全文获取类型
收费全文 | 152篇 |
免费 | 7篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 28篇 |
金属工艺 | 11篇 |
机械仪表 | 4篇 |
能源动力 | 5篇 |
轻工业 | 20篇 |
无线电 | 30篇 |
一般工业技术 | 37篇 |
冶金工业 | 16篇 |
自动化技术 | 7篇 |
出版年
2023年 | 1篇 |
2021年 | 3篇 |
2020年 | 2篇 |
2018年 | 2篇 |
2017年 | 2篇 |
2016年 | 11篇 |
2015年 | 3篇 |
2014年 | 4篇 |
2013年 | 6篇 |
2012年 | 8篇 |
2011年 | 2篇 |
2010年 | 4篇 |
2009年 | 3篇 |
2008年 | 3篇 |
2007年 | 3篇 |
2006年 | 5篇 |
2005年 | 4篇 |
2004年 | 4篇 |
2003年 | 3篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 8篇 |
1999年 | 7篇 |
1998年 | 9篇 |
1997年 | 4篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 8篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 3篇 |
排序方式: 共有159条查询结果,搜索用时 15 毫秒
1.
Su-Il Ri Song-Il Hong Jong-Chol Kim Ju-Hyok Wi 《International Journal of Hydrogen Energy》2021,46(5):3319-3328
We investigated some properties of the hydride Mg2FeH6 substituted with yttrium by a first principles calculation. Some experimental results showed that 4d transition metal, yttrium serves as a good catalyst for magnesium based hydrogen storage alloys, but there are a few theoretical studies about magnesium based hydrides substituted with it. Mg2FeH6 is regarded as a cheaper material than pure MgH2, while it is crystalized into Fm3m structure (space group 225). Although it has high hydrogen storage capacity, many investigations have not been devoted to it due to its extremely high thermodynamic stability. The yttrium substituted Mg2FeH6 exhibits very low energy of formation, and its desorption temperature, 75 °C is very suitable for practical hydrogen storage applications. Our results showed that Mg2FeH6 is destabilized effectively by yttrium substitution and introducing vacancy defects has additive effect to the improvement of dehydrogenation performance. 相似文献
2.
A.c. impedance has been determined at room temperature on hydrogen-free and hydrogen-charged passivating oxide films on aluminium in 0.05m Na2SO4 solution. Analysis of the impedance data enabled a clear distinction between the capacitance and inductance of the hydrogen-free oxide film and those of the hydrogen-charged oxide film to be made. The changes in capacitance and inductance by hydrogen-charging into the oxide films are discussed in relation to the compositional change from -Al2O3 to hydrated alumina. 相似文献
3.
Top-k frequent pattern mining finds interesting patterns from the highest support to the k-th support. The approach can be effectively applied in numerous fields such as marketing, finance, bio-data analysis, and so on since it does not need constraints by a minimum support threshold. Top-k mining methods use the support of the k-th pattern, not a user-specified minimum support. Thus, the methods conduct mining operations based on very low supports until the k-th pattern is detected. When a low support is used in the mining process, single-paths with numerous items are generated, where the top-k mining algorithm extracts valid patterns by combining the items for each single-path. Therefore, the bigger the number of combinations is, the larger the increase in time and memory consumption is. In this paper, in order to mine top-k frequent patterns more efficiently, we consider converting patterns obtained from single-paths into composite patterns during the mining process and recovering them as the original patterns when the top-k frequent patterns are extracted. For this, we define a new concept, the composite pattern, and propose novel techniques for reducing pattern combinations in the single-path. Two algorithms are introduced in this paper, where the former is CRM (Combination Reducing method), applying our reduction manner, and the latter is CRMN (Combination Reducing method for N-itemset), considering N-itemset, i.e., patterns’ lengths. A performance evaluation shows that CRM and CRMN algorithms can efficiently reduce pattern combinations in single-paths compared to state-of-the-art algorithms. The experimental results also illustrate that our approaches have outstanding performance in terms of runtime, memory, and scalability. 相似文献
4.
