首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1168篇
  免费   43篇
  国内免费   9篇
电工技术   42篇
化学工业   255篇
金属工艺   52篇
机械仪表   30篇
建筑科学   15篇
能源动力   54篇
轻工业   41篇
石油天然气   1篇
无线电   183篇
一般工业技术   278篇
冶金工业   109篇
原子能技术   13篇
自动化技术   147篇
  2023年   11篇
  2022年   35篇
  2021年   51篇
  2020年   26篇
  2019年   30篇
  2018年   34篇
  2017年   33篇
  2016年   26篇
  2015年   22篇
  2014年   36篇
  2013年   60篇
  2012年   51篇
  2011年   54篇
  2010年   45篇
  2009年   48篇
  2008年   54篇
  2007年   49篇
  2006年   47篇
  2005年   37篇
  2004年   21篇
  2003年   28篇
  2002年   27篇
  2001年   19篇
  2000年   13篇
  1999年   23篇
  1998年   49篇
  1997年   28篇
  1996年   24篇
  1995年   21篇
  1994年   13篇
  1993年   21篇
  1992年   9篇
  1991年   14篇
  1990年   15篇
  1989年   13篇
  1988年   13篇
  1987年   6篇
  1986年   6篇
  1985年   7篇
  1984年   10篇
  1983年   10篇
  1982年   6篇
  1981年   7篇
  1980年   7篇
  1979年   11篇
  1978年   9篇
  1977年   7篇
  1976年   7篇
  1974年   5篇
  1973年   7篇
排序方式: 共有1220条查询结果,搜索用时 15 毫秒
21.
Design of industrial annealing cycles requires recrystallization and grain growth studies, which are typically carried out under isothermal laboratory condition. The kinetics coefficients of these phase transformations are obtained from such studies, which are subsequently used in designing the industrial nonisothermal cycles using the additivity principles. However, the strong heating rate effects on the grain growth kinetics necessitate such kinetics studies using industrial thermal profiles. In the present work, the hot and cold spot cycles of an industrial batch annealing cycle for AIK grade steel have been simulated in a programmable laboratory furnace. Subsequently, the effect of annealing temperature, soaking time, and heating rate on the microstructural features, such as grain size distribution, grain shape anisotropy, and grain orientation, have been investigated through extensive quantitative microscopy. The implications of these results on the design of industrial batch annealing cycles have been discussed.  相似文献   
22.
Recent research suggests that social interactions in video games may lead to the development of community bonding and prosocial attitudes. Building on this line of research, a national survey of U.S. adults finds that gamers who develop ties with a community of fellow gamers possess gaming social capital, a new gaming‐related community construct that is shown to be a positive antecedent in predicting both face‐to‐face social capital and civic participation.  相似文献   
23.
In this paper, we establish a set of sufficient conditions for the controllability of damped second-order impulsive neutral integrodifferential systems with nonlocal initial conditions in Banach spaces. The approach used is the Sadovskii fixed point theorem combined with a noncompact condition on the cosine family of operators. An example is presented to illustrate the result.  相似文献   
24.

In General, Mobile Ad-Hoc Network (MANET) has limited energy resources, and it cannot recharge itself. This research goal focuses on building a power management scheme that saves energy in the MANET. Due to power instability, there is a chance that cluster heads fail and function incorrectly in cluster-based routing. As a result, instability occurs with the cluster heads while collecting data and communicating with others effectively. This work focuses on detecting the unstable cluster heads, which are replaced by other nodes implementing the envisaged self-configurable cluster mechanism. A self-configurable cluster mechanism with a k-means protocol approach is proposed to designate cluster heads effectively. The proposed k-means procedure is based on periodic irregular cluster head rotations or altering the number of clusters. We also propose a trust management mechanism in this research to detect and avoid MANET vulnerabilities. Because of the continuously changing topology and limited resources (power, bandwidth, computing), the trust management algorithm should only use local data. Consequently, compared to traditional protocols, the proposed approach with the k-means procedure and its experimental results show lower power usage and provide an optimal system for trust management.

