全文获取类型
收费全文 | 523篇 |
免费 | 1篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 9篇 |
综合类 | 1篇 |
化学工业 | 90篇 |
金属工艺 | 37篇 |
机械仪表 | 25篇 |
建筑科学 | 5篇 |
矿业工程 | 2篇 |
能源动力 | 69篇 |
轻工业 | 4篇 |
无线电 | 91篇 |
一般工业技术 | 90篇 |
冶金工业 | 2篇 |
原子能技术 | 1篇 |
自动化技术 | 100篇 |
出版年
2025年 | 1篇 |
2024年 | 22篇 |
2023年 | 25篇 |
2022年 | 18篇 |
2021年 | 36篇 |
2020年 | 23篇 |
2019年 | 15篇 |
2018年 | 9篇 |
2017年 | 25篇 |
2016年 | 36篇 |
2015年 | 42篇 |
2014年 | 35篇 |
2013年 | 28篇 |
2012年 | 23篇 |
2011年 | 17篇 |
2010年 | 23篇 |
2009年 | 27篇 |
2008年 | 22篇 |
2007年 | 21篇 |
2006年 | 15篇 |
2005年 | 7篇 |
2004年 | 4篇 |
2003年 | 6篇 |
2002年 | 7篇 |
2001年 | 10篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1996年 | 2篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1983年 | 2篇 |
1976年 | 1篇 |
1972年 | 2篇 |
1964年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有526条查询结果,搜索用时 15 毫秒
191.
Detection of fake news has spurred widespread interests in areas such as healthcare and Internet societies, in order to prevent propagating misleading information for commercial and political purposes. However, efforts to study a general framework for exploiting knowledge, for judging the trustworthiness of given news based on their content, have been limited. Indeed, the existing works rarely consider incorporating knowledge graphs (KGs), which could provide rich structured knowledge for better language understanding.In this work, we propose a deep triple network (DTN) that leverages knowledge graphs to facilitate fake news detection with triple-enhanced explanations. In the DTN, background knowledge graphs, such as open knowledge graphs and extracted graphs from news bases, are applied for both low-level and high-level feature extraction to classify the input news article and provide explanations for the classification.The performance of the proposed method is evaluated by demonstrating abundant convincing comparative experiments. Obtained results show that DTN outperforms conventional fake news detection methods from different aspects, including the provision of factual evidence supporting the decision of fake news detection. 相似文献
192.
《Ceramics International》2019,45(11):13942-13950
The Ni-rich LiNi0.8Co0.1Mn0.1O2 layered oxide (NCM811) is attracting considerable attention as a high-capacity cathode material for rechargeable Li-ion batteries. However, due to its inherent structural/chemical/electrochemical instability, NCM811 with high Ni content suffers from significant performance degradation upon storage even in ambient atmospheres as well as during charge–discharge cycling. Herein, we demonstrate a simple but effective surface-tuning approach to mitigate storage-induced degradation of NCM811, which is based on the conversion of undesirable Li residues to a protective Li3PO4 nanolayer via phosphate treatment. The accelerated storage stability test shows that phosphate-modified NCM811 exhibits remarkably improved electrochemical performance (capacity, cycle life, and rate capability) over the pristine one after being stored under harsh environmental conditions. A combined analytical study indicates that surface tuning through phosphate treatment enhances the storage stability of NCM811 by eliminating impurity-forming Li residues and producing a Li3PO4 nanolayer that inhibits parasitic reactions at the electrode–electrolyte interface. Furthermore, Li3PO4 provides an effective barrier to H2O and CO2 infiltration into the particle agglomerates, thereby suppressing the loss of particle integrity. 相似文献
193.
In a hyper-connected society, IoT environment, markets are rapidly changing as smartphones penetrate global market. As smartphones are applied to various digital media, development of a novel smart product is required. In this paper, a Smart Product Design-Finite Element Analysis Process (SPD-FEAP) is developed to adopt fast-changing tends and user requirements that can be visually verified. The user requirements are derived and quantitatively evaluated from Smart Quality Function Deployment (SQFD) using WebData. Then the usage scenarios are created according to the priority of the functions derived from SQFD. 3D shape analysis by Finite Element Analysis (FEA) was conducted and printed out through Rapid Prototyping (RP) technology to identify any possible errors. Thus, a User Customized Smart Keyboard has been developed using SPD-FEAP. 相似文献
194.
The efficiency of suspension seat can be influenced by several factors such as the input vibration, the dynamic characteristics of the seat and the dynamic characteristics of the human body. The objective of this paper is to study the effect of sitting postures and vibration magnitude on the vibration transmissibility of a suspension system of an agricultural tractor seat. Eleven (11) healthy male subjects participated in the study. All subjects were asked to sit on the suspension system. Four (4) different sitting postures were investigated – i) “relax”, ii) “slouch”, iii) “tense”, and iv) “with backrest support”. All subjects were exposed to random vertical vibration in the range of 1–20 Hz, at three vibration magnitudes - 0.5, 1.0 and 2.0 m/s2 r.m.s for 60 s. The results showed that there were three pronounced peaks in the seat transmissibility, with the primary resonance was found at 1.75–2.5 Hz for every sitting postures. The “backrest” condition had the highest transmissibility resonance (1.46), while the “slouch” posture had the highest Seat Effective Amplitude Transmissibility (SEAT) values (64.7%). Changes in vibration magnitude for “relax” posture from 0.5 to 2.0 m/s2 r.m.s resulted in greater reduction in the primary resonance frequency of seat transmissibility. The SEAT values decreased with increased vibration magnitude. It can be suggested that variations in posture and vibration magnitude affected the vibration transmission through the suspension system, indicating the non-linear effect on the interaction between the human body and the suspension system.Relevance to industry: Investigating the posture adopted during agricultural activities, and the effects of various magnitudes of vibration on the suspension system's performance are beneficial to the industry. The findings regarding their influence on the human body may be used to optimize the suspension system's performance. 相似文献
195.
