首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1285篇
  免费   97篇
  国内免费   1篇
电工技术   18篇
化学工业   397篇
金属工艺   14篇
机械仪表   27篇
建筑科学   58篇
能源动力   52篇
轻工业   160篇
水利工程   10篇
石油天然气   8篇
无线电   97篇
一般工业技术   200篇
冶金工业   80篇
原子能技术   3篇
自动化技术   259篇
  2023年   16篇
  2022年   37篇
  2021年   52篇
  2020年   46篇
  2019年   45篇
  2018年   43篇
  2017年   49篇
  2016年   58篇
  2015年   52篇
  2014年   67篇
  2013年   108篇
  2012年   101篇
  2011年   105篇
  2010年   77篇
  2009年   67篇
  2008年   74篇
  2007年   67篇
  2006年   39篇
  2005年   45篇
  2004年   33篇
  2003年   28篇
  2002年   17篇
  2001年   7篇
  2000年   17篇
  1999年   14篇
  1998年   25篇
  1997年   26篇
  1996年   9篇
  1995年   5篇
  1994年   5篇
  1993年   7篇
  1992年   3篇
  1991年   5篇
  1990年   4篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1985年   6篇
  1984年   2篇
  1983年   5篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1976年   4篇
排序方式: 共有1383条查询结果,搜索用时 15 毫秒
21.
Applications of wireless communications networks are emerging continuously. To offer a good level of security in these applications, new standards for wireless communications propose solutions based on cryptographic algorithms working on special modes of operation. This work presents a custom hardware architecture for the AES-CCM protocol (AES-CCMP) which is the basis for the security architecture of the IEEE 802.11i standard. AES-CCMP is based on the AES-CCM algorithm that performs the Advanced Encryption Standard (AES) in CTR with CBC-MAC mode (CCM mode), plus specialized data formatting modules, providing different security services through iterative and complex operations. Results of implementing the proposed architecture targeting FPGA devices are presented and discussed. A comparison against similar works shows significant improvements in terms of both throughput and efficiency.  相似文献   
22.
This article proposes a new type of discretizations for initial boundary value problems of thermodynamical systems. Based on a combination of finite elements in space and fractional step methods in time, we formulate algorithms that exactly preserve the symmetries and the laws of thermodynamics of the continuum problem. The algorithmic design is based on the GENERIC formalism of irreversible thermodynamics which naturally suggests the split of the evolution operator upon which our fractional step method is based. Although the emphasis of the article is on the generality of the results, as an illustration, a discretization of nonlinear, finite strain, thermoelasticity is presented. Numerical simulations are provided that verify the excellent performance of the new methods.  相似文献   
23.
ContextModel-Driven Development (MDD) is an alternative approach for information systems development. The basic underlying concept of this approach is the definition of abstract models that can be transformed to obtain models near implementation. One fairly widespread proposal in this sphere is that of Model Driven Architecture (MDA). Business process models are abstract models which additionally contain key information about the tasks that are being carried out to achieve the company’s goals, and two notations currently exist for modelling business processes: the Unified Modelling Language (UML), through activity diagrams, and the Business Process Modelling Notation (BPMN).ObjectiveOur research is particularly focused on security requirements, in such a way that security is modelled along with the other aspects that are included in a business process. To this end, in earlier works we have defined a metamodel called secure business process (SBP), which may assist in the process of developing software as a source of highly valuable requirements (including very abstract security requirements), which are transformed into models with a lower abstraction level, such as analysis class diagrams and use case diagrams through the approach presented in this paper.MethodWe have defined all the transformation rules necessary to obtain analysis class diagrams and use case diagrams from SBP, and refined them through the characteristic iterative process of the action-research method.ResultsWe have obtained a set of rules and a checklist that make it possible to automatically obtain a set of UML analysis classes and use cases, starting from SBP models. Our approach has additionally been applied in a real environment in the area of the payment of electrical energy consumption.ConclusionsThe application of our proposal shows that our semi-automatic process can be used to obtain a set of useful artifacts for software development processes.  相似文献   
24.
This paper presents a new procedure to construct families of spatial approximation-prediction functions which depend on several parameters. The method is based on partitions of the unity. In order to find optimal functions in these families we introduce a Vietoris simplicial set associated to an influence radius. We consider error estimators induced by these Vietoris simplicial sets. A computational implementation of these mathematical models has been developed to be applied to any kind of finite discrete data. Our methods provide a useful tool for the analysis of the spatial distribution of species, which is imperative for developing accurate and efficient management of endangered and invasive species, biological conservation programs, etc. We demonstrate the application of our method to the analysis of the spatial distribution of the grape moth Lobesia botrana (Lepidoptera: Tortricidae) in the vineyards of La Rioja obtaining useful results for the management of this pest.  相似文献   
25.
