首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1030篇
  免费   68篇
  国内免费   1篇
电工技术   13篇
化学工业   304篇
金属工艺   11篇
机械仪表   21篇
建筑科学   54篇
能源动力   47篇
轻工业   130篇
水利工程   8篇
石油天然气   8篇
无线电   82篇
一般工业技术   159篇
冶金工业   42篇
原子能技术   2篇
自动化技术   218篇
  2023年   9篇
  2022年   25篇
  2021年   46篇
  2020年   43篇
  2019年   36篇
  2018年   33篇
  2017年   33篇
  2016年   47篇
  2015年   42篇
  2014年   57篇
  2013年   91篇
  2012年   86篇
  2011年   92篇
  2010年   65篇
  2009年   57篇
  2008年   65篇
  2007年   60篇
  2006年   36篇
  2005年   36篇
  2004年   24篇
  2003年   25篇
  2002年   14篇
  2001年   6篇
  2000年   12篇
  1999年   7篇
  1998年   12篇
  1997年   14篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1985年   4篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1976年   2篇
排序方式: 共有1099条查询结果,搜索用时 375 毫秒
11.
Supercritical CO2 extraction is a viable alternative process for the extraction of high-quality oil from olive husk (also known as olive pomace), a residue obtained in the production of olive oil. We analyzed the effect of pressure (100–300 bar), temperature (40–60°C), solvent flow (1–1.5 L/min), and particle size (0.30–0.55 mm) on four important quality parameters of the oil extracted with CO2: tocopherol concentration, extinction coefficients at 232 and 270 nm, and saponification value. Response surface methodology was used to obtain mathematical expressions related to the operating variables and parameters studied. Results from these experiments were also used to design a three-step sequential CO2 extraction procedure to obtain a higher-quality extract. The optimal operational sequence consisted of a first extraction step at 75 bar for 1 h using 1% (vol/vol) ethanol modifier, followed by a second extraction stage at 350 bar for 2.5 h without ethanol and a third step, also at 350 bar, for 2.5 h but using ethanol. These extraction conditions obtained an intermediate fraction of oil with 64% yield and all normal parameters according to European Commission food legislation. This fraction is suitable without any further refining. On the contrary, the oils obtained by hexane extraction and by conventional supercritical CO2 extraction at optimal conditions are suitable for human consumption after further refining. This last finding may result in improved economics of the sequential CO2 extraction process compared to the conventional extraction method with hexane.  相似文献   
12.
Three new dihydro--agarofuran sesquiterpenes from two species ofMaytenus were isolated and their structures were elucidated by means of1H and13C NMR studies. The differences and similarities noted in the chemical content of the dihydro--agarofuran sesquiterpenes from the fourMaytenus species from Chile are in line with the taxonomic characterization of these species; their geographical distribution is also given.  相似文献   
13.
14.
The transmission of information has gone through various stages of evolution throughout its history. A stage before that of the electric telegraph was the so-called aerial/optical telegraph. It was developed towards the end of the 18th century and was in service until the middle of the 19th century. Chappe's system was widely used in France, and was the first to be in consistent use. However, a new and technologically superior system was developed soon afterwards which superseded it. Its inventor was Agustín de Betancourt, considered by some authors one of the founders of the Theory of Machines and Mechanisms, who, together with the distinguished clockmaker Breguet, presented it to the French Authorities in the turbulent decade of the 1790s.This article presents a historical review of this telegraph and analyzes its technical characteristics. It presents analytically, numerically and graphically some of the statements made about the telegraph, and corrects other subsequent observations. Lastly, a detailed reconstruction of the telegraph is made using different advanced CAD techniques, which provide an accurate static and dynamic view of each of its parts.  相似文献   
15.
16.
Applications of wireless communications networks are emerging continuously. To offer a good level of security in these applications, new standards for wireless communications propose solutions based on cryptographic algorithms working on special modes of operation. This work presents a custom hardware architecture for the AES-CCM protocol (AES-CCMP) which is the basis for the security architecture of the IEEE 802.11i standard. AES-CCMP is based on the AES-CCM algorithm that performs the Advanced Encryption Standard (AES) in CTR with CBC-MAC mode (CCM mode), plus specialized data formatting modules, providing different security services through iterative and complex operations. Results of implementing the proposed architecture targeting FPGA devices are presented and discussed. A comparison against similar works shows significant improvements in terms of both throughput and efficiency.  相似文献   
17.
This article proposes a new type of discretizations for initial boundary value problems of thermodynamical systems. Based on a combination of finite elements in space and fractional step methods in time, we formulate algorithms that exactly preserve the symmetries and the laws of thermodynamics of the continuum problem. The algorithmic design is based on the GENERIC formalism of irreversible thermodynamics which naturally suggests the split of the evolution operator upon which our fractional step method is based. Although the emphasis of the article is on the generality of the results, as an illustration, a discretization of nonlinear, finite strain, thermoelasticity is presented. Numerical simulations are provided that verify the excellent performance of the new methods.  相似文献   
18.
ContextModel-Driven Development (MDD) is an alternative approach for information systems development. The basic underlying concept of this approach is the definition of abstract models that can be transformed to obtain models near implementation. One fairly widespread proposal in this sphere is that of Model Driven Architecture (MDA). Business process models are abstract models which additionally contain key information about the tasks that are being carried out to achieve the company’s goals, and two notations currently exist for modelling business processes: the Unified Modelling Language (UML), through activity diagrams, and the Business Process Modelling Notation (BPMN).ObjectiveOur research is particularly focused on security requirements, in such a way that security is modelled along with the other aspects that are included in a business process. To this end, in earlier works we have defined a metamodel called secure business process (SBP), which may assist in the process of developing software as a source of highly valuable requirements (including very abstract security requirements), which are transformed into models with a lower abstraction level, such as analysis class diagrams and use case diagrams through the approach presented in this paper.MethodWe have defined all the transformation rules necessary to obtain analysis class diagrams and use case diagrams from SBP, and refined them through the characteristic iterative process of the action-research method.ResultsWe have obtained a set of rules and a checklist that make it possible to automatically obtain a set of UML analysis classes and use cases, starting from SBP models. Our approach has additionally been applied in a real environment in the area of the payment of electrical energy consumption.ConclusionsThe application of our proposal shows that our semi-automatic process can be used to obtain a set of useful artifacts for software development processes.  相似文献   
19.
This paper presents a new procedure to construct families of spatial approximation-prediction functions which depend on several parameters. The method is based on partitions of the unity. In order to find optimal functions in these families we introduce a Vietoris simplicial set associated to an influence radius. We consider error estimators induced by these Vietoris simplicial sets. A computational implementation of these mathematical models has been developed to be applied to any kind of finite discrete data. Our methods provide a useful tool for the analysis of the spatial distribution of species, which is imperative for developing accurate and efficient management of endangered and invasive species, biological conservation programs, etc. We demonstrate the application of our method to the analysis of the spatial distribution of the grape moth Lobesia botrana (Lepidoptera: Tortricidae) in the vineyards of La Rioja obtaining useful results for the management of this pest.  相似文献   
20.
The IEEE 802.21 standard facilitates media independent handovers by providing higher layer mobility management functions with common service primitives for all technologies. Right after the base specification was published, several voices rose up in the working group advocating to broaden the scope of IEEE 802.21 beyond handovers. This paper aims at updating the reader with the main challenges and functionalities required to create a Media Independence Service Layer, through the analysis of scenarios which are being discussed within the working group: 1) Wireless Coexistence, and 2) Heterogeneous Wireless Multihop Backhaul Networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号