首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1185篇
  免费   34篇
  国内免费   3篇
电工技术   29篇
化学工业   215篇
金属工艺   31篇
机械仪表   37篇
建筑科学   10篇
能源动力   41篇
轻工业   125篇
水利工程   1篇
石油天然气   6篇
无线电   257篇
一般工业技术   248篇
冶金工业   111篇
原子能技术   5篇
自动化技术   106篇
  2023年   7篇
  2022年   19篇
  2021年   44篇
  2020年   22篇
  2019年   28篇
  2018年   29篇
  2017年   29篇
  2016年   21篇
  2015年   16篇
  2014年   39篇
  2013年   75篇
  2012年   46篇
  2011年   57篇
  2010年   69篇
  2009年   38篇
  2008年   48篇
  2007年   32篇
  2006年   26篇
  2005年   34篇
  2004年   33篇
  2003年   15篇
  2002年   13篇
  2001年   17篇
  2000年   20篇
  1999年   23篇
  1998年   38篇
  1997年   32篇
  1996年   19篇
  1995年   35篇
  1994年   31篇
  1993年   28篇
  1992年   23篇
  1991年   25篇
  1990年   25篇
  1989年   23篇
  1988年   18篇
  1987年   9篇
  1986年   11篇
  1985年   9篇
  1984年   10篇
  1983年   8篇
  1982年   9篇
  1981年   9篇
  1980年   14篇
  1979年   4篇
  1978年   6篇
  1977年   5篇
  1976年   13篇
  1975年   6篇
  1973年   3篇
排序方式: 共有1222条查询结果,搜索用时 12 毫秒
101.
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave atomically, it has the first-come-first-served property (FCFS). Nonatomic access makes information vulnerable. The effects of this can be mitigated by minimizing the information and by spreading it over more variables. The design approach adopted here begins with such mitigating efforts. These resulted in an algorithm with a proof of correctness, first for atomic variables. This proof is then used as a blueprint for the simultaneous development of the algorithm for nonatomic variables and its proof. Mutual exclusion is proved by means of invariants. Bounded overtaking and liveness under weak fairness are proved with invariants and variant functions. Liveness under weak fairness is formalized and proved in a set-theoretic version of temporal logic. All these assertions are verified with the proof assistant PVS. We heavily rely on the possibility offered by a proof assistant like PVS to reuse proofs developed for one context in a different context.  相似文献   
102.
Multimedia Tools and Applications - Cryptography is the process by which a readable message is converted into cipher-text unintelligible to an eavesdropper. With the advent of the internet,...  相似文献   
103.
104.
105.
Carbonate deposition through the Earth's history shows two distinct changes in terms of volume and chemistry. Whereas carbonates comprise a very small percentage of the total sedimentary rocks in the Proterozoic, they constitute 20–25% at the present time. From the Archaean to Early Palaeozoic, carbonates are dominantly dolomites, whereas afterwards they are dominantly limestone. 87Sr/86Sr, δ180 and δ13C trends show an increase with decreasing age.
All these features of carbonate rocks are explicable as being related to the increased episodic outgassing of CO2 and CH4 from the upper mantle throughout the Earth's history.
The Mesozoic carbonates of Himalaya are correlatable with the CO2 outgassing associated with rifting and magmatism during the birth of the Tethys ocean.  相似文献   
106.
ABSTRACT

Stateless Address Autoconfiguration (SLAAC) is one of the novel features introduced in IPv6 Neighbor Discovery Protocol (NDP) providing for self-configuration of nodes and supplementing the reduction of operational and deployment cost of networks. Although self-configuration elevates the idea of autonomy for network, it has also introduced vulnerabilities that require substantial solutions. The SLAAC is pivoted on the presumption that network consists of authentic and entrusted nodes, however with inception of public sector wireless networks; any node can affix to the link with trivial authentication and situation changes radically. Although some security extensions like IPsec or SeND have been proposed, but these security protocols have been reported to have serious limitations like complex cryptographic algorithms which negate their adoption. This paper revisits the stateless auto configuration process and discusses its inherent vulnerabilities. The paper surveys existing research and available defense mechanisms available to protect SLAAC. The paper also suggests some guidelines from existing literature which can further promote and supplement the research to secure the auto configuration process. Finally, a novel technique is proposed for securing IPv6 link layer communication against DoS and Man-in-the-Middle attack which can be used as an alternate approach for CGA and SeND protocol.  相似文献   
107.
