首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2655篇
  免费   172篇
  国内免费   10篇
电工技术   24篇
综合类   6篇
化学工业   752篇
金属工艺   73篇
机械仪表   93篇
建筑科学   80篇
矿业工程   1篇
能源动力   198篇
轻工业   339篇
水利工程   38篇
石油天然气   18篇
武器工业   1篇
无线电   248篇
一般工业技术   531篇
冶金工业   72篇
原子能技术   18篇
自动化技术   345篇
  2024年   10篇
  2023年   61篇
  2022年   115篇
  2021年   193篇
  2020年   131篇
  2019年   160篇
  2018年   144篇
  2017年   144篇
  2016年   152篇
  2015年   116篇
  2014年   174篇
  2013年   259篇
  2012年   175篇
  2011年   230篇
  2010年   133篇
  2009年   108篇
  2008年   69篇
  2007年   61篇
  2006年   51篇
  2005年   28篇
  2004年   23篇
  2003年   33篇
  2002年   24篇
  2001年   21篇
  2000年   24篇
  1999年   15篇
  1998年   18篇
  1997年   14篇
  1996年   13篇
  1995年   8篇
  1994年   11篇
  1993年   8篇
  1992年   4篇
  1991年   10篇
  1990年   6篇
  1989年   4篇
  1988年   10篇
  1987年   6篇
  1986年   8篇
  1985年   9篇
  1984年   5篇
  1983年   7篇
  1982年   6篇
  1981年   6篇
  1978年   4篇
  1977年   5篇
  1974年   4篇
  1973年   4篇
  1972年   3篇
  1971年   3篇
排序方式: 共有2837条查询结果,搜索用时 15 毫秒
41.
Sr2La3Nb1?x Ta x Ti4O17 (0 ≤ x ≤ 1) ceramics were processed via a solid-state mixed oxide route. Sr2La3Nb1?x Ta x Ti4O17 (0 ≤ x ≤ 1) solid solutions were single phase in the whole range of x values within the x-ray diffraction (XRD) detection limit. The microstructure comprised elongated and needle-shaped grains. The ceramics exhibit relative permittivity (ε r) of 73 to 68.6, product of unloaded quality factor and resonant frequency (Q u f 0) of 7100 GHz to 9500 GHz, and temperature coefficient of resonant frequency (τ f) of 78.6 ppm/°C to 56.6 ppm/°C.  相似文献   
42.
The authors describe in detail the design considerations of our previously proposed novel optical quantizing and coding method for all-optical analog-to-digital (A/D) conversion using nonlinear optical switches based on the Sagnac interferometer. The multiperiod transfer function, which is the key to quantizing and coding, is achieved through a careful design of the Sagnac interferometer. In the experiments, the intensity of the pulse train input to our A/D converter is manually changed, and the corresponding digital signals are successfully mapped generated. Although the input-pulse trains are not the sampling of real analog signal, the principle of our proposed 3-bit A/D conversion at a 10 gigasample per second (Gsps) rate is demonstrated. The proposed optical quantizing and coding, combined with existing optical sampling techniques, will enable ultrafast photonic A/D conversion without electronics. The potential in the frequency regime of over a few hundred gigasamples per second was investigated by using an optical switch that utilizes the optical Kerr effect for fast operation. It was found out that the wavelength allocations and temporal widths of control and probe pulses have to be optimized with respect to the group-velocity dispersion of highly nonlinear fiber.  相似文献   
43.
Recently, directional sensor networks have received a great deal of attention due to their wide range of applications in different fields. A unique characteristic of directional sensors is their limitation in both sensing angle and battery power, which highlights the significance of covering all the targets and, at the same time, extending the network lifetime. It is known as the target coverage problem that has been proved as an NP-complete problem. In this paper, we propose four learning automata-based algorithms to solve this problem. Additionally, several pruning rules are designed to improve the performance of these algorithms. To evaluate the performance of the proposed algorithms, several experiments were carried out. The theoretical maximum was used as a baseline to which the results of all the proposed algorithms are compared. The obtained results showed that the proposed algorithms could solve efficiently the target coverage problem.  相似文献   
44.

In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.

  相似文献   
45.
AC conductivity of consolidated nanoparticles of NiO, having different average particle sizes (2.5 nm–17 nm) was measured in the temperature range 313 K to 413 K and over the frequency range 50 Hz to 3 MHz. The ac conductivity of the samples was found to be enhanced by six to eight orders of magnitude over that of NiO single crystals reported in the literature. This large enhancement in conductivity is attributed to the high density of Ni2+ vacancies in the nanoparticles. The variation of ac conductivity with frequency of the applied signal and temperature is discussed on the basis of the Correlated Barrier Hopping (CBH) Model. The observed spread in activation energy and slope of the log ac Vs log plots is attributed to the distribution of the charge carrier hopping distance and localization energies in the nanoparticle samples. The effect of the interfacial region on the electrical conductivity of the samples is analyzed by taking into account the contributions due to grain boundaries and triple junctions. The observed variation of measured ac conductivity with average particle size is semi-quantitatively explained based on the reasoning that the role of the triple junctions is to reduce the conductivity.  相似文献   
46.
