首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2994篇
  免费   238篇
  国内免费   17篇
电工技术   46篇
综合类   9篇
化学工业   811篇
金属工艺   50篇
机械仪表   126篇
建筑科学   96篇
矿业工程   4篇
能源动力   210篇
轻工业   369篇
水利工程   40篇
石油天然气   12篇
无线电   371篇
一般工业技术   593篇
冶金工业   70篇
原子能技术   18篇
自动化技术   424篇
  2024年   12篇
  2023年   94篇
  2022年   192篇
  2021年   317篇
  2020年   204篇
  2019年   187篇
  2018年   223篇
  2017年   192篇
  2016年   206篇
  2015年   146篇
  2014年   179篇
  2013年   230篇
  2012年   191篇
  2011年   220篇
  2010年   125篇
  2009年   114篇
  2008年   57篇
  2007年   62篇
  2006年   52篇
  2005年   39篇
  2004年   32篇
  2003年   32篇
  2002年   18篇
  2001年   7篇
  2000年   11篇
  1999年   7篇
  1998年   11篇
  1997年   3篇
  1996年   7篇
  1995年   8篇
  1994年   5篇
  1993年   7篇
  1992年   8篇
  1991年   6篇
  1990年   3篇
  1989年   8篇
  1988年   2篇
  1987年   2篇
  1986年   5篇
  1985年   2篇
  1984年   5篇
  1983年   2篇
  1982年   7篇
  1981年   3篇
  1980年   2篇
  1979年   1篇
  1973年   1篇
  1972年   1篇
  1968年   1篇
排序方式: 共有3249条查询结果,搜索用时 0 毫秒
991.
In a beamhouse, liming plays a key role in the removal of hair/wool and epidermis, but problems are created when waste liming sludge is discharged to the environment. The treatment of tannery wastewater is another major challenge to the industry. In this study, thermally-activated biochars derived from liming sludge were studied for their effective adsorption of chromium (Cr) from the tannery wastewater. The thermally activated biochars (B500, B550, B600, and B650) were prepared at different temperatures from the liming sludge. Their characteristics before and after the treatment were investigated using Fourier transform infrared spectroscopy, energy dispersive X-ray spectroscopy, Brunauer–Emmett–Teller, and scanning electron microscopy analyses. The related functional groups (C–H, O–H, C–N, and =C–O) and chromium adsorption capacity were determined according to the surface morphology, element contents (C, O, Ca, Na, Al, Mg, and Si), surface area (5.8–9.2 m2/g), pore size (5.22–5.53 nm), and particle size (652–1 034 nm) of the experimental biochars. The biochar originated at 600°C from the tannery liming sludge (B600) had a greater surface area with a chromium adsorption capacity of 99.8% in comparison to B500, B550, and B650 biochars. This study developed an innovative way of utilizing liming sludge waste to minimize the pollution load and wastewater treatment cost in the tannery industry.  相似文献   
992.
Data for 42 stations in different parts of the world in the northern hemisphere have been employed to partition monthly averaged daily global radiation and sunshine duration in a bid to obtain improved fits to Angstroms correlation. It has been found that regression fits to the correlation using data for biannual groups of months from March–August (months 3–8) and September–February (months 9–2), or March–September (months 3–9) and October–February (months 10–2), give an improvement in the rms error over the year, which is 25% or higher than the errors for annual fits for half of the cases. In no case is there an increase in rms error from the partitioning.It is found that biannual regression parameters for a pyranometer station may be used to predict with good accuracy global radiation for locations hundreds of kilometers away from the station if the climate, altitude and latitude are similar.A use of the seasonal partitioning of data leads to the following relations with station independent coefficients for  相似文献   
993.
