首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   951篇
  免费   63篇
  国内免费   14篇
电工技术   24篇
综合类   5篇
化学工业   229篇
金属工艺   14篇
机械仪表   16篇
建筑科学   26篇
矿业工程   5篇
能源动力   75篇
轻工业   75篇
水利工程   8篇
石油天然气   4篇
无线电   113篇
一般工业技术   229篇
冶金工业   36篇
原子能技术   10篇
自动化技术   159篇
  2024年   4篇
  2023年   22篇
  2022年   49篇
  2021年   67篇
  2020年   43篇
  2019年   39篇
  2018年   60篇
  2017年   45篇
  2016年   51篇
  2015年   40篇
  2014年   60篇
  2013年   84篇
  2012年   51篇
  2011年   67篇
  2010年   51篇
  2009年   39篇
  2008年   40篇
  2007年   45篇
  2006年   28篇
  2005年   22篇
  2004年   18篇
  2003年   22篇
  2002年   12篇
  2001年   8篇
  2000年   6篇
  1999年   6篇
  1998年   7篇
  1997年   3篇
  1996年   6篇
  1995年   4篇
  1994年   2篇
  1993年   5篇
  1992年   3篇
  1991年   3篇
  1990年   2篇
  1989年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1984年   4篇
  1983年   3篇
  1982年   1篇
  1978年   1篇
排序方式: 共有1028条查询结果,搜索用时 18 毫秒
81.
An attempt was taken to synthesize two types of polyaniline (PANI) with and without solvent followed by drying in air and vacuum oven conditions resulting different morphologies. The PANIs were prepared by chemical oxidative polymerization and studied with respect to their morphological features. Scanning electron microscopy, thermogravimetric analysis, X‐ray diffractometry, Fourier transform infrared spectroscopy, and ultraviolet–visible spectroscopy techniques were used for the characterization studies. The PANI synthesized with a solvent had a mixed morphology (fibrillar and granular), whereas PANI synthesized without a solvent had only a granular morphology. The direct‐current electrical conductivities of the samples were evaluated with an electrometer. We observed that the PANIs with mixed morphology (with solvent) were more electrically conducting than those with a single morphology (without solvent). On drying in vacuo, the conductivity of PANI decreased from 3.3 × 10?2 to 0.3 × 10?2 S/cm with solvent treatment, whereas it decreased from 0.1 × 10?2 to 0.3 × 10?3 S/cm without solvent treatment. © 2016 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2016 , 133, 44091.  相似文献   
82.
A CaO-Bi2O3-Al2O3-B2O3 glass system was studied as a sealant for sodium-sulfur battery. The thermal properties such as thermal expansion coefficient, glass transition, and softening temperature were determined by dilatometry and differential scanning calorimetry. Selected glasses, based on the thermal properties, were bonded with α-alumina substrate followed by aging in air at 400°C for 100 hours and in sodium vapor at 350°C for 100 hours. The interfacial compatibility and resistance to sodium vapor corrosion of the bonded and aged samples were evaluated by structural and microstructural analysis using X-ray diffractometer (XRD) and scanning electron microscope (SEM) attached with energy dispersive spectroscope (EDS). Helium leakage test was performed at room temperature to examine the sealing ability of the select glass. It is found that Bi2O3 increases the thermal expansion coefficient, decreases the glass transition and softening temperature, shows excellent interfacial compatibility and thermal cycling resistance, improves sealing ability, and degrades sodium corrosion resistance.  相似文献   
83.

Current work introduces a fast converging neural network-based approach for solution of ordinary and partial differential equations. Proposed technique eliminates the need of time-consuming optimization procedure for training of neural network. Rather, it uses the extreme learning machine algorithm for calculating the neural network parameters so as to make it satisfy the differential equation and associated boundary conditions. Various ordinary and partial differential equations are treated using this technique, and accuracy and convergence aspects of the procedure are discussed.

  相似文献   
84.
Multimedia Tools and Applications - Image watermarking in wavelet domain has been found useful for copyright protection and rightful ownership. Classical wavelet transforms, like discrete wavelet...  相似文献   
85.

