首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   359篇
  免费   27篇
  国内免费   14篇
工业技术   400篇
  2024年   2篇
  2023年   14篇
  2022年   23篇
  2021年   57篇
  2020年   22篇
  2019年   20篇
  2018年   35篇
  2017年   30篇
  2016年   27篇
  2015年   14篇
  2014年   15篇
  2013年   21篇
  2012年   13篇
  2011年   23篇
  2010年   12篇
  2009年   11篇
  2008年   6篇
  2007年   1篇
  2006年   3篇
  2005年   2篇
  2004年   2篇
  2003年   2篇
  2002年   1篇
  2001年   2篇
  2000年   2篇
  1999年   3篇
  1998年   2篇
  1996年   2篇
  1995年   3篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   3篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1982年   2篇
  1981年   1篇
  1980年   1篇
  1978年   1篇
  1977年   1篇
  1976年   2篇
  1973年   2篇
  1972年   1篇
  1966年   2篇
排序方式: 共有400条查询结果,搜索用时 0 毫秒
71.
In all fullerene-producing systems, reaction products were black soot extracts reported to contain a 5-25% fullerene mixture. Toluene extraction of the soot results in a solution of C60, C70, and higherc fullerenes. Without separation, absolute determination of the contents is not possible, leaving the researcher to comment only on the C60/C70 ratio of the solution. High-performance liquid chromatography, nuclear magnetic resonance, and scanning tunneling microscopy imaging techniques were reported in the literature for determining the C60/C70 ratio of the mixtures. These methods require tedious experiments and produce slightly differing results as well. In this communication, a new and relatively quick method is proposed for the simultaneous determination of the yields of C60 and C70 (not the ratio) in fullerene-containing solutions by ultraviolet-visible spectrophotometric analysis.  相似文献   
72.
73.
A standard method for the extraction of tiger nut milk has been introduced. It has been shown that, although milling duration improves the yield of tiger nut milk solids and its nutrient composition, there is a quantifiable loss of nutrient in the pressing residue during milk extraction. Milling duration improved the colloidal stability of the milk against creaming during 16 h of storage. A higher milling intensity resulted in the aggregation of biological polymers which resulted in colloidal destabilisation. Milling improved the lightness and stability and reduced browning rate of the tiger nut milk during storage. This report is important for the production of tiger nut milk of consistent and comparable characteristics. Milling has been introduced as a processing method for the qualitative and quantitative modulation of the properties of tiger nut milk. It is recommended to develop further strategies to improve the colloidal stability of tiger nut milk as a beverage.  相似文献   
74.
The recognizability of a letter is impaired by the presence of additional letters. This phenomenon is called lateral masking. Proceeding on the assumption of Bouma (1970) lateral masking can be described in terms of retinal eccentricity of the target letter and the distance between target and flanking stimuli. In this paper, we will address to the question if these kinds of parameters are adequate for describing lateral masking effects. For this purpose, characteristics of the string like its length and its homogenity are varied. The subject's task is to identify the central letter of a tachistoscopically presented string. The targets in the string are flanked both by only x and by different randomly selected letters. Additionally, we varied the length of the string. The data show that these variations influence the strength of the masking effect. It is concluded that a pure sensorical approach is not sufficient for an explanation of lateral masking effects.  相似文献   
75.
Purposes of the present study were to (a) examine psychometric properties of a brief Smoking Consequences Questionnaire-Adult (SCQ-A) among an African American sample and (b) explore differences in smoking expectancies across levels of smoking-nicotine dependence. Four hundred eighty-four smokers attending an urban health clinic completed the brief SCQ-A. Maximum likelihood factor extraction with a varimax rotation specifying 9 factors replicated 9 factors of the original SCQ-A. Evidence for the brief SCQ-A's reliability and validity was found. Heavier and/or more dependent smokers had significantly higher scores than lighter and/or less dependent smokers on positive expectancies SCQ-A subscales. Results suggest the brief SCQ-A may be a useful alternative to the full scale SCQ-A. Results also provide evidence for the SCQ-A's validity with African American smokers. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
76.