Vertical stacking is a novel alternative for constructing nonblocking multistage interconnection networks (MINs). Rearrangeably nonblocking optical MINs are attractive since they have lower complexity than their strictly nonblocking counterparts. In this paper, we study the realization of crosstalk-free permutations in rearrangeably nonblocking, self-routing banyan-type optical MINs built on vertical stacking. An available scheme for realizing crosstalk-free permutation in this type of optical MINs requires to first decompose a permutation into multiple crosstalk-free partial permutations based on the Euler-Split technique, and then to realize them crosstalk-free in different planes (stacked copies) of the MIN simultaneously. The overall time complexity of this scheme to realize a crosstalk-free permutation in an N × N optical MIN is O(N log N) which is dominated by the complexity of crosstalk-free decomposition. In this paper, we propose a new scheme for realizing permutations in this class of vertically stacked optical MINs crosstalk-free. The basic idea of the new scheme is to classify permutations into permutation classes such that all permutations in one class share the same crosstalk-free decomposition pattern. By running the Euler-Split based crosstalk-free decomposition only once for a permutation class and applying the obtained crosstalk-free decomposition pattern to all permutations in the class, crosstalk-free decomposition of permutations can be realized in a more efficient way. We show that the number of permutations in a permutation class is huge (N!)N when log2N is even and (2N!)N/2 when log2N is odd), and thus the average time complexity of crosstalk-free decomposition of a permutation becomes O(N).  相似文献   
994.
In this paper, we address the security challenges for wireless mesh enterprise networks (WMENs). The topology and communication characteristics of WMEN include the following: (a) deployment of the network devices are not planar, rather, devices are deployed over three-dimensional space (e.g., office buildings, shopping malls, grocery stores, etc.); (b) messages, generated/received by a mesh client, traverse through mesh routers in a multihop fashion; and (c) mesh clients, being mostly mobile in nature, may result in misbehaving or be spurious during communications. We propose a security scheme for WMEN in order to ensure that only authorized users are granted network access. Particularly, our scheme includes: (a) a deterministic key distribution technique that perfectly suits the network topology, (b) an efficient session key establishment protocol to achieve the client–router and router–router communications security, and (c) a distributed detection mechanism to identify malicious clients in the network. Analytical and simulation results are presented to verify our proposed solutions.  相似文献   
995.
Frequency diverse array (FDA) radar has been proposed in last decade for joint range and angle beamforming of a target. Multiple input multiple output-frequency diverse array (MIMO-FDA) radar has also been presented recently in literature to steer multiple beams by creating subarrays in transmit array. These beams help to localize the target in range as well as angle dimension. Due to same subarray size, all the beams have same beamwidth and thus exhibit same response for a given target. In this paper, we have proposed an unequal size subarrays structure for the FDA radar (US-MIMO-FDA), which allow us more focusing of the target in range and angle dimension by using beams of variable width. As a result the echoes received at the receiver help in better estimation of target parameters. The effectiveness of proposed scheme has been shown by comparing transmit and received beam patterns of proposed scheme with MIMO-FDA with equal subarrays Performance analysis of proposed scheme has also been done in terms of output signal to interference plus noise ratio, detection probability and cramer-rao lower bound. Simulation and results have verified better focusing of target by proposed design as compared to existing subarrays schemes for MIMO-FDA.  相似文献   
996.

The Internet of Things (IoT) is proved as technologically competent connecting many devices via the internet. Now in networks transmitting a large quantity of data in a secure manner is of vital concern as communication is on the increase. Hence an efficient cryptographic methodology is essential to transmit securely. However, conventional encryption algorithms are having high computational complexity, more power consumption and high memory occupation. In this paper, low latency, area and optimal power Hybrid Lightweight Cryptography Authentication Scheme which is utilizing the 8-bit manipulation principle (HLCAS) is proposed and implemented. For such a method verification is done and validated for speech signal utilizing MATLAB. The correlation and histogram attributes have been computed to validate the security level. The complexity of the hardware is validated utilizing devices of FPGA of Spartan3E XC3S500E. From the implementation result, it has been found that the proposed HLCAS method has 5.4 ns latency, 0.9 K bytes RAM and consumes 202 mW power. From the comparison with a few reported methods it has been observed that the proposed HLCAS method outperform other methods.

  相似文献   
997.
