首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   545篇
  免费   30篇
  国内免费   7篇
电工技术   9篇
综合类   5篇
化学工业   188篇
金属工艺   8篇
机械仪表   17篇
建筑科学   10篇
能源动力   39篇
轻工业   68篇
水利工程   9篇
石油天然气   6篇
无线电   37篇
一般工业技术   83篇
冶金工业   19篇
原子能技术   2篇
自动化技术   82篇
  2024年   1篇
  2023年   12篇
  2022年   19篇
  2021年   34篇
  2020年   40篇
  2019年   38篇
  2018年   44篇
  2017年   39篇
  2016年   45篇
  2015年   12篇
  2014年   19篇
  2013年   76篇
  2012年   38篇
  2011年   36篇
  2010年   23篇
  2009年   6篇
  2008年   9篇
  2007年   5篇
  2006年   4篇
  2005年   9篇
  2004年   3篇
  2003年   2篇
  2002年   3篇
  2001年   1篇
  1999年   2篇
  1998年   8篇
  1997年   4篇
  1996年   2篇
  1995年   2篇
  1994年   2篇
  1993年   4篇
  1992年   5篇
  1991年   1篇
  1990年   3篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1982年   8篇
  1981年   3篇
  1980年   4篇
  1979年   3篇
  1978年   1篇
  1975年   2篇
排序方式: 共有582条查询结果,搜索用时 15 毫秒
81.
Pattern synthesize of conformal array antennas is often a challenging problem. Various optimization algorithms such as genetic, particle swarm optimization (PSO), and invasive weed optimization have already been used for pattern synthesizing of conformal arrays. In this paper, a focused beam is synthesized for a quarter cylindrical conformal array antenna using the PSO algorithm with small computations. The desired pattern is a focused beam at θ = 90° and ? = 45° with 10° beamwidth in elevation and 15° beamwidth in azimuth with ?20 dB side‐lobe level. This method can be used in general for synthesizing arbitrary desired patterns and array geometries.  相似文献   
82.
The E-health care systems allow patients to gain the health monitoring facility and access medical services remotely. A secure mechanism for mutual authentication and session key agreement is the most important requirements for E-Health Care Systems. Recently, Amin et al.’s proposed a mutual authentication and session key agreement protocol and claimed that their scheme is secure against all possible attacks. In this paper, we show that not only their scheme is vulnerable to privileged-insider attack, replay attack, session key disclosure attack, but also does not provide patient untraceability and backward secrecy. In order to withstand the mentioned security weaknesses, we propose an efficient remote mutual authentication scheme for the systems which are using ECC and Fuzzy Extractor. The proposed scheme not only resists against different security attacks, but it also provides an efficient registration, login, mutual authentication, session key agreement, and password and biometric update phases. During the experimentation, it has been observed that the proposed scheme is secure against various known attacks. Beside, our scheme is robust against privileged-insider attack that it rarely checked in security analysis. The informal analysis will ensure that our scheme provides well security protection against the different security attacks. Furthermore, we analyzed the security of the scheme using AVISPA software and Random Oracle Model. The formal analysis results and performance evaluation vouch that our scheme is also secure and efficient in computation and communication cost.  相似文献   
83.
The design of a novel micro‐screw pump for viscous fluid is described. The device consists of a rotating screw in the centre of the channel, connected with a shaft and micro motor. The objective of this research is to investigate the effect of using various screw geometries on the pump performance. Theoretical analysis by finite volume simulations is carried out to study the influence of pitch, diameter of the screw and the thread (flight depth) to evaluate the optimal dimensions for the pump and to obtain the maximum flow rate. When the screw rotates, a net force is transferred to the fluid due to the differential pressure on the depth of the thread and pressure gradient along the screw axis, thus causing the fluid to displace. The three‐dimensional simulations indicate a gradual increase of the average velocity with increasing the screw diameter. The maximum average velocity can be obtained when the ratio between the pitch and screw diameter (pi/d) is 0.6. Effective pumping is achieved by increasing the thread and pitch at maximum screw diameter. The numerical simulation has been validated experimentally.  相似文献   
84.