Several different polymer modifications are currently used to produce commercial plastic materials, especially engineering resins, that have significantly improved melt strength. However, these modifications rarely produce materials that can be formed into very large parts. This study shows that the melt strength of engineering resins can be enhanced by rubber particles having grafted shells that are compatible with the resin. The melt strength of the engineering resin can be further improved by the incorporation of compatible highmolecular-weight polymers. The melt strength improvements thus obtained facilitate the formation of very large parts requiring 8–10 ft long parisons. The effects of shear rate on complex viscosity indicate that the extent of interaction between the polycarbonate matrix and the core-shell impact modifier decreases with increasing shear rate. Therefore, the impact strength of the part molded from a matrix modified with a core-shell rubber may depend on the process history. Dynamic mechanical measurements may provide a means to evaluate the interaction between the matrix and a core-shell modifier in an actual blend. © 1994 John Wiley & Sons, Inc.  相似文献   
77.
Wireless Personal Communications - Present-day wireless methods are necessary to support a variety of higher-speed data communication facilities for its subscribers such as cloud-based video...  相似文献   
78.
Developing systems by integrating Open Source Software (OSS) is increasingly gaining importance in the software industry. Although the literature claims that this approach highly impacts Requirements Engineering (RE) practices, there is a lack of empirical evidence to demonstrate this statement. To explore and understand problems and challenges of current system requirement–OSS component matching and mismatches resolution practices in software development projects that integrate one or more OSS components into their software products. Semi-structured in-depth interviews with 25 respondents that have performed RE activities in software development projects that integrate OSS components in 25 different software development companies in Spain, Norway, Sweden, and Denmark. The study uncovers 15 observations regarding system requirements-OSS components matching and mismatch resolution practices used in industrial projects that integrate OSS components. The assessed projects focused mainly on pre-release stages of software applications that integrate OSS components in an opportunistic way. The results also provide details of a set of previously unexplored scenarios when solving system requirement–OSS component mismatches; and clarify some challenges and related problems. For instance, although licensing issues and the potential changes in OSS components by their corresponding communities and/or changes in system requirements have been greatly discussed in the RE literature as problems for OSS component integration, they did not appear to be relevant in our assessed projects. Instead, practitioners highlighted the problem of getting suitable OSS component documentation/information.  相似文献   
79.
The literature on the challenges of and potential solutions to architecting cloud‐based systems is rapidly growing but is scattered. It is important to systematically analyze and synthesize the existing research on architecting cloud‐based software systems in order to build a cohesive body of knowledge of the reported challenges and solutions. We have systematically identified and reviewed 133 papers that report architecture‐related challenges and solutions for cloud‐based software systems. This paper reports the methodological details, findings, and implications of a systematic review that has enabled us to identify 44 unique categories of challenges and associated solutions for architecting cloud‐based software systems. We assert that the identified challenges and solutions classified into the categories form a body of knowledge that can be leveraged for designing or evaluating software architectures for cloud‐based systems. Our key conclusions are that a large number of primary studies focus on middleware services aimed at achieving scalability, performance, response time, and efficient resource optimization. Architecting cloud‐based systems presents unique challenges as the systems to be designed range from pervasive embedded systems and enterprise applications to smart devices with Internet of Things. We also conclude that there is a huge potential of research on architecting cloud‐based systems in areas related to green computing, energy efficient systems, mobile cloud computing, and Internet of Things. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
80.
The multimedia security is becoming more and more important as the data being exchanged on the Internet is increasing exponentially. Though cryptography is one of the methods which is used to secure the data during transit, but the camouflaged appearance of the scrambled data alerts the adversary about some critical information being shared. In such a scenario, steganography has been used as an alternate solution to secure the secret information. In this paper a color image steganographic algorithm based on hybrid edge detection is proposed. The color image is partitioned into constituent Red (R), Green (G) and Blue (B) planes. Hybrid edge detection is used for finding the edge and non-edge pixels of Green and Blue planes of cover image. The Green and Blue planes are used for hiding the data while Red plane holds the pixel status (whether edge or non-edge) of these planes. The RC4 encryption algorithm is used to encrypt secret message before embedding it in the cover image to enhance security of the secret data. A fragile watermark/logo (whose size is less than 1% of total secret data) has been embedded, besides secret data in the cover image, to facilitate content authentication and early tamper detection. At the receiver, firstly logo is extracted. If it is same as one embedded at transmitter, indicating that secret data has not been altered during transit, secret data is extracted. Otherwise (if extracted logo is not same as used at input) the receiver does not waste critical time to extract compromised data but sends an automatic retransmission request. Experimental investigations reveal that the proposed scheme is capable of providing high quality of stego-images for a fairly high pay load. A comparison of the proposed technique with some state of art schemes substantiates the above arguments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号