首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   581篇
  免费   43篇
  国内免费   4篇
电工技术   10篇
综合类   4篇
化学工业   104篇
金属工艺   12篇
机械仪表   39篇
建筑科学   5篇
能源动力   53篇
轻工业   80篇
水利工程   3篇
无线电   43篇
一般工业技术   145篇
冶金工业   26篇
原子能技术   1篇
自动化技术   103篇
  2024年   6篇
  2023年   14篇
  2022年   67篇
  2021年   81篇
  2020年   40篇
  2019年   49篇
  2018年   48篇
  2017年   40篇
  2016年   36篇
  2015年   21篇
  2014年   28篇
  2013年   31篇
  2012年   21篇
  2011年   26篇
  2010年   9篇
  2009年   14篇
  2008年   8篇
  2007年   12篇
  2006年   10篇
  2005年   6篇
  2004年   4篇
  2003年   7篇
  2002年   4篇
  2001年   4篇
  2000年   5篇
  1999年   4篇
  1998年   15篇
  1997年   4篇
  1996年   1篇
  1995年   1篇
  1994年   6篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1980年   1篇
排序方式: 共有628条查询结果,搜索用时 0 毫秒
51.
Journal of Materials Science: Materials in Electronics - Single lead-free Na0.73Bi0.09(Nb1???xTax)O3 (x?=?0, 0.10, 0.20, 0.30, and 0.40) ceramic phases were processed...  相似文献   
52.
To improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. Although the utilization of the cloud services improves the processing and storage capacity of mobile devices, the migration of confidential information on untrusted cloud raises security and privacy issues. Considering the security of mobile-cloud-computing subscribers’ information, a mechanism to authenticate legitimate mobile users in the cloud environment is sought. Usually, the mobile users are authenticated in the cloud environment through digital credential methods, such as password. Once the users’ credential information theft occurs, the adversary can use the hacked information for impersonating the mobile user later on. The alarming situation is that the mobile user is unaware about adversary’s malicious activities. In this paper, a light-weight security scheme is proposed for mobile user in cloud environment to protect the mobile user’s identity with dynamic credentials. The proposed scheme offloads the frequently occurring dynamic credential generation operations on a trusted entity to keep minimum processing burden on the mobile device. To enhance the security and reliability of the scheme, the credential information is updated frequently on the basis of mobile-cloud packets exchange. Furthermore, the proposed scheme is compared with the existing scheme on the basis of performance metrics i.e. turnaround time and energy consumption. The experimental results for the proposed scheme showed significant improvement in turnaround time and energy consumption as compared to the existing scheme.  相似文献   
53.
54.
Secret key generation (SKG) is an emerging technology to secure wireless communication from attackers. Therefore, the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’ uncertainty. However, the physical layer secret key generation (PHY-SKG) depends on two fundamental parameters, i.e., coherence time and power allocation. The coherence time for PHY-SKG is not applicable to secure wireless channels. This is because coherence time is for a certain period of time. Thus, legitimate users generate the secret keys (SKs) with a shorter key length in size. Hence, an attacker can quickly get information about the SKs. Consequently, the attacker can easily get valuable information from authentic users. Therefore, we considered the scheme of power allocation to enhance the secret key generation rate (SKGR) between legitimate users. Hence, we propose an alternative method, i.e., a power allocation, to improve the SKGR. Our results show 72% higher SKGR in bits/sec by increasing power transmission. In addition, the power transmission is based on two important parameters, i.e., epsilon and power loss factor, as given in power transmission equations. We found out that a higher value of epsilon impacts power transmission and subsequently impacts the SKGR. The SKGR is approximately 40.7% greater at 250 from 50 mW at epsilon = 1. The value of SKGR is reduced to 18.5% at 250 mW when epsilonis 0.5. Furthermore, the transmission power is also measured against the different power loss factor values, i.e., 3.5, 3, and 2.5, respectively, at epsilon = 0.5. Hence, it is concluded that the value of epsilon and power loss factor impacts power transmission and, consequently, impacts the SKGR.  相似文献   
55.
A new cone pressuremeter has been developed at the University of Engineering and Technology, Lahore-Pakistan. The new device is called the Akbar Pressuremeter (APMT). This paper is based on the APMT testing of a cohesive soil deposit comprised of low plastic lean clay (CL) to sandy silty clay (CL-ML). The APMT testing, using a full-displacement technique, standard penetration tests and undisturbed samples, was carried out at two locations. The soil strength and type were determined using the undisturbed samples. The applied pressure-cavity strain curves of the APMT tests performed at different levels were analysed to determine soil strength and stiffness. The undrained shear strength of the undisturbed samples was determined in the laboratory by unconfined compression tests. This paper provides a comparison of the parameters interpreted from the pressuremeter and those determined from other field and laboratory methods.  相似文献   
56.
The essential oil components of different tea brands were investigated by gas chromatography. The oil yields of dried tea samples were ranged from 0.09% to 0.63%. Twenty-five compounds from Supreme and Lipton Yellow Label tea brands representing 98.0% and 88.0% of the Camellia sinensis oil were identified, respectively. The main ones were β-pinene (51.2%) and α-pinene (30.2%). Nineteen components from Tapal tea brand representing 76.7% of the C. sinensis oil were determined with high contents of muurol-5-en-4-a-ol (10.5%) and muurol-5-en-4-b-ol (31.3%). Fifteen components from Deer and Diana tea brands were identified, accounting for 83.3% and 78.2% of the oil containing α-cadinol and β-pinene. Seventeen components from non-branded teas were determined with high contents of muurol-5-en-4-a-ol and muurol-5-en-4-b-ol. Twenty-one compounds from non-branded Bangladeshi Shezan and Indian teas were also identified. All oils consisted of monoterpenic hydrocarbons, oxygenated monoterpenes and sesquiterpenes.  相似文献   
57.
58.
Neural Computing and Applications - Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the...  相似文献   
59.
FT-Raman spectroscopy proves to be a powerful technique to study surface reactions on bioactive glasses and it eliminates the fluorescence of the organic phase of whole bone, thereby making it possible to compare the reaction layers formed on bioactive glasses with the mineral phase of bone. The spectrum of hydroxycarbonate apatite (HCA) developed on the bioactive glasses is closer to that of bone than synthetic hydroxyapatite (HA) and closely matches that of bone mineral obtained by deproteination of whole human femoral cortical bone.  相似文献   
60.
In the present numerical study, the combined effect of temperature-dependent thermal conductivity, linear thermal radiation, and magnetic effect on shear-thinning tangent hyperbolic fluid past a sensor surface has been studied. After converting the modelled partial differential equations into ordinary differential equations by using similarity transformation, the system of equations is tackled with the aid of the shooting method. The influence of important parameters on the fluid motion and energy distribution is displayed graphically and analyzed in detail. The presented simulations depict that a significant rise in fluid velocity is noticed for an enhancement in the magnetic parameter while an opposite trend is observed for the temperature distribution. Moreover, the skin friction coefficient decreases as the squeezed flow index is increased.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号