首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1556篇
  免费   316篇
  国内免费   264篇
电工技术   97篇
综合类   139篇
化学工业   33篇
金属工艺   13篇
机械仪表   66篇
建筑科学   90篇
矿业工程   28篇
能源动力   16篇
轻工业   11篇
水利工程   10篇
石油天然气   14篇
武器工业   18篇
无线电   302篇
一般工业技术   95篇
冶金工业   64篇
原子能技术   5篇
自动化技术   1135篇
  2024年   7篇
  2023年   23篇
  2022年   61篇
  2021年   60篇
  2020年   52篇
  2019年   54篇
  2018年   51篇
  2017年   51篇
  2016年   76篇
  2015年   81篇
  2014年   140篇
  2013年   123篇
  2012年   126篇
  2011年   125篇
  2010年   121篇
  2009年   151篇
  2008年   123篇
  2007年   159篇
  2006年   87篇
  2005年   94篇
  2004年   77篇
  2003年   54篇
  2002年   59篇
  2001年   38篇
  2000年   28篇
  1999年   18篇
  1998年   16篇
  1997年   12篇
  1996年   12篇
  1995年   10篇
  1994年   11篇
  1993年   8篇
  1992年   9篇
  1991年   5篇
  1989年   2篇
  1987年   3篇
  1986年   2篇
  1985年   1篇
  1984年   1篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1959年   1篇
  1956年   1篇
排序方式: 共有2136条查询结果,搜索用时 281 毫秒
1.
Attribute Allocation and Retrieval Scheme for Large-Scale Sensor Networks   总被引:1,自引:0,他引:1  
Wireless sensor network is an emerging technology that enables remote monitoring of large geographical regions. In this paper, we address the problem of distributing attributes over such a large-scale sensor network so that the cost of data retrieval is minimized. The proposed scheme is a data-centric storage scheme where the attributes are distributed over the network depending on the correlations between them. The problem addressed here is similar to the Allocation Problem of distributed databases. In this paper, we have defined the Allocation Problem in the context of sensor networks and have proposed a scheme for finding a good distribution of attributes to the sensor network. We also propose an architecture for query processing given such a distribution of attributes. We analytically determine the conditions under which the proposed architecture is beneficial and present simulation results to demonstrate the same. To the best of our knowledge, this is the first attempt to determine an allocation of attributes over a sensor network based on the correlations between attributes.  相似文献   
2.
A p‐version, hierarchical finite element for curved, moderately thick, elastic and isotropic beams is introduced. The convergence properties of the element are analysed and some results are compared with results published elsewhere or calculated using a commercial finite element package. It is verified that, with the proposed element, shear locking does not affect the computation of the natural frequencies and that low dimensional, accurate models are obtainable. Geometrically non‐linear vibrations due to finite deformations, which occur for harmonic excitations with frequencies close to the first three natural frequencies of vibration, are investigated using Newmark's method. The influence of the thickness, longitudinal inertia and curvature radius on the dynamic behaviour of curved beams are studied. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
3.
4.
Single-assignment and functional languages have value semantics that do not permit side-effects. This lack of side-effects makes automatic detection of parallelism and optimization for data locality in programs much easier. However, the same property poses a challenge in implementing these languages efficiently. This paper describes an optimizing compiler system that solves the key problem of aggregate copy elimination. The methods developed rely exclusively on compile-time algorithms, including interprocedural analysis, that are applied to an intermediate data flow representation. By dividing the problem into update-in-place and build-in-place analysis, a small set of relatively simple techniques—edge substitution, graph pattern matching, substructure sharing and substructure targeting—was found to be very powerful. If combined properly and implemented carefully, the algorithms eliminate unnecessary copy operations to a very high degree. No run-time overhead is imposed on the compiled programs.  相似文献   
5.
用APACHE+PHP+MYSQL实现网站自动更新   总被引:1,自引:0,他引:1  
在分析建立自动更新网站必要性的基础上,较详细地说明了如何利用APACHE+PHP+MYSQL工具实现网站自动更新中的权限控制、资料上传、自动更新,并给出了网页的部分源代码.  相似文献   
6.
The aim of this study was to examine the reliability and validity of a French version of the Revised Children's Manifest Anxiety Scale (RCMAS). A sample of 2,666 school-age French-Canadian children completed the questionnaire. With regard to factor structure, the 5-factor model found in U.S. normative samples was confirmed. The internal consistency of the 5 scales and of the 2 global scales was good to excellent. Test-retest reliabilities after a 6-month period were also similar to those of the original version. Finally, the concurrent validity, assessed by a correlation with the State-Trait Anxiety Inventory for Children, was also found to be good. Results of the present study show that the French version of the RCMAS is a good instrument to assess anxiety in children. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
GPRS全称通用分组无线业务,它在改进了现有GSM系统后能实现高速的数据传输。首先对GPRS系统做了简单介绍,然后在此基础上详细介绍了GPRS的板间切换在CPX8216硬件平台上的实现方法。  相似文献   
8.
A new return method for implicit integration of linear isotropic yield criteria is presented. The basic idea is to perform all the manipulations in the principal stress space and thereby achieve very simple formulae for calculating the plastic corrector stresses, based on the constant gradient of such criteria. The return formulae are in closed form and no iteration is required. The method accounts for three types of stress return: return to a single yield plane, to a discontinuity line at the intersection of two yield planes and to a discontinuity point at the intersection between three or more yield planes. The infinitesimal and the consistent elastoplastic constitutive matrix are calculated for each type of stress return, as are the conditions to ascertain which type of return is required. The method is exemplified with the Mohr–Coulomb yield criterion. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
9.
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large. This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based encryption (IBE) scheme [9], and exploits algebraic properties of the latter. Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means that the connection between key-insulated encryption and IBE is not accidental. Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award. Supported in part by an NSF graduate fellowship.  相似文献   
10.
An efficient return algorithm for stress update in numerical plasticity computations is presented. The yield criterion must be linear in principal stress space and can be composed of any number of yield planes. Each of these yield planes may have an associated or non-associated flow rule. The stress return and the formation of the constitutive matrix is carried out in principal stress space. Here the manipulations simplify and rely on geometrical arguments. The singularities arising at the intersection of yield planes are dealt with in a straightforward way also based on geometrical considerations. The method is exemplified on non-associated Mohr–Coulomb plasticity throughout the paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号