首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1408篇
  免费   103篇
  国内免费   5篇
电工技术   17篇
综合类   4篇
化学工业   302篇
金属工艺   31篇
机械仪表   42篇
建筑科学   49篇
矿业工程   1篇
能源动力   38篇
轻工业   139篇
水利工程   7篇
石油天然气   5篇
无线电   239篇
一般工业技术   277篇
冶金工业   73篇
原子能技术   16篇
自动化技术   276篇
  2023年   33篇
  2022年   50篇
  2021年   122篇
  2020年   89篇
  2019年   90篇
  2018年   83篇
  2017年   63篇
  2016年   112篇
  2015年   51篇
  2014年   67篇
  2013年   119篇
  2012年   95篇
  2011年   83篇
  2010年   64篇
  2009年   63篇
  2008年   49篇
  2007年   28篇
  2006年   32篇
  2005年   36篇
  2004年   9篇
  2003年   20篇
  2002年   15篇
  2001年   9篇
  2000年   5篇
  1999年   9篇
  1998年   27篇
  1997年   10篇
  1996年   9篇
  1995年   7篇
  1994年   6篇
  1993年   10篇
  1992年   5篇
  1991年   4篇
  1990年   2篇
  1989年   2篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   5篇
  1984年   3篇
  1983年   4篇
  1982年   2篇
  1981年   3篇
  1980年   3篇
  1979年   2篇
  1978年   1篇
  1977年   4篇
  1976年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有1516条查询结果,搜索用时 31 毫秒
51.
The APSSNMP network management protocol was proposed as a secure alternative to the Simple Network Management Protocol (SNMP) used in the TCP/IP suite. The designers claimed that it resists meet-in-the-middle (MITM) attacks. In this paper, we present an advanced MITM attack on the APSSNMP and hence show that it fails to achieve its design objective of providing better security against MITM attacks. Since the APSSNMP has been presented in several journals, and IEEE and IASTED conferences, our result is important to highlight to network implementers and users of distributed systems that the APSSNMP is not secure for practical deployment.  相似文献   
52.
A gas-jet micro pump with novel cross-junction channel has been designed and fabricated using a Si micromachining process. The valveless micro pump is composed of a piezoelectric lead zirconate titanate (PZT) diaphragm actuator and fluidic network. The design of the valveless pump focuses on a cross-junction formed by the neck of the pump chamber and one outlet and two opposite inlet channels. The structure of cross-junction allows differences in fluidic resistance and fluidic momentum inside the channels during each PZT diaphragm vibration cycle, which leads to the gas flow being rectified without valves. The flow channels were easily fabricated by using silicon etching process. To investigate the effects of the structure of the cross-junction on the gas flow rate, two types of pump with different cross-junction were studied. The design and simulation were done using ANSYS-Fluent software. The simulations and experimental data revealed that the step-nozzle structure is much more advantageous than the planar structure. A flow rate of 5.2 ml/min was obtained for the pump with step structure when the pump was driven at its resonant frequency of 7.9 kHz by a sinusoidal voltage of 50 Vp–p.  相似文献   
53.
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy with relatively small computational complexity compared with other conventional detection methods.  相似文献   
54.
WLAN (Wireless Local Area Network) has been seen to be one of the promising access technologies that adapts to 4G cellular network systems in providing very high speed connection with QoS guarantee through the polling function. However, when the handover happens, the contention-based medium access mechanism which is mainly used in WLAN is invoked and introduces unbounded transmission delay due to idle time periods and retransmission because of collision during the handover. If this technique is expanded to use in a microcellular network such as connected WLAN micro-cells, contention-based mechanism, therefore, should not be used to handle the MT’s handover, especially for vehicular users who change access point every few seconds. To overcome these difficulties in handover, we introduce parallel polling scheme in dynamic LMC (Logical Macro Cell) which can reduce delays much and remove packet loss rate. LMC is a virtual single macro cell which is built on a multicast group of adjacent micro-cells. In the same LMC, polling signals are sent from every BS (base station) to give MT (mobile terminal) permission to access one of these BSs. Instead of wasting much time to contend for resources of a new BS during handover, the MT answers the polling as an acknowledgment to connect to that new BS. The polling response is controlled to multicast to all BSs of the same LMC via the core network to synchronize for the next polling cycle. LMC is controlled to dynamically change when the MT comes in a new BS to make polling signals be continuous in a new LMC. Through analytical and simulation results, we show that the parallel polling scheme can achieve no handover latency, no packet loss and maintain mobile users’ throughput stably in the high traffic load condition though it causes overhead on the neighboring cells in both of wired and wireless sections. At speeds of up to70 m/s, the MT can still maintain its stable connection. OMNeT++ simulator with INET project is used to evaluate our proposal.  相似文献   
55.
In a previous paper (part I), new strategy was used for raising antibodies against hapten (< 300 Da) and the quantification of these hapten by ELISA using derivatization by chloroethyl nitrosourea (CENU). After raising antibodies against histamine, they were characterized and used for ELISA measurements. Optimal detection conditions were determined for the histamine quantification by ELISA method. The present study investigates the derivatization step of the histamine by chloroethylnitrosourea (CENU). Five factors (2 qualitative: nature of the solvent and nature of the antibodies and 3 quantitative: pH, % of solvent and time of derivatization) have been considered. Optimal reaction conditions were established by calculation of a validated model.  相似文献   
56.
On September 11, 2001, an airliner was intentionally crashed into the Pentagon. It struck at the first elevated slab on the west wall, and slid approximately 310?ft (94.5?m) diagonally into the building. The force of the collision demolished numerous columns and the fa?ade of the exterior wall, and induced damage to first-floor columns and the first elevated slab over an area approximately 90?ft (27.4?m) wide and 310?ft (94.5?m) long. None of the building collapsed immediately. The portion that remained standing, even after an intense fire, sustained substantial damage at the first-floor level.  相似文献   
57.
On September 11, 2001, the reinforced concrete structure of the Pentagon Building was able to resist, without collapse, the impact of a large commercial airliner despite the total loss of 26 columns and severe damage to 15 columns at the ground level. The ensuing fire and related fire-fighting activities led to the collapse of a portion of the building approximately one-half hour after the impact. In this paper, the reasons for the demonstrated toughness of the reinforced concrete structure are examined and attributed to use of spiral columns, effective splicing of reinforcing bars, strong girders, and short span lengths.  相似文献   
58.
We present a new approach to the modelling of time constrained systems. It is based on untimed high-level Petri nets using the concept of causal time. With this concept, the progression of time is modelled in the system by the occurrence of a distinguished event, tick, which serves as a reference to the rest of the system. In order to validate this approach as suitable for automated verification, a case study is provided and the results obtained using a model-checker on high-level Petri nets are compared with those obtained for timed automata using prominent tools. The comparison is encouraging and shows that the causal time approach is intuitive and modular. It also potentially allows for efficient verification.  相似文献   
59.
In 2000, Biham and Keller [Cryptanalysis of reduced variants of Rijndael, 3rd AES Conference, in press] presented an impossible differential cryptanalysis of the Advanced Encryption Standard (AES) up to 5 rounds. This was later improved in 2001 by Cheon et al. [Improved impossible differential cryptanalysis of Rijndael and Crypton, in: Lecture Notes in Comput. Sci., vol.  2288, Springer-Verlag, Berlin, 2001, pp. 39-49] to apply to 6 rounds of the AES. In this paper, we extend on previous results to present an attack on the AES up to 7 rounds. This is the best-known impossible differential attack on the AES, and works by exploiting weaknesses in the AES key schedule.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号