全文获取类型
收费全文 | 613篇 |
免费 | 30篇 |
专业分类
电工技术 | 7篇 |
综合类 | 1篇 |
化学工业 | 115篇 |
金属工艺 | 7篇 |
机械仪表 | 4篇 |
建筑科学 | 15篇 |
能源动力 | 43篇 |
轻工业 | 73篇 |
水利工程 | 10篇 |
石油天然气 | 1篇 |
无线电 | 132篇 |
一般工业技术 | 81篇 |
冶金工业 | 26篇 |
自动化技术 | 128篇 |
出版年
2024年 | 2篇 |
2023年 | 2篇 |
2022年 | 16篇 |
2021年 | 24篇 |
2020年 | 11篇 |
2019年 | 19篇 |
2018年 | 21篇 |
2017年 | 13篇 |
2016年 | 43篇 |
2015年 | 23篇 |
2014年 | 47篇 |
2013年 | 61篇 |
2012年 | 47篇 |
2011年 | 54篇 |
2010年 | 45篇 |
2009年 | 37篇 |
2008年 | 38篇 |
2007年 | 33篇 |
2006年 | 24篇 |
2005年 | 16篇 |
2004年 | 9篇 |
2003年 | 11篇 |
2002年 | 9篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1993年 | 3篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
排序方式: 共有643条查询结果,搜索用时 10 毫秒
631.
632.
Syndiotactic polypropylene nanocomposites based on layered silicates in various proportions were subjected to prolonged (246 h) ultraviolet (UV)-c irradiation. Fourier transform infrared (FT-IR) spectroscopy was used in order to investigate the molecular alterations of the polymeric matrix during the UV exposure relative to the concentration of nanoclay. It was found that a significant increase of the helical conformation upon the irradiation took place as a result of scissions of the polymeric chains. In addition, a simultaneous increase in the crystallinity was verified by X-ray diffraction (XRD) measurements. Furthermore, a variety of photooxidation products were detected, among them carboxylic acids, ketones, gamma-lactones, and esters. We report in this paper the impact of the clay on the degradation mechanism of syndiotactic polypropylene mostly by the production of additional free radicals. Therefore, the relative intensities of the produced photooxidative species are affected drastically as a function of the concentration of the layered silicate present. Finally, an interaction of the carbonyl groups formed in the polymer upon irradiation with the polar groups of the layered silicates was confirmed both from infrared and UV-visible spectroscopic studies. 相似文献
633.
The objective of the present paper is to introduce an offline algorithm searching for the optimal or suboptimal placement of a robot's base during workcell design, so that its end-effector can perform a position and orientation path following task of a given 3D curved path and orientation, maximizing the manipulator's velocity performance. The global index employed for this velocity performance optimization is the approximation of the minimum manipulator velocity ratio (AMMVR). 相似文献
634.
Theodoros K. Katranas Konstantinos S. Triantafyllidis Athanasios G. Vlessidis Nicholaos P. Evmiridis 《Catalysis Letters》2007,118(1-2):79-85
In this work we prepared various zeolite-X and USY samples partially exchanged with copper, iron and platinum. These samples
were characterized by XRD, Chemical Analysis, SEM-EDS, N2-adsorption–desorption, ammonia-TPD, and tested as catalysts in high temperature (400 and 550 °C) propane transformation.
The obtained results revealed the strong effect of Si/Al ratio in faujasite zeolite structure, the number and strength of
acid sites and of the presence of different metal ions in countered ion sites, on the catalytic activity and selectivity of
zeolite-X and USY. The highest propane dehydrogenation activity was achieved with the platinum-exchanged X zeolite (∼11.2%
propylene yield, ∼31% selectivity). On the contrary USY zeolites showed high cracking capability and relatively low dehydrogenation
activity excepting the platinum-exchanged sample which yielded notably high aromatization products. 相似文献
635.
Ignatios Fotiou Athanasios Baltopoulos Antonios Vavouliotis Vassilis Kostopoulos 《应用聚合物科学杂志》2013,129(5):2754-2764
The driver for this study is the observation that heating of carbon nanotubes (CNTs) with electromagnetic field can offer a more efficient and cost‐effective alternative in heat transfer for the production of composites. The idea of this study is twofold; CNT can work as microwave (MW) radiation susceptors and they can act as nanoreinforcements in the final system. To test these assumptions, a household oven was modified to control the curing schedule. Polymers with different CNT concentrations were prepared (0.5 and 1.0 wt %). The dispersion of the CNTs in the epoxy was achieved using shear‐mixing dissolver technique. MW and conventionally cured specimens were also produced in a convection oven for reference. Thermal and mechanical tests were used as control point. A curing schedule investigation was further performed to quantify the energy and time‐saving capabilities using CNT and MWs. The presence of CNTs into epoxy matrix has been proven beneficial for the shortening of the curing time. MW‐cured composites showed the same degree of polymerization with the conventionally cured composites in a shorter time period and this time was reduced as the CNT concentration was increased. A good distribution of the CNT is required to avoid hot spot effects and local degradation. Mechanical performance was, in some cases, favored by the use of CNT. The benefit from the use of MWs and CNT could reach at least 40% in terms of energy needed and time without sacrificing mechanical performance. © 2013 Wiley Periodicals, Inc. J. Appl. Polym. Sci., 2013 相似文献
636.