  相似文献   
25.
Wireless Personal Communications - In the recent past, the Cognitive Radio Network (CRN) plays significant role in mobile technology for energy efficient wireless 5G communication. The Non...  相似文献   
26.
Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on the computer or provided in plain text, they are resistant to replay, guessing, and stolen verification attacks. The suggested protocol uses a one-way hash function and XOR operations, with the client having remote access to a large number of servers over a secure communication channel. Concentrates on HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hash would make it substantially more difficult to break via a rainbow table.  相似文献   
27.
The recent research in biocompatible materials has been useful in replacing and supporting the fractured natural human bones/joints. Under some condition, negative reaction like release of ions from the bare metal toward the human body fluid leads to corrosion. In this proposed research paper, the biocompatibility of the laser surface-modified austenitic stainless steel (SS316L) and nickel-based superalloy (Inconel 718) was studied. The investigation on laser-modified surfaces is evaluated through electrochemical polarization analysis using simulated body fluid (SBF). The samples subjected to electrochemical polarization analysis were characterized by optical image analysis, SEM, EDS, and XRD analysis. It was inferred that laser surface-modified materials provided enhanced corrosion resistance and bare nickel alloy is more susceptible to corrosion by SBF.  相似文献   
28.
The inverse problem of reconstructing the location and size of defects in a coated metallic pipe from single frequency limited view electromagnetic scattered field is considered. Specifically, the paper addresses the problem of assessing shape changes in the shadow region entailed by limited view data in 2D by operating in an intermediate size parameter (ka) range. The inverse scattering problem is formulated as a non-linear optimization problem solved through genetic algorithm that seeks to minimize in the least-squared sense the difference between measured data and simulated data through iterations of the solution to a forward problem. The hybrid finite element boundary integral formulations were used to solve the forward problem of coated metallic pipe with defects. The proposed inversion methodology was applied for shadow region shape change assessment to determine whether a metal pipe is coated or not, and to reconstruct the location and size of corrosion-like defect, over a range of size parameters. The study is carried out using transverse electric and transverse magnetic polarized fields. To understand the effect of coating on backscattered fields, parametric studies are conducted using numerical data. A range for size parameter \(2.0\le ka\le 4\) was found to produce the highest contrast between defect free pipe and coated metallic pipes with defects in the deep shadow region. The experiments are carried out using vector network analyzer in an anechoic chamber. The inversion results obtained using measured data were found be in good agreement with inversion results obtained using synthetic data. Estimated extent of corrosion in deep shadow region of a coated metallic pipe was found to be within 9 % of actual extent of corrosion.  相似文献   
29.
30.
Near infrared (NIR) light utilization in a range of current technologies has gained huge significance due to its abundance in nature and nondestructive properties. NIR active lanthanide (Ln) doped upconversion nanomaterials synthesized in controlled shape, size, and surface functionality can be combined with various pertinent materials for extensive applications in diverse fields. Upconversion nanophosphors (UCNP) possess unique abilities, such as deep tissue penetration, enhanced photostability, low toxicity, sharp emission peaks, long anti‐Stokes shift, etc., which have bestowed them with prodigious advantages over other conventional luminescent materials. As new generation fluorophores, UCNP have found a wide range of applications in various fields. In this Review, a comprehensive overview of lanthanide doped NIR active UCNP is provided by discussing the fundamental concepts including the different mechanisms proposed for explaining the upconversion processes, followed by the different strategies employed for the synthesis of these materials, and finally the technological applications of UCNP, mainly in the fields of bioimaging, drug delivery, sensing, and photocatalysis by highlighting the recent works in these areas. In addition, a brief note on the applications of UCNP in other fields is also provided along with the summary and future perspectives of these materials.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号