全文获取类型
收费全文 | 1185篇 |
免费 | 34篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 29篇 |
化学工业 | 215篇 |
金属工艺 | 31篇 |
机械仪表 | 37篇 |
建筑科学 | 10篇 |
能源动力 | 41篇 |
轻工业 | 125篇 |
水利工程 | 1篇 |
石油天然气 | 6篇 |
无线电 | 257篇 |
一般工业技术 | 248篇 |
冶金工业 | 111篇 |
原子能技术 | 5篇 |
自动化技术 | 106篇 |
出版年
2023年 | 7篇 |
2022年 | 19篇 |
2021年 | 44篇 |
2020年 | 22篇 |
2019年 | 28篇 |
2018年 | 29篇 |
2017年 | 29篇 |
2016年 | 21篇 |
2015年 | 16篇 |
2014年 | 39篇 |
2013年 | 75篇 |
2012年 | 46篇 |
2011年 | 57篇 |
2010年 | 69篇 |
2009年 | 38篇 |
2008年 | 48篇 |
2007年 | 32篇 |
2006年 | 26篇 |
2005年 | 34篇 |
2004年 | 33篇 |
2003年 | 15篇 |
2002年 | 13篇 |
2001年 | 17篇 |
2000年 | 20篇 |
1999年 | 23篇 |
1998年 | 38篇 |
1997年 | 32篇 |
1996年 | 19篇 |
1995年 | 35篇 |
1994年 | 31篇 |
1993年 | 28篇 |
1992年 | 23篇 |
1991年 | 25篇 |
1990年 | 25篇 |
1989年 | 23篇 |
1988年 | 18篇 |
1987年 | 9篇 |
1986年 | 11篇 |
1985年 | 9篇 |
1984年 | 10篇 |
1983年 | 8篇 |
1982年 | 9篇 |
1981年 | 9篇 |
1980年 | 14篇 |
1979年 | 4篇 |
1978年 | 6篇 |
1977年 | 5篇 |
1976年 | 13篇 |
1975年 | 6篇 |
1973年 | 3篇 |
排序方式: 共有1222条查询结果,搜索用时 12 毫秒
101.
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies
bounded overtaking. When the shared variables behave atomically, it has the first-come-first-served property (FCFS). Nonatomic
access makes information vulnerable. The effects of this can be mitigated by minimizing the information and by spreading it
over more variables. The design approach adopted here begins with such mitigating efforts. These resulted in an algorithm
with a proof of correctness, first for atomic variables. This proof is then used as a blueprint for the simultaneous development
of the algorithm for nonatomic variables and its proof. Mutual exclusion is proved by means of invariants. Bounded overtaking
and liveness under weak fairness are proved with invariants and variant functions. Liveness under weak fairness is formalized
and proved in a set-theoretic version of temporal logic. All these assertions are verified with the proof assistant PVS. We
heavily rely on the possibility offered by a proof assistant like PVS to reuse proofs developed for one context in a different
context. 相似文献
102.
Multimedia Tools and Applications - Cryptography is the process by which a readable message is converted into cipher-text unintelligible to an eavesdropper. With the advent of the internet,... 相似文献
103.
The 88‐kDa Eales’ protein in serum is a complex of haptoglobin,complement C3, and galectin‐1 as identified by liquid chromatography coupled mass spectrometry 下载免费PDF全文
104.
105.
M. I. Bhat 《Journal of Petroleum Geology》1983,5(4):389-400
Carbonate deposition through the Earth's history shows two distinct changes in terms of volume and chemistry. Whereas carbonates comprise a very small percentage of the total sedimentary rocks in the Proterozoic, they constitute 20–25% at the present time. From the Archaean to Early Palaeozoic, carbonates are dominantly dolomites, whereas afterwards they are dominantly limestone. 87 Sr/86 Sr, δ18 0 and δ13 C trends show an increase with decreasing age.
All these features of carbonate rocks are explicable as being related to the increased episodic outgassing of CO2 and CH4 from the upper mantle throughout the Earth's history.
The Mesozoic carbonates of Himalaya are correlatable with the CO2 outgassing associated with rifting and magmatism during the birth of the Tethys ocean. 相似文献
All these features of carbonate rocks are explicable as being related to the increased episodic outgassing of CO
The Mesozoic carbonates of Himalaya are correlatable with the CO
106.
