首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1048篇
  免费   64篇
  国内免费   1篇
电工技术   13篇
化学工业   318篇
金属工艺   11篇
机械仪表   21篇
建筑科学   56篇
能源动力   47篇
轻工业   133篇
水利工程   8篇
石油天然气   8篇
无线电   80篇
一般工业技术   158篇
冶金工业   40篇
原子能技术   2篇
自动化技术   218篇
  2023年   14篇
  2022年   36篇
  2021年   46篇
  2020年   43篇
  2019年   36篇
  2018年   32篇
  2017年   33篇
  2016年   48篇
  2015年   42篇
  2014年   57篇
  2013年   92篇
  2012年   87篇
  2011年   92篇
  2010年   65篇
  2009年   57篇
  2008年   65篇
  2007年   60篇
  2006年   34篇
  2005年   35篇
  2004年   25篇
  2003年   25篇
  2002年   14篇
  2001年   6篇
  2000年   12篇
  1999年   7篇
  1998年   11篇
  1997年   14篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1992年   2篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1985年   4篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1976年   2篇
排序方式: 共有1113条查询结果,搜索用时 0 毫秒
1.
The photocatalytic oxidation of a common antibiotic, the lincomycin was carried out in aqueous suspensions of polycrystalline TiO2 Degussa P25 irradiated by sunlight. In order to improve the performance of the lincomycin degradation a hybrid system consisting of a solar photoreactor with the photocatalyst in suspension coupled with a membrane module, used to confine both photocatalyst and pollutants in the reaction environment, was tested.A preliminary study was carried out in order to determine some kinetics parameters of the drug photodegradation. The influence of initial substrate concentration on the lincomycin photooxidation rate was investigated. The photooxidation rate follows a pseudo-first order kinetics with respect to the lincomycin concentration under the used experimental conditions. The presence of the membrane reactor allows the catalyst separation and to operate in continuous mode as the membranes rejection for lincomycin and its oxidation products was quite high.  相似文献   
2.
3.
Applications of wireless communications networks are emerging continuously. To offer a good level of security in these applications, new standards for wireless communications propose solutions based on cryptographic algorithms working on special modes of operation. This work presents a custom hardware architecture for the AES-CCM protocol (AES-CCMP) which is the basis for the security architecture of the IEEE 802.11i standard. AES-CCMP is based on the AES-CCM algorithm that performs the Advanced Encryption Standard (AES) in CTR with CBC-MAC mode (CCM mode), plus specialized data formatting modules, providing different security services through iterative and complex operations. Results of implementing the proposed architecture targeting FPGA devices are presented and discussed. A comparison against similar works shows significant improvements in terms of both throughput and efficiency.  相似文献   
4.
This article proposes a new type of discretizations for initial boundary value problems of thermodynamical systems. Based on a combination of finite elements in space and fractional step methods in time, we formulate algorithms that exactly preserve the symmetries and the laws of thermodynamics of the continuum problem. The algorithmic design is based on the GENERIC formalism of irreversible thermodynamics which naturally suggests the split of the evolution operator upon which our fractional step method is based. Although the emphasis of the article is on the generality of the results, as an illustration, a discretization of nonlinear, finite strain, thermoelasticity is presented. Numerical simulations are provided that verify the excellent performance of the new methods.  相似文献   
5.
ContextModel-Driven Development (MDD) is an alternative approach for information systems development. The basic underlying concept of this approach is the definition of abstract models that can be transformed to obtain models near implementation. One fairly widespread proposal in this sphere is that of Model Driven Architecture (MDA). Business process models are abstract models which additionally contain key information about the tasks that are being carried out to achieve the company’s goals, and two notations currently exist for modelling business processes: the Unified Modelling Language (UML), through activity diagrams, and the Business Process Modelling Notation (BPMN).ObjectiveOur research is particularly focused on security requirements, in such a way that security is modelled along with the other aspects that are included in a business process. To this end, in earlier works we have defined a metamodel called secure business process (SBP), which may assist in the process of developing software as a source of highly valuable requirements (including very abstract security requirements), which are transformed into models with a lower abstraction level, such as analysis class diagrams and use case diagrams through the approach presented in this paper.MethodWe have defined all the transformation rules necessary to obtain analysis class diagrams and use case diagrams from SBP, and refined them through the characteristic iterative process of the action-research method.ResultsWe have obtained a set of rules and a checklist that make it possible to automatically obtain a set of UML analysis classes and use cases, starting from SBP models. Our approach has additionally been applied in a real environment in the area of the payment of electrical energy consumption.ConclusionsThe application of our proposal shows that our semi-automatic process can be used to obtain a set of useful artifacts for software development processes.  相似文献   
6.
