首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   466篇
  免费   20篇
  国内免费   5篇
电工技术   7篇
综合类   1篇
化学工业   92篇
金属工艺   11篇
机械仪表   17篇
建筑科学   23篇
矿业工程   1篇
能源动力   25篇
轻工业   44篇
水利工程   7篇
石油天然气   3篇
无线电   52篇
一般工业技术   99篇
冶金工业   15篇
原子能技术   3篇
自动化技术   91篇
  2024年   2篇
  2023年   8篇
  2022年   23篇
  2021年   25篇
  2020年   20篇
  2019年   21篇
  2018年   27篇
  2017年   16篇
  2016年   21篇
  2015年   14篇
  2014年   22篇
  2013年   38篇
  2012年   33篇
  2011年   39篇
  2010年   19篇
  2009年   18篇
  2008年   21篇
  2007年   15篇
  2006年   14篇
  2005年   14篇
  2004年   7篇
  2003年   2篇
  2002年   13篇
  2001年   4篇
  2000年   1篇
  1999年   3篇
  1998年   5篇
  1997年   11篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1993年   4篇
  1991年   3篇
  1990年   1篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1984年   2篇
  1983年   3篇
  1982年   3篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有491条查询结果,搜索用时 62 毫秒
71.
Soy protein is known for its eco-friendly, sustainable, and biodegradable qualities that are likely used as raw material in producing bioadhesive. However, soy protein-based adhesive are lacking in terms of adhesive strength and water-resistance compared to commercial formaldehyde-based adhesives such as phenol and urea-formaldehyde resin. Therefore, continuous research has been done to improve adhesive performance. This can be done via physical or modification methods, including the usage of cross-linking agents, structural modification, enzymatic modification, and the addition of additives. This review will cover these modification methods that give significant enhancement to the water-resistance and adhesive strength of soy protein-based adhesives.  相似文献   
72.
73.
Mobile ad hoc networks (MANETs) are becoming an emerging technology that offer several advantages to users in terms of cost and ease of use. A MANET is a collection of mobile nodes connected by wireless links that form a temporary network topology that operates without a base station and centralized administration. Routing is a method through which information is forwarded from a transmitter to a specific recipient. Routing is a strategy that guarantees, at any time, the connection between any two nodes in a network. In this work, we propose a novel routing protocol inspired by the cuckoo search method. Our routing protocol is implemented using Network simulator 2. We chose Random WayPoint model as our mobility model. To validate our work, we opted for the comparison with the routing protocol ad hoc on-demand distance vector, destination sequence distance vector and the bio-inspired routing protocol AntHocNet in terms of the quality of service parameters: packet delivery ratio and end-to-end delay (E2ED).  相似文献   
74.
Privacy in Vehicular Ad Hoc Networks (VANET) is fundamental because the user's safety may be threatened by the identity and the real‐time spatiotemporal data exchanged on the network. This issue is commonly addressed by the use of certified temporal pseudonyms and their updating strategies to ensure the user's unlinkability and anonymity. IEEE 1609.2 Standard specified the process of certifying pseudonym along with certificates structure. However, the communication procedure between the certifying authority and the requesting vehicle was not defined. In this paper, a new privacy‐preserving solution for pseudonym on‐road on‐demand refilling is proposed where the vehicle anonymously authenticates itself to the regional authority subsidiary of the central trusted authority to request a new pseudonyms pool. The authentication method has two phases, the first one uses anonymous tickets, and the second one is a challenge‐based authentication. The anonymous tickets are certificates that do not include the identity of the user. Instead, it contains a reference number and the certifying authority signature. The challenge authentication is identity‐less to preserve the privacy, yet it is used to prevent the misuse of tickets and the impersonation of its owner. Our proposed scheme is analyzed by the use of Burrows, Abadi and Needham (BAN) logic to demonstrate its correctness. It is also specified and checked by using the Security Protocol ANimator (SPAN) and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. The logical demonstration proved that this privacy‐preserving authentication is assured. The SPAN and AVISPA tools illustrated that it is resilient to security attacks.  相似文献   
75.

Wireless Video Sensor Networks (WVSNs7unding environmental information. Those sensor nodes can locally process the information and then wirelessly transmit it to the coordinator and to the sink to be further processed. As a consequence, more abundant video and image data are collected. In such densely deployed networks, the problem of data redundancy arises when information are gathered from neighboring nodes. To overcome this problem, one important enabling technology for WVSN is data aggregation, which is essential to be cost-efficient. In this paper, we propose a new approach for data aggregation in WVSN based on images and shot similarity functions. It is deployed on two levels: the video-sensor node level and the coordinator level. At the sensor node level the proposed algorithms aim at reducing the number of frames sensed by the sensor nodes and sent to the coordinator. At the coordinator level, after receiving shots from different neighbouring sensor nodes, the similarity between these shots is computed to eliminate redundancies and to only send the frames which meet a certain condition to the sink. The similarity between shots is evaluated based on their color, edge and motion information. We evaluate our approach on a live scenario and compare the results with another approach from the literature in terms of data reduction and energy consumption. The results show that the two approaches have a significant data reduction to reduce the energy consumption, thus our approach tends to overcome the other one in terms of reducing the energy consumption related to the sensing process, and to the transmitting process while guaranteeing the detection of all the critical events at the node and the coordinator levels.

