首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   265篇
  免费   10篇
  国内免费   4篇
电工技术   5篇
综合类   1篇
化学工业   64篇
金属工艺   10篇
机械仪表   4篇
建筑科学   8篇
能源动力   12篇
轻工业   22篇
水利工程   1篇
无线电   61篇
一般工业技术   33篇
冶金工业   9篇
原子能技术   1篇
自动化技术   48篇
  2024年   1篇
  2023年   5篇
  2022年   12篇
  2021年   10篇
  2020年   10篇
  2019年   11篇
  2018年   16篇
  2017年   10篇
  2016年   10篇
  2015年   12篇
  2014年   11篇
  2013年   22篇
  2012年   15篇
  2011年   13篇
  2010年   11篇
  2009年   17篇
  2008年   13篇
  2007年   11篇
  2006年   6篇
  2005年   1篇
  2004年   6篇
  2003年   5篇
  2002年   7篇
  2001年   5篇
  2000年   1篇
  1999年   4篇
  1998年   3篇
  1997年   2篇
  1996年   4篇
  1995年   6篇
  1994年   3篇
  1993年   5篇
  1992年   1篇
  1991年   1篇
  1989年   1篇
  1987年   1篇
  1986年   1篇
  1983年   1篇
  1981年   1篇
  1979年   2篇
  1975年   1篇
  1974年   1篇
排序方式: 共有279条查询结果,搜索用时 15 毫秒
1.
4-Amino-3-thio-1,24-triazolidine (L1) and 4-amino-5-thio-1,3,4-thiadiazole (LII) as well as their metal complexes of the general formulae MLI·2H2O and MLIICl (M; Pb(II), Cd(II) and Zn(II)) were prepared. With Sn(II), we obtained Sn(LI)2·2H2O and SnLIICl, respectively. The structures of the compounds were identified through elemental analysis, and IR and UV spectra measurements, in addition to thermal analysis in case of the metal complexes. The antifouling properties of the compounds were tested by their incorporation into paint formulations which were applied to PVC substrates and tested in water from Alexandria western harbour. When the compounds were added at 17·5% by volume, the coated panels were fouled after 3 months of immersion. The addition of 6·7% by volume of tributyltin oxide to 15·8% of the prepared compounds in one formulation elevated the paint efficiency and prevented fouling for 11 months. Paint containing solely tributyltin oxide at the same concentration was inactive against algae.  相似文献   
2.
A different newly designed cationic exchange polymer membrane and anionic exchange polymer membrane were introduced, and also the transport properties of these polymeric membranes were investigated in this study. The transport properties of these polymer membranes in contact with ferrocene redox derivatives were estimated by using electrochemical techniques such as cyclicvoltammetry, chronopotentiometry, and chronoamperometry techniques, respectively. The used ferrocene redox substances, which have different functional groups, were (Ferrocenylmethyl) trimethylamonium iodide, FcMA, Ferrocenedimethanol, FcDM, and Ferrocene carboxylic acid, FcCA. It indicated that the performance of a membrane depended on the content of polymer gel, anionic exchange polymer site (20 wt % and 50 wt %) or cationic polymer exchange site (20 wt % and 50 wt %), and the efficiency of the functional groups of cationic and anionic exchange polymer site as well. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci, 2008  相似文献   
3.
The charged mosaic polymer membrane (CMM) without reinforcement and the composite charged mosaic polymer membrane (CCMM) with reinforcement were investigated in terms of salt and water transport (permeability). The composite charged mosaic polymer membrane (CCMM) with reinforcement showed a unique transport behavior such as preferential material transport Lp and ω. Water permeability coefficient, Lp and salt permeability coefficient, ω were estimated by taking account of active layer thickness of composite polymer gel. The Lp and ω values of CCMM with reinforcement were larger than those of CMM without reinforcement. On the other hand, the reflection coefficient of CCMM, σ, showed negative value, which suggested preferential material transport to solvent transport. © 2008 Wiley Periodicals, Inc. J Appl Polym Sci, 2008  相似文献   
4.
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.  相似文献   
5.
Numerical simulation has been performed to improve the performance of Cu2ZnSnS4 (CZTS) solar cells by replacing CdS with Zn1–xSnxO buffer layer. The influences of thickness, donor concentration and defect density of buffer layers on the performance of CZTS solar cells were investigated. It has been found that Zn1–xSnxO buffer layer for Sn content of 0.20 is better for CZTS solar cell. A higher efficiency can be achieved with thinner buffer layer. The optimized solar cell demonstrated a maximum power conversion efficiency of 13%.  相似文献   
6.
Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion detection is performed based on two tiers. In the first tier, a Deep Convolution Neural Network (DCNN) analyzes the data packets by extracting packet flow features to classify the packets as normal, malicious, and suspicious. In the second tier, the suspicious packets are classified as normal or malicious using the Generative Adversarial Network (GAN). Finally, intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization (IMO) is used for attack path discovery by considering several metrics, and the Graph cut utilized algorithm for attack scenario reconstruction (ASR). UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator (NS-3.26). Compared with previous performance metrics such as energy consumption, storage overhead accuracy, response time, attack detection rate, precision, recall, and F-measure. The simulation result shows that the proposed MZWB method achieves high performance than existing works  相似文献   
7.
This paper presents a navigation aid for the blind based on a microcontroller with synthetic speech output. The system consists of two vibrators, two ultrasonic sensors mounted on the user??s shoulders and another one integrated into the cane. It is able to give information to the blind about urban walking routes and to provide real-time information on the distance of over-hanging obstacles within 6 m along the travel path ahead of the user. The suggested system can then sense the surrounding environment via sonar sensors and sending vibro-tactile feedback to the user of the position of the closest obstacles in range. For the ultrasonic cane, it is used to detect any obstacle on the ground. Experimental results show the effectiveness of the proposed system for blind navigation.  相似文献   
8.
In this paper, we propose to use Harman, Croft and Okapi measures with Lesk algorithm to develop a system for Arabic word sense disambiguation, that combines unsupervised and knowledge based methods. This system must solve the lexical semantic ambiguity in Arabic language. The information retrieval measures are used to estimate the most relevant sense of the ambiguous word, by returning a semantic coherence score corresponding to the context that is semantically closest to the original sentence containing the ambiguous word. The Lesk algorithm is used to assign and select the adequate sense from those proposed by the information retrieval measures mentioned above. This selection is based on a comparison between the glosses of the word to be disambiguated, and its different contexts of use extracted from a corpus. Our experimental study proves that using of Lesk algorithm with Harman, Croft, and Okapi measures allows us to obtain an accuracy rate of 73%.  相似文献   
9.
A new interconnection network is proposed for the construction of a massively parallel computer system. The systematic construction of this interconnection network, denoted RCC-FULL, is performed by methodically connecting together a number of basic atoms where a basic atom is a set of fully interconnected nodes. Key communication characteristics are derived and evaluated for RCC-FULL and efficient routing algorithms, which need only local information to route messages between any two nodes, are also derived. AnO(log (N)) sorting algorithm is shown for RCC-FULL and RCC-FULL is shown to emulate deterministically the CRCW PRAM model, with onlyO(log (N)) degradation in time performance. Finally, the hardware cost for the RCC-FULL is estimated as a function of its pin requirements and compared to that of the binary hypercube and most instances of RCC-FULL have substantially lower cost. Hence, RCC-FULL appears to be a particularly effective network for PRAM emulation, and might be considered as a universal network for future supercomputing systems.  相似文献   
10.
The aromatic compounds and biological activities of essential oils from six Tunisian aromatic plants including Artemisia herba-alba, Rosmarinus officinalis, Thymus capitatus, Mentha piperita, Ocimum basilicum and Artemisia absinthium were investigated. Hydro-distillation was used to extract essential oil from these plants. The identification of compounds from essential oils was performed using GC–MS analysis. Camphor (28.47%) was the major compound of A. absinthium essential oil. High contents of verbenone (20.99%) and camphor (19.72%) were found in R. officinalis. In the case of T. capitatus, carvacrol (81.09%), gamma terpinene (6.61%) and caryophyllene (4.87%) were identified as the major compounds. While eugenol (24.69%), linalool (18.00%) were characteristic compounds of O. basilicum essential oil, camphor (39.10%) and farnesol (14.25%) together with bornyl acetate (12.31%) were the main constituents of A. absinthium. These oils were also subjected to a screening for their antioxidant activity and essential oil from A. absinthium showed a greater antioxidant activity (IC50?=?0.0063 mg/mL) compared to the standard Vitamin E (IC50?=?0.019 mg/mL). The antibacterial activities of the oils against seven pathogenic strains, Pseudomonas aeruginosa, Bacillus cereus, Salmonella, Klebsiella pneumoniae, Escherichia coli, Staphylococcus aureus, Enterococcus faecalis and Micrococcus luteus, were tested. The highest and broadest activity was shown by M. piperita; however, Ocimum basilicum was inactive against all strains. Essential oils were also evaluated for antidiabetic and anti-acetylcholinesterase activities. The IC50 values of A. herba-alba and O. basilicum against α-amylase were respectively 17.76 and 16.32 µg/mL suggesting a powerful anti-diabetic effect comparable to that of acarbose (IC50?=?14.88 µg/mL). R. officinalis, M. piperita and A. absinthium exhibited an interesting acetylcholinesterase inhibition with IC50 equal to 22, 24 and 58 µg/mL respectively.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号