首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   745篇
  免费   33篇
  国内免费   1篇
电工技术   15篇
化学工业   152篇
金属工艺   21篇
机械仪表   21篇
建筑科学   7篇
能源动力   34篇
轻工业   73篇
水利工程   11篇
石油天然气   1篇
无线电   99篇
一般工业技术   136篇
冶金工业   30篇
原子能技术   2篇
自动化技术   177篇
  2024年   3篇
  2023年   11篇
  2022年   35篇
  2021年   33篇
  2020年   40篇
  2019年   30篇
  2018年   37篇
  2017年   24篇
  2016年   35篇
  2015年   24篇
  2014年   24篇
  2013年   54篇
  2012年   41篇
  2011年   37篇
  2010年   32篇
  2009年   30篇
  2008年   33篇
  2007年   28篇
  2006年   29篇
  2005年   25篇
  2004年   24篇
  2003年   18篇
  2002年   16篇
  2001年   8篇
  2000年   12篇
  1999年   7篇
  1998年   7篇
  1997年   9篇
  1996年   15篇
  1995年   6篇
  1994年   4篇
  1993年   6篇
  1992年   6篇
  1991年   5篇
  1989年   3篇
  1988年   1篇
  1987年   2篇
  1986年   3篇
  1985年   2篇
  1984年   1篇
  1983年   7篇
  1982年   3篇
  1981年   1篇
  1979年   2篇
  1978年   1篇
  1977年   3篇
  1974年   1篇
  1970年   1篇
排序方式: 共有779条查询结果,搜索用时 562 毫秒
101.
Organizations are increasingly turning to information technology (IT) to help them respond to unanticipated environmental threats and opportunities. In this paper, we introduce a systematic review of the literature on IT-enabled agility, helping to establish the boundary between what we know and what we don’t know. We base our review on a wide body of literature drawn from the AIS Basket of Eight IT journals, a cross-section of non-Basket journals, IT practitioner outlets, and premier international IS conferences. We review the use of different theoretical lenses used to investigate the relationship between IT and organizational agility and how the literature has conceptualized agility, its antecedents, and consequences. We also map the evolution of the literature through a series of stages that highlight how researchers have built on previous work. Lastly, we discuss opportunities for future research in an effort to close important gaps in our understanding.  相似文献   
102.
Kumar  Rajeev  Hossain  Ashraf 《Wireless Networks》2020,26(8):6139-6154
Wireless Networks - In this paper, we consider full-duplex (FD) two-way relaying networks, where wireless power transfers from hybrid power access-point, H to user and wireless information...  相似文献   
103.

In Wireless Sensor Network, sensed data reflects two types of correlations of physical attributes: spatial and temporal. In this paper, a scheme named, Adaptive Prediction Strategy with ClusTering (APSCT) is proposed. In APSCT, a data-driven clustering and grey prediction model is used to exploit both the correlations. APSCT minimizes the transmission of messages in the network. However, the use of prediction includes additional computation overhead. There is a trade-off between prediction accuracy and energy consumption in computation and communication in wireless networks. This paper also gives an approach to calculate the upper and lower bound of the prediction interval which is used to evaluate different confidence levels and provides an energy-efficient sensor environment. Simulation is carried out on real-world data collected by Intel Berkeley Lab and results are compared with existing approaches.

  相似文献   
104.
Photonic Network Communications - This paper depicts the design of 0.55 Tb/s heterogeneous Flexi-rate Nyquist-wavelength division multiplexed (Nyquist-WDM) Superchannel. Here, for the...  相似文献   
105.
Innovations in Systems and Software Engineering - In the recent years due to technological development, Internet is omnipresent. With advancement, more and more people are connected through...  相似文献   
106.
We present a partitioned iterative formulation for the modeling of fluid-structure interaction (FSI) in two-phase flows. The variational formulation consists of a stable and robust integration of three blocks of differential equations, viz, an incompressible viscous fluid, a rigid or flexible structure, and a two-phase indicator field. The fluid-fluid interface between the two phases, which may have high density and viscosity ratios, is evolved by solving the conservative phase-field Allen-Cahn equation in the arbitrary Lagrangian-Eulerian coordinates. While the Navier-Stokes equations are solved by a stabilized Petrov-Galerkin method, the conservative Allen-Cahn phase-field equation is discretized by the positivity preserving variational scheme. Fully decoupled implicit solvers for the two-phase fluid and the structure are integrated by the nonlinear iterative force correction in a staggered partitioned manner and the generalized-α method is employed for the time marching. We assess the accuracy and stability of the phase-field/ALE variational formulation for two- and three-dimensional problems involving the dynamical interaction of rigid bodies with free surface. We consider the decay test problems of increasing complexity, namely, free translational heave decay of a circular cylinder and free rotation of a rectangular barge. Through numerical experiments, we show that the proposed formulation is stable and robust for high density ratios across fluid-fluid interface and for low structure-to-fluid mass ratio with strong added-mass effects. Overall, the proposed variational formulation produces results with high accuracy and compares well with available measurements and reference numerical data. Using unstructured meshes, we demonstrate the second-order temporal accuracy of the coupled phase-field/ALE method via decay test of a circular cylinder interacting with the free surface. Finally, we demonstrate the three-dimensional phase-field FSI formulation for a practical problem of internal two-phase flow in a flexible circular pipe subjected to vortex-induced vibrations due to external fluid flow.  相似文献   
107.
