全文获取类型
收费全文 | 342篇 |
免费 | 17篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 8篇 |
化学工业 | 66篇 |
金属工艺 | 11篇 |
机械仪表 | 6篇 |
建筑科学 | 10篇 |
能源动力 | 19篇 |
轻工业 | 13篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 62篇 |
一般工业技术 | 81篇 |
冶金工业 | 9篇 |
原子能技术 | 2篇 |
自动化技术 | 73篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 26篇 |
2021年 | 14篇 |
2020年 | 15篇 |
2019年 | 15篇 |
2018年 | 23篇 |
2017年 | 24篇 |
2016年 | 23篇 |
2015年 | 16篇 |
2014年 | 24篇 |
2013年 | 22篇 |
2012年 | 18篇 |
2011年 | 22篇 |
2010年 | 16篇 |
2009年 | 16篇 |
2008年 | 11篇 |
2007年 | 17篇 |
2006年 | 6篇 |
2005年 | 10篇 |
2004年 | 3篇 |
2003年 | 2篇 |
2002年 | 7篇 |
2001年 | 4篇 |
2000年 | 5篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1991年 | 5篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有363条查询结果,搜索用时 0 毫秒
1.
Syed Waqar Haider Wouter C. Brink Neeraj Buch 《International Journal of Pavement Engineering》2017,18(7):645-657
The performance prediction models in the Pavement-ME design software are nationally calibrated using in-service pavement material properties, pavement structure, climate and truck loadings, and performance data obtained from the Long-Term Pavement Performance programme. The nationally calibrated models may not perform well if the inputs and performance data used to calibrate those do not represent the local design and construction practices. Therefore, before implementing the new M-E design procedure, each state highway agency (SHA) should evaluate how well the nationally calibrated performance models predict the measured field performance. The local calibrations of the Pavement-ME performance models are recommended to improve the performance prediction capabilities to reflect the unique conditions and design practices. During the local calibration process, the traditional calibration techniques (split sampling) may not necessarily provide adequate results when limited number of pavement sections are available. Consequently, there is a need to employ statistical and resampling methodologies that are more efficient and robust for model calibrations given the data related challenges encountered by SHAs. The main objectives of the paper are to demonstrate the local calibration of rigid pavement performance models and compare the calibration results based on different resampling techniques. The bootstrap is a non-parametric and robust resampling technique for estimating standard errors and confidence intervals of a statistic. The main advantage of bootstrapping is that model parameters estimation is possible without making distribution assumptions. This paper presents the use of bootstrapping and jackknifing to locally calibrate the transverse cracking and IRI performance models for newly constructed and rehabilitated rigid pavements. The results of the calibration show that the standard error of estimate and bias are lower compared to the traditional sampling methods. In addition, the validation statistics are similar to that of the locally calibrated model, especially for the IRI model, which indicates robustness of the local model coefficients. 相似文献
2.
Interface Engineering and Controlling the Friction and Wear of Ultrathin Carbon Films: High sp3 Versus High sp2 Carbons 下载免费PDF全文
Neeraj Dwivedi Reuben J. Yeo Zheng Zhang Chetna Dhand Sudhiranjan Tripathy Charanjit S. Bhatia 《Advanced functional materials》2016,26(10):1526-1542
Understanding and engineering interfaces, and controlling the friction and wear of materials, are extremely important for many technological applications, particularly for magnetic storage technologies and micro‐ and nanoelectromechanical systems (MEMS and NEMS), where one sliding/moving surface comes into contact with another. Ultrathin carbon films are generally employed in most of these technologies. However, their wear and friction mechanisms are not well understood, especially the role of the film–substrate (FS) interface has not been deeply explored and discussed to date. This limits further developments in this field. Through experimental and theoretical experiments, we are able to report on the engineering of a FS interface consisting of high sp3‐ and high sp2‐bonded ultrathin carbon films on Al2O3–TiC substrates by introducing a silicon nitride (SiNx) interlayer and tuning the carbon ion energy. All carbon‐based overcoats show a low coefficient of friction (COF) in the range of 0.08–0.16; however, the high sp3‐bonded C/SiNx bilayer overcoat reveals the lowest and most stable friction. The friction mechanism is explained using an integrated framework of surface passivation, rehybridization, material transfer, tribolayer formation, and interfaces. We discover that FS interface engineering substantially reduces the wear of ultrathin carbon films while maintaining/reducing the friction. In general, this approach can be applied to control the friction and wear of ultrathin films of diverse materials. 相似文献
3.
Jasna M. Pushkaran Neeraj K. Manoj M. Aanandan C. K. Jayaraj M. K. 《Journal of Electronic Materials》2020,49(3):1689-1701
Journal of Electronic Materials - Electromagnetic safeguards are key factors for electronic devices. Lightweight and highly flexible polymer composite films with high electrical conductivity are... 相似文献
4.
