首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1159篇
  免费   37篇
  国内免费   9篇
电工技术   42篇
化学工业   247篇
金属工艺   51篇
机械仪表   31篇
建筑科学   15篇
能源动力   54篇
轻工业   41篇
石油天然气   1篇
无线电   182篇
一般工业技术   271篇
冶金工业   108篇
原子能技术   13篇
自动化技术   149篇
  2023年   11篇
  2022年   36篇
  2021年   52篇
  2020年   27篇
  2019年   31篇
  2018年   36篇
  2017年   37篇
  2016年   26篇
  2015年   22篇
  2014年   35篇
  2013年   58篇
  2012年   49篇
  2011年   49篇
  2010年   43篇
  2009年   46篇
  2008年   52篇
  2007年   49篇
  2006年   46篇
  2005年   37篇
  2004年   21篇
  2003年   27篇
  2002年   27篇
  2001年   19篇
  2000年   13篇
  1999年   23篇
  1998年   49篇
  1997年   28篇
  1996年   24篇
  1995年   21篇
  1994年   12篇
  1993年   21篇
  1992年   9篇
  1991年   14篇
  1990年   15篇
  1989年   13篇
  1988年   13篇
  1987年   6篇
  1986年   6篇
  1985年   7篇
  1984年   10篇
  1983年   10篇
  1982年   6篇
  1981年   7篇
  1980年   7篇
  1979年   11篇
  1978年   8篇
  1977年   7篇
  1976年   6篇
  1974年   5篇
  1973年   7篇
排序方式: 共有1205条查询结果,搜索用时 15 毫秒
1.
By exploiting new human-machine interface techniques, such as visual eyetrackers, it should be possible to develop more efficient visual multimedia services associated with low bandwidth, dynamic channel adaptation and robust visual data transmission. In this paper, we introduce foveation-based error resilience and unequal error protection techniques over highly error-prone mobile networks. Each frame is spatially divided into foveated and background layers according to perceptual importance. Perceptual importance is determined either through an eye tracker or by manually selecting a region of interest. We attempt to improve reconstructed visual quality by maintaining the high visual source throughput of the foveated layer using foveation-based error resilience and error correction using a combination of turbo codes and ARQ (automatic reQuest). In order to alleviate the degradation of visual quality, a foveation based bitstream partitioning is developed. In an effort to increase the source throughput of the foveated layer, we develop unequal delay-constrained ARQ (automatic reQuest) and rate compatible punctured turbo codes where the punctual pattern of RCPC (rate compatible punctured convolutional) codes in H.223 Annex C is used. In the simulation, the visual quality is significantly increased in the area of interest using foveation-based error resilience and unequal error protection; (as much as 3 dB FPSNR (foveal peak signal to noise ratio) improvement) at 40% packet error rate. Over real-fading statistics measured in the downtown area of Austin, Texas, the visual quality is increased up to 1.5 dB in PSNR and 1.8 dB in FPSNR at a channel SNR of 5 dB.  相似文献   
2.
This paper discusses the successful application of the Acoustic Emission Technique (AET) for detection and location of leak paths present on the inaccessible side of an end shield of a Pressurised Heavy Water Reactor (PHWR). The methodology was based on the fact that air and water leak AE signals have different characteristic features. Baseline data was generated from a sound end-shield of a PHWR for characterizing the background noise. A mock up end-shield system with saw cut leak paths was used to verify the validity of the methodology. It was found that air leak signals under pressurisation (as low as 3 psi) could be detected by frequency domain analysis. Signals due to air leaks from various locations of a defective end-shield were acquired and analysed. It was possible to detect and locate leak paths. Presence of detected leak paths were further confirmed by alternate test.  相似文献   
3.
Writing project reports is an important part of the engineering curriculum at Singapore universities. One important section of the formal report is the literature review. Most universities around the world provide guidelines on writing reviews, emphasizing that plagiarism is unethical. However, these guidelines do not offer explicit training on how to avoid plagiarism. In order to write academically acceptable reviews while avoiding copying from source materials, students face a major challenge and resort to employing various strategies to cope with the task. In this study, we examined the literature review sections of final year project reports to find out how engineering undergraduates in a Singapore university cope with writing reviews and to suggest ways in which they can extend their skills to improve their literature reviews.  相似文献   
4.
The paper describes the synthesis of N-2/4-toluyl methacrylatoethyl carbamates using 2/4-toluyl isocyanate and 2-hydroxyethyl methacrylate. Homopolymerisation and copolymerisation of these novel monomers with methyl methacrylate was carried out using benzoyl peroxide as an initiator and tetrahydrofuran as solvent. Photopolymerisation of N-4-toluyl methacrylatoethyl carbamate could be carried out without the use of photosensitiser. Structural characterisation of copolymers was done using 1H-NMR. Thermal stability of copolymers was evaluated in a nitrogen atmosphere by dynamic thermogravimetry.  相似文献   
5.
6.
This paper introduces a binary neural network-based prediction algorithm incorporating both spatial and temporal characteristics into the prediction process. The algorithm is used to predict short-term traffic flow by combining information from multiple traffic sensors (spatial lag) and time series prediction (temporal lag). It extends previously developed Advanced Uncertain Reasoning Architecture (AURA) k-nearest neighbour (k-NN) techniques. Our task was to produce a fast and accurate traffic flow predictor. The AURA k-NN predictor is comparable to other machine learning techniques with respect to recall accuracy but is able to train and predict rapidly. We incorporated consistency evaluations to determine whether the AURA k-NN has an ideal algorithmic configuration or an ideal data configuration or whether the settings needed to be varied for each data set. The results agree with previous research in that settings must be bespoke for each data set. This configuration process requires rapid and scalable learning to allow the predictor to be set-up for new data. The fast processing abilities of the AURA k-NN ensure this combinatorial optimisation will be computationally feasible for real-world applications. We intend to use the predictor to proactively manage traffic by predicting traffic volumes to anticipate traffic network problems.  相似文献   
7.
Recent research suggests that social interactions in video games may lead to the development of community bonding and prosocial attitudes. Building on this line of research, a national survey of U.S. adults finds that gamers who develop ties with a community of fellow gamers possess gaming social capital, a new gaming‐related community construct that is shown to be a positive antecedent in predicting both face‐to‐face social capital and civic participation.  相似文献   
8.
In this paper, we establish a set of sufficient conditions for the controllability of damped second-order impulsive neutral integrodifferential systems with nonlocal initial conditions in Banach spaces. The approach used is the Sadovskii fixed point theorem combined with a noncompact condition on the cosine family of operators. An example is presented to illustrate the result.  相似文献   
9.
Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on the computer or provided in plain text, they are resistant to replay, guessing, and stolen verification attacks. The suggested protocol uses a one-way hash function and XOR operations, with the client having remote access to a large number of servers over a secure communication channel. Concentrates on HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hash would make it substantially more difficult to break via a rainbow table.  相似文献   
10.
Degradation of device parameters over the lifetime of a system is emerging as a significant threat to system reliability. Among the aging mechanisms, wearout resulting from Negative Bias Temperature Instability (NBTI) is of particular concern in deep submicron technology generations. While there has been significant effort at the device and circuit level to model and characterize the impact of NBTI, the analysis of NBTI’s impact at the architectural level is still at its infancy. To facilitate architectural level aging analysis, a tool capable of evaluating NBTI vulnerabilities early in the design cycle has been developed that evaluates timing degradation due to NBTI. The tool includes workload-based temperature and performance degradation analysis across a variety of technologies and operating conditions, revealing a complex interplay between factors influencing NBTI timing degradation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号