Junaid Latief Shah Heena Farooq Bhat 《Information Security Journal: A Global Perspective》2020,29(1):14-29
ABSTRACTStateless Address Autoconfiguration (SLAAC) is one of the novel features introduced in IPv6 Neighbor Discovery Protocol (NDP) providing for self-configuration of nodes and supplementing the reduction of operational and deployment cost of networks. Although self-configuration elevates the idea of autonomy for network, it has also introduced vulnerabilities that require substantial solutions. The SLAAC is pivoted on the presumption that network consists of authentic and entrusted nodes, however with inception of public sector wireless networks; any node can affix to the link with trivial authentication and situation changes radically. Although some security extensions like IPsec or SeND have been proposed, but these security protocols have been reported to have serious limitations like complex cryptographic algorithms which negate their adoption. This paper revisits the stateless auto configuration process and discusses its inherent vulnerabilities. The paper surveys existing research and available defense mechanisms available to protect SLAAC. The paper also suggests some guidelines from existing literature which can further promote and supplement the research to secure the auto configuration process. Finally, a novel technique is proposed for securing IPv6 link layer communication against DoS and Man-in-the-Middle attack which can be used as an alternate approach for CGA and SeND protocol. 相似文献
107.
T Balakrishna Bhat 《Bulletin of Materials Science》1984,6(4):677-687
Some aspects of the deformation behaviour of solids at very high, moderately high and low strain rates are discussed. In the
very high strain rate region, deformation equations and the physics of the shock front are analysed to propose a route to
lower energy dissipation at the shock front. In the moderately high strain rate region, alloy design principles for maximizing
the deformation resistance are outlined. In the low strain rate region, an analysis of the physical basis for the power law
creep equation is presented. Some physical arguments are presented as a rationale for the high stress exponents and activation
energies often observed in particle-strengthened alloys. The additivity of strain rates by various mechanisms is also briefly
discussed. 相似文献
108.
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Schedulability theory can assure deadlines for a given task set when periods and worst-case execution times (WCETs) of tasks are known. While periods are generally derived from the problem specification, a task??s code needs to be statically analyzed to derive safe and tight bounds on its WCET. Such static timing analysis abstracts from program input and considers loop bounds and architectural features, such as pipelining and caching. However, unpredictability due to dynamic memory (DRAM) refresh cannot be accounted for by such analysis, which limits its applicability to systems with static memory (SRAM). In this paper, we assess the impact of DRAM refresh on task execution times and demonstrate how predictability is adversely affected leading to unsafe hard real-time system design. We subsequently contribute a novel and effective approach to overcome this problem through software-initiated DRAM refresh. We develop (1)?a?pure software and (2)?a?hybrid hardware/software refresh scheme. Both schemes provide predictable timings and fully replace the classical hardware auto-refresh. We discuss implementation details based on this design for multiple concrete embedded platforms and experimentally assess the benefits of different schemes on these platforms. We further formalize the integration of variable latency memory references into a data-flow framework suitable for static timing analysis to bound a task??s memory latencies with regard to their WCET. The resulting predictable execution behavior in the presence of DRAM refresh combined with the additional benefit of reduced access delays is unprecedented, to the best of our knowledge. 相似文献
109.
Several power system networks exhibit bifurcation, chaos and instability behavior for some specific values of initial conditions and parameters. Angle and voltage instability behavior of power system is prone to such specific values and parameter variation. This paper proposes fractional order proportional integral controller (FOPI) based state feedback for precise and robust control of such undesirable behavior. This paper proposes first ever use of FOPI for precise rotor angle control leading to instability in power system dynamic behavior. FOPI controller is applied on generator connected to IEEE‐14 bus benchmark model. The ripple frequency of turbine torque is chosen as one of the cause of instability behavior of power system, which has the potential possibility to push system behavior to chaos and instability mode. The proposed FOPI controller design will inhibit the dynamic behavior of power system to safe and stable bounds. Proposed strategy can be applied to other large power system models as well due to its simplicity in design philosophy. Several phase plane trajectories with and without FOPI controller are used to support the viewpoint. 相似文献
110.
Kaustubh S. Phanse Aniket Bhat Luiz A. DaSilva 《Journal of Network and Systems Management》2006,14(2):261-278
The ability to dynamically configure mobile ad-hoc network (MANET) devices is critical for supporting complex services such as quality of service (QoS), security and access control in these networks. In our work, we address the problem of policy distribution and provisioning in MANETs. Previously, we have proposed a policy provisioning architecture that enables the operator, e.g., a military command and control center, to maintain a logically centralized control of the network as a whole, while allowing a physically decentralized and self-managing implementation essential for a MANET environment. In this paper, we present an analytical model of the availability of the policy distribution service in a MANET and analyze the performance using stochastic Petri nets (SPNs). We develop the model at two levels of complexity: as a simple Markovian model with Poisson assumptions and as a more accurate non-Markovian model with general distributions obtained using statistical parameterization. We compare and cross-validate the analytical results with simulation and experimental results. Finally, we illustrate the effectiveness of the architecture for managing QoS for soft real-time applications, using an emulated mobile ad-hoc network testbed. 相似文献