首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   258篇
  免费   16篇
  国内免费   2篇
电工技术   7篇
化学工业   66篇
机械仪表   1篇
建筑科学   4篇
能源动力   15篇
轻工业   13篇
石油天然气   2篇
无线电   43篇
一般工业技术   45篇
冶金工业   9篇
原子能技术   10篇
自动化技术   61篇
  2023年   4篇
  2022年   15篇
  2021年   10篇
  2020年   7篇
  2019年   5篇
  2018年   5篇
  2017年   13篇
  2016年   12篇
  2015年   13篇
  2014年   5篇
  2013年   13篇
  2012年   10篇
  2011年   29篇
  2010年   15篇
  2009年   15篇
  2008年   15篇
  2007年   9篇
  2006年   11篇
  2005年   7篇
  2004年   3篇
  2003年   6篇
  2002年   5篇
  2001年   2篇
  2000年   2篇
  1999年   2篇
  1998年   4篇
  1997年   3篇
  1996年   5篇
  1995年   1篇
  1994年   2篇
  1992年   5篇
  1991年   2篇
  1990年   1篇
  1989年   6篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1983年   2篇
  1981年   3篇
  1979年   1篇
  1978年   1篇
  1970年   1篇
排序方式: 共有276条查询结果,搜索用时 15 毫秒
81.
82.
Over the last 20 years, the privacy of most GSM phone conversations was protected by the A5/1 and A5/2 stream ciphers, which were repeatedly shown to be cryptographically weak. They are being replaced now by the new A5/3 and A5/4 algorithms, which are based on the block cipher KASUMI. In this paper we describe a new type of attack called a sandwich attack, and use it to construct a simple related-key distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 2?14. By using this distinguisher and analyzing the single remaining round, we can derive the complete 128-bit key of the full KASUMI with a related-key attack which uses only 4 related keys, 226 data, 230 bytes of memory, and 232 time. These completely practical complexities were experimentally verified by performing the attack in less than two hours on a single-core of a PC. Interestingly, neither our technique nor any other published attack can break the original MISTY block cipher (on which KASUMI is based) significantly faster than exhaustive search. Our results thus indicate that the modifications made by ETSI’s SAGE group in moving from MISTY to KASUMI made it extremely weak when related-key attacks are allowed, but do not imply anything about its resistance to single-key attacks. Consequently, there is no indication that the way KASUMI is implemented in GSM and 3G networks is practically vulnerable in any realistic attack model.  相似文献   
83.
Recently, perovskite solar cells (PSC) with high power‐conversion efficiency (PCE) and long‐term stability have been achieved by employing 2D perovskite layers on 3D perovskite light absorbers. However, in‐depth studies on the material and the interface between the two perovskite layers are still required to understand the role of the 2D perovskite in PSCs. Self‐crystallization of 2D perovskite is successfully induced by deposition of benzyl ammonium iodide (BnAI) on top of a 3D perovskite light absorber. The self‐crystallized 2D perovskite can perform a multifunctional role in facilitating hole transfer, owing to its random crystalline orientation and passivating traps in the 3D perovskite. The use of the multifunctional 2D perovskite (M2P) leads to improvement in PCE and long‐term stability of PSCs both with and without organic hole transporting material (HTM), 2,2′,7,7′‐tetrakis‐(N,N‐di‐p‐methoxyphenyl‐amine)‐9,9′‐spirobifluorene (spiro‐OMeTAD) compared to the devices without the M2P.  相似文献   
84.
Adaptive finite element analysis of axisymmetric freezing   总被引:3,自引:0,他引:3  
The paper describes an adaptive finite element analysis of the transient axisymmetric freezing process. Adaptivity schemes are applied to both space and time tessellations. Error equidistribution adjusts the nodal positions and Taylor series analysis of time truncation error selects the time step. In implicit time integration, the location of the freezing front and the nodal temperatures at the next time is solved by full Newton all at once. The method appears to be accurate; in cases for which closed-form solutions are available, it agrees well with them. It also avoids the problem found in the Modified Isotherm Migration Method where the freezing front tends to retrogress when solid just forms on the outer surface cooled by convection.  相似文献   
85.
Cyclam type macrocyclic ligand was tethered onto mesoporous silica surface through N-functionalization of the cyclam. The mesoporous silica was synthesized directly with in-built chloropropyl functional group by applying microwave synthesis approach and the cyclam ligand was tethered via the surface substitution reaction of the chloro group. The tethered cyclam ligand was proven to facilely accommodate Co(III) cation into its cavity. This Co(III)cyclam-functionalized mesoporous silica showed good catalytic activity in the aerial oxidation of ethylbenzene to give acetophenone as the major product, which exceeded 60%. The presence of pyridine ligand which bounded to the axial sites of the tethered Co(III)cyclam complex enhanced the activity of the catalyst with sustaining the selectivity.  相似文献   
86.
In many applications noisy signals are measured. These signals have to be filtered and, sometimes, their derivative has to be computed. In this paper a method for filtering the signals and computing the derivatives is presented. This method is based on expansion onto transformed Legendre polynomials. Numerical examples demonstrate the efficacy of the method as well as the theoretical estimates. This research was supported by the ISRAEL SCIENCE FOUNDATION (grant No. 1364/04) and the UNITED STATES-ISRAEL BINATIONAL SCIENCE FOUNDATION (grant No. 2004099).  相似文献   
87.
The authors describe a novel method of probabilistic power system production cost and reliability calculation using the Z transform. In the proposed method, the generating unit available capacity probability density functions (PDFs) are represented by probability impulses. These PDFs are convolved using the Z transform to produce equivalent capacity PDFs. By operating the equivalent capacity PDFs on the system demand, the unit energies, loss of load probability (LOLP), and expected unserved energy (EUE) can be calculated for each load level and the total demand. The method is compared with the cumulant method and Calebrese's traditional direct convolution procedure in terms of accuracy and computing time using the IEEE Reliability Test System. The main advantage of the new method is that actual load and generator availability data can be used directly, rather than via a mathematical representation such as cumulants. An efficient recursive algorithm using the Z transform procedure has been formulated to allow fast evaluations of convolution and deconvolution of PDFs. In terms of computing time, the new method is not much slower than the cumulant method. LOLP and EUE are also calculated more accurately  相似文献   
88.
89.
In this study, a unified mathematical modelling technique for computing the steady-state and dynamic voltage-current (V-I) characteristics of PEM fuel cell stacks is developed. The proposed modelling method is based on the least squares technique and a set of electrochemical equations representing the PEM fuel cells. Three PEM fuel cell systems are considered for validating the proposed model. Furthermore, the authors investigated load current optimization by using the proposed method, in order to maximize the power output. Hence, this study provides a valuable approach for optimization of operating points of fuel cells and design of power conditioning units, simulators, and system controllers.  相似文献   
90.
An engineering kinetic model is applied to EPDM devulcanization in an extrusion process. Parameters that were included in the model are crosslink density, devulcanizing agent concentration, time, shear rate, and temperature. The extruder is considered as a series of plug flow and stirred tank reactors. The residence time is calculated using solid flow or liquid flow model, depending on the degree of decrosslinking. The model can accurately predict the decrosslinking degree inside the temperature boundary defined by the applied experimental conditions. Outside this boundary, the effect of chemical degradation on the measured conversion becomes more significant.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号