全文获取类型
收费全文 | 261篇 |
免费 | 7篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 63篇 |
金属工艺 | 9篇 |
机械仪表 | 17篇 |
建筑科学 | 12篇 |
矿业工程 | 1篇 |
能源动力 | 11篇 |
轻工业 | 26篇 |
石油天然气 | 2篇 |
无线电 | 19篇 |
一般工业技术 | 74篇 |
冶金工业 | 16篇 |
原子能技术 | 1篇 |
自动化技术 | 19篇 |
出版年
2024年 | 1篇 |
2023年 | 9篇 |
2022年 | 7篇 |
2021年 | 11篇 |
2020年 | 8篇 |
2019年 | 15篇 |
2018年 | 12篇 |
2017年 | 16篇 |
2016年 | 14篇 |
2015年 | 6篇 |
2014年 | 10篇 |
2013年 | 31篇 |
2012年 | 23篇 |
2011年 | 17篇 |
2010年 | 21篇 |
2009年 | 15篇 |
2008年 | 8篇 |
2007年 | 4篇 |
2006年 | 8篇 |
2005年 | 5篇 |
2004年 | 5篇 |
2003年 | 2篇 |
2002年 | 3篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1991年 | 2篇 |
1985年 | 1篇 |
1982年 | 1篇 |
排序方式: 共有273条查询结果,搜索用时 31 毫秒
1.
Wireless Personal Communications - This paper considers half-duplex cooperative spectrum sharing scheme where both primary and secondary systems mutually cooperate with each other to exploit... 相似文献
2.
Senthilkumar M. Vasundhara M. G. Kalavathi G. K. 《International Journal of Mechanics and Materials in Design》2019,15(3):611-627
International Journal of Mechanics and Materials in Design - The resonant frequency of electromechanical energy harvester should be tuned to ambient frequency so as to maximize the harvester power.... 相似文献
3.
In optical microscopic measurement of internal blood-vessel diameters, the effect of refraction must be taken into account to ensure accuracy of the result. This effect is discussed and an analytical correction formula derived. Phantom blood vessels with known internal and external diameters were used to test the validity of the correction formula. The errors obtained prior to correction were reduced significantly after correction. 相似文献
4.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI. 相似文献
5.
Cognitive Radio Network (CRN) is an intelligent wireless communication system that adapts itself to variations in the incoming radio frequency stimuli by modifying the operating parameters. Using the spectrum sensing techniques, the idle channels are detected, and allocated to the Secondary Users (SUs). The existing cooperative spectrum sensing techniques such as centralized sensing technique, Distributed sensing technique, and External sensing technique exploit efficient prediction models for allocating the frequency spectrum to SUs. For an optimal assignment of the channel using channel parameters, the channel estimation techniques such as pilot-assisted channel estimation, blind and semi blind estimation technique, and decision directed channel estimation technique are analyzed. The flexible nature of the CRN introduces various security attacks such as Primary User Emulation Attack, Objective Function Attack, Jamming Attack, Spectrum Sensing Data Falsification (SSDF), Control Channel Saturation DoS Attack (CCSD), Selfish Channel Negotiation (SCN), Sinkhole Attacks, HELLO Flood Attacks and Lion Attack. From the surveyed results, it is observed that the existing spectrum sensing, and prediction-based techniques consume more energy, and minimal data transmission rate for detecting the idle channel. Further, the end-to-end delay, energy consumption, end-to-end delay, and bandwidth are not minimized by the existing techniques. 相似文献
6.
The ability to visualize cell motility occurring deep in the context of opaque tissues will allow many currently intractable issues in developmental biology and organogenesis to be addressed. In this study, we compare two-photon excitation with laser scanning confocal and conventional digital deconvolution fluorescence microscopy, using the same optical configuration, for their ability to resolve cell shape deep in Xenopus gastrula and neurula tissues. The two-photon microscope offers better depth penetration and less autofluorescence compared to confocal and conventional deconvolution imaging. Both two-photon excitation and confocal microscopy also provide improved rejection of "out-of-focus" noise and better lateral and axial resolution than conventional digital deconvolution microscopy. Deep Xenopus cells are best resolved by applying the digital deconvolution method on the two-photon images. We have also found that the two-photon has better depth penetration without any degradation in the image quality of interior sections compared to the other two techniques. Also, we have demonstrated that the quality of the image changes at different depths for various excitation powers. 相似文献
7.
A protective film has been formed on the surface of carbon steel in aqueous environment using a synergistic mixture of an environment-friendly inhibitor, aspartic acid, and Zn2+. The synergistic effect of aspartic acid (AS) in controlling corrosion of carbon steel has been investigated by gravimetric studies in the presence of Zn2+. The formulation consisting of AS and Zn2+ has an excellent inhibition efficiency. The results of potentiodynamic polarization revealed that the formulations are of mixed-type inhibitor. Impedance studies of the metal/solution interface indicated that the surface film is highly protective against the corrosion of carbon steel in the aqueous environment. X-ray photoelectron spectroscopic analysis of the protective film showed the presence of the elements iron, nitrogen, oxygen, carbon, and zinc. The spectra of these elements in the surface film showed the presence of oxides/hydroxides of iron(III), Zn(OH)2, and [Fe(III)/Fe(II)–Zn(II)-AS] complex. Further, surface characterization techniques such as Fourier transform infrared spectroscopy, scanning electron microscopy, and atomic force microscopy are used to ascertain the nature of the protective film formed on the carbon steel surface. 相似文献
8.
9.
10.
K. Senthilkumar T. Kalaivani S. Kanagesan V. Balasubramanian 《Journal of Materials Science: Materials in Electronics》2012,23(11):2048-2052
ZnSe QDs have been synthesized by wet chemical, template free process by zinc acetate and elemental selenium powder in presence of ethylene glycol, hydrazine hydrate and a defined amount of water at 90 °C. The product was in strong quantum confinement regime, having yield as high as 50 %. The transmission electron microscopy image indicated that the particles were well dispersed and spherical in shape. The X-ray diffraction analysis showed that the ZnSe nanoparticles were of the Cubic structure, with average particle diameter of about 3.50 nm. The FTIR characteristic indicates that the N2H4 molecule has intercalated into the complex and formed a molecular precursor. 相似文献