Tube-wall reactors are gaining importance for highly exothermic and fast chemical reactions because of their simple construction and improved temperature control. A generalized mathematical model of the non-isothermal annular tube-wall reactors for simultaneous catalytic reactions with mixed type non-linear reaction kinetics and volume change is developed. Numerical solutions of two-dimensional component transfer equations, heat transfer equation and fluid flow equation may be obtained with appropriate boundary conditions using a recently developed orthogonal collocation method for annular geometries. The model has been successfully applied to the tube-wall reactors for the Fischer-Tropsch Synthesis. Comparison between model predictions and previous experimental results is good.  相似文献   
85.
86.
This article aims to reduce the melting temperature of lead-free solder alloy and promote its mechanical properties. Eutectic tin-silver lead-free solder has a high melting temperature 221 °C used for electronic component soldering. This melting temperature, higher than that of lead–tin conventional eutectic solder, is about 183 °C. The effect of the melt spinning process and copper additions into eutectic Sn-Ag solder enhances the crystallite size to about 47.92 nm which leads to a decrease in the melting point to about 214.70 °C, where the reflow process for low heat-resistant components on print circuit boards needs lower melting point solder. The results showed the presence of intermetallic compound Ag3Sn formed in nano-scale at the Sn-3.5Ag alloy due to short time solidification. The presence of new intermetallic compound, IMC from Ag0.8Sn0.2 and Ag phase improves the mechanical properties, and then enhances the micro-creep resistance especially at Sn-3.5Ag-0.7Cu. The higher Young’s modulus of Sn-3.5Ag-0.5Cu alloy 55.356 GPa could be attributed to uniform distribution of eutectic phases. Disappearance of tin whiskers in most of the lead-free melt-spun alloys indicates reduction of the internal stresses. The stress exponent (n) values for all prepared alloys were from 4.6 to 5.9, this indicates to climb deformation mechanism. We recommend that the Sn95.7-Ag3.5-Cu0.7 alloy has suitable mechanical properties, low internal friction 0.069, low pasty range 21.7 °C and low melting point 214.70 °C suitable for step soldering applications.  相似文献   
87.
This paper presents a new circuit topology of millimetre-wave quadrature voltage-controlled oscillator (QVCO) using an improved Colpitts oscillator without tail bias. By employing an extra capacitance between the drain and source terminations of the transistors and optimising circuit values, a low-power and low-phase-noise (PN) oscillator is designed. For generating the output signals with 90° phase difference, a self-injection coupling network between two identical cores is used. The proposed QVCO dissipates no extra dc power for coupling, since there is no dc-path to ground for the coupled transistors and no extra noise is added to circuit. The best figure-of-merit is ?188.5, the power consumption is 14.98–15.45 mW, in a standard 180-nm CMOS technology, for 58.2 GHz center frequency from 59.3 to 59.6 GHz. The PN is ?104.86 dBc/Hz at 1-MHz offset.  相似文献   
88.
89.
Synthesis of bio-based polyamide/acid-functionalized multiwalled carbon nanotube nanocomposites (PA/FCNT NCs) is reported in this investigation. New aliphatic–aromatic bio-based polyamide (PA) was synthesized through direct polycondensation reaction between bio-based diacid derived from a renewable resource; vanillin and diamine containing ether linkages. To obtain a homogeneous dispersion of multiwalled carbon nanotubes (MWCNTs) in the PA matrix, acid-functionalized MWCNTs (FCNTs) were used and PA nanocomposites with three different FCNT contents (1, 5 and 7?wt%) were prepared. The resulting NCs were characterized by Fourier transform infrared spectroscopy (FT-IR), X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM), and thermogravimetric analysis (TGA).  相似文献   
90.
The great attention to cognitive radio networks (CRNs) in recent years, as a revolutionary communication paradigm that aims to solve the problem of spectrum scarcity, prompts serious investigation on security issues of these networks. One important security concern in CRNs is the preservation of users location privacy, which is under the shadow of threat, especially in database-driven CRNs. To this end, in this paper, we propose a Location Privacy Preserving Database-Driven Spectrum-Sharing \((\hbox {L-PDS}^2)\) protocol for sharing the spectrum between PUs and SUs in a database-driven CRN, while protecting location privacy of both primary and secondary users, simultaneously. We also present two specific algorithms as implementations of \(\hbox {L-PDS}^2\) protocol. Our analytical results for the privacy protection capability of \(\hbox {L-PDS}^2\) protocol prove that it provides location privacy preservation with very high probability for users of both networks. Moreover, the simulation results show that the proposed algorithms are efficient in terms of run time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号