The IEEE 802.21 standard facilitates media independent handovers by providing higher layer mobility management functions with common service primitives for all technologies. Right after the base specification was published, several voices rose up in the working group advocating to broaden the scope of IEEE 802.21 beyond handovers. This paper aims at updating the reader with the main challenges and functionalities required to create a Media Independence Service Layer, through the analysis of scenarios which are being discussed within the working group: 1) Wireless Coexistence, and 2) Heterogeneous Wireless Multihop Backhaul Networks.  相似文献   
7.
Current methods of quantifying the stand-to-sit activity (StTS) are resource intensive and have not been applied to unilateral transtibial amputees (TTAs). The purpose of this study is to define five phases of arm-rest assisted and unassisted StTS using simple instrumentation and implement this method for assessing TTA movement patterns. Twelve TTAs and 12 age-matched non-amputees performed StTS with and without arm-rest support. Symmetry of weight distribution between lower limbs was calculated for five StTS phases: Descent Initiation; Descent Deceleration; Seat-Contact; Stabilisation and Sitting. TTAs demonstrated an asymmetrical weight distribution pattern and a tendency to transfer weight to the intact limb during the course of the activity. Non-amputees had relatively higher symmetry and did not exhibit substantial weight shifts during the activity. Symmetry indices were similar for assisted and unassisted sitting in both subject groups. These results highlight a need for therapeutic interventions in TTAs for reducing loading asymmetries and associated co-morbidities.  相似文献   
8.
This work presents a strategy to minimise the network usage and the energy consumption of wireless battery-powered sensors in the observer problem over networks. The sensor nodes implement a periodic send-on-delta approach, sending new measurements when a measure deviates considerably from the previous sent one. The estimator node implements a jump observer whose gains are computed offline and depend on the combination of available new measurements. We bound the estimator performance as a function of the sending policies and then state the design procedure of the observer under fixed sending thresholds as a semidefinite programming problem. We address this problem first in a deterministic way and, to reduce conservativeness, in a stochastic one after obtaining bounds on the probabilities of having new measurements and applying robust optimisation problem over the possible probabilities using sum of squares decomposition. We relate the network usage with the sending thresholds and propose an iterative procedure for the design of those thresholds, minimising the network usage while guaranteeing a prescribed estimation performance. Simulation results and experimental analysis show the validity of the proposal and the reduction of network resources that can be achieved with the stochastic approach.  相似文献   
9.
Two of the most popular finite element formulations for solving nonlinear beams are the absolute nodal coordinate and the geometrically exact approaches. Both can be applied to problems with very large deformations and strains, but they differ substantially at the continuous and the discrete levels. In addition, implementation and run-time computational costs also vary significantly. In the current work, we summarize the main features of the two formulations, highlighting their differences and similarities, and perform numerical benchmarks to assess their accuracy and robustness. The article concludes with recommendations for the choice of one formulation over the other.  相似文献   
10.
Development of novel computational approaches for modeling protein properties is a main goal in applied Proteomics. In this work, we reported the extension of the radial distribution function (RDF) scores formalism to proteins for encoding 3D structural information with modeling purposes. Protein-RDF (P-RDF) scores measure spherical distributions on protein 3D structure of 48 amino acids/residues properties selected from the AAindex data base. P-RDF scores were tested for building predictive models of the change of thermal unfolding Gibbs free energy change (DeltaDeltaG) of chymotrypsin inhibitor 2 upon mutations. In this sense, an ensemble of Bayesian-Regularized Genetic Neural Networks (BRGNNs) yielded an optimum nonlinear model for the conformational stability. The ensemble predictor described about 84% and 70% variance of the data in training and test sets, respectively.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号