首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2129篇
  免费   128篇
  国内免费   12篇
电工技术   37篇
综合类   2篇
化学工业   460篇
金属工艺   81篇
机械仪表   62篇
建筑科学   47篇
矿业工程   1篇
能源动力   68篇
轻工业   103篇
水利工程   1篇
石油天然气   4篇
无线电   394篇
一般工业技术   435篇
冶金工业   228篇
原子能技术   28篇
自动化技术   318篇
  2023年   5篇
  2022年   16篇
  2021年   21篇
  2020年   26篇
  2019年   25篇
  2018年   48篇
  2017年   46篇
  2016年   46篇
  2015年   50篇
  2014年   69篇
  2013年   184篇
  2012年   99篇
  2011年   131篇
  2010年   118篇
  2009年   119篇
  2008年   126篇
  2007年   106篇
  2006年   75篇
  2005年   68篇
  2004年   62篇
  2003年   71篇
  2002年   47篇
  2001年   46篇
  2000年   55篇
  1999年   68篇
  1998年   102篇
  1997年   51篇
  1996年   45篇
  1995年   43篇
  1994年   37篇
  1993年   30篇
  1992年   17篇
  1991年   24篇
  1990年   13篇
  1989年   24篇
  1988年   18篇
  1987年   20篇
  1986年   14篇
  1985年   16篇
  1984年   6篇
  1983年   13篇
  1982年   6篇
  1981年   11篇
  1980年   5篇
  1978年   7篇
  1977年   9篇
  1976年   9篇
  1975年   8篇
  1974年   4篇
  1973年   3篇
排序方式: 共有2269条查询结果,搜索用时 62 毫秒
51.
Since a large variety of digital games have been used in many fields for educational purposes, their real functions in learning have caught much attention as well. This study first defines learning characteristics of problem-solving digital games and their corresponding cognitive levels, then designs and develops a problem-solving game in accordance to the criteria. Tasks in the game context are inter-related to each other so that players need to critically and creatively think about problem solutions. Learners’ task analyses are performed to observe four elementary learners’ gaming paths, behaviors and cognitive activities, individually and collaboratively. System documentation, video recording, researcher observation, and interviews are conducted to analyze learners’ learning strategies and their cognitive performance during the gaming process.  相似文献   
52.
This article proposes the PC-based LabVIEW as the software to develop the algorithm of the robust complex extended Kalman filter (RCEKF) to detect the parameters of the voltage signal in power systems. The hardware used is a sample-and-hold card and a data acquisition (DAQ) card to extract the data from an outside system to the PC, and the program will compute the amplitude, frequency, and phase of the voltage signal with RCEKF. To validate the performance of RCEKF, the voltage signal from a function generator was applied to check the feasibility of the algorithm. This application was also used in the Taiwan Power Company (TPC) secondary substation in Sijhou, Taiwan.  相似文献   
53.
In geometry, two configurations are called similar if they can be brought to a complete match by rigid motions and dilations. In the simplest case, product designs X and Y have the same dimensionality and same number of points which can be brought into a one to one correspondence by substantive considerations. Under orthogonal transformations, product design Y can only be rotated and reflected in order to approximate product design X. As for the “as close as possible” or “relatively close” criterion, a reasonable definition would be to measure the distances between corresponding points, square these values, and add them to obtain the sum-of-squares criterion L. In this paper, a product structure (BOM)-based product similarity measures using orthogonal procrustes approach is proposed. A structural product is first transformed into bill of materials (BOM), the structural similarity measurement between a product query and target product is calculated and evaluated using orthogonal procrustes approach. The results show that the proposed product structure similarity measure method can help companies find desired product information based on BOM feature.  相似文献   
54.
We have investigated real-time, label-free, in-situ detection of human epidermal growth factor receptor 2 (Her2) in diluted serum using the first longitudinal extension mode of a lead zirconate-lead titanate (PZT)/glass piezoelectric microcantilever sensor (PEMS) with H3 single-chain variable fragment (scFv) immobilized on the 3-mercaptopropyltrimethoxysilane (MPS) insulation layer of the PEMS surface. We showed that with the longitudinal extension mode, the PZT/glass PEMS consisting of a 1 mm long and 127 μm thick PZT layer bonded with a 75 μm thick glass layer with a 1.8 mm long glass tip could detect Her2 at a concentration of 6-60 ng/ml (or 0.06-0.6 nM) in diluted human serum, about 100 times lower than the concentration limit obtained using the lower-frequency flexural mode of a similar PZT/glass PEMS. We further showed that with the longitudinal mode, the PZT/glass PEMS determined the equilibrium H3-Her2 dissociation constant K(d) to be 3.3±0.3 × 10(-8) M consistent with the value, 3.2±0.28 ×10(-8) M deduced by the surface plasmon resonance method (BIAcore).  相似文献   
55.
