首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   238篇
  免费   8篇
  国内免费   3篇
电工技术   2篇
综合类   1篇
化学工业   55篇
金属工艺   4篇
机械仪表   13篇
建筑科学   17篇
矿业工程   1篇
能源动力   23篇
轻工业   17篇
水利工程   7篇
石油天然气   3篇
无线电   16篇
一般工业技术   42篇
冶金工业   12篇
自动化技术   36篇
  2024年   1篇
  2023年   5篇
  2022年   11篇
  2021年   17篇
  2020年   18篇
  2019年   8篇
  2018年   15篇
  2017年   10篇
  2016年   14篇
  2015年   9篇
  2014年   16篇
  2013年   24篇
  2012年   14篇
  2011年   20篇
  2010年   15篇
  2009年   9篇
  2008年   9篇
  2007年   2篇
  2006年   4篇
  2005年   3篇
  2004年   4篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1998年   6篇
  1997年   3篇
  1994年   1篇
  1989年   2篇
  1984年   1篇
  1980年   2篇
  1979年   1篇
排序方式: 共有249条查询结果,搜索用时 15 毫秒
241.
适用于吸力循环作用的膨胀性非饱和土本构模型   总被引:1,自引:0,他引:1  
首先从颗粒尺度基于热力学理论对干湿循环路径下膨胀土的变形行为产生的机理进行了论述。通过分析可知,吸力循环作用下膨胀性非饱和土的塑性变形不仅取决于土中集聚体之间的重新排列,而且与集聚体内储存的塑性势能的变化相关。其次基于BBM模型建立了一个适用于吸力循环作用的膨胀性非饱和土的弹塑性本构模型。模型中通过吸力变化屈服面和混合硬化准则描述上述两种不同作用机理所产生的塑性变形。最后利用该模型对膨胀性非饱和土在吸力循环作用下的行为进行了预测。通过预测结果与试验数据的比对可知:该模型能够较好地描述膨胀性非饱和土在吸力循环作用下产生的累积塑性变形,及其随着循环次数的增加趋向于稳态的特性。  相似文献   
242.
A tandem AGV configuration connects all cells of a manufacturing facility/plant by means of non-overlapping, single-vehicle closed loops. Each loop has at least one additional P/D station, provided as an interface between adjacent loops. This study describes the development of tabu search and genetic algorithm procedures for designing tandem AGV systems. The objective is to minimize the maximum workload of the system. Both algorithms have mechanisms to prevent solutions with intersecting loops. The new algorithms and the partitioning algorithm presented by Bozer and Srinivasan are compared using randomly generated test problems. Results show that for large-scale problems, the partitioning algorithm often leads to infeasible configurations with crossed loops in spite of its shorter running time. However the newly developed algorithm avoids infeasible configurations and often yields better objective function values.  相似文献   
243.
The efficiency of parthenium weed as an adsorbent for removing Cd(II) from water has been studied. Parthenium is found to exhibit substantial adsorption capacity over a wide range of initial Cd(II) ions concentration. Effect of time, temperature, pH and concentration on the adsorption of Cd(II) was investigated by batch process. Pseudo-first-order and Pseudo-second-order models were evaluated. The kinetics data for the adsorption process obeyed second-order rate equation. The equilibrium data could be described well by the Langmuir and Freundlich isotherms. Thermodynamic parameters such as DeltaH degrees , DeltaS degrees and DeltaG degrees were calculated. The adsorption process was found to be endothermic and spontaneous. The maximum adsorption of Cd(II) ions (99.7%) in the pH range 3-4 indicated that material could be effectively utilized for the removal of Cd(II) ions from wastewater. The desorption studies showed 82% recovery of Cd(II) when 0.1 M HCl solution was used as effluent.  相似文献   
244.
This paper describes a new method for the determination of citalopram in biological fluids using molecularly imprinted solid-phase extraction as the sample cleanup technique combined with high performance liquid chromatography. The molecularly imprinted polymers were prepared using methacrylic acid as functional monomer, ethylene glycol dimethacrylate as crosslinker, chloroform as porogen and citalopram hydrobromide as the template molecule. The novel imprinted polymer was used as a solid-phase extraction sorbent for the extraction of citalopram from human serum and urine. Effective parameters on citalopram retention were studied. The optimal conditions for molecularly imprinted solid-phase extraction consisted of conditioning with 1 mL methanol and 1 mL of deionized water at neutral pH, loading of citalopram sample (50 μg L(-1)) at pH 9.0, washing using 1 mL acetone and elution with 3 × 1 mL of 10 % (v/v) acetic acid in methanol. The MIP selectivity was evaluated by checking several substances with similar molecular structures to that of citalopram. Results from the HPLC analyses showed that the calibration curve of citalopram using MIP from human serum and urine is linear in the ranges of 1-100 and 2-120 μg L(-1) with good precisions (2.5 and 1.5 % for 10.0 μg L(-1)), and recoveries (between 82-86 and 83-85 %), respectively.  相似文献   
245.
Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques: Cloudflare and K-nearest neighbors (KNN) classification. Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks. However, the KNN classifiers will determine which area the spammer belongs to. At the end of the article, various prevention techniques for securing cloud servers will be discussed, a comparison will be made with different papers, a conclusion will be drawn based on different results.  相似文献   
246.
The main objective of this article is to introduce novel 3D bio-inspired auxetic meta-structures printed with soft/hard polymers for energy absorption/dissipation applications under single and cyclic loading–unloading. Meta-structures are developed based on understanding the hyper-elastic feature of thermoplastic polyurethane (TPU) polymers, elastoplastic behavior of polyamide 12 (PA 12), and snowflake inspired design, derived from theory and experiments. The 3D meta-structures are fabricated by multi-jet fusion 3D printing technology. The feasibility and mechanical performance of different meta-structures are assessed experimentally and numerically. Computational finite element models (FEMs) for the meta-structures are developed and verified by the experiments. Mechanical compression tests on TPU auxetics show unique features like large recoverable deformations, stress softening, mechanical hysteresis characterized by non-coincident compressive loading–unloading curve, Mullins effect, cyclic stress softening, and high energy absorption/dissipation capacity. Mechanical testing on PA 12 meta-structures also reveals their elastoplastic behavior with residual strains and high energy absorption/dissipation performance. It is shown that the developed FEMs can replicate the main features observed in the experiments with a high accuracy. The material-structural model, conceptual design, and results are expected to be instrumental in 3D printing tunable soft and hard meta-devices with high energy absorption/dissipation features for applications like lightweight drones and unmanned aerial vehicles (UAVs).  相似文献   
247.
Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double encryption algorithm will be implemented to send data in a secure format. First, the XOR function will be applied to plain text, and then salt technique will be used. Finally, a reversing mechanism will be implemented on that data to provide more data security. To decrypt data, the cipher text will be reversed, salt will be removed, and XOR will be implemented. At the end of the paper, the proposed algorithm will be compared with other algorithms, and it will conclude how much better the existing algorithm is than other algorithms.  相似文献   
248.
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker will not be able to decipher the encrypted data, and even if the attacker tries to tamper with the data, the attacker will not have access to the original data. In this paper, various data security techniques are developed, which can be used to protect the data from attackers completely. First, a customized American Standard Code for Information Interchange (ASCII) table is developed. The value of each Index is defined in a customized ASCII table. When an attacker tries to decrypt the data, the attacker always tries to apply the predefined ASCII table on the Ciphertext, which in a way, can be helpful for the attacker to decrypt the data. After that, a radix 64-bit encryption mechanism is used, with the help of which the number of cipher data is doubled from the original data. When the number of cipher values is double the original data, the attacker tries to decrypt each value. Instead of getting the original data, the attacker gets such data that has no relation to the original data. After that, a Hill Matrix algorithm is created, with the help of which a key is generated that is used in the exact plain text for which it is created, and this Key cannot be used in any other plain text. The boundaries of each Hill text work up to that text. The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms. Then, the Kasiski test is used to verify the validity of the proposed algorithm and found that, if the proposed algorithm is used for data encryption, so an attacker cannot break the proposed algorithm security using any technique or algorithm.  相似文献   
249.
An epoxy-based intumescent coating containing the silica and zinc borate nanoparticles was fabricated. The fire performance of the coating with the optimum formulation was investigated in terms of the changes in the physical and chemical structure of the formed char layer during the exposure to a temperature of 1000°C. The state of the chemical structure was analyzed by performing the Fourier-transform infrared spectroscopy, x-ray diffraction, and x-ray photoelectron spectroscopy analysis from the char layer at the three-time intervals of 10, 30, and 60 min of the heating process. The innovative Condorcet method was also employed to examine the changes in the physical structure of the formed char layer. Some instabilities were detected in the physical structure of the char layer in the middle period of heating. Moreover, a gradual formation of silicon carbide crystalline structure was observed on top of the surface, followed by its oxidation to silica over time. In contrast, in the bulk structure, silicon crystalline structures (Coesite) intensified with time. Boron nitride was also increasingly created on the top surface and in the bulk of the coating over the heating time. These findings proved the effective role of the silica and zinc-borate nanoparticles in the fire performance of epoxy-based intumescent coatings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号