首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2572篇
  免费   165篇
  国内免费   7篇
电工技术   20篇
综合类   5篇
化学工业   744篇
金属工艺   72篇
机械仪表   83篇
建筑科学   77篇
矿业工程   1篇
能源动力   211篇
轻工业   339篇
水利工程   33篇
石油天然气   16篇
武器工业   1篇
无线电   223篇
一般工业技术   513篇
冶金工业   61篇
原子能技术   22篇
自动化技术   323篇
  2024年   10篇
  2023年   58篇
  2022年   112篇
  2021年   193篇
  2020年   129篇
  2019年   150篇
  2018年   140篇
  2017年   144篇
  2016年   147篇
  2015年   109篇
  2014年   169篇
  2013年   257篇
  2012年   169篇
  2011年   227篇
  2010年   135篇
  2009年   100篇
  2008年   68篇
  2007年   58篇
  2006年   49篇
  2005年   22篇
  2004年   20篇
  2003年   31篇
  2002年   22篇
  2001年   19篇
  2000年   24篇
  1999年   12篇
  1998年   14篇
  1997年   11篇
  1996年   14篇
  1995年   7篇
  1994年   11篇
  1993年   8篇
  1992年   5篇
  1991年   8篇
  1990年   8篇
  1989年   4篇
  1988年   9篇
  1987年   4篇
  1986年   8篇
  1985年   6篇
  1984年   5篇
  1983年   5篇
  1982年   7篇
  1981年   5篇
  1978年   4篇
  1977年   5篇
  1974年   4篇
  1973年   4篇
  1972年   4篇
  1971年   2篇
排序方式: 共有2744条查询结果,搜索用时 15 毫秒
41.

Wireless body area network (WBAN) has witnessed significant attentions in the healthcare domain using biomedical sensor-based monitoring of heterogeneous nature of vital signs of a patient’s body. The design of frequency band, MAC superframe structure, and slots allocation to the heterogeneous nature of the patient’s packets have become the challenging problems in WBAN due to the diverse QoS requirements. In this context, this paper proposes an Energy Efficient Traffic Prioritization for Medium Access Control (EETP-MAC) protocol, which provides sufficient slots with higher bandwidth and guard bands to avoid channels interference causing longer delay. Specifically, the design of EETP-MAC is broadly divided in to four folds. Firstly, patient data traffic prioritization is presented with broad categorization including Non-Constrained Data (NCD), Delay-Constrained Data (DCD), Reliability-Constrained Data (RCD) and Critical Data (CD). Secondly, a modified superframe structure design is proposed for effectively handling the traffic prioritization. Thirdly, threshold based slot allocation technique is developed to reduce contention by effectively quantifying criticality on patient data. Forth, an energy efficient frame design is presented focusing on beacon interval, superframe duration, and packet size and inactive period. Simulations are performed to comparatively evaluate the performance of the proposed EETP-MAC with the state-of-the-art MAC protocols. The comparative evaluation attests the benefit of EETP-MAC in terms of efficient slot allocation resulting in lower delay and energy consumption.

  相似文献   
42.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting...  相似文献   
43.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
44.
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes.  相似文献   
45.
Abdul Majid  Bryan D. Sparks 《Fuel》1983,62(7):772-774
The application of a low temperature ashing method for estimating total residual organic matter (toluene insolubles) in oil sands is described. A linear correlation exists between organic carbon content and loss on ignition at 400 ± 10 °C of solvent extracted oil sands. The ratio between total organic carbon and the weight loss on ignition (CT/LOl) owing to the removal of residual organic matter is much lower than that obtained for toluene soluble bitumen fractions, indicating very different chemical composition for the residual organic matter. The measured carbon content of the residual organic matter in oil sands suggests that this material could be a mixture of various fractions contained in resins, asphaltenes, asphaltic acids and humic acids.  相似文献   
46.
The volatile components of dalieb fruit have been investigated by capillary column gas chromatography/mass spectrometry. The main components were C1 to C4 aliphatic alcohols and the corresponding acids together with esters derived from them. Acetic acid and ethanol were particularly abundant, the fruit pulp containing approximately 0.1% of each compound. Other volatiles present included the unsaturated ketone 6-methyl-5-heptene-2-one, the corresponding alcohol and the terpene, geranyl acetone.  相似文献   
47.
A modified steam distillation method was developed to extract furfural from crude palm oil (CPO). The collected distillates were analysed using high performance liquid chromatography (HPLC) coupled with an ultraviolet diode detector at 284 nm. The HPLC method allowed identification and quantification of furfural in CPO. The unique thermal extraction of CPO whereby the fresh fruit bunches (FFB) are first subjected to steam treatment, distinguishes itself from other solvent-extracted or cold-pressed vegetable oils. The presence of furfural was also determined in the fresh palm oil from FFB (without undergoing the normal extraction process), palm olein, palm stearin, olive oil, coconut oil, sunflower oil, soya oil and corn oil. The chromatograms of the extracts were compared to that of standard furfural. Furfural was only detected in CPO. The CPO consignments obtained from four mills were shown to contain 7.54 to 20.60 mg/kg furfural.  相似文献   
48.
49.
BACKGROUND: Mango is a highly perishable seasonal fruit and large quantities are wasted during the peak season as a result of poor postharvest handling procedures. Processing surplus mango fruits into flour to be used as a functional ingredient appears to be a good preservation method to ensure its extended consumption. RESULTS: In the present study, the chemical composition, bioactive/antioxidant compounds and functional properties of green and ripe mango (Mangifera indica var. Chokanan) peel and pulp flours were evaluated. Compared to commercial wheat flour, mango flours were significantly low in moisture and protein, but were high in crude fiber, fat and ash content. Mango flour showed a balance between soluble and insoluble dietary fiber proportions, with total dietary fiber content ranging from 3.2 to 5.94 g kg?1. Mango flours exhibited high values for bioactive/antioxidant compounds compared to wheat flour. The water absorption capacity and oil absorption capacity of mango flours ranged from 0.36 to 0.87 g kg?1 and from 0.18 to 0.22 g kg?1, respectively. CONCLUSION: Results of this study showed mango peel flour to be a rich source of dietary fiber with good antioxidant and functional properties, which could be a useful ingredient for new functional food formulations. Copyright © 2011 Society of Chemical Industry  相似文献   
50.
Thirty randomly selected Aeromonas isolates from food and the environment in Abu Dhabi, United Arab Emirates, were characterized for putative virulence determinants, such as production of cytotoxin, cytotonic toxin, and hemolysin and their capacity to adhere to and invade Henle 407 cells in vitro. Seventy percent of the tested isolates were cytotoxin producers, and 80% were hemolytic. Cytotoxin was produced by 6 of 7 A. hydrophila strains, 6 of 13 A. caviae strains, and 6 of 7 A. veronii bv. sobria strains, mostly from food sources. A. schubertii, A. jandaei, and A. trota also produced both cytotoxin and hemolysin. All of the 30 isolates tested adhered to Henle 407 cells, but none were able to invade the cells, as determined with the in vitro assay. However, no significant correlation of the presence of these putative virulence factors was found among these aeromonad food isolates.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号