within the same execution are allowed, models of cryptoprotocols are often infinite. Sometimes, for verification purposes, only a finite and approximated model is needed. For this, we consider the problem of computing such an approximation and we propose to simulate the required partial execution in an abstract level. More precisely, we define an abstract finite category G a as an abstract game semantics for the SPC calculus, a dedicated calculus for security protocols. The abstract semantics is then used to build a decision procedure for secrecy correctness in security protocols.  相似文献   
125.
The adverse impacts of CO2 emission on the global warming highlight the importance of carbon capture and storage technology and geological storage of CO2 under solubility trapping mechanisms. Enhancing the solubility of CO2 in formation water has always been the focus of research in the area of CO2 sequestration. Ultrasound techniques are one of the environmentally friendly methods that use high-intensity acoustic waves to improve gas solubility in liquids. Ultrasonic waves can alter the properties of different phases that lead to chemical reactions and provide a means to increase the solubility of CO2 in connate water. In this study, we investigated the effects of ultrasound on the solubility of CO2 in connate water under different conditions of pressure, temperature, and salinity. The results showed that the solubility of CO2 was improved with increasing pressure under ultrasonic effects. However, the solubility of CO2 was inversely proportional to the increase in brine salinity and temperature. Therefore, it was concluded that the solubility of CO2 might be enhanced in the presence of ultrasound.  相似文献   
126.
Influenza poses a significant health threat to children, and schools may play a critical role in community outbreaks. Mathematical outbreak models require assumptions about contact rates and patterns among students, but the level of temporal granularity required to produce reliable results is unclear. We collected objective contact data from students aged 5–14 at an elementary school and middle school in the state of Utah, USA, and paired those data with a novel, data-based model of influenza transmission in schools. Our simulations produced within-school transmission averages consistent with published estimates. We compared simulated outbreaks over the full resolution dynamic network with simulations on networks with averaged representations of contact timing and duration. For both schools, averaging the timing of contacts over one or two school days caused average outbreak sizes to increase by 1–8%. Averaging both contact timing and pairwise contact durations caused average outbreak sizes to increase by 10% at the middle school and 72% at the elementary school. Averaging contact durations separately across within-class and between-class contacts reduced the increase for the elementary school to 5%. Thus, the effect of ignoring details about contact timing and duration in school contact networks on outbreak size modelling can vary across different schools.  相似文献   
127.
The circadian clock, which drives a wide range of bodily rhythms in synchrony with the day–night cycle, is based on a molecular oscillator that ticks with a period of approximately 24 h. Timed proteasomal degradation of clock components is central to the fine-tuning of the oscillator’s period. FBXL3 is a protein that functions as a substrate-recognition factor in the E3 ubiquitin ligase complex, and was originally shown in mice to mediate degradation of CRY proteins and thus contribute to the mammalian circadian clock mechanism. By exome sequencing, we have identified a FBXL3 mutation in patients with syndromic developmental delay accompanied by morphological abnormalities and intellectual disability, albeit with a normal sleep pattern. We have investigated the function of FBXL3 in the zebrafish, an excellent model to study both vertebrate development and circadian clock function and, like humans, a diurnal species. Loss of fbxl3a function in zebrafish led to disruption of circadian rhythms of promoter activity and mRNA expression as well as locomotor activity and sleep–wake cycles. However, unlike humans, no morphological effects were evident. These findings point to an evolutionary conserved role for FBXL3 in the circadian clock system across vertebrates and to the acquisition of developmental roles in humans.  相似文献   
128.
Uniform nanosized, mesoporous and high specific surface area ceria–zirconia (1:1 mole ratio) solid solutions were synthesized employing a poly-block copolymer surfactant combined with microwave or thermal treatment. For comparison purpose an identical composition Ce x Zr1?x O2 mixed oxide was also prepared by a conventional coprecipitation method. The surface and bulk structure of the synthesized samples were investigated using X-ray diffraction (XRD), small angle X-ray scattering (SAXS), Raman spectroscopy, scanning electron microscopy (SEM), transmission electron microscopy (TEM), BET surface area and BJH pore size distribution (PSD) methods. The catalytic activity was evaluated for CO oxidation at normal atmospheric pressure. The Ce x Zr1?x O2 solid solutions obtained through surfactant use exhibited high specific surface area and mesoporosity. The XRD measurements revealed the presence of cubic Ce0.75Zr0.25O2 and Ce0.6Zr0.4O2 phases in the case of conventional coprecipitation and surfactant controlled synthesized samples, respectively. The Raman measurements revealed existence of more oxygen defects in the surfactant-controlled and microwave treated sample. The SEM images suggested that all samples consist of typical spherical agglomerates with almost uniform size within the nanometer size range. The TEM measurements revealed nanosized crystallites in a narrow range between 4 and 8 nm, and densely packed in the case of conventional precipitation and microwave treated samples. Interestingly, the Ce x Zr1?x O2 solid solution obtained by surfactant-controlled method and treated with microwave radiation exhibited better CO oxidation activity than other samples. Enhanced activity of surfactant-controlled and microwave treated sample is correlated with its unique physicochemical characteristics.  相似文献   
129.
130.
In this paper, we propose a novel intrusion detection technique with a fully automatic attack signatures generation capability. The proposed approach exploits a honeypot traffic data analysis to build an attack scenarios database, used to detect potential intrusions. Furthermore, for an effective and efficient intrusion detection mechanism, we introduce several new or adapted algorithms for signature generation, signature comparison, etc. Finally, we use DARPA’99 and UNSW-NB15 traffic to evaluate the proposed approach. The results indicate that the generated attack signatures are of high quality with low rates of false negatives and false positives.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号