首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   136篇
  免费   8篇
化学工业   28篇
金属工艺   2篇
机械仪表   3篇
建筑科学   3篇
能源动力   23篇
轻工业   10篇
水利工程   3篇
无线电   16篇
一般工业技术   19篇
冶金工业   7篇
原子能技术   5篇
自动化技术   25篇
  2023年   2篇
  2022年   6篇
  2021年   9篇
  2020年   5篇
  2019年   6篇
  2018年   7篇
  2017年   7篇
  2016年   5篇
  2015年   6篇
  2014年   7篇
  2013年   13篇
  2012年   6篇
  2011年   13篇
  2010年   7篇
  2009年   2篇
  2008年   3篇
  2007年   3篇
  2006年   4篇
  2005年   1篇
  2004年   2篇
  2003年   3篇
  2000年   3篇
  1998年   2篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1982年   1篇
  1973年   1篇
  1972年   2篇
  1969年   1篇
  1967年   1篇
  1966年   1篇
排序方式: 共有144条查询结果,搜索用时 15 毫秒
61.
We report on the enhanced capacitive properties of a copper(I) oxide nanoparticle (Cu2O NP)-decorated multiwalled carbon nanotube (MWCNT) forest with nitrogen (N) doping. A careful in situ solid-state dewetting and plasma doping method was developed that ensured homogeneous decoration and contamination-free Cu2O NPs with N doping on the nanotube sidewalls. The morphology and structure of the hybrid materials were characterised by scanning electron microscopy, transmission electron microscopy, energy-dispersive spectroscopy, Raman spectroscopy and X-ray photoemission spectroscopy. The electrochemical performance of the hybrid materials was investigated by cyclic voltammetry and galvanostatic charge/discharge tests in a 0.1 M Na2SO4 electrolyte. The electrochemical tests demonstrated that the Cu2O NP/N-MWCNT electrode exhibits a specific capacitance up to 132.2 F g?1 at a current density of 2.5 A g?1, which is 30% higher than that of the pure MWCNT electrode. Furthermore, the electrode could retain the specific capacitance at 85% stability over 1000 cycles. These observations along with the simple assembly method for the hybrid materials suggest that the Cu2O NP/N-MWCNT could be a promising electrode for supercapacitor applications.  相似文献   
62.
The growing demand and dependence upon cloud services have garnered an increasing level of threat to user data and security. Some of such critical web and cloud platforms have become constant targets for persistent malicious attacks that attempt to breach security protocol and access user data and information in an unauthorized manner. While some of such security compromises may result from insider data and access leaks, a substantial proportion continues to remain attributed to security flaws that may exist within the core web technologies with which such critical infrastructure and services are developed. This paper explores the direct impact and significance of security in the Software Development Life Cycle (SDLC) through a case study that covers some 70 public domain web and cloud platforms within Saudi Arabia. Additionally, the major sources of security vulnerabilities within the target platforms as well as the major factors that drive and influence them are presented and discussed through experimental evaluation. The paper reports some of the core sources of security flaws within such critical infrastructure by implementation with automated security auditing and manual static code analysis. The work also proposes some effective approaches, both automated and manual, through which security can be ensured through-out the SDLC and safeguard user data integrity within the cloud.  相似文献   
63.
Clustering algorithms optimization can minimize topology maintenance overhead in large scale vehicular Ad hoc networks (VANETs) for smart transportation that results from dynamic topology, limited resources and non-centralized architecture. The performance of a clustering algorithm varies with the underlying mobility model to address the topology maintenance overhead issue in VANETs for smart transportation. To design a robust clustering algorithm, careful attention must be paid to components like mobility models and performance objectives. A clustering algorithm may not perform well with every mobility pattern. Therefore, we propose a supervisory protocol (SP) that observes the mobility pattern of vehicles and identifies the realistic Mobility model through microscopic features. An analytical model can be used to determine an efficient clustering algorithm for a specific mobility model (MM). SP selects the best clustering scheme according to the mobility model and guarantees a consistent performance throughout VANET operations. The simulation has performed in three parts that is the central part simulation for setting up the clustering environment, In the second part the clustering algorithms are tested for efficiency in a constrained atmosphere for some time and the third part represents the proposed scheme. The simulation results show that the proposed scheme outperforms clustering algorithms such as honey bee algorithm-based clustering and memetic clustering in terms of cluster count, re-affiliation rate, control overhead and cluster lifetime.  相似文献   
64.
