首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1383篇
  免费   57篇
  国内免费   8篇
电工技术   18篇
化学工业   269篇
金属工艺   28篇
机械仪表   54篇
建筑科学   20篇
能源动力   88篇
轻工业   80篇
水利工程   6篇
石油天然气   3篇
无线电   193篇
一般工业技术   274篇
冶金工业   153篇
原子能技术   11篇
自动化技术   251篇
  2024年   6篇
  2023年   27篇
  2022年   56篇
  2021年   72篇
  2020年   51篇
  2019年   50篇
  2018年   63篇
  2017年   67篇
  2016年   58篇
  2015年   25篇
  2014年   57篇
  2013年   99篇
  2012年   58篇
  2011年   75篇
  2010年   58篇
  2009年   53篇
  2008年   49篇
  2007年   51篇
  2006年   37篇
  2005年   34篇
  2004年   23篇
  2003年   36篇
  2002年   30篇
  2001年   15篇
  2000年   15篇
  1999年   22篇
  1998年   40篇
  1997年   26篇
  1996年   21篇
  1995年   22篇
  1994年   13篇
  1993年   21篇
  1992年   4篇
  1991年   5篇
  1990年   7篇
  1989年   7篇
  1988年   6篇
  1987年   7篇
  1986年   5篇
  1984年   6篇
  1983年   4篇
  1981年   6篇
  1980年   6篇
  1979年   4篇
  1978年   4篇
  1977年   7篇
  1976年   11篇
  1975年   4篇
  1973年   6篇
  1969年   5篇
排序方式: 共有1448条查询结果,搜索用时 15 毫秒
21.
Network virtualization serves as a promising technique for providing a flexible and highly adaptable shared substrate network to satisfy the diversity of demands and overcoming the ossification of Internet infrastructure. As a key issue of constructing a virtual network (VN), various state-of-the-art algorithms have been proposed in many research works for addressing the VN mapping problem. However, these traditional works are efficient for mapping VN which with deterministic amount of network resources required, they even deal with the dynamic resource demand by using over-provisioning. These approaches are obviously not advisable, since the network resources are becoming more and more scarce. In this paper, we investigate the online stochastic VN mapping (StoVNM) problem, in which the VNs are generated as a Poisson process and each bandwidth demand x i follows a normal distribution, i.e., x i ~ N(μ i , σ i 2). Firstly, we formulate the model for StoVNM problem by mixed integer linear programming, which with objective including minimum-mapping-cost and load balance. Then, we devise a sliding window approach-based heuristic algorithm w-StoVNM for tackling this NP-hard StoVNM problem efficiently. The experimental results achieved from extensive simulation experiments demonstrate the effectiveness of the proposed approach and superiority than traditional solutions for VN mapping in terms of VN mapping cost, blocking ratio, and total net revenue in the long term.  相似文献   
22.
This paper proposes an adaptive morphological dilation image coding with context weights prediction. The new dilation method is not to use fixed models, but to decide whether a coefficient needs to be dilated or not according to the coefficient’s predicted significance degree. It includes two key dilation technologies: (1) controlling dilation process with context weights to reduce the output of insignificant coefficients and (2) using variable-length group test coding with context weights to adjust the coding order and cost as few bits as possible to present the events with large probability. Moreover, we also propose a novel context weight strategy to predict a coefficient’s significance degree more accurately, which can be used for two dilation technologies. Experimental results show that our proposed method outperforms the state of the art image coding algorithms available today.  相似文献   
23.
Network operators depend on security services with the aim of safeguarding their IT infrastructure. Various types of network security policies are employed on a global scale and are disseminated among several security middleboxes implemented in networks. But, owing to the complications in security policies, it is not quite efficient to directly use the path‐wise enforcement schemes that are prevalent. The major motivation of this work is to improve security levels and solve the policy enforcement problem. For the first time, this work reports the issue of policy enforcement on middleboxes. The major contribution of this work is to design security policy enforcement as a Weighted K Set Covering Problem, and we designed a Policy Space Analysis (PSA) tool intended for a group of operations in the security policy. This PSA tool was developed based on range‐signified hyper‐rectangles, which are indexed by the Hilbert R‐tree. Leveraging the PSA, we first investigated the topological features of various kinds of policies. Balancing the PSA tool in a non‐dominated sorting particle swarm optimization technique exposes the intrinsic difficulties of this security strategy and provides guidance for designing the enforcement approach. In addition, in this research, a new fuzzy rule‐based classification system is introduced for packet classification. A scope‐wise policy enforcement algorithm was proposed, which chooses a moderate number of enforcement network nodes for deploying multiple policy subsets in a greedy manner. This scheme is much quicker compared with the first one and therefore has found its application in real‐time deployments.  相似文献   
24.