In this paper, an energy balanced model (EBM) for lifetime maximization for a randomly distributed sensor network is proposed. The lifetime of a sensor network depends on the rate of energy depletion caused by multiple factors, such as load imbalance, sensor deployment distribution, scheduling, transmission power control, and routing. Therefore, in this work, we have developed a mathematical model for analysis of load imbalance under uniform and accumulated data flow. Based on this analysis, we developed a model to rationalize energy distribution among the sensors for enhancing the lifetime of the network. To realize the proposed EBM, three algorithms—annulus formation, connectivity ensured routing and coverage preserved scheduling have been proposed. The proposed model has been simulated in ns-2 and results are compared with Energy-Balanced Transmission Policy and Energy Balancing and unequal Clustering Algorithm. Lifetime has been measured in terms of the time duration for which the network provides satisfactory level of coverage and data delivery ratio. EBM outperform both the existing models. In our model the variance of residual energy distribution among the sensors is lower than other two models. This validated the essence of energy rationalization hypothesized by our model. 相似文献
5.
Sangwoo Han Neeraj Lal Chang-Ho Lee Matinpour B. Laskar J. 《Solid-State Circuits, IEEE Journal of》2001,36(9):1360-1364
We present a C-band monolithic microwave integrated circuit (MMIC) transmitter module development for multichannel RF/optical subcarrier multiplexed (OSCM) communication applications. The C-band MMIC transmitter module consists of one fully monolithic four-channel OSCM transmitter IC and four coupled-line filters. This MMIC is designed and implemented in a commercial GaAs MESFET process and coupled line bandpass filters are fabricated on the module board. We present the design and performance of the first fully monolithic IC transmitter module for OSCM packet switched applications 相似文献
6.
Wireless Networks - Since 1999 IEEE 802.11 has become a dominating wireless technology for providing WLAN in both public and private places. The protocol has evolved with time and the current... 相似文献
7.
Predistribution of cryptographic keys is a widely used approach for establishing secure communication between severely resource-constrained nodes with limited or no access to network infrastructure. Many proposed key predistribution schemes make the implicit assumption that message contents need not be kept private from nodes other than the intended recipient. Messages in such schemes are not guaranteed to be confidential—they may be read by nodes within the network other than the intended recipient. In this paper, we present TASK—a symmetric key predistribution scheme that enables secure and confidential communication within wireless networks. TASK distributes keys by generating and reinforcing a series of template key assignment instances. It is parameterized, which allows it to make use of key storage capacities that other recently proposed schemes cannot. We show, through analysis and simulation, that TASK can achieve a level of security superior to that of two recently proposed schemes that also provide confidentiality. We also demonstrate that the techniques used in TASK (namely parameterization, templatization, and selective reinforcement) can be applied to other key assignment schemes for star or bipartite networks. 相似文献
8.
Most of the existing VANET routing protocols rely on information collected from beacons for making routing decisions such as next neighbor selection. Beacons are very small size hello messages that each vehicle broadcasts periodically. Owing to very small payload size of beacons as compared to the payload size of a data message, they can easily pass through even very weak links, through which a data message could never pass. Therefore, the use of beacon information for making routing decisions in a highly dynamic scenario such as VANETs may cause selection of routes through which data message can never be sent. Several researchers have given solutions that do not use beacon information for making routing decisions. But most of these solutions incorporate a large number of broadcasts to forward the data packets, causing wastage of bandwidth. In this paper, we present a beacon information independent geographic routing algorithm called BIIR, which reduces the number of broadcasts to forward the data packets by making intelligent use of information collected by the vehicle during previous route discovery attempts for a destination. Our simulation results have shown that the proposed algorithm outperforms the existing beacon less routing protocols in terms of the average number of broadcasts per data packet forwarding, packet delivery ratio and end to end delay experienced by the data messages. 相似文献
9.
Xiaoying Jia Neeraj Kumar Kim‐Kwang Raymond Choo Debiao He 《International Journal of Communication Systems》2018,31(1)
The capability to efficiently revoke compromised/misbehaving users is important in identity‐based encryption (IBE) applications, as it is not a matter of if but of when that one or more users are compromised. Existing solutions generally require a trusted third party to update the private keys of nonrevoked users periodically, which impact on scalability and result in high computation and communication overheads at the key generation center. Li et al proposed a revocable IBE scheme, which outsources most of the computation and communication overheads to a Key Update Cloud Service Provider (KU‐CSP). However, their scheme is lack of scalability since the KU‐CSP must maintain a secret value for each user. Tseng et al proposed another revocable IBE scheme with a cloud revocation authority, seeking to provide scalability and improve both performance and security level. In this paper, we present a new revocable IBE scheme with a cloud revocation server (CRS). The CRS holds only one secret time update key for all users, which provides the capability to scale our scheme. We demonstrate that our scheme is secure against adaptive‐ID and chosen ciphertext attacks under the k‐CAA assumption and outperforms both schemes mentioned above, in terms of having lower computation and communication overheads. 相似文献
10.