The IEEE 802.21 standard facilitates media independent handovers by providing higher layer mobility management functions with common service primitives for all technologies. Right after the base specification was published, several voices rose up in the working group advocating to broaden the scope of IEEE 802.21 beyond handovers. This paper aims at updating the reader with the main challenges and functionalities required to create a Media Independence Service Layer, through the analysis of scenarios which are being discussed within the working group: 1) Wireless Coexistence, and 2) Heterogeneous Wireless Multihop Backhaul Networks.  相似文献   
26.
Hosts with several, possibly heterogeneous and/or multicore, processors provide new challenges and opportunities to accelerate applications with high communications bandwidth requirements. Many opportunities to scale these network applications with the increase in the link bandwidths are related to the exploitation of the available parallelism provided by the presence of several processing cores in the servers, not only for computing the workload of the user application but also for decreasing the overhead associated to the network interface and the system software.  相似文献   
27.
Problems in learning with hypertext systems have been claimed to be caused by high levels of disorientation and cognitive load. This was recognized by DeStefano and LeFevre [DeStefano, D., & LeFevre, J. -A., (2007). Cognitive load in hypertext reading: A review. Computers in Human Behavior, 23(3), 1616–1641.] who predicted an increase of cognitive load and impairment of learning for hypertexts with a higher number of links per page. From a practical perspective, several navigation support techniques, such as providing link suggestions, have been proposed for guiding learners and reducing cognitive overload. In an experiment, we tested DeStefano and LeFevre’s predictions as well as the usefulness of link suggestions. Participants used different versions of a hypertext, either with 3-links or 8-links per page, presenting link suggestions or not. We tested their cognitive load and learning outcomes. Results showed that there was a benefit of using link suggestions for learning, but no effect of number of links on learning was found. Moreover, the effects of our manipulations on cognitive load were mediated by the reading order that participants selected. Implications for research and the design of navigation support systems are discussed.  相似文献   
28.
Current methods of quantifying the stand-to-sit activity (StTS) are resource intensive and have not been applied to unilateral transtibial amputees (TTAs). The purpose of this study is to define five phases of arm-rest assisted and unassisted StTS using simple instrumentation and implement this method for assessing TTA movement patterns. Twelve TTAs and 12 age-matched non-amputees performed StTS with and without arm-rest support. Symmetry of weight distribution between lower limbs was calculated for five StTS phases: Descent Initiation; Descent Deceleration; Seat-Contact; Stabilisation and Sitting. TTAs demonstrated an asymmetrical weight distribution pattern and a tendency to transfer weight to the intact limb during the course of the activity. Non-amputees had relatively higher symmetry and did not exhibit substantial weight shifts during the activity. Symmetry indices were similar for assisted and unassisted sitting in both subject groups. These results highlight a need for therapeutic interventions in TTAs for reducing loading asymmetries and associated co-morbidities.  相似文献   
29.
This work presents a strategy to minimise the network usage and the energy consumption of wireless battery-powered sensors in the observer problem over networks. The sensor nodes implement a periodic send-on-delta approach, sending new measurements when a measure deviates considerably from the previous sent one. The estimator node implements a jump observer whose gains are computed offline and depend on the combination of available new measurements. We bound the estimator performance as a function of the sending policies and then state the design procedure of the observer under fixed sending thresholds as a semidefinite programming problem. We address this problem first in a deterministic way and, to reduce conservativeness, in a stochastic one after obtaining bounds on the probabilities of having new measurements and applying robust optimisation problem over the possible probabilities using sum of squares decomposition. We relate the network usage with the sending thresholds and propose an iterative procedure for the design of those thresholds, minimising the network usage while guaranteeing a prescribed estimation performance. Simulation results and experimental analysis show the validity of the proposal and the reduction of network resources that can be achieved with the stochastic approach.  相似文献   
30.
The computerized design of advanced straight and skew bevel gears produced by precision forging is proposed. Modifications of the tooth surfaces of one of the members of the gear set are proposed in order to localize the bearing contact and predesign a favorable function of transmission errors. The proposed modifications of the tooth surfaces will be computed by using a modified imaginary crown-gear and applied in manufacturing through the use of the proper die geometry. The geometry of the die is obtained for each member of the gear set from their theoretical geometry obtained considering its generation by the corresponding imaginary crown-gear. Two types of surface modification, whole and partial crowning, are investigated in order to get the more effective way of surface modification of skew and straight bevel gears. A favorable function of transmission errors is predesigned to allow low levels of noise and vibration of the gear drive. Numerical examples of design of both skew and straight bevel gear drives are included to illustrate the advantages of the proposed geometry.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号