首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1761篇
  免费   73篇
  国内免费   9篇
电工技术   21篇
综合类   3篇
化学工业   335篇
金属工艺   68篇
机械仪表   30篇
建筑科学   25篇
矿业工程   4篇
能源动力   39篇
轻工业   56篇
水利工程   5篇
石油天然气   5篇
无线电   275篇
一般工业技术   486篇
冶金工业   225篇
原子能技术   14篇
自动化技术   252篇
  2023年   20篇
  2022年   23篇
  2021年   44篇
  2020年   40篇
  2019年   43篇
  2018年   53篇
  2017年   59篇
  2016年   59篇
  2015年   40篇
  2014年   56篇
  2013年   99篇
  2012年   64篇
  2011年   74篇
  2010年   66篇
  2009年   73篇
  2008年   63篇
  2007年   63篇
  2006年   45篇
  2005年   34篇
  2004年   44篇
  2003年   50篇
  2002年   46篇
  2001年   29篇
  2000年   30篇
  1999年   32篇
  1998年   55篇
  1997年   33篇
  1996年   44篇
  1995年   32篇
  1994年   41篇
  1993年   30篇
  1992年   26篇
  1991年   21篇
  1990年   23篇
  1989年   15篇
  1988年   22篇
  1987年   22篇
  1986年   22篇
  1985年   26篇
  1984年   22篇
  1983年   17篇
  1982年   11篇
  1981年   14篇
  1980年   13篇
  1979年   12篇
  1978年   17篇
  1977年   20篇
  1976年   10篇
  1973年   7篇
  1968年   6篇
排序方式: 共有1843条查询结果,搜索用时 31 毫秒
41.
In this paper, a block based steganographic algorithm has been proposed where a sequence of secret bits are embedded into a set of pixels by rearranging the pixel locations. This algorithm has been devised as an improvement over existing statistical restoration based algorithms in order to reduce the additive noise which occurs due to embedding. It is shown that the proposed scheme substantially reduces the additive noise compared to existing statistical restoration based schemes.  相似文献   
42.
Stoichiometric magnesium aluminate spinel was synthesized by reaction sintering of alumina with caustic and sintered magnesia. The volume expansion of 5–7% during MgAl2O4 formation was utilized to identify the starting temperature of spinel formation and densification by high temperature dilatometry. The magnesia reactivity was determined by measurement of crystallite size and specific surface area. Caustic magnesia and sintered magnesia behave differently vis-à-vis phase formation and densification of spinel. Densification of stoichiometric Mag-Al spinel was carried out between 1650 and 1750 °C. Attempts were made to correlate the MgO reactivity with microstructure and densification of spinel.  相似文献   
43.
Microstructure and properties of flame sprayed tungsten carbide coatings   总被引:3,自引:0,他引:3  
This article reports on feasibility experiments carried out with oxy-acetylene spray system with various oxygen to fuel ratios using two different tungsten carbide powders and powder feeding methods, to evaluate the newly developed fused WC, synthesised by transferred arc thermal plasma method. Transferred arc thermal plasma method is more economical and less energy intensive than the conventional arc method and results in a fused carbide powder with higher hardness. The microstructure and phase composition of powders and coatings were analysed by optical and scanning electron microscopy, energy dispersive spectroscopy and X-ray diffraction. Carbon content of the powders and coatings were determined to study the decarburisation of the material during spraying process. Coatings were also characterised by their hardness and abrasive wear. The effects of metallurgical transformation and phase content are related to wear performance. The results demonstrate that the powders exhibit various degree of phase transformation during the spray process depending on the type of powder, powder feeding and spray parameters. The carbon loss during the spray process in excess of 45% resulted in reduced hardness and wear resistance of the coatings. Coatings with high amount of WC and W2C along with FeW3C showed higher wear resistance. Thus, coatings of high wear resistance can be produced using fused tungsten carbide powder with WC and W2C phases, which can be economically synthesised by thermal plasma transferred arc method.  相似文献   
44.
45.
This paper presents the analytical models of power consumption in macrocell, microcell, picocell and femtocell based networks. Five case studies are presented in this paper where macrocells, microcells, picocells and femtocells are deployed based on the number of mobile subscribers present in a region, mobile user traffic in that region and the area of the region where cellular coverage has to be provided. A comparative study is performed between the power consumption by the base stations in each of these five cases and that of the only macrocell based network. The simulation results demonstrate that using each of these five strategies the power consumption by the base stations can be minimized than that of only macrocell based network. Based on the power consumption by the base stations in these five schemes, we have categorized the networks into five classes, A, B, C, D and E, each of which contains cells of different types to reduce power consumption to achieve green cellular network.  相似文献   
46.
This paper considers the problem of distributed inferencing in a sensor network. It particularly explores the probabilistic inferencing problem in the context of a distributed Boltzmann machine-based framework for monitoring the network. The paper offers a variational mean-field approach to develop communication-efficient local algorithm for variational inferencing in distributed environments (VIDE). It compares the performance of the proposed approximate variational technique with respect to the exact and centralized techniques. It shows that the VIDE offers a much more communication-efficient solution at very little cost in terms of the accuracy. It also offers experimental results in order to substantiate the scalability of the proposed algorithm.  相似文献   
47.
The NP-hard microaggregation problem seeks a partition of data points into groups of minimum specified size k, so as to minimize the sum of the squared euclidean distances of every point to its group's centroid. One recent heuristic provides an O(k3) guarantee for this objective function and an O(k2) guarantee for a version of the problem that seeks to minimize the sum of the distances of the points to its group's centroid. This paper establishes approximation bounds for another microaggregation heuristic, providing better approximation guarantees of O(k2) for the squared distance measure and O(k) for the distance measure.  相似文献   
48.
Bacterial trapping using nanonets is a ubiquitous immune defense mechanism against infectious microbes. These nanonets can entrap microbial cells, effectively arresting their dissemination and rendering them more vulnerable to locally secreted microbicides. Inspired by this evolutionarily conserved anti-infective strategy, a series of 15 to 16 residue-long synthetic β-hairpin peptides is herein constructed with the ability to self-assemble into nanonets in response to the presence of bacteria, enabling spatiotemporal control over microbial killing. Using amyloid-specific K114 assay and confocal microscopy, the membrane components lipoteichoic acid and lipopolysaccharide are shown to play a major role in determining the amyloid-nucleating capacity as triggered by Gram-positive and Gram-negative bacteria respectively. These nanonets displayed both trapping and killing functionalities, hence offering a direct improvement from the trap-only biomimetics in literature. By substituting a single turn residue of the non-amyloidogenic BTT1 peptide, the nanonet-forming BTT1-3A analog is produced with comparable antimicrobial potency. With the same sequence manipulation approach, BTT2-4A analog modified from BTT2 peptide showed improved antimicrobial potency against colistin-resistant clinical isolates. The peptide nanonets also demonstrated robust stability against proteolytic degradation, and promising in vivo efficacy and biosafety profile. Overall, these bacteria-responsive peptide nanonets are promising clinical anti-infective alternatives for circumventing antibiotic resistance.  相似文献   
49.

IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsibles face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT risk domain. Furthermore, the existing threat modeling methods have shortcomings. This paper introduces a metamodel-based approach named Yet Another Cybersecurity Risk Assessment Framework (Yacraf). Yacraf aims to enable comprehensive risk assessment for organizations with more decision support. The paper includes a risk calculation formalization and also an example showing how an organization can use and benefit from Yacraf.

  相似文献   
50.

With the exponential growth of end users and web data, the internet is undergoing the change of paradigm from a user-centric model to a content-centric one, popularly known as information-centric networks (ICN). Current ICN research evolves around three key-issues namely (i) content request searching, (ii) content routing, and (iii) in-network caching scheme to deliver the requested content to the end user. This would improve the user experience to obtain requested content because it lowers the download delay and provides higher throughput. Existing researches have mainly focused on on-path congestion or expected delivery time of a content to determine the optimized path towards custodian. However, it ignores the cumulative effect of the link-state parameters and the state of the cache, and consequently it leads to degrade the delay performance. In order to overcome this shortfall, we consider both the congestion of a link and the state of on-path caches to determine the best possible routes. We introduce a generic term entropy to quantify the effects of link congestion and state of on-path caches. Thereafter, we develop a novel entropy dependent algorithm namely ENROUTE for searching of content request triggered by any user, routing of this content, and caching for the delivery this requested content to the user. The entropy value of an intra-domain node indicates how many popular contents are already cached in the node, which, in turn, signifies the degree of enrichment of that node with the popular contents. On the other hand, the entropy for a link indicates how much the link is congested with the traversal of contents. In order to have reduced delay, we enhance the entropy of caches in nodes, and also use path with low entropy for downloading contents. We evaluate the performance of our proposed ENROUTE algorithm against state-of-the-art schemes for various network parameters and observe an improvement of 29–52% in delay, 12–39% in hit rate, and 4–39% in throughput.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号