首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3305篇
  免费   223篇
  国内免费   7篇
电工技术   29篇
综合类   8篇
化学工业   714篇
金属工艺   92篇
机械仪表   57篇
建筑科学   71篇
矿业工程   5篇
能源动力   214篇
轻工业   420篇
水利工程   32篇
石油天然气   12篇
无线电   354篇
一般工业技术   637篇
冶金工业   386篇
原子能技术   26篇
自动化技术   478篇
  2023年   39篇
  2022年   60篇
  2021年   117篇
  2020年   73篇
  2019年   81篇
  2018年   154篇
  2017年   159篇
  2016年   137篇
  2015年   92篇
  2014年   140篇
  2013年   254篇
  2012年   197篇
  2011年   237篇
  2010年   167篇
  2009年   155篇
  2008年   129篇
  2007年   117篇
  2006年   105篇
  2005年   72篇
  2004年   93篇
  2003年   66篇
  2002年   37篇
  2001年   35篇
  2000年   38篇
  1999年   56篇
  1998年   96篇
  1997年   78篇
  1996年   63篇
  1995年   57篇
  1994年   41篇
  1993年   37篇
  1992年   37篇
  1991年   29篇
  1990年   29篇
  1989年   17篇
  1988年   20篇
  1987年   21篇
  1986年   10篇
  1985年   18篇
  1984年   17篇
  1983年   19篇
  1982年   17篇
  1981年   17篇
  1980年   12篇
  1978年   12篇
  1977年   15篇
  1976年   13篇
  1974年   7篇
  1973年   9篇
  1970年   7篇
排序方式: 共有3535条查询结果,搜索用时 15 毫秒
51.
I.  S.  A.  S.  A.  Ram  A.   《Sensors and actuators. B, Chemical》2008,130(2):882-888
Nanocrystalline gamma iron oxide (γ-Fe2O3) has been synthesized at room temperature through sonication-assisted precipitation technique. The key in obtaining γ-Fe2O3 at room temperature lies in exploiting high-power ultrasound (600 W). The gas-sensing properties to n-butane of pure γ-Fe2O3 were investigated by studying the electrical properties of the sensor elements fabricated from the synthesized powder. The maximum response (90%) of the sensor to 1000 ppm n-butane at 300 °C can be explained on the basis of catalytic activity of the nanocrystallites. The response and recovery time of the sensor to 1000 ppm n-butane were less than 12 s and 120 s, respectively.  相似文献   
52.
International Journal of Control, Automation and Systems - This article presents a fuzzy adaptive control law (FACL) designed for tracking the trajectory of a low-scale unmanned aerial vehicle...  相似文献   
53.

In General, Mobile Ad-Hoc Network (MANET) has limited energy resources, and it cannot recharge itself. This research goal focuses on building a power management scheme that saves energy in the MANET. Due to power instability, there is a chance that cluster heads fail and function incorrectly in cluster-based routing. As a result, instability occurs with the cluster heads while collecting data and communicating with others effectively. This work focuses on detecting the unstable cluster heads, which are replaced by other nodes implementing the envisaged self-configurable cluster mechanism. A self-configurable cluster mechanism with a k-means protocol approach is proposed to designate cluster heads effectively. The proposed k-means procedure is based on periodic irregular cluster head rotations or altering the number of clusters. We also propose a trust management mechanism in this research to detect and avoid MANET vulnerabilities. Because of the continuously changing topology and limited resources (power, bandwidth, computing), the trust management algorithm should only use local data. Consequently, compared to traditional protocols, the proposed approach with the k-means procedure and its experimental results show lower power usage and provide an optimal system for trust management.

  相似文献   
54.
The recent research in biocompatible materials has been useful in replacing and supporting the fractured natural human bones/joints. Under some condition, negative reaction like release of ions from the bare metal toward the human body fluid leads to corrosion. In this proposed research paper, the biocompatibility of the laser surface-modified austenitic stainless steel (SS316L) and nickel-based superalloy (Inconel 718) was studied. The investigation on laser-modified surfaces is evaluated through electrochemical polarization analysis using simulated body fluid (SBF). The samples subjected to electrochemical polarization analysis were characterized by optical image analysis, SEM, EDS, and XRD analysis. It was inferred that laser surface-modified materials provided enhanced corrosion resistance and bare nickel alloy is more susceptible to corrosion by SBF.  相似文献   
55.
56.
Ball-burnishing induces compressive residual stresses on treated materials by the effect of plastic deformation. The result is an increase in the fatigue life of the treated part, retarding the initiation of cracks on the surface. Compressive residual stresses have been previously measured by X-ray diffraction near the surface, revealing considerably high values at the maximum analyzed depth, in relation to other finishing processes such as shot peening. However, the maximum analyzed depth is very limited by using this technique. In this paper, the incremental hole drilling (IHD) technique is tested to measure residual stresses, being able to reach a 2-mm measuring depth. To that objective, a commercial strain gage is used and calibrated using finite element model simulations. A second Finite Element Model based on material removal rate is developed to obtain the equations to calculate the strain release through IHD. Finally, residual stresses are measured experimentally with that technique on two different materials, confirming that ball-burnishing increases the compressive residual stresses in layers up to 0.5?mm deep for the testing conditions, which is a good response to industrial needs. The method proves to be suitable, simple and inexpensive way to measure the value of these tensions.  相似文献   
57.
