首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   670篇
  免费   38篇
电工技术   5篇
综合类   2篇
化学工业   198篇
金属工艺   18篇
机械仪表   9篇
建筑科学   50篇
矿业工程   2篇
能源动力   17篇
轻工业   39篇
水利工程   2篇
无线电   55篇
一般工业技术   134篇
冶金工业   34篇
原子能技术   6篇
自动化技术   137篇
  2023年   16篇
  2022年   18篇
  2021年   20篇
  2020年   12篇
  2019年   11篇
  2018年   12篇
  2017年   17篇
  2016年   28篇
  2015年   15篇
  2014年   32篇
  2013年   33篇
  2012年   34篇
  2011年   43篇
  2010年   47篇
  2009年   46篇
  2008年   38篇
  2007年   43篇
  2006年   16篇
  2005年   25篇
  2004年   25篇
  2003年   14篇
  2002年   6篇
  2001年   9篇
  2000年   15篇
  1999年   13篇
  1998年   6篇
  1997年   12篇
  1996年   11篇
  1995年   2篇
  1994年   7篇
  1993年   6篇
  1992年   9篇
  1991年   6篇
  1990年   2篇
  1989年   3篇
  1988年   6篇
  1987年   4篇
  1986年   8篇
  1985年   2篇
  1983年   4篇
  1982年   4篇
  1981年   6篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
  1974年   2篇
  1966年   3篇
  1964年   1篇
排序方式: 共有708条查询结果,搜索用时 0 毫秒
11.
A Comparison of Free BDDs and Transformed BDDs   总被引:2,自引:0,他引:2  
Ordered binary decision diagrams (OBDDs) introduced by Bryant (IEEE Trans. on Computers, Vol. 35, pp. 677–691, 1986) have found a lot of applications in verification and CAD. Their use is limited if the OBDD size of the considered functions is too large. Therefore, a variety of generalized BDD models has been presented, among them FBDDs (free BDDs) and TBDDs (transformed BDDs). Here the quite tight relations between these models are revealed and their advantages and disadvantages are discussed.  相似文献   
12.
The design of two custom sample holders with a spherical cavity for commercial vibrating sample magnetometer systems is described. For such cavities, the magnetization M[over ->] and the internal magnetic field H(i)[over ->] of a sample are both homogeneous. Consequently, the material parameter M(H(i)) of a sample can be determined even for liquids and powders with a high magnetic susceptibility.  相似文献   
13.
Young (ages 18–22 years) and older (ages 61–87 years) adults (N = 106) played the Virtual Week board game, which involves simulating common prospective memory (PM) tasks of everyday life (e.g., taking medication), and performed working memory (WM) and vigilance tasks. The Virtual Week game includes regular (repeated) and irregular (nonrepeated) PM tasks with cues that are either more or less focal to other ongoing activities. Age differences in PM were reduced for repeated tasks, and performance improved over the course of the week, suggesting retrieval was more spontaneous or habitual. Correlations with WM within each age group were reduced for PM tasks that had more regular or focal cues. WM (but not vigilance) ability was a strong predictor of irregular PM tasks with less focal cues. Taken together, these results support the hypothesis that habitual and focally cued PM tasks are less demanding of attentional resources (specifically, WM), whereas tasks that are more demanding of controlled attentional processes produce larger age differences, which may be attributable to individual differences in WM. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
14.
Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow security guidelines? Using an organizational control lens, we build a model to explain individual information security precaution-taking behavior. Specific hypotheses are developed and tested using a field survey. We examine elements of control and introduce the concept of ‘mandatoriness,’ which we define as the degree to which individuals perceive that compliance with existing security policies and procedures is compulsory or expected by organizational management. We find that the acts of specifying policies and evaluating behaviors are effective in convincing individuals that security policies are mandatory. The perception of mandatoriness is effective in motivating individuals to take security precautions, thus if individuals believe that management watches, they will comply.  相似文献   
15.
16.