Zara Hamid Faisal Bashir Hussain Jae-Young Pyun 《Multimedia Tools and Applications》2016,75(14):8195-8216
Wireless Multimedia Sensor Networks (WMSNs) consist of networks of interconnected devices involved in retrieving multimedia content, such as, video, audio, acoustic, and scalar data, from the environment. The goal of these networks is optimized delivery of multimedia content based on quality of service (QoS) parameters, such as delay, jitter and distortion. In multimedia communications each packet has strict playout deadlines, thus late arriving packets and lost packets are treated equally. It is a challenging task to guarantee soft delay deadlines along with energy minimization, in resource constrained, high data rate WMSNs. Conventional layered approach does not provide optimal solution for guaranteeing soft delay deadlines due to the large amount of overhead involved at each layer. Cross layer approach is fast gaining popularity, due to its ability to exploit the interdependence between different layers, to guarantee QoS constraints like latency, distortion, reliability, throughput and error rate. The paper presents a channel utilization and delay aware routing (CUDAR) protocol for WMSNs. This protocol is based on a cross-layer approach, which provides soft end-to-end delay guarantees along with efficient utilization of resources. Extensive simulation analysis of CUDAR shows that it provides better delay guarantees than existing protocols and consequently reduces jitter and distortion in WMSN communication. 相似文献
5.
Developing future weapons systems has become increasingly complicated and costly. The armed forces of major nations use modeling and simulation techniques for new weapons systems from the conceptual stage to design, production, deployment and training stages to shorten the development cycle and guarantee their effectiveness. Failure in the development cycle carries too much loss in time and money. Therefore, computer-based modeling and simulation techniques are applied from the conceptual stage to gauge the efficacy of new weapons systems. The objective of this study is to develop a modeling and simulation methodology for small scale engagement using the DEVS formalism. The entities required for modeling and simulation are divided into three categories: combat, logical, and environmental entities. Combat entities represent the military hardware or combatants; logical entities represent the judgment and decision entities for the interaction between various entities; and environmental entities emulate the constituents of real combat environment. The combat entities are further modeled into Shell and Core Parts to maximize their reusability under various combat scenarios. The proposed framework is verified using a one-on-one combat engagement simulation (written in C++) between two submarines. 相似文献
6.
Shannon K. Douglass John A. Juvik Hyung-Jung Pyun Robert M. Coates 《Journal of chemical ecology》1993,19(1):11-27
-Bergamotenoic acid, a compound previously shown to stimulate oviposition inH. zea, was converted into a set of bicyclic analogs and tested with a set of acyclic side chain analogs to ascertain the molecular structure that maximizes insect behavioral response. While changes in the bicyclic ring elicited no variation in response, alteration in the side chain structure of-bergamotenoic acid resulted in significant changes in moth preference. Free rotation about the C-C bond proximal to the carboxylic acid group appears to be an important structural factor, since saturation of the side chain double bond significantly increased activity. The carboxylic acid group seems to be required for strong oviposition stimulation, since analogs lacking the carboxylic acid group exhibited no significant oviposition activity. Oviposition preference ofH. zea was also influenced by the length of the hydrocarbon chain to which the carboxylic acid is attached. While hexanoic acid was found inactive, the ovipositional preference for the heptanoic and octanoic acids was greatest for the one 8-carbon tested. This and other work suggest that carboxylic acids of specific chain lengths influence the oviposition behavior of bothHelicoverpa andHeliothis species and may be associated with host-plant selection. The potential use of this information in designing integrated pest management strategies for control ofH. zea is discussed. 相似文献
7.
