全文获取类型
收费全文 | 382篇 |
免费 | 18篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 6篇 |
综合类 | 2篇 |
化学工业 | 117篇 |
金属工艺 | 13篇 |
机械仪表 | 7篇 |
建筑科学 | 19篇 |
矿业工程 | 1篇 |
能源动力 | 16篇 |
轻工业 | 49篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 42篇 |
一般工业技术 | 51篇 |
冶金工业 | 9篇 |
原子能技术 | 3篇 |
自动化技术 | 65篇 |
出版年
2024年 | 2篇 |
2023年 | 14篇 |
2022年 | 17篇 |
2021年 | 42篇 |
2020年 | 30篇 |
2019年 | 25篇 |
2018年 | 20篇 |
2017年 | 17篇 |
2016年 | 26篇 |
2015年 | 14篇 |
2014年 | 15篇 |
2013年 | 34篇 |
2012年 | 22篇 |
2011年 | 14篇 |
2010年 | 11篇 |
2009年 | 18篇 |
2008年 | 20篇 |
2007年 | 7篇 |
2006年 | 9篇 |
2005年 | 7篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 1篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 7篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有402条查询结果,搜索用时 15 毫秒
1.
Hoang V. Le Phuong T. Pham Ly T. Le Anh D. Nguyen Ngoc Quang Tran Phong D. Tran 《International Journal of Hydrogen Energy》2021,46(44):22852-22863
WO3 is a potential material candidate for construction of photoanode for solar driven water splitting. In this work, μm-thick porous WO3 photoanode is prepared by depositing a stable ink made of WO3 nanoparticles and Aristoflex velvet polymer in water using the doctor blade technique, followed by a sintering in air. The nature of WO3 nanoparticles, its loading mass on F-doped tin oxide electrode as well as sintering temperature are examined in order to optimize the photocatalytic activity of the resultant WO3 photoanode. The operation of WO3 photoanode is investigated by varying the light illumination direction and light incident intensity as well as changing the nature of the electrolyte. Dissolved tungsten in electrolyte is quantified by ICP-MS providing insights into the influences of electrolyte nature and operating conditions to the corrosion of WO3. It is proposed that the H2O2 and OH. radical generated as by-products of the photo-driven water oxidation on the photoanode surface are harmful species that accelerate the dissolution of WO3. 相似文献
2.
Anh Tuan Thanh Pham Oanh Kieu Truong Le Dung Van Hoang Truong Huu Nguyen Trang Huyen Cao Pham Phuong Thanh Ngoc Vo Thang Bach Phan Vinh Cao Tran 《Journal of the European Ceramic Society》2021,41(6):3493-3500
Structure modification has been found to tune significantly the transparent-conducting performance, especially mobility and conductivity of hydrogenated Ga-doped ZnO (HGZO) films. The strong correlation between film thickness and mobility of the films is revealed. The mobility increases quickly with increasing the thickness from 350 to 900 nm, and then tends to be saturated at further thicknesses. A higher mobility than 50 cm2/Vs can be achieved, which is an extra-high value for polycrystalline ZnO films deposited by using the sputtering technique. The thickness-dependent mobility originates from scatterings on grain boundaries and dislocation-induced defects controlled by thin-film growth. Based on the Volmer-Weber model, an expansion model is built up to describe the thickness-dependent crystal growth of the HGZO films, especially at the thick films. As a result, the 800 nm-thick HGZO film obtains the highest performance with high mobility of 51.5 cm2/Vs, low resistivity of 5.3 × 10?4 Ωcm, and good transmittance of 83.3 %. 相似文献
3.
4.
Kuo R. J. Chang C. K. Nguyen Thi Phuong Quyen Liao T. W. 《Knowledge and Information Systems》2021,63(7):1935-1959
Knowledge and Information Systems - With the advance of information technology, many fields have begun using data clustering to reveal data structures and obtain useful information. Most of the... 相似文献
5.
Phan Alex Truong Phuong Schade Christoph Vasan Aditya Friend James Talke Frank E. 《Microsystem Technologies》2021,27(6):2473-2479
Microsystem Technologies - “Zero drift” behavior of an optical intraocular pressure sensor is studied using an analytical model based on the deflection of a circular membrane. Results... 相似文献
6.
