首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   296篇
  免费   9篇
电工技术   11篇
综合类   1篇
化学工业   93篇
机械仪表   7篇
建筑科学   5篇
能源动力   18篇
轻工业   8篇
无线电   43篇
一般工业技术   46篇
冶金工业   23篇
原子能技术   1篇
自动化技术   49篇
  2023年   3篇
  2022年   11篇
  2021年   9篇
  2020年   14篇
  2019年   16篇
  2018年   10篇
  2017年   3篇
  2016年   8篇
  2015年   2篇
  2014年   7篇
  2013年   15篇
  2012年   15篇
  2011年   15篇
  2010年   11篇
  2009年   9篇
  2008年   5篇
  2007年   9篇
  2006年   5篇
  2005年   4篇
  2004年   6篇
  2002年   8篇
  2001年   4篇
  2000年   5篇
  1999年   3篇
  1998年   5篇
  1997年   7篇
  1996年   11篇
  1995年   3篇
  1994年   6篇
  1993年   8篇
  1992年   6篇
  1991年   5篇
  1989年   4篇
  1988年   6篇
  1986年   2篇
  1984年   2篇
  1982年   4篇
  1981年   3篇
  1980年   2篇
  1978年   5篇
  1977年   2篇
  1976年   3篇
  1973年   2篇
  1969年   3篇
  1968年   2篇
  1967年   2篇
  1960年   1篇
  1958年   1篇
  1957年   1篇
  1956年   4篇
排序方式: 共有305条查询结果,搜索用时 15 毫秒
1.
In this article we introduce the notion of I-Cauchy sequence and I-convergent sequence in probabilistic n-normed space. The concept of I*-Cauchy sequence and I*-convergence in probabilistic n-normed space are also introduced and some of their properties related to these notions have been established.  相似文献   
2.

Digital image watermarking technique based on LSB Substitution and Hill Cipher is presented and examined in this paper. For better imperceptibility watermark is inserted in the spatial domain. Further the watermark is implanted in the Cover Image block having the highest entropy value. To improve the security of the watermark hill cipher encryption is used. Both subjective and objective image quality assessment technique has been used to evaluate the imperceptibility of the proposed scheme.Further, the perceptual perfection of the watermarked pictures accomplished in the proposed framework has been contrasted and some state-of-art watermarking strategies. Test results demonstrates that the displayed method is robust against different image processing attacks like Salt and Peppers, Gaussian filter attack, Median filter attacks, etc.

  相似文献   
3.
Ring shear tests were conducted on five samples of different nature with a modified Imperial College type ring shear machine. The three different testing methods used, (1) individual sample testing for each normal stress, (2) increasing load multistage ring shear test, and (3) reducing load multistage ring shear test, all showed similar effective residual internal friction angle for the samples, irrespective of testing method. However, effective residual shear intercept was different according to the testing methodology. The internal friction angle did not vary, particularly after the first minimum point in the stress displacement curve, although the residual shear intercept decreased with increase in the displacement. The thickness of the shearing zone increased along with the displacement. The remolded peak shear strength for saturated conditions at field dry density varied with the consolidation history. Measurement of remolded peak shear strength was possible in a single sample using the increasing load multistage ring shear test at normal consolidation. The equilibrium water content of the sample after the ring shear test was nearly equal to the plastic limit.  相似文献   
4.
Due to the exponential growth of the Internet users and wireless devices, interests on home networks have been enormously increased in recent days. In digital home networks, home services including remote access and control to home appliances as well as services offered by service providers are alluring. However, the remote control services cause digital home networks to have various security threats. Hence, for digital home networks, robust security services, especially remote user authentication, should be considered. This paper presents a robust and efficient authentication scheme based on strong-password approach to provide secure remote access in digital home network environments. The proposed scheme uses lightweight computation modules including hashed one-time password and hash-chaining technique along with low-cost smart card technology. It aims to satisfy several security requirements including stolen smart card attack and forward secrecy with lost smart card as well as functional requirements including no verification table and no time synchronization. Comparing with the existing representative schemes, it can be validated that the proposed scheme is more robust authentication mechanism having better security properties. We have conducted formal verification of the proposed scheme.  相似文献   
5.
Euglena gracilis is a photosynthetic flagellate. To acquire a suitable position in its surrounding aquatic environment, it exploits light and gravity primarily as environmental cues. Several physiological studies have indicated a fine-tuned relationship between gravity sensing (gravitaxis) and light sensing in E. gracilis. However, the underlying molecular mechanism is largely unknown. The photoreceptor photoactivated adenylyl cyclase (PAC) has been studied for over a decade. Nevertheless, no direct/indirect interaction partner (upstream/downstream) has been reported for PAC. It has been shown that a specific protein, kinase A (PKA), showed to be involved in phototaxis and gravitaxis. The current study reports the localization of the specific PKA and its relationship with PAC.  相似文献   
6.
Iron exists in Fe2+ and Fe3+ states in CaO–P2O5–Fe2O3 glasses and they impart characteristic optical absorption bands that allow analysis of relative proportion of the two species. This communication reports the redox states of glasses melted under air, argon, and oxygen atmospheres and relates them to the dissolution rates. The dissolution rate was found to be related to the redox state and it is lowered if the glass is melted under oxidizing atmospheres.  相似文献   
7.
In this paper, instrumented impact test results obtained using V-notch and precracked Charpy specimens of AISI 308 weld and AISI 316 stainless steels are analysed for determining the plastic -factor for three-point bend specimens used in J-integral evaluation. Tested 316 stainless steel specimens were in various thermal aging/cold-work conditions whereas 308 weld specimens were in the as-welded condition. The results are analysed using the various procedures proposed in the literature and compared with experimental and finite element results reported in the literature. Based on our analysis, two polynomial expressions of a/W for pl are presented: one gives a sort of upper-bound in the a/W range 0.05–1.0 while the other gives conservative values (i.e., use of this results in J-R curves and J sufficiently conservative for engineering purposes). Both provide a smooth variation of pl over the entire a/W range unlike some of the expressions given in the literature which show a discontinuous change at an intermediate a/W.  相似文献   
8.
9.
Interesterification of fats   总被引:8,自引:0,他引:8  
Interesterification changes the distribution of the fatty acids among the glycerides of fats or mixtures of fats from what was present originally. This affects the physical nature and behavior of fats. A discussion of this process from the standpoints of mechanism, catalysts, methods of monitoring the reaction and applications will be presented.  相似文献   
10.
A Smart Grid is the modernization of the electricity grid using communication technology with the prime goals of reducing energy consumption as well as cost increasing reliability and creating new services for all participants. It comprises key components such as the Advanced Metering Infrastructure (AMI), which includes Neighborhood area network (NAN). When multi-hopping is considered in wireless communication, especially in WiFi and ZigBee, the range of the communication can be extended to communicate with the gateway collector in AMI network. Wireless mesh AMI network may have smart meters, a NAN gateway, and fixed as well as mobile repeaters. Though many techniques have been developed to secure on-demand routing protocols in wireless multi-hop ad-hoc networks, these protocols have shortcomings. In this paper, we propose two robust and secure multipath routing protocols for wireless mesh AMI networks. We have analyzed their robustness to various attacks. The simulation results show that the proposed protocols are better than existing secure routing protocols.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号