The coexistence of multiple toxic water pollutants (heavy metals, organic dyes, oils, and organic solvents) limits the sustainable supply of clean water worldwide and urges the development of advanced water purification technology that can remove these contaminants simultaneously. Since its discovery, graphene-based materials have gained substantial attention toward development of new-generation sorbents for water purification. Despite several recently published reviews on water purification technology using graphene and its derivatives, there is still a gap in the review considering multiple water-pollutant remediation using advanced graphene materials. In this review, in the first instance, a comparative structure–function–performance relationship between graphene-based sorbents and the multipollutants in water is established. A fundamental correlation is made between the sorption performance for diverse pollutants in water with the more specific adsorption properties (surface area, pore size, type of functional groups, C/O, C/N, and C/S atomic ratio) of advanced graphene sorbents. Second, the underlying interaction mechanisms are uncovered between different classes of water pollutants using single graphene-based sorbents. Third, the rational design of advanced multipollutant sorbents based on graphene is elaborated. The reality, challenges, and opportunities of advanced graphene materials as emerging sorbents for sustainable water purification technology are finally presented in the last section.  相似文献   
998.
In this paper we propose a MAC called “Neighbor Initiated Approach for avoiding Deaf and Hidden node problems in directional MAC protocol for Ad Hoc networks”, which takes advantage of the multi beam smart antennas. Through the antenna, a node can simultaneously transmit/receive a packet to/from all the directions around it. Thus the antenna switches itself in transmission and reception mode. In our scheme all transmission and reception will be directional. We discussed the hidden and deaf node problems with directional MAC and proposed the scheme to overcome those shortcomings. Our scheme has been inspired by the IEEE 802.11, which includes a new scheme to inform its neighbors who was deaf due to other communication. Moreover, the simultaneous transmission of the RTS/CTS through it’s all beams prevent the hidden node problem. In our scheme the idle nodes stay in reception mode for sensing the channel through its M non overlapping beams, as a substitute of omnidirectional antenna. It prevents the hidden node problem due to asymmetry in gain. We have simulated our scheme by OPNET 16.0, and compared our results with CDR MAC, DMAC and IEEE 802.11 protocols. Our results show that NIADH performs better than that of the existing protocols in majority of the scenarios.  相似文献   
999.
A realistic approach for modelling a fixed?fixed beam is presented. The use of probabilistic methods to assess the electromechanical behaviour of the beam under the presence of micro-machine manufacturing and process uncertainties is demonstrated. A finite-element model of the beam is constructed using the commercial code ANSYS (10.0). In the standard approach of modelling, existing literature assumes deterministic values for design parameters, however, fabrication of the device introduces some amount of variation in the design parameters. Here, the probabilistic approach is discussed to account for the variability in fabrication. Probabilistic analysis guides the design of the fixed?fixed beam to achieve a robust and reliable design in the most efficient way. The results of the probabilistic design approach on the performance characteristics such as maximum deflection and maximum stress will be discussed.  相似文献   
1000.
The practical application of lithium (Li) metal battery is impeded by the Li dendrite growth and unstable solid electrolyte interphase (SEI) layer. Herein, an ultra-stretchable and ionic conducting chemically crosslinked pressure-sensitive adhesive (cPSA) synthesized via the copolymerization of 2-ethylhexyl acrylate and acrylic acid with poly(ethyleneglycol)dimethacrylate as crosslinker (short for 70cPSA), is developed as both artificial SEI layer and solid polymer electrolyte (SPE) for stable Li-metal electrode, enabling all-solid-state Li metal batteries with excellent cycling performance. As an artificial SEI layer, the 70cPSA-modified electrodes exhibit excellent electrochemical performance in Li|70cPSA@Cu half cells and 70cPSA@Li|70cPSA@Li symmetric cells. In full cells with LiFePO4 (LFP) as cathode, the 70cPSA@Li|LFP cell exhibits stable cycling performance over 250 cycles. Utilized as SPE, the all-solid-state Li|SPE|LFP cell delivers excellent cycling stability with a capacity retention of 86% over 500 cycles. With high-voltage LiNi0.8Mn0.1Co0.1O2 (NMC811) as cathode, the Li|SPE|NMC811 cell exhibits a discharge capacity of 124.3 mAh g−1 with a capacity retention of 71% after 200 cycles. The rational design of PSAs and investigation of their dual role for stable and safe Li-metal batteries may shed a light on adhesive polymers for battery applications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号