Linh Thao Ly Stefanie Rinderle-Ma Kevin G?ser Peter Dadam 《Information Systems Frontiers》2012,14(2):195-219
Key to broad use of process management systems (PrMS) in practice is their ability to foster and ease the implementation,
execution, monitoring, and adaptation of business processes while still being able to ensure robust and error-free process
enactment. To meet these demands a variety of mechanisms has been developed to prevent errors at the structural level (e.g., deadlocks). In many application domains, however, processes often have to comply with business level rules and
policies (i.e., semantic constraints) as well. Hence, to ensure error-free executions at the semantic level, PrMS need certain control mechanisms for validating
and ensuring the compliance with semantic constraints. In this paper, we discuss fundamental requirements for a comprehensive
support of semantic constraints in PrMS. Moreover, we provide a survey on existing approaches and discuss to what extent they
are able to meet the requirements and which challenges still have to be tackled. In order to tackle the particular challenge
of providing integrated compliance support over the process lifecycle, we introduce the SeaFlows framework. The framework
introduces a behavioural level view on processes which serves a conceptual process representation for constraint specification
approaches. Further, it provides general compliance criteria for static compliance validation but also for dealing with process
changes. Altogether, the SeaFlows framework can serve as formal basis for realizing integrated support of semantic constraints
in PrMS. 相似文献
7.
Thao P. Nghiem Kiki Maulana Kinh Nguyen David Green Agustinus Borgy Waluyo David Taniar 《Journal of Parallel and Distributed Computing》2014
The increasing use of mobile communications has raised many issues of decision support and resource allocation. A crucial problem is how to solve queries of Reverse Nearest Neighbour (RNN). An RNN query returns all objects that consider the query object as their nearest neighbour. Existing methods mostly rely on a centralised base station. However, mobile P2P systems offer many benefits, including self-organisation, fault-tolerance and load-balancing. In this study, we propose and evaluate 3 distinct P2P algorithms focusing on bichromatic RNN queries, in which mobile query peers and static objects of interest are of two different categories, based on a time-out mechanism and a boundary polygon around the mobile query peers. The Brute-Force Search Algorithm provides a naive approach to exploit shared information among peers whereas two other Boundary Search Algorithms filter a number of peers involved in query processing. The algorithms are evaluated in the MiXiM simulation framework with both real and synthetic datasets. The results show the practical feasibility of the P2P approach for solving bichromatic RNN queries for mobile networks. 相似文献
8.
Tetraalkylammonium cellulosates were prepared by means of an exchange reaction between cellulose and tetraalkylammonium methoxides in anhydrous methanol and dimethylsulfoxide up to a degree of substitution of about 0,7 without chain degradation. The course of this reaction and the structure of the cellulosates in comparison to lithium and sodium cellulosate has been studied. The reaction rate and the equilibrium substitution decreased with increasing size of the cation in the methoxide. The distribution of the alcoholate groups in equilibrium at C-2, C-3 and C-6 of the glucopyranosyl unit in the cellulosates, which was investigated by methylation, hydrolysis of the methylcelluloses, and analysis of the methylglucoses by gas chromatography, was independent of the nature of the cation. Under the given reaction conditions the hydroxyl group at C-2 was more acidic than those at C-3 and C-6, while for the latter practically no difference was found. The tetraalkylammonium cellulosates are highly reactive intermediates for the preparation of cellulose derivatives. The reactivity of the cellulosates increased with increasing size of the cation, Li⊕ < Na⊕ < N(CH3)4⊕ <[(CH3)3N? CH2? C6H5]⊕. 相似文献
9.
10.
In this paper, we introduce an internet voting protocol which satisfies desired security requirements of electronic voting. In the newly proposed protocol, we allow the adversaries to get more power than in any previous works. They can be coercers or vote buyers outside, and corrupted parties inside our system. These adversaries also have ability to collude with each other to ruin the whole system. Our main contribution is to design an internet voting protocol which is unsusceptible to most of sophisticated attacks. We employ the blind signature technique and the dynamic ballots instead of complex cryptographic techniques to preserve privacy in electronic voting. Moreover, we also aim at the practical system by improving the blind signature scheme and removing physical assumptions which have often been used in the previous works. 相似文献