首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2312篇
  免费   164篇
  国内免费   22篇
电工技术   59篇
综合类   4篇
化学工业   624篇
金属工艺   54篇
机械仪表   102篇
建筑科学   104篇
矿业工程   4篇
能源动力   176篇
轻工业   191篇
水利工程   12篇
石油天然气   55篇
无线电   214篇
一般工业技术   442篇
冶金工业   85篇
原子能技术   24篇
自动化技术   348篇
  2024年   6篇
  2023年   46篇
  2022年   64篇
  2021年   135篇
  2020年   129篇
  2019年   157篇
  2018年   194篇
  2017年   192篇
  2016年   138篇
  2015年   111篇
  2014年   159篇
  2013年   252篇
  2012年   148篇
  2011年   193篇
  2010年   142篇
  2009年   104篇
  2008年   74篇
  2007年   51篇
  2006年   33篇
  2005年   22篇
  2004年   15篇
  2003年   15篇
  2002年   12篇
  2001年   16篇
  2000年   11篇
  1999年   8篇
  1998年   10篇
  1997年   13篇
  1996年   5篇
  1995年   8篇
  1994年   6篇
  1993年   1篇
  1992年   4篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   3篇
  1987年   5篇
  1986年   1篇
  1985年   2篇
  1982年   5篇
  1981年   1篇
  1980年   2篇
  1976年   2篇
排序方式: 共有2498条查询结果,搜索用时 203 毫秒
21.
Journal of Porous Materials - In this work, tris(hydroxymethyl)aminomethane-Zirconium complex supported on modified SBA-15 (SBA-15@n-Pr-THMAM-ZrO) prepared as a novel mesoporous catalyst. The...  相似文献   
22.
Silicon - In this paper, a new structure: triple work function metal gate SOI MESFET, intended for integration into the deep-submicron CMOS technology, is proposed. The gate of the device consists...  相似文献   
23.
In cloud computing, services play key roles. Services are well defined and autonomous components. Nowadays, the demand of using Fuzzy inference as a service is increasing in the domain of complex and critical systems. In such systems, along with the development of the software, the cost of detecting and fixing software defects increases. Therefore, using formal methods, which provide clear, concise, and mathematical interpretation of the system, is crucial for the design of these Fuzzy systems. To obtain this goal, we introduce the Fuzzy Inference Cloud Service (FICS) and propose a novel discipline for formal modeling of the FICS. The FICS provides the service of Fuzzy inference to the consumers. We also introduce four novel formal verification tests, which allow strict analysis of certain behavioral disciplines in the FICS as follows: (1) Internal consistency, which analyzes the service in a strict and delicate manner; (2) Deadlock freeness; (3) Divergence freeness; and (4) Goal reach ability. The four tests are discussed and the FICS is verified to ensure that it can pass all these tests.  相似文献   
24.
Although leather has a number of desirable properties such as thermal stability and fire retardancey, in addition to high toughness, it has a few drawbacks such as weight, high water absorption, poor soil and rot resistance, and nonuniformity. If these defects are overcome, leather's usefulness would be further enhanced and its competitive position with respect to synthetics would increase. This study reports the physical and mechanical properties of buffalo leather after chemical graft copolymerization with ethyl acrylate, butyl acrylate, and 2‐ethyl hexyl acrylate using benzoyl peroxide as an initiator. The optimum conditions for grafting (e.g., monomer and initiator concentrations, temperature and time of grafting, and solvent leather ratio) were extensively investigated. The study achieved outstanding properties for buffalo leather in reduction of water uptake after grafting, especially on using 2‐ethyl hexyl acrylate and butyl acrylate monomers. FT‐IR and solid 13C‐NMR for leather before and after grafting confirmed the grafting process.© 2003 Wiley Periodicals, Inc. J Appl Polym Sci 89: 1478–1483, 2003  相似文献   
25.