Younghun Sung Jaehoon Lim Jai Hyun Koh Byoung Koun Min Jeffrey Pyun Kookheon Char 《Korean Journal of Chemical Engineering》2016,33(8):2287-2290
Pt-decorated CdSe tetrapods with different arm lengths were tested for the photocatalytic hydrogen generation reaction. Well-defined CdSe tetrapods with controlled wurtzite arm lengths were synthesized by the continuous precursor injection (CPI) approach. Pt nanocrystals with an extremely small size of ~1 nm were directly decorated on the overall surfaces of CdSe tetrapods. Ligand-exchanged Pt-decorated CdSe tetrapods with different arm lengths were employed as photocatalysts for photocatalytic hydrogen generation reaction in the presence of hole scavengers. Pt-decorated CdSe tetrapods with shorter arm length showed the highest photocatalytic efficiency, which is due to higher probability of charge separation. 相似文献
8.
金刚石有序排列锯片切割性能的研究 总被引:4,自引:2,他引:4
在金刚石锯片刀头表面上,金刚石颗粒的切割效率取决于金刚石颗粒之间的间距分布和单个金刚石的磨损状况。在这项研究中,试图分析金刚石颗粒之间的间距分布,在锯片的加工中,金刚石颗粒是人工有序排布的,将这种金刚石有序排列的锯片的切割特性与普通锯片的切割特性做了对比。金刚石颗粒的平均间距定为4mm,使用浓度为1.1ct/cm^3的美国40/50目的金刚石。在完成切割之后,在金刚石有序排列的锯片上,80%的金刚石颗粒可观测到其间距仍保持在2~6mm的范围内, 相似文献
9.
Chang-Min Suh Sang-Yeob Oh Young-Sik Pyun 《Journal of Mechanical Science and Technology》2010,24(5):1061-1066
This experimental studies were carried out in order to understand the effects of the PVD coating and the UNSM treatment of
HSS55 (high speed steel 55) during the production of the automotive inner pipe by the plastic deformation of S45C. The field
test and the SEM images revealed that the PVD coating is necessary in spite of the high compressive residual stresses which
were formed at the head of a punch pin. Upon the application of the AlCrN coating with the UNSM treatment the productivity
and reliability of a punch pin had improved more than about 2.6 times compared to that of the TiN coating without the UNSM
treatment. It is likely that the improvement is caused by the decreased stress concentration factor by the ‘wrapped in oxides’
inside of an abrasion pit. The abrasion pits were mostly generated within range of 5% ∼ 50% of the diameter ratio from the
end of a pin and reached the maximum value about 17% from the end of a pin. 相似文献
10.
Young June Pyun Younghee Park Douglas S. Reeves Xinyuan Wang Peng Ning 《Computer Networks》2012,56(5):1646-1665
Tracing interactive attack traffic that traverses stepping stones (i.e., intermediate hosts) is challenging, as the packet headers, lengths, and contents can all be changed by the stepping stones. The traffic timing (delays between packets) has therefore been studied as a means of tracing traffic. One such technique uses traffic timing as a side channel into which a watermark, or identifying tag, can be embedded to aid with tracing. The effectiveness of such techniques is greatly reduced when the packet count of the traffic is changed at the stepping stone. Such transformations may occur as a result of either active countermeasures (e.g. chaff packets, flow splitting) by an adversary attempting to defeat tracing, or by incidental repacketization of the traffic by network interfaces.This paper presents a new method of embedding a watermark in traffic timing, for purposes of tracing the traffic in the presence of flow splitting, chaff packets, timing perturbation, and repacketization. This method uses an invariant characteristic of two connection flows which are part of the same stepping stone chain, namely, the elapsed time of the flows. The duration of each flow is sliced into short fixed-length intervals. Packet timing is adjusted to manipulate the packet count in specific intervals (without adding or deleting any packets), for purposes of embedding the watermark. The method is self-synchronizing and does not require clock synchronization between the watermark encoder and decoder.A statistical analysis of the method, with no assumptions or limitations concerning the distribution of packet times, proves the effectiveness of the method given a sufficient number of packets, despite natural and/or deliberate repacketization and countermeasures by an adversary. The method has been implemented and tested on a large number of SSH traffic flows. The results demonstrate that 100% detection rates and very low false positive rates are achieved under conditions of multiple countermeasures, and using only a few hundred packets. 相似文献