首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   326篇
  免费   20篇
  国内免费   4篇
电工技术   1篇
综合类   1篇
化学工业   99篇
金属工艺   2篇
机械仪表   5篇
建筑科学   5篇
能源动力   12篇
轻工业   54篇
水利工程   3篇
石油天然气   4篇
无线电   35篇
一般工业技术   75篇
冶金工业   16篇
原子能技术   4篇
自动化技术   34篇
  2024年   1篇
  2023年   11篇
  2022年   23篇
  2021年   43篇
  2020年   26篇
  2019年   21篇
  2018年   17篇
  2017年   19篇
  2016年   20篇
  2015年   16篇
  2014年   10篇
  2013年   21篇
  2012年   15篇
  2011年   18篇
  2010年   15篇
  2009年   16篇
  2008年   13篇
  2007年   8篇
  2006年   4篇
  1999年   4篇
  1998年   5篇
  1997年   6篇
  1996年   3篇
  1994年   3篇
  1991年   1篇
  1990年   2篇
  1988年   2篇
  1978年   2篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
  1970年   1篇
排序方式: 共有350条查询结果,搜索用时 375 毫秒
71.
72.
73.
74.
Journal of Materials Science: Materials in Electronics - Electrode materials with the benefits of high working voltage, low cost, and environmental benign are needed for the realization of...  相似文献   
75.
The current study investigates the comparison and quality characteristics of starches isolated from potatoes using different processing methods from three commercial varieties: Lady Rosetta, Asterix and Challenger, for the first time in Pakistan. The analysis of variance revealed that starch yield significantly (P < 0.05) depended on total solids, peeling (12.7%, 12.0% and 12.0%) and unpeeling (15.0%, 14.0% and 14.0%) of potatoes compared to potato varieties for Lady Rosetta, Challenger and Asterix, respectively. Moreover, pasting properties, protein content, redness and yellowness were increased in those starches isolated without peeling while carbohydrates and lightness were increased in peeled potato starches. Furthermore, Fourier-transform infrared spectroscopy analysis revealed that protein (1200–1400 cm−1) was present in starch extracted without peeling. Besides, scanning electron microscopy analysis revealed oval-shaped starch granules with no impurities in peeled potato starch. The findings suggest the suitability of peeling process for obtaining a high-quality pure starch.  相似文献   
76.
77.
The Internet of Things (IoTs) is apace growing, billions of IoT devices are connected to the Internet which communicate and exchange data among each other. Applications of IoT can be found in many fields of engineering and sciences such as healthcare, traffic, agriculture, oil and gas industries, and logistics. In logistics, the products which are to be transported may be sensitive and perishable, and require controlled environment. Most of the commercially available logistic containers are not integrated with IoT devices to provide controlled environment parameters inside the container and to transmit data to a remote server. This necessitates the need for designing and fabricating IoT based smart containers. Due to constrained nature of IoT devices, these are prone to different cyber security attacks such as Denial of Service (DoS), Man in Middle (MITM) and Replay. Therefore, designing efficient cyber security framework are required for smart container. The Datagram Transport Layer Security (DTLS) Protocol has emerged as the de facto standard for securing communication in IoT devices. However, it is unable to minimize cyber security attacks such as Denial of Service and Distributed Denial of Service (DDoS) during the handshake process. The main contribution of this paper is to design a cyber secure framework by implementing novel hybrid DTLS protocol in smart container which can efficiently minimize the effects of cyber attacks during handshake process. The performance of our proposed framework is evaluated in terms of energy efficiency, handshake time, throughput and packet delivery ratio. Moreover, the proposed framework is tested in IoT based smart containers. The proposed framework decreases handshake time more than 9% and saves 11% of energy efficiency for transmission in compare of the standard DTLS, while increases packet delivery ratio and throughput by 83% and 87% respectively.  相似文献   
78.
The security for Telecare Medicine Information Systems (TMIS) has been crucial for reliable dispensing of the medical services to patients at distant locations. Security and privacy element needs to be there for any physician or caregiver to make certain an appropriate diagnosis, medical treatment or any other exchange of critical information. In this connection, many relevant TMIS-based authentication schemes have been presented, however various forms of attacks and inefficiencies render these schemes inapplicable for a practical scenario. Lately, Amin et al. proposed a scheme based on a multi-server authentication for TMIS. However, the Amin et al., scheme has been found vulnerable to user and server impersonation attacks. We have proposed an improved model with higher performance and efficiency, as evident from the forthcoming sections. Besides, the scheme has been backed up by formal security analysis using BAN logic to ensure the resilience of the proposed scheme.  相似文献   
79.
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号