首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   261篇
  免费   7篇
  国内免费   5篇
电工技术   3篇
化学工业   63篇
金属工艺   9篇
机械仪表   17篇
建筑科学   12篇
矿业工程   1篇
能源动力   11篇
轻工业   26篇
石油天然气   2篇
无线电   19篇
一般工业技术   74篇
冶金工业   16篇
原子能技术   1篇
自动化技术   19篇
  2024年   1篇
  2023年   9篇
  2022年   7篇
  2021年   11篇
  2020年   8篇
  2019年   15篇
  2018年   12篇
  2017年   16篇
  2016年   14篇
  2015年   6篇
  2014年   10篇
  2013年   31篇
  2012年   23篇
  2011年   17篇
  2010年   21篇
  2009年   15篇
  2008年   8篇
  2007年   4篇
  2006年   8篇
  2005年   5篇
  2004年   5篇
  2003年   2篇
  2002年   3篇
  2001年   3篇
  2000年   2篇
  1999年   4篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1991年   2篇
  1985年   1篇
  1982年   1篇
排序方式: 共有273条查询结果,搜索用时 31 毫秒
1.
Wireless Personal Communications - This paper considers half-duplex cooperative spectrum sharing scheme where both primary and secondary systems mutually cooperate with each other to exploit...  相似文献   
2.
International Journal of Mechanics and Materials in Design - The resonant frequency of electromechanical energy harvester should be tuned to ambient frequency so as to maximize the harvester power....  相似文献   
3.
In optical microscopic measurement of internal blood-vessel diameters, the effect of refraction must be taken into account to ensure accuracy of the result. This effect is discussed and an analytical correction formula derived. Phantom blood vessels with known internal and external diameters were used to test the validity of the correction formula. The errors obtained prior to correction were reduced significantly after correction.  相似文献   
4.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI.  相似文献   
5.
Cognitive Radio Network (CRN) is an intelligent wireless communication system that adapts itself to variations in the incoming radio frequency stimuli by modifying the operating parameters. Using the spectrum sensing techniques, the idle channels are detected, and allocated to the Secondary Users (SUs). The existing cooperative spectrum sensing techniques such as centralized sensing technique, Distributed sensing technique, and External sensing technique exploit efficient prediction models for allocating the frequency spectrum to SUs. For an optimal assignment of the channel using channel parameters, the channel estimation techniques such as pilot-assisted channel estimation, blind and semi blind estimation technique, and decision directed channel estimation technique are analyzed. The flexible nature of the CRN introduces various security attacks such as Primary User Emulation Attack, Objective Function Attack, Jamming Attack, Spectrum Sensing Data Falsification (SSDF), Control Channel Saturation DoS Attack (CCSD), Selfish Channel Negotiation (SCN), Sinkhole Attacks, HELLO Flood Attacks and Lion Attack. From the surveyed results, it is observed that the existing spectrum sensing, and prediction-based techniques consume more energy, and minimal data transmission rate for detecting the idle channel. Further, the end-to-end delay, energy consumption, end-to-end delay, and bandwidth are not minimized by the existing techniques.  相似文献   
6.
The ability to visualize cell motility occurring deep in the context of opaque tissues will allow many currently intractable issues in developmental biology and organogenesis to be addressed. In this study, we compare two-photon excitation with laser scanning confocal and conventional digital deconvolution fluorescence microscopy, using the same optical configuration, for their ability to resolve cell shape deep in Xenopus gastrula and neurula tissues. The two-photon microscope offers better depth penetration and less autofluorescence compared to confocal and conventional deconvolution imaging. Both two-photon excitation and confocal microscopy also provide improved rejection of "out-of-focus" noise and better lateral and axial resolution than conventional digital deconvolution microscopy. Deep Xenopus cells are best resolved by applying the digital deconvolution method on the two-photon images. We have also found that the two-photon has better depth penetration without any degradation in the image quality of interior sections compared to the other two techniques. Also, we have demonstrated that the quality of the image changes at different depths for various excitation powers.  相似文献   
7.
A protective film has been formed on the surface of carbon steel in aqueous environment using a synergistic mixture of an environment-friendly inhibitor, aspartic acid, and Zn2+. The synergistic effect of aspartic acid (AS) in controlling corrosion of carbon steel has been investigated by gravimetric studies in the presence of Zn2+. The formulation consisting of AS and Zn2+ has an excellent inhibition efficiency. The results of potentiodynamic polarization revealed that the formulations are of mixed-type inhibitor. Impedance studies of the metal/solution interface indicated that the surface film is highly protective against the corrosion of carbon steel in the aqueous environment. X-ray photoelectron spectroscopic analysis of the protective film showed the presence of the elements iron, nitrogen, oxygen, carbon, and zinc. The spectra of these elements in the surface film showed the presence of oxides/hydroxides of iron(III), Zn(OH)2, and [Fe(III)/Fe(II)–Zn(II)-AS] complex. Further, surface characterization techniques such as Fourier transform infrared spectroscopy, scanning electron microscopy, and atomic force microscopy are used to ascertain the nature of the protective film formed on the carbon steel surface.  相似文献   
8.
9.
10.
ZnSe QDs have been synthesized by wet chemical, template free process by zinc acetate and elemental selenium powder in presence of ethylene glycol, hydrazine hydrate and a defined amount of water at 90 °C. The product was in strong quantum confinement regime, having yield as high as 50 %. The transmission electron microscopy image indicated that the particles were well dispersed and spherical in shape. The X-ray diffraction analysis showed that the ZnSe nanoparticles were of the Cubic structure, with average particle diameter of about 3.50 nm. The FTIR characteristic indicates that the N2H4 molecule has intercalated into the complex and formed a molecular precursor.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号