首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   598篇
  免费   44篇
  国内免费   4篇
电工技术   10篇
综合类   4篇
化学工业   112篇
金属工艺   12篇
机械仪表   40篇
建筑科学   5篇
能源动力   54篇
轻工业   83篇
水利工程   3篇
无线电   45篇
一般工业技术   145篇
冶金工业   26篇
原子能技术   1篇
自动化技术   106篇
  2024年   6篇
  2023年   15篇
  2022年   68篇
  2021年   83篇
  2020年   40篇
  2019年   51篇
  2018年   48篇
  2017年   41篇
  2016年   37篇
  2015年   22篇
  2014年   32篇
  2013年   32篇
  2012年   21篇
  2011年   27篇
  2010年   10篇
  2009年   14篇
  2008年   8篇
  2007年   12篇
  2006年   11篇
  2005年   6篇
  2004年   4篇
  2003年   7篇
  2002年   4篇
  2001年   4篇
  2000年   5篇
  1999年   4篇
  1998年   15篇
  1997年   5篇
  1996年   1篇
  1995年   1篇
  1994年   6篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1980年   1篇
排序方式: 共有646条查询结果,搜索用时 0 毫秒
1.
Atrazine (ATR) is a herbicide globally used to eliminate undesired weeds. Herbicide usage leads to various adverse effects on human health and the environment. The primary source of herbicides in humans is the food laced with the herbicides. The ATR binding to trypsin (TYP) was investigated in this study to explore its binding potential and toxicity. In vitro interaction of ATR with TYP was studied using multi-spectroscopic methods, molecular docking, and enzyme kinetics to explore the mechanism of binding for the TYP-ATR system. The TYP-ATR complex revealed binding constants (103 M−1), suggesting a moderate binding. The free energy for the TYP-ATR complexes was negative, suggesting a spontaneous interaction. Thermodynamic parameters enthalpy (ΔH) and entropy (ΔS) obtained positive values for the TYP-ATR system suggesting hydrophobic interactions in the binding process. Micro-environmental and conformational changes in TYP molecules were induced on interaction with ATR. Reduced catalytic activity of TYP was observed after interaction with ATR owing to the changes in the secondary structure of the TYP.  相似文献   
2.
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT)....  相似文献   
3.
The shape and scale parameters of a Weibull density distribution function are calculated for 10 locations in Saudi Arabia. The daily mean wind speed data from 1970 to mid-1990 are used for this purpose. It is found that the numerical values of the shape parameter vary between 1.7 and 2.7, whereas the value of the scale parameter is found to vary between 3 and 6. It is also concluded from this study that wind data are very well represented by the Weibull distribution function.  相似文献   
4.
This paper presents an integrated guidance and control design scheme for an unmanned air vehicle (UAV), and its flight test results. The paper focuses on the longitudinal control and guidance aspects, with particular emphasis on the terrain-following problem. An introduction to the mission, and the terrain-following problem is given first. Waypoints for climb and descent are defined. Computation of the reference trajectory in the vertical plane is discussed, including a terrain-following (TF) algorithm for real-time calculation of climb/descent points and altitudes. The algorithm is particularly suited for online computation and is therefore useful for autonomous flight. The algorithm computes the height at which the vehicle should fly so that a specified clearance from the underlying terrain is always maintained, while ensuring that the vehicle’s rate of climb and rate of descent constraints are not violated. The output of the terrain-following algorithm is used to construct a smooth reference trajectory for the vehicle to track. The design of a robust controller for altitude tracking and stability augmentation of the vehicle is then presented. The controller uses elevators for pitch control in the inner loop, while the reference pitch commands are generated by the outer altitude control loop. The controller tracks the reference trajectory computed by the terrain-following algorithm. The design of an electromechanical actuator for actuating the control surfaces of the vehicle during flight is also discussed. The entire guidance and control scheme is implemented on an actual experimental vehicle and flight test results are presented and discussed.  相似文献   
5.
6.
Sulfides are promising anode candidates because of their relatively large theoretical discharge/charge specific capacity and pretty small volume changes, but suffers from sluggish kinetics and structural instability upon cycling. Phase engineering can be designed to overcome the weakness of the electrochemical performance of sulfide anodes. By choosing nickel sulfides (α-NiS, β-NiS, and NiS2) supported by reduced graphene oxide (rGO) as model systems, it is demonstrated that the nickel sulfides with different crystal structures show different performances in both sodium-ion and potassium-ion batteries. In particular, the α-NiS/rGO display superior stable capacity (≈426 mAh g−1 for 500 cycles at 500 mA g−1) and exceptional rate capability (315 mAh g−1 at 2000 mA g−1). The combined density functional theory calculations and experimental studies reveal that the hexagonal structure is more conducive to ion absorption and conduction, a higher pseudocapacitive contribution, and higher mechanical ability to relieve the stress caused by the volume changes. Correspondingly, the phase engineered nickel sulfide coupled with the conducting rGO network synergistically boosts the electrochemical performance of batteries. This work sheds light on the use of phase engineering as an essential strategy for exploring materials with satisfactory electrochemical performance for sodium-ion and potassium-ion batteries.  相似文献   
7.
Over the last few years, vehicular ad hoc networks (VANETs) have gained popularity for their interesting applications. To make efficient routing decisions, VANET routing protocols require road traffic density information for which they use density estimation schemes. This paper presents a distributed mechanism for road vehicular density estimation that considers multiple road factors, such as road length and junctions. Extensive simulations are carried out to analyze the effectiveness of the proposed technique. Simulation results suggested that, the proposed technique is more accurate compared to the existing technique. Moreover, it facilitate VANET routing protocols to increase packet delivery ratio and reduce end-to-end delay.  相似文献   
8.

In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.

  相似文献   
9.
IP header compression schemes offer a valuable measure for bandwidth preservation. Such schemes have been practically implemented in infrastructure‐based IP networks for point‐to‐point links. However, minimal research and practical implementation efforts have been conducted in the direction of an IP header compression strategy that can meet the peculiar requirements of multi‐hop ad hoc wireless networks. In this paper, we present a practically implemented multi‐hop IP header compression scheme using the Robust Header Compression (ROHC) protocol suite. The scheme runs on a novel identifier (ID) based networking architecture, known as an ID‐based ad hoc network (IDHOCNET). IDHOCNET additionally solves a number of bottlenecks of pure IP‐based ad hoc networks that have emerged owing to IP address auto‐configuration service, distributed naming and name resolution, and the role of an IP address as an identifier at the application layer. The proposed scheme was tested on a multi‐hop test bed. The results show that the implemented scheme has better gain and requires only O (1) ROHC contexts.  相似文献   
10.
Scientometrics - In general peer review is accredited as the vital and utmost cornerstone of the scientific publishing and research developments. Undeniably, the reviewers play a decisive role in...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号