The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communication, security and privacy issues arise which need to be addressed. To protect information about users’ location, an efficient technique should be devised. Several techniques have already been proposed for preserving location privacy in IoT. However, the existing research lags in preserving location privacy in IoT and has highlighted several issues such as being specific or being restricted to a certain location. In this paper, we propose a new location privacy technique called the enhanced semantic obfuscation technique (ESOT) to preserve the location information of a user. Experimental results show that ESOT achieves improved location privacy and service utility when compared with a well-known existing approach, the semantic obfuscation technique.  相似文献   
65.
In the present study, a new mesophilic bacterial strain, identified as Bacillus anthracis strain PUNAJAN 1 was isolated from palm oil mill effluent (POME) sludge, and tested for its hydrogen production ability. Effect of physico-chemical factors such as temperature, initial pH, nitrogen source and carbon sources were investigated in order to determine the optimal conditions for hydrogen production. The maximum hydrogen yield of 2.42 mol H2/mol mannose was obtained at 35 °C and initial pH of 6.5. Yeast and mannose were used as the main carbon and nitrogen sources respectively in the course of the hydrogen production. Apart from synthetic substrate, specific hydrogen production potentials of the strain using POME was calculated and found to be 236 ml H2/g chemical oxygen demand (COD). The findings of this study demonstrate that the indigenous strain PUNAJAN 1 could be a potential candidate for hydrogen using POME as substrate.  相似文献   
66.
67.
A comparative study was performed to determine tocopherols, tocotrienols, fatty acids, and pigments content during the development of three varieties of flaxseed (H52, O116 and P129). Seed samples were collected at regular intervals from 7 to 56 days after flowering (DAF). The highest content of chlorophyll (89.72–130.5 mg/kg oil) was detected at 7 DAF. The maximum level of carotenoids (52.10–65.55 mg/kg oil) was reached at 21 DAF. During seed development, unsaturated fatty acids are the major component, reaching 85% of the total fatty acids while saturated fatty acids content were about 15%. The maximum level of γ-tocopherol (585 mg/kg oil) was reached at 42 DAF in P129 variety. These results may be useful for evaluating the flaxseed quality and determining its optimal harvest period.  相似文献   
68.
69.
One way of proactively detecting multistage attacks such as Distributed Denial of Service (DDoS), worms and coordinated spamming is to profile hosts that engage in scanning activity and predict their future actions, which is a difficult challenge. We attempt to better understand this challenge by hypothesising that network intrusion attempts exhibit self‐similar characteristics. We analyse logs from the DShield repository of globally distributed IDS alerts corresponding to the first 2 weeks of January 2005 and present three pieces of evidence in favour of this hypothesis. First, we observed that the persistence of hosts that attempt network intrusions obey a power‐law relationship such that the overwhelming majority of hosts are short‐lived whereas a small number are highly persistent. Second, the distribution of hosts in the IP address space is broadly identical regardless of different categories of lifetimes and intrusion attempts. Finally, there is a scale invariant diurnal cycle with long‐range dependence in the number of unique hosts observed per unit time. The overall implication of these findings is that any predictive model must account for identical statistical characteristics regardless of the volumetric, spatiotemporal and categorical resolution of the observations used to build and train that model. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
70.
Bilayer ZnO/MgO dielectrics for metal–insulator–metal (MIM) capacitor application were successfully deposited using simple chemical technique which is sol–gel spin coating method with different annealing temperatures. Important criteria in determining good dielectric layer have been investigated which include structural, electrical and dielectric properties. Cubic-like grain was observed for films annealed at 400 and 425 °C which enhance the carrier density and polarization that resulted in high k value produced. Bilayer film annealed at 475 °C improved in small surface roughness (17.629 nm), minimum leakage current density (~10?8 A cm?2) and high resistivity (3.14 × 105 Ω cm). Dielectric constant, k was varied with frequency and k value was found to be 5.09 at 10 kHz. The results obtained in this study indicated that film annealed at temperature of 475 °C is suitable to be used as dielectrics for MIM capacitor application.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号