首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   460篇
  免费   40篇
电工技术   10篇
综合类   2篇
化学工业   167篇
金属工艺   6篇
机械仪表   16篇
建筑科学   25篇
能源动力   38篇
轻工业   47篇
水利工程   1篇
石油天然气   12篇
无线电   21篇
一般工业技术   78篇
冶金工业   34篇
原子能技术   3篇
自动化技术   40篇
  2023年   9篇
  2022年   24篇
  2021年   31篇
  2020年   16篇
  2019年   21篇
  2018年   23篇
  2017年   21篇
  2016年   21篇
  2015年   19篇
  2014年   24篇
  2013年   43篇
  2012年   22篇
  2011年   22篇
  2010年   24篇
  2009年   22篇
  2008年   16篇
  2007年   12篇
  2006年   13篇
  2005年   20篇
  2004年   8篇
  2003年   7篇
  2002年   8篇
  2001年   8篇
  2000年   2篇
  1999年   1篇
  1998年   18篇
  1997年   11篇
  1996年   6篇
  1995年   2篇
  1994年   1篇
  1993年   4篇
  1992年   2篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   2篇
  1986年   3篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1978年   1篇
  1975年   1篇
  1970年   1篇
排序方式: 共有500条查询结果,搜索用时 15 毫秒
1.
Pattern Analysis and Applications - Efficient high-dimensional analyses of hyperspectral datasets and their utilization within classification algorithms is a popular topic in the field of data...  相似文献   
2.
3.
4.
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.  相似文献   
5.
A new product development (NPD) process can be thought as a comprehensive process in which the design is progressively detailed through a series of phases. At the end of each phase a design review is held to approve the design and release or not it to the next level. As one of these phases, concept selection aiming to select the most appropriate concept for further development, is conducted earlier in the process. As the further development progresses on a selected concept, it becomes more difficult to make design changes in terms of cost and schedule dimensions, and therefore, selecting the best concept among a set of available alternatives has been an important issue for companies. On the other hand, in the presence of many alternatives and selection criteria, the selection problem becomes a multiple-criteria decision making concept selection problem. To solve this problem, in this work, an integrated approach bringing two popular methods together: the modified technique for order preference by similarity to ideal solution (TOPSIS) and the analytical network process (ANP). The ANP method is used to determine the relative weights of a set of quantitative and qualitative evaluation criteria, as the modified TOPSIS method utilized to rank competing concept alternatives. In addition, a real example is presented to demonstrate the effectiveness and applicability of the proposed approach for potential practitioners and readers.  相似文献   
6.
Relaxation oscillations occur when a capacitor is inserted in series with a field emission tube, a DC high-voltage power supply, and a ballast resistor. The waveform of these oscillations is highly reproducible with a dominant frequency of 200 MHz and a decay time of 20 ns. The peak current as high as 320 mA has been observed although the tungsten emitter is only rated for 10 microA. We have shown that these oscillations are due to a displacement current, charging of the anode-tip capacitance, and are not of a field emission origin. We conclude that the effects of displacement current should be considered in measurements of field emission with microsecond pulses, where high-current densities can be observed.  相似文献   
7.
AgGaTe2 and AgAlTe2 layers were grown on a-plane sapphire substrates by closed-space sublimation. These compounds replace Cd in CdTe with group I and III elements, and are, hence, expected to be ideal novel candidate materials for solar cells. The grown layers were confirmed to be stoichiometric AgGaTe2 and AgAlTe2 by x-ray diffraction (XRD). The AgAlTe2 layers had strong preference for the (112) orientation. The XRD spectrum of the AgGaTe2 layer was different from that of the AgAlTe2 layer, and strong peaks were observed for (103) and (110) diffraction. The variation in orientations of the grown layers was analyzed in detail by use of XRD pole figures, which revealed that the AgGaTe2 layers had an epitaxial relationship with the a-plane sapphire substrates.  相似文献   
8.
The authors aimed to examine a multivariate statistical analysis approach for monitoring the hydrocarbon potentiality of source rocks in the North Western Desert to recognize the potentiality of source rocks and subsequently investigate the maturation level of the proven potential source formations for oil preservation. To achieve this aim, they applied multivariate statistics analysis (principle component analysis [PCA], cluster analysis, and correlation coefficient) and Rock-Eval pyrolysis analyses. The results showed that both PCA and cluster analyses have showed two types of source rocks. The first is classified as poor to fair source rock and immature to marginally mature source rock, the second is considered as fair to good source rock and mature to post mature source rock. PCA extracted two independent factors, which explained 81.87% of the total variance. The first type of source rock was responsible for 50% of the total variance and was best represented by variables TOC, S2, OI, and Ro, and the second one was responsible for 31.65% of the total variance and was represented by the HI variable. Pearson correlation coefficient showed a significant positive correlation between TOC and S2 or Ro. A positive correlation between S2 and HI or OI and also between OI and Ro was observed, while no significant correlation was noticed between HI and Ro.  相似文献   
9.
A bionanocomposite of grafted cellulose and organo-modified clay was synthesized through solution intercalation method. For this purpose, chloromethylstyrene was grafted onto cellulose using acryloylchloride and the subsequent free radical polymerization. The synthesized cellulose-graft-polychloromethylstyrene was used as an atom transfer radical polymerization macroinitiator of acrylonitrile in the presence of CuCl/2,2′-bipyridine catalyst system, to prepare the cellulose-graft-polychloromethylstyrene-graft-polyacrylonitrile terpolymer. For preparing the modified clay, Na-montmorillonite was mixed with hexadecyl trimethyl ammonium chloride salt. Finally, cellulose-graft-polychloromethylstyrene-graft-polyacrylonitrile/organoclay bionanocomposite was prepared in CCl4 by solution intercalation method.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号