The Internet of Things (IoT) has emerged as one of the most revolutionary technological innovations with the proliferation of applications within almost all fields of the human race. A cloud environment is the main component of IoT infrastructure to make IoT devices efficient, safe, reliable, usable, and autonomous. Reduction in infrastructure cost and demand accessibility of shared resources are essential parts of cloud-based IoT (CIoT) infrastructure. Information leakage in cloud-assisted IoT devices may invite dangerous activities and phenomena. Various cloud-based systems store IoT sensor data and later on access it accordingly. Some of them are public, and some of them are private. Private cloud services must be secured from external as well as internal adversaries. Hence, there must be a robust mechanism to prevent unauthorized access to devices. This paper proposes a novel and efficient protocol based on the Elliptic Curve property known as Elliptic Curve Discrete Logarithm Problem (ECDLP) with hash and XOR functions for the authentication in cloud-based IoT devices. In comparison to the existing protocols, the proposed protocol is resistant to attacks and other security vulnerabilities. The one-way hash function and XOR function effectively ensure a reduction in computation cost. AVISPA and BAN logic have been used for formal analysis of the proposed protocol. As per the performance analysis results, it is clear that the proposed protocol is efficiently suitable for cloud-assisted IoT devices.

  相似文献   
86.
Knowledge representation using fuzzy Petri nets-revisited   总被引:1,自引:0,他引:1  
In the paper by S. Chen et al. (see ibid., vol.2, no.3, p.311-19, 1990), the authors proposed an algorithm which determines whether there exists an antecedent-consequence relationship from a fuzzy proposition d s to proposition dj and if the degree of truth of proposition ds is given, then the degree of truth of proposition dj can be evaluated. The fuzzy reasoning algorithm proposed by S. Chen et al. (1990) was found not to be working with all types of data. We propose: (1) a modified form of the algorithm, and (2) a concept of hierarchical fuzzy Petri nets for data abstraction  相似文献   
87.
In this work, a composite numerical scheme based on finite difference and Haar wavelets is proposed to solve time dependent coupled Burgers’ equation with appropriate initial and boundary conditions. Time derivative is discretized by forward difference and then quasilinearization technique is used to linearize the coupled Burgers’ equation. Space derivatives discretization with Haar wavelets leads to a system of linear equations and is solved using Matlab7.0. Convergence analysis of proposed scheme exhibits that the error bound is inversely proportional to the resolution level of the Haar wavelet. Finally, the adaptability of proposed scheme is demonstrated by numerical experiments and shows that the present composite scheme offers better accuracy in comparison with other existing numerical methods.  相似文献   
88.
We analyse the performance and dependability of protocols which implement ‘sequence consistency’ in distributed replicated systems. Sites send messages to each other from time to time, passing information about the update requests that have been received. The recipient of a message is chosen according to some probability distribution which may depend on the sender. The random variables of main interest are (a) the interval between receiving an update request and being able to execute it on the original site, subject to the consistency requirement, and (b) the time it takes to bring all sites to a consistent state after the arrival of an update.  相似文献   
89.
We propose an optical scheme for quantum key distribution in which bits are encoded in relative phases of four bipartite weak coherent states ${|\alpha, \alpha\rangle, |-\alpha, -\alpha\rangle, |-\alpha, \alpha\rangle}$ and ${|\alpha, -\alpha \rangle}$ , with respect to a strong reference pulse. We discuss security of the scheme against eavesdropping strategies like, photon number splitting, photon beam splitting and intercept-resend attacks. It is found that present scheme is more sensitive against these eavesdropping strategies than the two-dimensional non-orthogonal state based protocol and BB84 protocol. Our scheme is very simple, requires only passive optical elements like beam splitters, phase shifters and photon detectors, hence is at the reach of presently available technology.  相似文献   
90.
The median (antimedian) set of a profile π=(u 1,…,u k ) of vertices of a graph G is the set of vertices x that minimize (maximize) the remoteness ∑ i d(x,u i ). Two algorithms for median graphs G of complexity O(n idim(G)) are designed, where n is the order and idim(G) the isometric dimension of G. The first algorithm computes median sets of profiles and will be in practice often faster than the other algorithm which in addition computes antimedian sets and remoteness functions and works in all partial cubes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号