Anargyros J. Roumeliotis Stavroula Vassaki Athanasios D. Panagopoulos 《Wireless Personal Communications》2018,98(1):337-362
This paper studies the case of an overlay cognitive radio network where the primary user leases spectral resources to the secondary user in exchange for cooperation, considering that both type of users have specific quality of service requirements. We investigate the problem of joint power and time allocation for the secondary access during the cooperative phase, with a view to optimizing the effective capacity of the primary user given an average energy constraint for the secondary user. Afterwards, the optimal power allocation of the secondary user for its own transmission phase is investigated in order to maximize the effective capacity of the secondary link. The proposed joint power and time allocation mechanism is compared with an optimal time/constant power allocation scheme and a less sophisticated baseline allocation scheme, i.e. power allocation under constant time and its superiority is proven for various network parameters. The reference model of one primary–one secondary user is extended to a general multi user cognitive radio network through the proposed pairing mechanism based on matching theory. Particularly, considering the remarks of the reference scenario, we propose two different matching schemes (with/without consideration of primary users’ quality of service requirements) and we confirm their superiority compared to other matching mechanisms. 相似文献
637.
Georgios T. Pitsiladis Athanasios D. Panagopoulos Phillip Constantinou 《Journal of Infrared, Millimeter and Terahertz Waves》2010,31(3):329-340
Microwave links are the obvious mobile backhauling solution for many mobile operators. Multi-hops are likely to be necessary
in order to ensure connectivity for mobile backhaul solutions. The subject of the present paper is the evaluation of the connectivity
of wireless multi-hop backhaul networks assuming high frequency transmissions among the relays. A novel analytical physical
propagation and engineering model is presented for the calculation of the connectivity of wireless multi-hop networks that
appropriate for operating frequencies above 10 GHz. Assuming equal power transmissions from every node and a random spatial
node distribution following the homogeneous Poisson process, we calculate the node isolation probability. Furthermore, we
calculate the minimum required node density in order to keep the backhaul network almost connected. The sensitivity of the
isolation probability and of the minimum node density on frequency of operation, transmission power and climatic conditions
is also investigated. Some useful conclusions are drawn. 相似文献
638.
Internet of Things (IoT) and its relevant technologies have been attracting the attention of researchers from academia, industry, and government in recent years. However, since the requirements of the IoT are quite different from what the Internet today can offer, several innovative techniques have been gradually developed and incorporated into IoT, which is referred to as the Future Internet of Things (FIoT). Among them, how to extract “data” and transfer them into “knowledge” from sensing layer to application layer has become a vital issue. This paper begins with an overview of IoT and FIoT, followed by discussions on how to apply data mining and computational intelligence to FIoT. An intelligent data management framework inspired by swarm optimization will then given. Finally, open issues and future trends of this field will be addressed. 相似文献
639.
With the rapid growth of elderly population, ubiquitous healthcare (u-healthcare) service combined with advanced wireless networking technology is gaining popularity. The advance in medical sensor technology has boasted up the u-healthcare market potential. However, the global connectivity with a sufficient level of reliability is still an issue to study for its prototype development. In our previous study (Lee et al. In: Proc BodyNets 2010, Lee et al. in J Commun Netw 13(2):160–166, 2011), the energy efficient packet-level scheduling was studied but the scheduling and management topics in the access stratum, which is the beginning part of end-to-end connection for ubiquitous healthcare service, are still open. In this paper, we study an efficient and adaptive method that can provide u-healthcare user devices with an increased level of access privilege so that the healthcare related user data, which is sometimes delay-critical, can be more favorable admitted to the access stratum. We develop a mathematical formulation for the access control in access stratum domain over the existing 3.9-th generation cellular communication standard, called long term evolution (LTE) and devise an efficient and exact algorithm to solve it. The proposed method has simplicity in implementation and efficiency in operation. In addition, it can improve key performance measures, such as call blocking and call dropping performance. 相似文献
640.
On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC 下载免费PDF全文
Anil Kumar Sutrala Ashok Kumar Das Neeraj Kumar Alavalapati Goutham Reddy Athanasios V. Vasilakos Joel J. P. C. Rodrigues 《International Journal of Communication Systems》2018,31(8)
In wireless sensor networks (WSNs), there are many critical applications (for example, healthcare, vehicle tracking, and battlefield), where the online streaming data generated from different sensor nodes need to be analyzed with respect to quick control decisions. However, as the data generated by these sensor nodes usually flow through open channel, so there are higher chances of various types of attacks either on the nodes or on to the data captured by these nodes. In this paper, we aim to design a new elliptic curve cryptography–based user authenticated key agreement protocol in a hierarchical WSN so that a legal user can only access the streaming data from generated from different sensor nodes. The proposed scheme is based upon 3‐factor authentication, as it applies smart card, password, and personal biometrics of a user (for ticket generation). The proposed scheme maintains low computation cost for resource‐constrained sensor nodes, as it uses efficient 1‐way cryptographic hash function and bitwise exclusive‐OR operations for secure key establishment between different sensor nodes. The security analysis using the broadly accepted Burrows‐Abadi‐Needham logic, formal security verification using the popular simulation tool (automated validation of Internet security protocols and applications), and informal security show that the proposed scheme is resilient against several well‐known attacks needed for a user authentication scheme in WSNs. The comparison of security and functionality requirements, communication and computation costs of the proposed scheme, and other related existing user authentication schemes shows the superior performance of the proposed scheme. 相似文献