47.
Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite network. The verification stage can verify the effectiveness of secret shares issued by the ground control center to each participant and verify the effectiveness of secret shares shown by participants. We use a lot of difficult assumptions based on mathematical problems in the verification stage, such as solving the difficult problem of the discrete logarithm, large integer prime factorization, and so on. Compared with other verifiable secret sharing schemes designed for difficult problems under the same security, the verifiable secret sharing scheme based on the Elliptic Curve Cryptography (ECC) system has the advantages of less computational overhead and shorter key. At present, the binary polynomial is a single secret scheme and cannot provide effective verification. Therefore, based on a Protected Verifiable Synchronous Multi Secret Sharing (PVS-MSS) scheme, this paper is designed based on bivariate asymmetric polynomials. The advanced verifiable attribute is introduced into the Protected Secret Sharing (PSS) scheme. This paper extends the protected synchronous multi-secret sharing scheme based on bivariate polynomial design. The ECC system constructs the security channel between the ground control center and participants and constructs the verification algorithm. Through the verification algorithm, any participant can verify the consistency and effectiveness of the secret shadow and secret share received from other participants or presented by the secret distribution center. Therefore, no additional key agreement protocol is required; participants do not need to negotiate the session key for encryption; the secret share polynomial can generate the session key between participants and speed up the secret reconstruction process. The verification stage has lower computational complexity than the verifiable scheme constructed by Rivest Shamir Adleman (RSA) and other encryption methods. Chinese Remainder Theorem (CRT) is used to update the secret shadow. The secret shadow does not need to be updated with the change of the scheme shared secret, and the public value update efficiency is higher. Reduce the complexity of sharing secret updates in a synchronous multi-secret sharing scheme.  相似文献   
48.
The formation of 3-monochloropropane-1,2-diol (3-MCPD) esters in refined palm oil during deodorisation is attributed to the intrinsic composition of crude palm oil. Utilising D-optimal design, the effects of the degumming and bleaching processes on the reduction in 3-MCPD ester formation in refined palm oil from poor-quality crude palm oil were studied relative to the palm oil minor components that are likely to be their precursors. Water degumming remarkably reduced 3-MCPD ester formation by up to 84%, from 9.79 mg/kg to 1.55 mg/kg. Bleaching with synthetic magnesium silicate caused a further 10% reduction, to 0.487 mg/kg. The reduction in 3-MCPD ester formation could be due to the removal of related precursors prior to the deodorisation step. The phosphorus content of bleached palm oil showed a significant correlation with 3-MCPD ester formation.  相似文献   
49.
Gelatin is a highly purified animal protein of pig, cow, and fish origins and is extensively used in food, pharmaceuticals, and personal care products. However, the acceptability of gelatin products greatly depends on the animal sources of the gelatin. Porcine and bovine gelatins have attractive features but limited acceptance because of religious prohibitions and potential zoonotic threats, whereas fish gelatin is welcomed in all religions and cultures. Thus, source authentication is a must for gelatin products but it is greatly challenging due to the breakdown of both protein and DNA biomarkers in processed gelatins. Therefore, several methods have been proposed for gelatin identification, but a comprehensive and systematic document that includes all of the techniques does not exist. This up-to-date review addresses this research gap and presents, in an accessible format, the major gelatin source authentication techniques, which are primarily nucleic acid and protein based. Instead of presenting these methods in paragraph form which needs much attention in reading, the major methods are schematically depicted, and their comparative features are tabulated. Future technologies are forecasted, and challenges are outlined. Overall, this review paper has the merit to serve as a reference guide for the production and application of gelatin in academia and industry and will act as a platform for the development of improved methods for gelatin authentication.  相似文献   
50.
BACKGROUND: Mango is a highly perishable seasonal fruit and large quantities are wasted during the peak season as a result of poor postharvest handling procedures. Processing surplus mango fruits into flour to be used as a functional ingredient appears to be a good preservation method to ensure its extended consumption. RESULTS: In the present study, the chemical composition, bioactive/antioxidant compounds and functional properties of green and ripe mango (Mangifera indica var. Chokanan) peel and pulp flours were evaluated. Compared to commercial wheat flour, mango flours were significantly low in moisture and protein, but were high in crude fiber, fat and ash content. Mango flour showed a balance between soluble and insoluble dietary fiber proportions, with total dietary fiber content ranging from 3.2 to 5.94 g kg?1. Mango flours exhibited high values for bioactive/antioxidant compounds compared to wheat flour. The water absorption capacity and oil absorption capacity of mango flours ranged from 0.36 to 0.87 g kg?1 and from 0.18 to 0.22 g kg?1, respectively. CONCLUSION: Results of this study showed mango peel flour to be a rich source of dietary fiber with good antioxidant and functional properties, which could be a useful ingredient for new functional food formulations. Copyright © 2011 Society of Chemical Industry  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号