首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   373篇
  免费   27篇
  国内免费   3篇
电工技术   3篇
化学工业   127篇
金属工艺   4篇
机械仪表   6篇
建筑科学   15篇
能源动力   32篇
轻工业   32篇
水利工程   1篇
石油天然气   2篇
无线电   17篇
一般工业技术   83篇
冶金工业   18篇
原子能技术   14篇
自动化技术   49篇
  2023年   17篇
  2022年   45篇
  2021年   44篇
  2020年   33篇
  2019年   23篇
  2018年   27篇
  2017年   20篇
  2016年   24篇
  2015年   9篇
  2014年   18篇
  2013年   15篇
  2012年   12篇
  2011年   16篇
  2010年   10篇
  2009年   5篇
  2008年   12篇
  2007年   6篇
  2006年   9篇
  2005年   9篇
  2004年   8篇
  2003年   2篇
  2002年   5篇
  2001年   1篇
  2000年   3篇
  1999年   5篇
  1998年   7篇
  1997年   2篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1990年   1篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1976年   1篇
排序方式: 共有403条查询结果,搜索用时 109 毫秒
1.
2.
Transition metal oxyhydroxides have been used as promising electrocatalysts for water splitting however, their catalytic activity is restricted due to low surface area and poor conductivity. Herein, we report novel composite FeOOH@ZIF-12/graphene composite as electrocatalyst for water oxidation, whereby ZIF-12 provide extra surface for the FeOOH dispersion whilst graphene act as excellent electron mediator. The composite shows a low overpotential value of 291 mV to attain a current density of 10 mA cm?2 and a low Tafel slope value of 78 mV dec?1. The catalyst offers a maximum current density of 101 mA cm?2, while it gives a turnover frequency (TOF) value of 0.031 s?1 at an overpotential of 291 mV only. The excellent activity and remarkable stability of composite is attributed to highly conductive and porous support.  相似文献   
3.
4.
The beginning of failure of a (ZrO2-7%Y2O3)/(Ni-22%Co-17%Cr-12.5%Al-0.6%Y) duplex andgraded coating systems on lnconel 617 and IN738LC in burner rig tests has been characterized.The test conditions are 40 s heating up to 75O℃ substrate temperature followed by 80 s aircooling. Failure is considered at the appearance of the first bright spot during heating period.Stresses due to thermal expansion mismatch strains on cooling are the probable cause of life-limiting in this conditions of testing.  相似文献   
5.
The characteristics of ion beams of hydrogen and nitrogen with different filling pressures emitted from the plasma focus device of 2.3 kJ energy are investigated. CR-39 SSNTDs are employed for the registration of tracks of ions. The exposed detectors are etched in 6N NaOH solution at 70°C and then examined with an optical microscope. The ion flux is estimated to be of the order of 105–6 tracks/cm2. The flux with the radial position does not exhibit any regular pattern of variation.  相似文献   
6.
The electrochemical behavior of brasses with various Zn content (5.5–38 mass%) and brass (Cu–38Zn) with different Pb contents (1–3.4 mass%) in 0.6 M NaCl was investigated. The effects of temperature, immersion time, and concentration of chloride ions on the behavior of the different alloys were studied. The pitting corrosion behavior of Cu–Zn alloys and leaded–brass alloys in 0.6 M NaCl solution was also investigated. Open-circuit potential measurements (OCP), polarization techniques and electrochemical impedance spectroscopy (EIS) were used. The results show that the increase in the Zn content increases the corrosion rate of the brass alloys in chloride solutions, while the increase of Pb content in Cu–38Zn–Pb decreases the corrosion rate of the alloy. Long immersion time of the alloys in the aqueous electrolyte improves their stability due to the formation of passive film on the alloy surface. The breakdown potential is shifted to more negative direction with increasing the Zn content, whereas it shifts towards positive values with increasing Pb content. Equivalent circuit model for the electrode/electrolyte interface under different conditions was proposed to illustrate the electrochemical processes taking place at the interface. The electrochemical behavior of the different alloys was discussed in view of the fitting results.  相似文献   
7.
This paper proposes an adaptive Wiener filtering method for speech enhancement. This method depends on the adaptation of the filter transfer function from sample to sample based on the speech signal statistics; the local mean and the local variance. It is implemented in the time domain rather than in the frequency domain to accommodate for the time-varying nature of the speech signals. The proposed method is compared to the traditional frequency-domain Wiener filtering, spectral subtraction and wavelet denoising methods using different speech quality metrics. The simulation results reveal the superiority of the proposed Wiener filtering method in the case of Additive White Gaussian Noise (AWGN) as well as colored noise.  相似文献   
8.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
9.
One of the elementary operations in computing systems is multiplication. Therefore, high-speed and low-power multipliers design is mandatory for efficient computing systems. In designing low-energy dissipation circuits, reversible logic is more efficient than irreversible logic circuits but at the cost of higher complexity. This paper introduces an efficient signed/unsigned 4 × 4 reversible Vedic multiplier with minimum quantum cost. The Vedic multiplier is considered fast as it generates all partial product and their sum in one step. This paper proposes two reversible Vedic multipliers with optimized quantum cost and garbage output. First, the unsigned Vedic multiplier is designed based on the Urdhava Tiryakbhyam (UT) Sutra. This multiplier consists of bitwise multiplication and adder compressors. Compared with Vedic multipliers in the literature, the proposed design has a quantum cost of 111 with a reduction of 94% compared to the previous design. It has a garbage output of 30 with optimization of the best-compared design. Second, the proposed unsigned multiplier is expanded to allow the multiplication of signed numbers as well as unsigned numbers. Two signed Vedic multipliers are presented with the aim of obtaining more optimization in performance parameters. DesignI has separate binary two’s complement (B2C) and MUX circuits, while DesignII combines binary two’s complement and MUX circuits in one circuit. DesignI shows the lowest quantum cost, 231, regarding state-of-the-art. DesignII has a quantum cost of 199, reducing to 86.14% of DesignI. The functionality of the proposed multiplier is simulated and verified using XILINX ISE 14.2.  相似文献   
10.
Emerging technologies such as edge computing, Internet of Things (IoT), 5G networks, big data, Artificial Intelligence (AI), and Unmanned Aerial Vehicles (UAVs) empower, Industry 4.0, with a progressive production methodology that shows attention to the interaction between machine and human beings. In the literature, various authors have focused on resolving security problems in UAV communication to provide safety for vital applications. The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification (CSODL-SUAVC) model for Industry 4.0 environment. The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image steganography and image classification. Primarily, the proposed CSODL-SUAVC method involves the following methods such as Multi-Level Discrete Wavelet Transformation (ML-DWT), CSO-related Optimal Pixel Selection (CSO-OPS), and signcryption-based encryption. The proposed model deploys the CSO-OPS technique to select the optimal pixel points in cover images. The secret images, encrypted by signcryption technique, are embedded into cover images. Besides, the image classification process includes three components namely, Super-Resolution using Convolution Neural Network (SRCNN), Adam optimizer, and softmax classifier. The integration of the CSO-OPS algorithm and Adam optimizer helps in achieving the maximum performance upon UAV communication. The proposed CSODL-SUAVC model was experimentally validated using benchmark datasets and the outcomes were evaluated under distinct aspects. The simulation outcomes established the supreme better performance of the CSODL-SUAVC model over recent approaches.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号