Irina A. Profatilova 《Electrochimica acta》2009,54(19):4445-10184
The influence of fluoroethylene carbonate (FEC) on the electrochemical and thermal properties of graphite anodes is examined. The dQ/dV graph of graphite/Li cells shows that the electrochemical reduction peak of an electrolyte shifts to higher potential in the presence of FEC. The DSC results for graphite anodes cycled in FEC-containing electrolytes clearly exhibit that an exothermic peak at around 120 °C mostly disappears. It is demonstrated by X-ray photoelectron spectroscopy (XPS) and electrochemical impedance spectroscopy (EIS) that SEI formed by the electrochemical reduction of FEC consists of a relatively high proportion of LiF and gives low interfacial resistance for graphite/Li/Li cells. 相似文献
196.
Kah-Young Song 《Electrochimica acta》2007,53(2):637-643
The water crossover behavior in air-breathing direct methanol fuel cell (DMFC) was studied with varying structural variables of membrane electrode assembly (MEA), such as existence of microporous layer (MPL) in cathode diffusion layer, hydrophobicity of cathode backing layer, and membrane thickness. Water crossover from anode to cathode was lowered by the introduction of MPL to cathode backing layer, the reduction of hydrophobicity of cathode backing layer, and the reduction of membrane thickness. To account for the observed water crossover behavior, water back flow caused by the hydraulic pressure difference between the cathode and anode was considered. It was also found that the methanol crossover was lowered with the reduction of water crossover. The MEA designed for low water crossover revealed improved stability under continuous operation. 相似文献
197.
Min-Woo Park Young-Hyun Choi Jung-Ho Eom Tai-Myoung Chung 《Personal and Ubiquitous Computing》2014,18(6):1373-1386
Personalization by means of third party application is one of the greatest advantages of smartphones. For example, when a user looks for a path to destination, he can download and install a navigation application with ease from official online market such as Google Play and Appstore. Such applications require an access to the Internet, and most users prefer Wi-Fi networks which are free to use, to mobile networks which cost a fee. For this reason, when they have no access to free Wi-Fi networks, most smartphone users choose to try to use unknown Wi-Fi access points (AP). However, this can be highly dangerous, because such unknown APs are sometimes installed by an adversary with malicious intentions such as stealing information or session hijacking. Today, smartphones contains all kinds of personal information of the users including e-mail address, passwords, schedules, business document, personal photographs, etc., making them an easy target for malicious users. If an adversary takes smartphone, he will get all of information of the users. For this reason, smartphone security has become very important today. In wireless environments, malicious users can easily eavesdrop on and intervene in communication between an end-user and the internet service providers, meaning more vulnerability to man-in-the-middle attacks. In this paper, we try to reveal the risk of using unknown APs by presenting demonstration results. The testbed is composed of two smartphones, two APs, and one server. The compromised AP forwards messages of victim smartphone to the fake server by using domain name system spoofing. Thus, the application that is running on the victim smartphone transfers HTTP request to the fake server. As a result, this application displays the abnormal pop-up advertisement, which contains malicious codes and links. Our demonstration shows that merely connecting to compromise APs can make a malicious behavior even the applications are benign. 相似文献
198.
In recent years, the significance of greenhouses has been increased greatly because the world has been facing serious problems with energy as its growing demand. At the same time, home automation systems have been steadily gaining popularity; growing toward smart home based on Cloud technology. This paper introduces a cost-effective home energy saving system based on a small embedded system with remote controlling feature. For this purpose, the system is composed of a wireless router based on embedded Linux for the platform to develop a low-cost energy control server and a smart phone for remote light control app. The prototype system was implemented by porting OpenWrt onto the wireless router which is connected with an interface board with LEDs attached. The remote access and GUI function were implemented by TCP/IP programming using Apple iPhone. The operation of the remote control system was verified by socket communication between the smart phone and the wireless router, and by USB communication between the wireless router and the interface board. The implementation result shows that an OpenWrt-based wireless router can give benefits of saving energy and safety through lighting control. 相似文献
199.
200.
In 2008, Juang and Wu proposed two authenticated key exchange protocols by improving Park and Park’s two-factor authenticated key exchange protocol in public wireless LANs. They pointed out that Park’s protocol was vulnerable to the dictionary attack on the identity protection. The improved protocols requires fewer exchanged messages and provided more secure protection for the client’s identity. In this paper, we propose two protocols require less exchanged messages than Juang’s protocols. In addition to this advantage, we point out that the identity protection of Juang’s protocol is computationally inefficient for the server and efficient identity protection is proposed in the second proposed protocol. 相似文献