The present paper reports the effect of B- and BN-doped \(\hbox {C}_{60}\) as catalysts for lowering the dehydrogenation energy in \(\hbox {MXH}_{4}\) clusters (M = Na and Li, X = Al and B) using density functional calculations. \(\hbox {MXH}_{4}\) interacts strongly with B-doped \(\hbox {C}_{60}\) and weakly with BN-doped \(\hbox {C}_{60}\) in comparison with pure \(\hbox {C}_{60}\) with binding energy 0.56–0.80 and 0.05–0.34 eV, respectively. The hydrogen release energy \((E_{\mathrm{HRE}})\) of \(\hbox {MXH}_{4}\) decreases sharply in the range of 38–49% when adsorbed on B-doped \(\hbox {C}_{60}\); however, with BN-doped \(\hbox {C}_{60}\) the decrease in the \(E_{\mathrm{HRE}}\) varies in the range of 6–20% as compared with pure \(\hbox {MXH}_{4}\) clusters. The hydrogen release energy of second hydrogen atom in \(\hbox {MXH}_{4}\) decreases sharply in the range of 1.7–41% for BN-doped \(\hbox {C}_{60}\) and decreases in the range of 0.2–11.3% for B-doped \(\hbox {C}_{60}\) as compared with pure \(\hbox {MXH}_{4}\) clusters. The results can be explained on the basis of charge transfer within \(\hbox {MXH}_{4}\) cluster and with the doped \(\hbox {C}_{60}\).  相似文献   
108.
Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP) and fuzzy technique for order preference by similarity ideal solution (fuzzy TOPSIS). To establish the efficacy of this methodology, the results are obtained after the evaluation have been tested on fifteen different web application projects (Online Quiz competition, Entrance Test, and others) of the Babasaheb Bhimrao Ambedkar University, Lucknow, India. The tabulated outcomes demonstrate that the methodology of the Multi-Level Fuzzy Hybrid system is highly effective in providing accurate estimation for strengthening the security of web applications. The proposed study will help experts and developers in developing and managing security from any web application design phase for better accuracy and higher security.  相似文献   
109.
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web. Therefore, security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks. The aim of this work is to provide efficient and effective healthcare web application security assessment. The study has worked with the hybrid computational model of Multi-Criteria Decision Making (MCDM) based on Analytical Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS) under the Hesitant Fuzzy (HF) environment. Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision. The proposed research endeavor will support designers and developers in identifying, selecting and prioritizing the best security attributes for web applications’ development. The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption, Authentication, Limit Access, Revoke Access, Data Validation, and Maintain Audit Trail. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security. The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications.  相似文献   
110.
Lithium–CO2 batteries are attractive energy‐storage systems for fulfilling the demand of future large‐scale applications such as electric vehicles due to their high specific energy density. However, a major challenge with Li–CO2 batteries is to attain reversible formation and decomposition of the Li2CO3 and carbon discharge products. A fully reversible Li–CO2 battery is developed with overall carbon neutrality using MoS2 nanoflakes as a cathode catalyst combined with an ionic liquid/dimethyl sulfoxide electrolyte. This combination of materials produces a multicomponent composite (Li2CO3/C) product. The battery shows a superior long cycle life of 500 for a fixed 500 mAh g?1 capacity per cycle, far exceeding the best cycling stability reported in Li–CO2 batteries. The long cycle life demonstrates that chemical transformations, making and breaking covalent C? O bonds can be used in energy‐storage systems. Theoretical calculations are used to deduce a mechanism for the reversible discharge/charge processes and explain how the carbon interface with Li2CO3 provides the electronic conduction needed for the oxidation of Li2CO3 and carbon to generate the CO2 on charge. This achievement paves the way for the use of CO2 in advanced energy‐storage systems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号