Magnetic optical sensor particles with multifunctional cores and shells are synthesized via a facile nanoprecipitation method and the subsequent modification of the particle shell. The hydrophobic particle core includes optical oxygen indicators, a light harvesting system, photosensitizers, and magnetic nanoparticles. Further functionalities are introduced by modifying the shell with enzymes, antibodies, multiple layers of polyelectrolytes, stimuli‐responsive polymers, and luminescent indicator dyes. The hydrodynamic diameter is tunable by varying different precipitation parameters.  相似文献   
17.
Local electric defects may result in considerable performance losses in solar cells. Infrared (IR) thermography is one important tool to detect these defects on photovoltaic modules. Qualitative interpretation of IR images has been carried out successfully, but quantitative interpretation has been hampered by the lack of “calibration” defects. The aims of this study are to (i) establish methods to induce well‐defined electric defects in thin‐film solar cells serving as “calibration” defects and to (ii) assess the accuracy of IR imaging methods by using these artificially induced defects. This approach paves the way for improving quality control methods based on imaging in photovoltaic. We created ohmic defects (“shunts”) by using a focused ion beam and weak diodes (“interface shunts”) by applying a femto‐second laser at rather low power on copper indium gallium selenide cells. The defects can be induced precisely and reproducibly, and the severity of the defects on the electrical performance can be well adjusted by focused ion beam/laser parameters. The successive assessment of the IR measurement (ILIT‐Voc) revealed that this method can predict the losses in Pmpp (maximal power extractable) with a mean error of below 10%. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
18.
Stefan Mangold  Ingo Forkel 《电信纪事》2000,55(11-12):567-576
DLC protocols, scheduling, and multiplexing issues for broadband fixed wireless access networks based on ATM are discussed. The established DSA++ mac protocol has been developed at ComNets and has been widely applied within the German project ATMmobil. It has been a fundamental contribution to the etsi bran standardisation of HIPERLAN /2. The DSA++ is here modified to perform optimal within the fixed wireless access network environment. Therefore, realistic traffic as well as radio channel models for the respective scenarios are introduced. Simulation results are presented, showing the feasibility of the respective protocol stack for offering broadband multimedia services with reasonable quality of service. In addition to this advanced protocol approach, two systems are discussed which are currently under standardisation process. The IEEE 802.16 as well as the European hiperaccess systems are both proposed for fixed wireless access networks. Expected scenarios and applications are presented and basic requirements the standards have to fulfil are derived. As another aspect of access networks, their impact on the global information society is discussed.  相似文献   
19.
Rapid growth of computer network sizes and uses necessitate analysis of network application middleware in terms of its scalability as well as performance. In this paper we analyze a distributed network management middleware based on agents that can be dispatched to locations where they can execute close to the managed nodes. The described middleware operates between the network protocol layer and the application layer and uses standard TCP protocol and SNMP probes to interface the network. By aggregating requests from many users into a single agent, our system allows multiple managers to probe problem areas with minimal management traffic overhead. We discuss and quantify the benefits of the described middleware by implementing real‐time network managers using our system. The main result of this paper is a comparison of scalability and efficiency of our agent‐based management middleware and traditional SNMP‐based data collection. To this end, we measured traffic in both real and simulated networks. In the latter case, we designed, used and described here a method of separating simulated application flow into separate subflows to simplify design of simulations. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
20.
One‐dimensional fibers and tubes are constructed through the oriented carbon‐carbon cross‐linking reactions towards rigid conjugated polymer networks. As the result, a template‐free and one‐step synthesis of CNTs and CNFs is achieved through a simple carbonization of the as‐formed carbon‐rich tubular and fiberlike polyphenylene precursors under argon. Microporous CNTs and CNFs with a surface area up to 900 m2 g–1 are obtained, together with HR‐TEM characterizations indicating the formation of intrinsic microporous structure in these rigid carbon‐rich networks. The primary electrochemical experiments reveal their promising applications as advanced electrodes in electrochemical double‐layered capacitor (EDLC).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号