25.
Wireless Personal Communications - Biometric traits are frequently used by security agencies for automatic recognition of a person. There are numerous biometric traits used for person...  相似文献   
26.
Ternary I‐III‐VI2 nanocrystals (NCs), such as CuInS2, are receiving attention as heavy‐metals‐free materials for solar cells, luminescent solar concentrators (LSCs), LEDs, and bio‐imaging. The origin of the optical properties of CuInS2 NCs are however not fully understood. A recent theoretical model suggests that their characteristic Stokes‐shifted and long‐lived luminescence arises from the structure of the valence band (VB) and predicts distinctive optical behaviours in defect‐free NCs: the quadratic dependence of the radiative decay rate and the Stokes shift on the NC radius. If confirmed, this would have crucial implications for LSCs as the solar spectral coverage ensured by low‐bandgap NCs would be accompanied by increased re‐absorption losses. Here, by studying stoichiometric CuInS2 NCs, it is revealed for the first time the spectroscopic signatures predicted for the free band‐edge exciton, thus supporting the VB‐structure model. At very low temperatures, the NCs also show dark‐state emission likely originating from enhanced electron‐hole spin interaction. The impact of the observed optical behaviours on LSCs is evaluated by Monte Carlo ray‐tracing simulations. Based on the emerging device design guidelines, optical‐grade large‐area (30×30 cm2) LSCs with optical power efficiency (OPE) as high as 6.8% are fabricated, corresponding to the highest value reported to date for large‐area devices.  相似文献   
27.
Engineered magnetic iron oxide nanoparticles with surprisingly high antimicrobial activity and excellent safety profiles to mammalian cell lines have been developed. Hematite hollow nanospheres (HNSs) are prepared by a facile hard templating method; reduction of hematite HNSs by H2 leads to magnetite HNSs. The antimicrobial activity of magnetite HNSs towards Gram negative (Escherichia coli) and Gram positive (Staphylococcus epidermidis) bacteria is evaluated against hematite HNSs and conventional magnetite (C‐magnetite; diameter <50 nm). Superior antibacterial performance is observed for magnetite HNSs towards both E. coli and S. epidermidis over hematite HNSs and C‐magnetite. The origin of the antimicrobial activity of magnetite HNSs is the high leaching of iron ions in the presence of microorganisms, which leads to high generation of reactive oxygen species. Magnetite HNSs allow multiple‐fold increase in the generation of soluble iron ions over hematite HNSs and C‐magnetite, showing that control over both the composition and nanostructure is crucial to tune the antimicrobial activity of iron oxides. Based on the current findings, magnetic HNSs show promising potential antimicrobial applications.  相似文献   
28.
A steady-state analysis is presented of a permanent magnet (PM) synchronous motor drive with a current source inverter (CSI). The torque-speed profile required of the drive is a constant torque region from zero to base speed and a constant power region above base speed. The analysis assumes position feedback control. Optimum control strategies are obtained for the two regions of the torque-speed profile. Using these optimum strategies, performance curves of the drive are predicted and experimentally verified. The time harmonics in the motor are a function of the presence and configuration of the dampers in the motor. An expression is obtained for the equivalent inductance seen by the harmonics for different damper configurations. A Fourier series approach is used to predict the line-to-line voltage waveforms. Even though the presence of the dampers is not essential to the operation of the drive, their presence reduces the voltage spikes present in the line-to-line voltage.  相似文献   
29.
This paper presents an isotropic model for the effective viscosities of sintering particle packings. The relationship between the macroscopic stress and deformation rate is based on the behavior of individual interparticle contacts, represented by contact viscosities, and the statistics of the packing. The contact viscosities depend on the contact area, which is the primary variable used to describe the state of the packing. A direct consequence of this choice of state variable is that the effective viscosities are identically zero for an undeformed and unsintered packing. Specific results are presented for the case of Newtonian viscous materials. The model is compared with existing models for porous Newtonian viscous materials. Experiments conducted with spherical glass powder packings show good agreement with the model. Finite-element simulations using the model have been used to study forging of a pellet.  相似文献   
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号