首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   389篇
  免费   24篇
  国内免费   5篇
电工技术   7篇
综合类   2篇
化学工业   100篇
金属工艺   12篇
机械仪表   9篇
建筑科学   12篇
矿业工程   1篇
能源动力   22篇
轻工业   15篇
水利工程   18篇
石油天然气   4篇
无线电   40篇
一般工业技术   70篇
冶金工业   11篇
原子能技术   2篇
自动化技术   93篇
  2024年   1篇
  2023年   19篇
  2022年   32篇
  2021年   44篇
  2020年   30篇
  2019年   36篇
  2018年   34篇
  2017年   30篇
  2016年   35篇
  2015年   14篇
  2014年   22篇
  2013年   26篇
  2012年   29篇
  2011年   26篇
  2010年   10篇
  2009年   6篇
  2008年   5篇
  2007年   5篇
  2006年   4篇
  2004年   3篇
  2002年   1篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1991年   1篇
  1987年   1篇
  1982年   1篇
排序方式: 共有418条查询结果,搜索用时 15 毫秒
31.
Journal of Superconductivity and Novel Magnetism - NdFeB hot-pressed and hot-deformed magnets were prepared by hot-pressed (HP) sintering and spark plasma sintering (SPS). The effects of sintering...  相似文献   
32.
Journal of Superconductivity and Novel Magnetism - Microstructure optimization is highly desirable for improving the magnetic properties of permanent magnetic materials. To optimize the...  相似文献   
33.
Multimedia Tools and Applications - One of the most critical aspects of this technologically progressive era is the propagation of information through an unsecured communication channel. The...  相似文献   
34.
The present work is designed to discover new perovskite-based materials, which are expected to show high mechanical stability during their applications, using machine learning (ML) techniques, and based on the Pugh's criterion for distinguishing brittle and ductile behaviors. For this purpose, ML models to predict the moduli of materials, bulk (B) and shear (G), are built using their crystal structure and composition information. The ML process is initiated with the information of 5663 compounds, including composition, crystal structure and moduli, as listed in AFLOW database. Following a procedure of data characteristics, feature generation, feature processing, training, and testing, the ML models are constructed with acceptable accuracy (tenfold cross-validation R2 score of 0.90 and 0.89 for B and G, respectively). The validation process of the models, which is conducted using the corresponding density functional theory calculations, reveals that these models are reliable to be employed in a large-scale screening process. Indeed, the B- and G-based ML models are incorporated in a screening process, and this is also conjugated with other screening criterions, to find out thermodynamically stable and formable perovskite-based materials with improved mechanical performance.  相似文献   
35.
Efficient charge–carrier separation and their utilization are the key factors in overcoming sluggish four-electron reaction kinetics involved in photocatalytic oxygen evolution. Here, a novel study demonstrates the significance of Na2S2O8 as a sacrificial agent in comparison to AgNO3. Resultantly, BiFeO3 (BFO) and titanium doped-oxygen deficient BiFeO3 (Ti-BFO-R) nanostructures achieve ≈64 and 44.5 times higher O2 evolution in the presence of Na2S2O8 compared to AgNO3 as a sacrificial agent, respectively. Furthermore, the presence of Co single atoms (Co-SAs) deposited via immersion method on BFO and Ti-BFO-R nanostructures led to achieving outstanding O2 evolution at a rate of 16.11 and 23.89 mmol g−1 h−1, respectively, which is 153 and 227.5 times higher compared to BFO (in the presence of AgNO3), the highest O2 evolution observed for BFO-based materials to date. The successful deposition of Co-SAs is confirmed by aberration-corrected high-angle annular dark-field scanning transmission electron microscopy (AC HAADF-STEM) and X-ray absorption near-edge structure (XANES). The charge transfer investigations confirm the significance of Co-SAs on BFO-based photocatalysts for improved charge–carrier separation, transport, and utilization. This novel study validates the excellent role of Na2S2O8 as a sacrificial agent and Co-SAs as a cocatalyst for BFO-based nanostructures for efficient O2 evolution.  相似文献   
36.
In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with the purpose of inducing confusion in cryptosystems. For the last decade, most of the work on designing S-boxes over the points of elliptic curves has been published. The main purpose of these studies is to hide data and improve the security levels of crypto algorithms. In this work, we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers (GI). The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters. But the prime field dependent on the Elliptic curve (EC) provides one S-box at a time by fixing three parameters and . The newly designed pair of S-boxes are assessed by various tests like nonlinearity, bit independence criterion, strict avalanche criterion, linear approximation probability, and differential approximation probability.  相似文献   
37.
To improve the resource limitation of mobile devices, mobile users may utilize cloud-computational and storage services. Although the utilization of the cloud services improves the processing and storage capacity of mobile devices, the migration of confidential information on untrusted cloud raises security and privacy issues. Considering the security of mobile-cloud-computing subscribers’ information, a mechanism to authenticate legitimate mobile users in the cloud environment is sought. Usually, the mobile users are authenticated in the cloud environment through digital credential methods, such as password. Once the users’ credential information theft occurs, the adversary can use the hacked information for impersonating the mobile user later on. The alarming situation is that the mobile user is unaware about adversary’s malicious activities. In this paper, a light-weight security scheme is proposed for mobile user in cloud environment to protect the mobile user’s identity with dynamic credentials. The proposed scheme offloads the frequently occurring dynamic credential generation operations on a trusted entity to keep minimum processing burden on the mobile device. To enhance the security and reliability of the scheme, the credential information is updated frequently on the basis of mobile-cloud packets exchange. Furthermore, the proposed scheme is compared with the existing scheme on the basis of performance metrics i.e. turnaround time and energy consumption. The experimental results for the proposed scheme showed significant improvement in turnaround time and energy consumption as compared to the existing scheme.  相似文献   
38.
Multimedia Tools and Applications - In this paper, a computer based system has been proposed as a support to gastrointestinal polyp detection. It can detect and classify gastrointestinal polyps...  相似文献   
39.
There are many practical situations where the underlying distribution of the quality characteristic either deviates from normality or it is unknown. In such cases, practitioners often make use of the nonparametric control charts. In this paper, a new nonparametric double exponentially weighted moving average control chart on the basis of the signed-rank statistic is proposed for monitoring the process location. Monte Carlo simulations are carried out to obtain the run length characteristics of the proposed chart. The performance comparison of the proposed chart with the existing parametric and nonparametric control charts is made by using various performance metrics of the run length distribution. The comparison showed the superiority of the suggested chart over its existing parametric and nonparametric counterparts. An illustrative example for the practical implementation of the proposed chart is also provided by using the industrial data set.  相似文献   
40.
The paper proposes an algorithm for multi-robot coordination and navigation in order to intercept a target at a long distance. For this purpose, a limit cycle based algorithm using a neural oscillator with phase differences is proposed. The state of target is unknown, under the assumption that it is stationary or in motion with constant unknown speed along a straight line. Using the proposed algorithm, a group of robots is intended to move towards the target in such a way that the robots surround it. While moving to the target, self-collision between the robots is avoided. Moreover, a collision avoidance with static obstacles as well as dynamic target is realized. The robots reach the target at a desired distance, keeping uniformly distributed angles around the target. The algorithm is further extended so that a static interception point for the target can be estimated in place of pursuing a dynamic target, which is referred to as a virtual target in this paper. In other words, the robots move towards the virtual target instead of the actual target. The robots ultimately encircle the actual target when they arrive at the virtual target. The effectiveness of the proposed method is verified through simulation results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号