Some aspects of the deformation behaviour of solids at very high, moderately high and low strain rates are discussed. In the very high strain rate region, deformation equations and the physics of the shock front are analysed to propose a route to lower energy dissipation at the shock front. In the moderately high strain rate region, alloy design principles for maximizing the deformation resistance are outlined. In the low strain rate region, an analysis of the physical basis for the power law creep equation is presented. Some physical arguments are presented as a rationale for the high stress exponents and activation energies often observed in particle-strengthened alloys. The additivity of strain rates by various mechanisms is also briefly discussed.  相似文献   
108.
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Schedulability theory can assure deadlines for a given task set when periods and worst-case execution times (WCETs) of tasks are known. While periods are generally derived from the problem specification, a task??s code needs to be statically analyzed to derive safe and tight bounds on its WCET. Such static timing analysis abstracts from program input and considers loop bounds and architectural features, such as pipelining and caching. However, unpredictability due to dynamic memory (DRAM) refresh cannot be accounted for by such analysis, which limits its applicability to systems with static memory (SRAM). In this paper, we assess the impact of DRAM refresh on task execution times and demonstrate how predictability is adversely affected leading to unsafe hard real-time system design. We subsequently contribute a novel and effective approach to overcome this problem through software-initiated DRAM refresh. We develop (1)?a?pure software and (2)?a?hybrid hardware/software refresh scheme. Both schemes provide predictable timings and fully replace the classical hardware auto-refresh. We discuss implementation details based on this design for multiple concrete embedded platforms and experimentally assess the benefits of different schemes on these platforms. We further formalize the integration of variable latency memory references into a data-flow framework suitable for static timing analysis to bound a task??s memory latencies with regard to their WCET. The resulting predictable execution behavior in the presence of DRAM refresh combined with the additional benefit of reduced access delays is unprecedented, to the best of our knowledge.  相似文献   
109.
Several power system networks exhibit bifurcation, chaos and instability behavior for some specific values of initial conditions and parameters. Angle and voltage instability behavior of power system is prone to such specific values and parameter variation. This paper proposes fractional order proportional integral controller (FOPI) based state feedback for precise and robust control of such undesirable behavior. This paper proposes first ever use of FOPI for precise rotor angle control leading to instability in power system dynamic behavior. FOPI controller is applied on generator connected to IEEE‐14 bus benchmark model. The ripple frequency of turbine torque is chosen as one of the cause of instability behavior of power system, which has the potential possibility to push system behavior to chaos and instability mode. The proposed FOPI controller design will inhibit the dynamic behavior of power system to safe and stable bounds. Proposed strategy can be applied to other large power system models as well due to its simplicity in design philosophy. Several phase plane trajectories with and without FOPI controller are used to support the viewpoint.  相似文献   
110.
The ability to dynamically configure mobile ad-hoc network (MANET) devices is critical for supporting complex services such as quality of service (QoS), security and access control in these networks. In our work, we address the problem of policy distribution and provisioning in MANETs. Previously, we have proposed a policy provisioning architecture that enables the operator, e.g., a military command and control center, to maintain a logically centralized control of the network as a whole, while allowing a physically decentralized and self-managing implementation essential for a MANET environment. In this paper, we present an analytical model of the availability of the policy distribution service in a MANET and analyze the performance using stochastic Petri nets (SPNs). We develop the model at two levels of complexity: as a simple Markovian model with Poisson assumptions and as a more accurate non-Markovian model with general distributions obtained using statistical parameterization. We compare and cross-validate the analytical results with simulation and experimental results. Finally, we illustrate the effectiveness of the architecture for managing QoS for soft real-time applications, using an emulated mobile ad-hoc network testbed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号