首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   257篇
  免费   15篇
  国内免费   3篇
工业技术   275篇
  2024年   2篇
  2023年   9篇
  2022年   5篇
  2021年   14篇
  2020年   13篇
  2019年   16篇
  2018年   21篇
  2017年   18篇
  2016年   14篇
  2015年   9篇
  2014年   10篇
  2013年   32篇
  2012年   15篇
  2011年   16篇
  2010年   10篇
  2009年   10篇
  2008年   7篇
  2007年   8篇
  2006年   6篇
  2005年   2篇
  2004年   3篇
  2003年   6篇
  2002年   5篇
  2001年   5篇
  2000年   3篇
  1999年   1篇
  1998年   3篇
  1997年   4篇
  1996年   2篇
  1995年   1篇
  1994年   1篇
  1991年   2篇
  1988年   1篇
  1987年   1篇
排序方式: 共有275条查询结果,搜索用时 9 毫秒
1.
In this paper, the ethylene adsorption capacities of the nano-sized carbon hollow spheres (CNB) and active carbon (AC), the Pd (PdCl2) impregnated CNB or AC (Pd/CNB, Pd/AC) and heat treatment under various conditions, were studied at different ethylene concentrations from 64 to 1060 ppm. The results indicated that AC had a good ethylene adsorption capacity at high ethylene concentration. Pd impregnation decreased the ethylene adsorption capacity of AC. Heat treatment and H2 activation could increase the ethylene adsorption capacity, but also lowered than AC itself. CNB had lower ethylene adsorption capacity than AC, but heat treatment and H2 activation could increase its ethylene adsorption capacity markedly. With activating condition from heat treatment in N2 at 300 °C to activation in H2/N2 at 100 °C, to activation in H2 at 200 °C, and to activation in H2 at 300 °C, the ethylene adsorption capacity of Pd/CNB was increased regularly. At low ethylene concentration, viz., 64 ppm, the ethylene adsorption quantities (q a) by Pd/CNB activated in H2 at 200 or 300 °C were higher than any other adsorbents. So, activated in H2 atmosphere at higher than 100 °C, Pd/CNB is particularly advantaged for adsorbing low concentration of ethylene. Amongst all the adsorbents used, Pd/CNB activated in H2 atmosphere at 300 °C for 2 h has the highest ethylene adsorption capacity at lower concentration than 125 ppm. In addition, all the CNB, Pd/CNB, AC, and Pd/AC samples can be easily regenerated in airflow for more than 3 h.  相似文献   
2.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
3.
We present a Hoare logic for proving semantic security and determining exact security bounds of a block cipher mode of operation. We propose a simple yet expressive programming language to specify encryption modes, semantic functions for each command (statement) in the language, an assertion language that allows to state predicates and axioms, and rules to propagate the predicates through the commands of a program. We also provide heuristics for finding loop invariants that are necessary for the application of our rule on for-loops. This enables us to prove the security of protocols that take arbitrary length messages as input. We implemented a prototype that uses this logic to automatically prove the security of block cipher modes of operation. This prototype can prove the security of many standard modes of operation, such as Cipher Block Chaining (CBC), Cipher FeedBack mode (CFB), Output FeedBack (OFB), and CounTeR mode (CTR).  相似文献   
4.
5.
6.
7.
An electromechanical switch based on bent carbon nanotubes was fabricated. The shape and structure of the bent carbon nanotubes allows one to produce a low cost and low working voltage switch. The fabrication process is free of any nanolithography. The electrical characteristics of the fabricated device were investigated, both experimentally and theoretically. Actuation of the fabricated device shows hysteresis behavior in the measured IV curves depending on the structural parameters of the bent nanotubes. The relationship between the pull-in voltage and the morphology of the bent nanotubes was studied by the obtained hysteresis curves. A scanning electron microscope was used for structural analysis. This study introduced an easy way to fabricate electromechanical switches with controllable on/off states.  相似文献   
8.
Fault-tolerant motion of redundant manipulators can be obtained by joint velocity reconfiguration. For fault-tolerant manipulators, it is beneficial to determine the configurations that can tolerate the locked-joint failures with a minimum relative joint velocity jump, because the manipulator can rapidly reconfigure itself to tolerate the fault. This paper uses the properties of the condition numbers to introduce those optimal configurations for serial manipulators. The relationship between the manipulator’s locked-joint failures and the condition number of the Jacobian matrix is indicated by using a matrix perturbation methodology. Then, it is observed that the condition number provides an upper bound of the required relative joint velocity change for recovering the faults which leads to define the optimal fault-tolerant configuration from the minimization of the condition number. The optimization problem to obtain the minimum condition number is converted to three standard Eigen value optimization problems. A solution is for selected optimization problem is presented. Finally, in order to obtain the optimal fault-tolerant configuration, the proposed method is applied to a 4-DoF planar manipulator.  相似文献   
9.
Polypyrrole (PPy) and polypyrrole-carboxylic functionalized multi wall carbon nanotube composites (PPy/f-MWCNT) were synthesized by in situ chemical oxidative polymerization of pyrrole on the carbon nanotubes (CNTs). The structure of the resulting complex nanotubes was characterized by transmission electron microscopy (TEM) and X-ray diffraction (XRD). The effects of f-MWCNT concentration on the electrical properties of the resulting composites were studied at temperatures between 100 K and 300 K. The Hall mobility and Hall coefficient of PPy and PPy/f-MWCNT composite samples with different concentrations of f-MWCNT were measured using the van der Pauw technique. The mobility decreased slightly with increasing temperature, while the conductivity was dominated by the gradually increasing carrier density.  相似文献   
10.
An Iranian clinoptilolite has been modified with MnO2 for the catalytic removal of Fe2+ cations from water in a batch slurry reactor. The modified zeolite was subjected to FESEM, XRD, WDX, XRF and specific surface area analysis. A correlation for the intrinsic catalytic reaction rate incorporating both Fe2+ and dissolved oxygen concentration as a function of reaction temperature has been presented. The effect of the modified zeolite aggregate particle size on the iron removal kinetics has been investigated. It was shown that for particles larger than 150 μm, diffusion through the mesopores of the zeolite aggregate is rate controlling. The effective diffusion coefficient through the particles at RT has been calculated as 2.3 × 10?6 cm2 s?1. It is shown that liquid phase molecular diffusion within the mesopores is the dominating mass transfer mechanism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号