  相似文献   
76.
This paper aims at presenting a maximum power point tracking (MPPT) controller for photovoltaic (PV) systems subject to asymmetric input constraint. Indeed, the output voltage of the DC‐DC converter used for adjusting the photovoltaic output power can be controlled by means of variation of duty ratio limited between 1 and 0. The control design goal is to improve the efficiency of PV systems under asymmetric saturation of duty ratio. To achieve this goal, first, a Takagi‐Sugeno (T‐S) fuzzy model is used to represent the nonlinear behavior of the PV system. A T–S reference model is employed to give the ideal state direction which must be followed. To achieve a good steady state tracking, the integral of the state tracking error is used to define an extended system state vector. Second, the input characteristic is partitioned into several regions. In each region, the asymmetric saturation function can be considered as a symmetric saturation function. Furthermore, H stabilization conditions for the resulting switching fuzzy control of the PV system under actuator saturation are formulated in term of linear matrix inequalities (LMI) using the Lyapunov approach. Simulation results are exhibited to demonstrate the effectiveness of the proposed design method.  相似文献   
77.
Universal Access in the Information Society - There are many systems in the field of speech therapy, and each offers different features. Identifying the effects of these systems on speech learning...  相似文献   
78.
Polymer composite materials are being increasingly used in primary load-bearing structures in several advanced industrial fields such as aerospace vessels, railway wagons and mega-scaled wind turbines where detection of subcritical damage initiation can significantly reduce safety issues and maintenance costs. It is therefore crucial to inspect these composite structures in order to assess their structural health and to ensure their integrity. Non-destructive testing techniques (NDT) are used for this purpose, making it possible to monitor mechanical damage of composite materials under in situ or ex situ service conditions. This paper reviews the capabilities of the most common NDT techniques used to inspect the integrity of composite materials. Each technique has a detection potential and cannot allow a full diagnosis of the mechanical damage state of the material. Thus, depending on the occurring damage mechanism and the conditions of use, one technique will be preferred over another, or several techniques should be combined to improve the diagnosis of the damage state of the structures.  相似文献   
79.
The effect of electrodeposition technique on CdS thickness incorporated in CdS/CdTe-based solar cell has been investigated using all-electrodeposited g/FTO/n-CdS/n-CdTe/p-CdTe multilayer device configuration. The optical, morphological and structural properties of the electroplated CdS were investigated for CdS thicknesses between 50 and 200 nm. The observed CdS bandgap ranges between 2.42 and 2.46 eV. The morphological analysis shows full coverage of underlying g/FTO substrate for all CdS thicknesses except for the 50 nm which shows the presence of gap in-between grains. The structural analysis shows a preferred orientation of H(101) for all the CdS thicknesses except the 50 nm thick CdS which shows either a weak crystallinity or an amorphous nature. The fabricated solar cell shows a maximum conversion efficiency of ~11 % using CdS thickness ranging between 100 and 150 nm. These results show that although low CdS thickness is desirable for photovoltaic application, the effect of nucleation mechanism of deposition technique should be taken into consideration.  相似文献   
80.
Smart materials are versatile material systems which exhibit a measurable response to external stimuli. Recently, smart material systems have been developed which incorporate graphene in order to share on its various advantageous properties, such as mechanical strength, electrical conductivity, and thermal conductivity as well as to achieve unique stimuli-dependent responses. Here, a graphene fiber-based smart material that exhibits reversible electrical conductivity switching at a relatively low temperature (60 °C), is reported. Using molecular dynamics (MD) simulation and density functional theory-based non-equilibrium Green's function (DFT-NEGF) approach, it is revealed that this thermo-response behavior is due to the change in configuration of amphiphilic triblock dispersant molecules occurring in the graphene fiber during heating or cooling. These conformational changes alter the total number of graphene-graphene contacts within the composite material system, and thus the electrical conductivity as well. Additionally, this graphene fiber fabrication approach uses a scalable, facile, water-based method, that makes it easy to modify material composition ratios. In all, this work represents an important step forward to enable complete functional tuning of graphene-based smart materials at the nanoscale while increasing commercialization viability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号