In this work are studied the electronic and structural properties of armchair boron nitride/carbon nanotubes using first principles calculations. The density functional within the generalized gradient approximation (HSEh1PBE-GGA) is used. For each composition, different bonding schemes for the construction of the hybrid systems were employed. Among them, structural stability with neutral charge was determined for the following compositions: T1: B40N35C75H20, T2: B35N40C75H20, T3: B37N38C75H20, T4 : B37N37C76H20, and T7: B35N35C80H20. All these hybrid nanotubes have high polarity; the T3, T4 and T7 are semiconductors: whereas T1 and T2 are conductor in character. The formers also have magnetic behavior. These properties together with a low-chemical potential suggest applications as nano-vehicle for drug delivery. These mixed nanotubes also have potential applications in the electronic devices based on the small work function.  相似文献   
58.
Introduction: Studies on fever of unknown origin (FUO) in patients of chronic kidney disease and end stage renal disease patients on dialysis were not many. In this study, we used 18 F‐FDG PET/CT scan whole body survey for detection of hidden infection, in patients on dialysis, labelled as FUO. Methods: In this retrospective study, 20 patients of end stage renal disease on dialysis were investigated for the cause of FUO using 18F‐FDG PET/CT scan. All these patients satisfied the definition of FUO as defined by Petersdorf and Beeson. Any focal abnormal site of increased FDG concentration detected by PET/CT, either a solitary or multiple lesions was documented and at least one of the detected abnormal sites of radio tracer concentration was further examined for histopathology. Findings: All patients were on renal replacement therapy. Of these, 18 were on hemodialysis and two were on peritoneal dialysis. 18F‐FDG PET/CT scan showed metabolically active lesions in 15 patients and metabolically quiescent in five patients. After 18F‐FDG PET/CT scan all, but one patient had a change in treatment for fever. Anti‐tuberculous treatment was given in 15 patients, antibiotics in four patients and anti‐malaria treatment in one patient. Discussion: The present study is first study of 18F‐FDG PET/CT scan in patients of end stage renal disease on dialysis with FUO. The study showed that the 18 F FDG PET/CT scan may present an opportunity to attain the diagnosis in end stage renal disease patients on dialysis with FUO.  相似文献   
59.
It is widely accepted that concrete-embedded steel is in a passive state. However, there are some exceptional circumstances that induce corosion in an active state within concrete structures, thereby severely reducing their durability. This two-part paper analyses some major questions which, however elementary they may be, are still controversial in scientific, technical and economic terms. The first part provides answers to the following questions on the steel/concrete/environment system:
  1. How does steel in concrete normally behave?
  2. What are the initiating factors for depassivation?
  3. What are the effects of corrosion?
  4. What is the morphology of corrosion in the active state? and
  5. What is the corrosion rate threshold above which the durability of reinforced concrete structures is impaired? The answers to these questions are provided in light of experimental results, most of which were obtained by the authors themselves.
  相似文献   
60.
One of the major problems concerning information assurance is malicious code. To evade detection, malware has also been encrypted or obfuscated to produce variants that continue to plague properly defended and patched networks with zero day exploits. With malware and malware authors using obfuscation techniques to generate automated polymorphic and metamorphic versions, anti-virus software must always keep up with their samples and create a signature that can recognize the new variants. Creating a signature for each variant in a timely fashion is a problem that anti-virus companies face all the time. In this paper we present detection algorithms that can help the anti-virus community to ensure a variant of a known malware can still be detected without the need of creating a signature; a similarity analysis (based on specific quantitative measures) is performed to produce a matrix of similarity scores that can be utilized to determine the likelihood that a piece of code under inspection contains a particular malware. Two general malware detection methods presented in this paper are: Static Analyzer for Vicious Executables (SAVE) and Malware Examiner using Disassembled Code (MEDiC). MEDiC uses assembly calls for analysis and SAVE uses API calls (Static API call sequence and Static API call set) for analysis. We show where Assembly can be superior to API calls in that it allows a more detailed comparison of executables. API calls, on the other hand, can be superior to Assembly for its speed and its smaller signature. Our two proposed techniques are implemented in SAVE) and MEDiC. We present experimental results that indicate that both of our proposed techniques can provide a better detection performance against obfuscated malware. We also found a few false positives, such as those programs that use network functions (e.g. PuTTY) and encrypted programs (no API calls or assembly functions are found in the source code) when the thresholds are set 50% similarity measure. However, these false positives can be minimized, for example by changing the threshold value to 70% that determines whether a program falls in the malicious category or not.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号