首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3093篇
  免费   133篇
  国内免费   4篇
电工技术   23篇
综合类   2篇
化学工业   557篇
金属工艺   116篇
机械仪表   51篇
建筑科学   98篇
矿业工程   4篇
能源动力   125篇
轻工业   272篇
水利工程   26篇
石油天然气   6篇
无线电   258篇
一般工业技术   654篇
冶金工业   523篇
原子能技术   25篇
自动化技术   490篇
  2024年   8篇
  2023年   48篇
  2022年   87篇
  2021年   101篇
  2020年   77篇
  2019年   96篇
  2018年   112篇
  2017年   105篇
  2016年   113篇
  2015年   79篇
  2014年   99篇
  2013年   221篇
  2012年   156篇
  2011年   208篇
  2010年   157篇
  2009年   161篇
  2008年   177篇
  2007年   165篇
  2006年   127篇
  2005年   104篇
  2004年   91篇
  2003年   63篇
  2002年   74篇
  2001年   50篇
  2000年   44篇
  1999年   40篇
  1998年   39篇
  1997年   48篇
  1996年   32篇
  1995年   28篇
  1994年   40篇
  1993年   28篇
  1992年   24篇
  1991年   19篇
  1990年   14篇
  1989年   15篇
  1988年   26篇
  1987年   16篇
  1986年   13篇
  1985年   15篇
  1984年   28篇
  1983年   14篇
  1982年   15篇
  1981年   7篇
  1980年   6篇
  1979年   6篇
  1976年   4篇
  1975年   5篇
  1973年   7篇
  1971年   5篇
排序方式: 共有3230条查询结果,搜索用时 15 毫秒
1.
2.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
3.
The hot blow forming of magnesium sheet offers significant opportunity for forming complex, lightweight parts for automotive applications. This paper characterizes the elevated-temperature formability of AZ31 magnesium sheet materials and the effect of processing conditions on the performance of these materials. In addition, magnesium sheet application development at General Motors Corporation is reviewed.  相似文献   
4.
Carbon nanotubes (CNTs) have been synthesized using the arc discharge method with a rotating graphite disc as the cathode. Arcing was carried out in open air and without the use of catalysts. The current density was maintained constant through out the experiment, while, the rate of rotation of the cathode and atmosphere under which arcing was carried out were changed during experimentation. Characterization of the samples produced indicates that rotation of the cathode has a significant impact on the quality and yield of the process. It is proposed that rotation of the cathode drags plasma formed between two electrodes away from high temperature region. This results in a sudden quenching of the reactive plasma. The time available for nucleation and growth phenomena is significantly reduced and thus leads to the formation of highly graphitic multi walled CNTs (yield 60%) and traces of double walled CNTs.  相似文献   
5.
Lean philosophy: implementation in a forging company   总被引:2,自引:2,他引:0  
This research addresses the implementation of lean philosophy in a forging company with a focus on radial forging production flow lines. Here, the prime motive is to evolve and test several strategies to eliminate waste on the shop floor. In this research, a systematic approach is suggested for the implementation of lean principles. This paper describes an application of value stream mapping (VSM). Consequently, the present and future states of value stream maps are constructed to improve the production process by identifying waste and its sources. Furthermore, Taguchi’s method of design of experiments is pursued here to minimize the forging defects produced due to imperfect operating conditions. A noticeable reduction in set-up time and work-in-process (WIP) inventory level is substantiated. Finally, we conclude with a discussion of managerial implications and the future scope of research.  相似文献   
6.
Evaluated the effects of performance feedback on levels of treatment integrity in school-based behavioral consultation. Three teachers employed in a residential treatment community were responsible for treatment implementation. Treatment integrity was defined as the percentage of 2-min intervals during which contingent teacher reinforcement for student on-task behavior was directly observed. Teacher and child behavior were monitored across baseline, traditional consultation, and consultation with performance feedback conditions in a multiple baseline design. Following a Problem Identification Interview and Problem Analysis Interview (J. R. Bergan, 1977), mean levels of treatment integrity for the 3 teachers ranged from 9% to 37%. The addition of a performance feedback package increased treatment integrity for all 3 teachers to levels ranging from 60% to 83%. The findings contribute to a growing literature supporting the need for direct assessment of treatment integrity in school-based consultation research and practice. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
8.
9.
We study the application of the geographic nearest neighbor approach to two problems. The first problem is the construction of an approximately minimum length rectilinear Steiner tree for a set ofn points in the plane. For this problem, we introduce a variation of a subgraph of sizeO(n) used by YaO [31] for constructing minimum spanning trees. Using this subgraph, we improve the running times of the heuristics discussed by Bern [6] fromO(n 2 log n) toO(n log2 n). The second problem is the construction of a rectilinear minimum spanning tree for a set ofn noncrossing line segments in the plane. We present an optimalO(n logn) algorithm for this problem. The rectilinear minimum spanning tree for a set of points can thus be computed optimally without using the Voronoi diagram. This algorithm can also be extended to obtain a rectilinear minimum spanning tree for a set of nonintersecting simple polygons.The results in this paper are a part of Y. C. Yee's Ph.D. thesis done at SUNY at Albany. He was supported in part by NSF Grants IRI-8703430 and CCR-8805782. S. S. Ravi was supported in part by NSF Grants DCI-86-03318 and CCR-89-05296.  相似文献   
10.
This article illustrates how the hermeneutic analysis of text illuminates how shared understandings affect our interpretations of lean communication in distributed work environments. It is proposed that in contrast to the pessimistic conclusions of media richness theory that lean communication channels cannot support complex or equivocal work tasks, miscommunications are not the result of technology, but rather occur due to a lack of shared understandings among the individuals communicating. An illustrative case study based on fieldwork in franchise organizations is presented to demonstrate the possibilities for how the hermeneutic analysis of coherence, invention, intention, and reference can be used to discover how workers create and recreate shared understandings through text.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号