CoHub, a coherency hub ASIC, provides a cost-effective way to extend a glueless two-node chip-multithreading system to a four-node system without changes to the processor. The four-node, 256-thread system achieves near-linear scaling of performance with thread count on transaction-processing workloads. Time-to-market pressure, 800-MHz operation, and a six-stage pipeline were among the constraints that shaped CoHub's design.  相似文献   
56.
Remote user authentication scheme is a procedure which allows a server to authenticate a remote user through insecure channel. Recently, Yoon, Ryu and Yoo made an enhancement based on Ku–Chen’s remote user authentication scheme by using smart cards. The scheme has the merits of providing mutual authentication, no verification table, freely choosing password, involving only few hashing operations and parallel session attack resistance. In this paper, we point out security flaws of Yoon–Ryu–Yoo’s protocols against masquerading attack, off-line password guessing attacks and parallel session attack. An improvement to enhance Yoon–Ryu–Yoo’s security scheme is proposed.  相似文献   
57.
Traditional algorithms for optimizing the execution order of joins are no more valid when selections and projections involve methods and become very expensive operations. Selections and projections could be even more costly than joins such that they are pulled above joins, rather than pushed down in a query tree. In this paper, we take a fundamental look at how to approach query optimization from a top-down design perspective, rather than trying to force one model to fit into another. We present a graph model which is designed to characterize execution plans. Each edge and each vertex of the graph is assigned a weight to model execution plans. We also design algorithms that use these weights to optimize the execution order of operations. A cost model of these algorithms is developed. Experiments are conducted on the basis of this cost model. The results show that our algorithms are superior to similar work proposed in the literature. Received 20 April 1999 / Accepted 9 August 2000 Published online 20 April 2001  相似文献   
58.
Monodisperse copolymer particles carrying surface carboxyl groups in the range of 50–200 μm were prepared by in situ UV polymerization of ethyleneglycol dimethacrylate (EGDMA) with acrylic acid (AA) via a microfluidic flow-focusing device (MFFD). The design of the coaxial orifices in the MFFD enables the confinement of the comonomer liquid thread to the central axis of the microchannel, which can avoid the wetting problem of comonomer liquid with the microchannel and can successfully produce monodisperse copolymer microspheres with coefficient of variance below 5%. The effects of concentration of EGDMA and AA on droplet diameters and the distribution of carboxyl group on particle surfaces were examined. It has been found that, increasing the concentration of AA would decrease particle sizes, but increase the distribution of carboxyl group on particle surfaces. Bioconjugation of the carboxylated copolymer particles with the anti-rabbit IgG–Cy3 conjugates was successfully demonstrated. By increasing the concentration of AA accompanied with decreasing the particle sizes, high efficiency of bioconjugation on carboxylated copolymer particles was achieved. The rapid continuous synthesis of carboxylated copolymer particles via a microfluidic device provides a reliable control of particle sizes and composition for massive production in biotechnological applications.  相似文献   
59.
This paper describes a resource broker whose main function is to match available resources to user needs. The resource broker provides a uniform interface for accessing available and appropriate resources via user credentials. We also focus on providing approximate measurement models for network-related information using NWS for future scheduling and benchmarking. We first propose a network measurement model for gathering network-related information (including bandwidth, latency, forecasting, error rates, etc.) without generating excessive system overhead. Second, we constructed a grid platform using Globus Toolkit that integrates the resources of five schools in Taichung integrated grid environment resources (TIGER). The resource broker runs on top of TIGER. Therefore, it provides security and current information about available resources and serves as a link to the diverse systems available in the Grid.
Sung-Yi ChenEmail:
  相似文献   
60.
Behavior‐based detection and signature‐based detection are two popular approaches to malware (malicious software) analysis. The security industry, such as the sector selling antivirus tools, has been using signature and heuristic‐based technologies for years. However, this approach has been proven to be inefficient in identifying unknown malware strains. On the other hand, the behavior‐based malware detection approach has a greater potential in identifying previously unknown instances of malicious software. The accuracy of this approach relies on techniques to profile and recognize accurate behavior models. Unfortunately, with the increasing complexity of malicious software and limitations of existing automatic tools, the current behavior‐based approach cannot discover many newer forms of malware either. In this paper, we implement ‘holography platform’, a behavior‐based profiler on top of a virtual machine emulator that intercepts the system processes and analyzes the CPU instructions, CPU registers, and memory. The captured information is stored in a relational database, and data mining techniques are used to extract information. We demonstrate the breadth of the ‘holography platform’ by conducting two experiments: a packed binary behavior analysis and a malvertising (malicious advertising) incident tracing. Both tasks are known to be very difficult to do efficiently using existing methods and tools. We demonstrate how the precise behavior information can be easily obtained using the ‘holography platform’ tool. With these two experiments, we show that the ‘holography platform’ can provide security researchers and automatic malware detection systems with an efficient malicious software behavior analysis solution. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号