Importance sampling is a technique that is commonly used to speed up Monte Carlo simulation of rare events. However, little is known regarding the design of efficient importance sampling algorithms in the context of queueing networks. The standard approach, which simulates the system using an a priori fixed change of measure suggested by large deviation analysis, has been shown to fail in even the simplest network settings. Estimating probabilities associated with rare events has been a topic of great importance in queueing theory, and in applied probability at large. In this article, we analyse the performance of an importance sampling estimator for a rare event probability in a Jackson network. This article carries out strict deadlines to a two-node Jackson network with feedback whose arrival and service rates are modulated by an exogenous finite state Markov process. We have estimated the probability of network blocking for various sets of parameters, and also the probability of missing the deadline of customers for different loads and deadlines. We have finally shown that the probability of total population overflow may be affected by various deadline values, service rates and arrival rates.  相似文献   
26.
Quantum-dot cellular automata (QCA) technique is one of the emerging and promising nanotechnologies. It has considerable advantages versus CMOS technology in various aspects such as extremely low power dissipation, high operating frequency and small size. In this paper, designing of a one-bit full adder is investigated using a QCA implementation of Toffoli and Fredkin gates. Then, a full adder design with reversible QCA1 gates is proposed regarding to overhead and power savings. Our proposed full adder design is more preferable when considering both circuit area and speed. The proposed design uses only two QCA1 gates and maximizes the circuit density and focuses on a layout of the circuit which is minimal in using QCA cells.  相似文献   
27.
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud.  相似文献   
28.
The issue of exponential stability analysis of continuous‐time switched singular systems consisting of a family of stable and unstable subsystems with time‐varying delay is investigated in this paper. It is very difficult to analyze the stability of such systems because of the existence of time‐delay and unstable subsystems. In this regard, on the basis of the free‐weighting matrix approach, by constructing the new Lyapunov‐like Krasovskii functional, and using the average dwell‐time approach, delay‐dependent sufficient conditions are derived and formulated in terms of LMIs to check the exponential stability of such systems. This paper also highlights the relationship between the average dwell‐time of the switched singular time‐delay system, its stability, exponential convergence rate of differential states, and algebraic states. Finally, a numerical example is given to confirm the analytical results and illustrate the effectiveness of the proposed strategy. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
29.
Dehydration of water/1-1-dimethylhydrazine mixtures by zeolite membranes   总被引:3,自引:0,他引:3  
In this research, dehydration of water/1-1-dimethylhydrazine (UDMH) mixtures by zeolite NaA and hydroxy sodalite membranes has been investigated. Support of these membranes has been tubular mullites that have been made by extruding a mixture of about 67–75% kaolin clay and 33–25% distilled water using an extruder. Zeolite NaA and hydroxy sodalite membranes have been coated on the external surface of the porous supports by the hydrothermal synthesis.

UDMH/water mixtures have been separated at ambient temperature and pressure by pervaporation (PV) using these zeolite membranes. These membranes showed very high selectivity of water for all UDMH mixtures. For the UDMH/water mixtures, separation factor as high as 10 000 has been obtained for UDMH feed concentration of 2%. Total mass fluxes of 1.05–0.2 kg/(m2 h) have been also obtained.  相似文献   

30.
A simple, fast, and reliable liquid–liquid micro-extraction (LLME) method assisted by thermal ultrasound approach was developed for simultaneous determination of synthetic phenolic antioxidants (SPAs) in edible oils by high-performance liquid chromatography equipped with ultraviolet detector (HPLC-UV). The synthetic antioxidants were propyl gallate (PG), butylated hydroxyanisole (BHA), tert-butylhydroquinone (TBHQ), and butylated hydroxyltoluene (BHT). The best extraction conditions were observed were methanol/acetonitrile (1:1, v/v) as the solvent, ultrasound at 4 min, and a temperature of 40°C. The linearity of the calibration curves for the optimum conditions were R2 > 0.989 for all of the SPAs in a range from 1–200 μg ml−1. Relative standard deviation (RSD %) for five analysis was in range of 2.83% to 4.21%. Limit of detection (LOD) and limit of quantification (LOQ) were obtained in range of 0.012–0.06 and 0.04–0.2 μg g−1, respectively. With regard to recovery, a range of 91%–116% was calculated for the spiked edible oils.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号