首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   203篇
  免费   17篇
  国内免费   2篇
电工技术   1篇
化学工业   48篇
机械仪表   1篇
建筑科学   2篇
能源动力   9篇
轻工业   13篇
石油天然气   2篇
无线电   30篇
一般工业技术   44篇
冶金工业   6篇
原子能技术   10篇
自动化技术   56篇
  2023年   1篇
  2022年   11篇
  2021年   9篇
  2020年   5篇
  2019年   5篇
  2018年   5篇
  2017年   13篇
  2016年   12篇
  2015年   11篇
  2014年   3篇
  2013年   10篇
  2012年   9篇
  2011年   25篇
  2010年   15篇
  2009年   14篇
  2008年   15篇
  2007年   9篇
  2006年   5篇
  2005年   6篇
  2004年   1篇
  2003年   4篇
  2002年   3篇
  2001年   2篇
  2000年   2篇
  1998年   3篇
  1997年   3篇
  1996年   1篇
  1994年   1篇
  1992年   3篇
  1991年   2篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1983年   2篇
  1981年   3篇
  1979年   1篇
  1978年   1篇
  1970年   1篇
排序方式: 共有222条查询结果,搜索用时 171 毫秒
51.
A fundamental study of the interactions between binary particulate formulations in HFA-based pressurised metered dose inhaler (pMDI) systems was undertaken. Differences in the surface energetics of lactose, mannitol and sibenadet hydrochloride were observed, which could be related to the degree of particle adhesion/cohesion, the sedimentation rate and the aerosolisation performance of formulations containing different mixtures of these components. In general, lactose was shown to be the most cohesive material and readily formed coarse aggregates with sibenadet hydrochloride which sedimented rapidly. This had the greatest effect on aerosolisation performance at high-lactose concentrations (and low-sibenadet hydrochloride concentrations), where heavily agglomerated particles were observed in collected samples of the emitted aerosol. A model, relating the adhesive and cohesive forces between the components in these systems has been proposed, which satisfactorily describes these phenomena. Furthermore, although the more energetic systems were shown to result in significantly decreased aerosol performance, the through-life performance was enhanced.  相似文献   
52.
Magnetic Resonance Materials in Physics, Biology and Medicine - We propose a deep learning-based fully automatic right ventricle (RV) segmentation technique that targets radially reconstructed...  相似文献   
53.
Access control policies may contain anomalies such as incompleteness and inconsistency, which can result in security vulnerabilities. Detecting such anomalies in large sets of complex policies automatically is a difficult and challenging problem. In this paper, we propose a novel method for detecting inconsistency and incompleteness in access control policies with the help of data classification tools well known in data mining. Our proposed method consists of three phases: firstly, we perform parsing on the policy data set; this includes ordering of attributes and normalization of Boolean expressions. Secondly, we generate decision trees with the help of our proposed algorithm, which is a modification of the well-known C4.5 algorithm. Thirdly, we execute our proposed anomaly detection algorithm on the resulting decision trees. The results of the anomaly detection algorithm are presented to the policy administrator who will take remediation measures. In contrast to other known policy validation methods, our method provides means for handling incompleteness, continuous values and complex Boolean expressions. In order to demonstrate the efficiency of our method in discovering inconsistencies, incompleteness and redundancies in access control policies, we also provide a proof-of-concept implementation.  相似文献   
54.
Amino-functionalized-SBA-15 catalysts with nanostructured hexagonal platelet morphologies were synthesized directly by using microwave synthesis from the hydrolysis and co-condensation of aminopropyltriethoxysilane (APTES) and sodium metasilicate under a strong acidic condition with the Pluronic P123 triblock copolymer as a structure-directing agent. The amino-functionalized-SBA-15 catalysts were proven by SEM and TEM techniques to have very short channels in the range of 200–300 nm perpendicular to the hexagonal platelet morphologies. These short-channeled catalysts were proven to be effective heterogeneous catalysts in liquid-phase reactions such as Knoevenagel and Claisen-Schmidt condensations as well as in Henry reaction. They exhibited greatly improved catalytic activities over the typical fibrous type SBA-15 catalyst having long channels. Obviously, the easy diffusion and rapid mass transfer of substrate into the short channel mesopores played important roles in the significant improvement in the catalytic activities.  相似文献   
55.
A simple, rapid, sensitive and inexpensive method has been developed for the determination of trace amounts of chromium(VI) using 3,4-dihydroxybenzaldehydeisonicotinoylhydrazone (3,4-DHBINH). The metal ion gives a yellow coloured complex with 3,4-DHBINH in acetate buffer of pH 5.5 with 1:1 (metal:ligand) composition. The complex shows a maximum absorption at 400 nm. Beer’s law is obeyed in the range 0.5–7.7 ppm of Cr(VI). The molar absorptivity, Sandell’s sensitivity and detection limit were found to be 1.35 × 104 L mol−1 cm−1, 0.0075 μg cm−2 and 0.0045 μg mL−1, respectively. The correlation co-efficient and regression co-efficient of the Cr(VI)–3,4-DHBINH complex were 0.99 and 0.12, respectively. Major cations and anions did not show any interference. The developed method has been successfully applied for the analysis of Cr(VI) in food samples (leafy vegetables), comparing the results simultaneously with those obtained using an Atomic Absorption Spectrophotometer, whereby the validity of the method has been tested.  相似文献   
56.
57.
58.
We show that the electrode/molecule chemical bond does not change the tunneling barrier for charge transport through alkyl chain monolayers sandwiched between Si and Hg electrodes. This observation can be understood if the interfacial bond mainly governs the monolayer's structure, while the electronic states due to molecule-electrode bonding do not contribute significantly to tunneling. Yet, the nature of the bond affects the Schottky barrier inside the semiconductor due to changes in the interface dipole.  相似文献   
59.
The paper analyzes the mechanism of partitioning and rejection of organic solutes by polyamide membranes for reverse osmosis and nanofiltration. The partitioning of homologous series of alcohols and polyols, in which polarity changes with size in opposite ways, was measured using attenuated total reflection IR spectroscopy. The results show that the partitioning of polyols monotonously decreases with size, whereas for alcohols it is not monotonous and slightly decreases for small C1-C3 alcohols followed by a sharp increase for larger alcohols. These results may be explained by assuming a heterogeneous structure of polyamide comprising a hydrophobic polyamide matrix and a polar internal aqueous phase. The partitioning data could consistently explain the results of rejection in standard filtration experiments. They clearly demonstrate that high/low partitioning may play a significant role in achieving a low/high rejection of organics. In particular, this points to the need to account for the partitioning effect while using molecular probes such as polyols or sugars for estimating the effective "pore" size or molecular weight cutoff of a membrane and for choosing/developing organic-rejecting membranes.  相似文献   
60.
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic primitives that employ data-dependent table lookups. The attacks allow an unprivileged process to attack other processes running in parallel on the same processor, despite partitioning methods such as memory protection, sandboxing, and virtualization. Some of our methods require only the ability to trigger services that perform encryption or MAC using the unknown key, such as encrypted disk partitions or secure network links. Moreover, we demonstrate an extremely strong type of attack, which requires knowledge of neither the specific plaintexts nor ciphertexts and works by merely monitoring the effect of the cryptographic process on the cache. We discuss in detail several attacks on AES and experimentally demonstrate their applicability to real systems, such as OpenSSL and Linux’s dm-crypt encrypted partitions (in the latter case, the full key was recovered after just 800 writes to the partition, taking 65 milliseconds). Finally, we discuss a variety of countermeasures which can be used to mitigate such attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号