首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3245篇
  免费   194篇
  国内免费   8篇
电工技术   40篇
化学工业   824篇
金属工艺   40篇
机械仪表   84篇
建筑科学   128篇
矿业工程   5篇
能源动力   114篇
轻工业   568篇
水利工程   30篇
石油天然气   19篇
无线电   204篇
一般工业技术   473篇
冶金工业   117篇
原子能技术   13篇
自动化技术   788篇
  2024年   10篇
  2023年   45篇
  2022年   127篇
  2021年   143篇
  2020年   115篇
  2019年   133篇
  2018年   121篇
  2017年   110篇
  2016年   142篇
  2015年   112篇
  2014年   147篇
  2013年   286篇
  2012年   236篇
  2011年   264篇
  2010年   210篇
  2009年   192篇
  2008年   179篇
  2007年   152篇
  2006年   124篇
  2005年   96篇
  2004年   77篇
  2003年   64篇
  2002年   69篇
  2001年   35篇
  2000年   33篇
  1999年   27篇
  1998年   29篇
  1997年   20篇
  1996年   21篇
  1995年   20篇
  1994年   12篇
  1993年   19篇
  1992年   8篇
  1991年   8篇
  1990年   7篇
  1989年   5篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   5篇
  1984年   4篇
  1983年   5篇
  1982年   3篇
  1981年   5篇
  1977年   5篇
  1976年   2篇
  1974年   2篇
  1973年   5篇
  1967年   1篇
  1945年   1篇
排序方式: 共有3447条查询结果,搜索用时 0 毫秒
31.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
32.
33.
Styrene polymerization was carried out with Ni(acac)2/MAO and Ni(acac)2/SiO2/MAO. The influence of reaction parameters (Al/Ni mole ratio, catalyst concentration, temperature and time polymerization) on styrene polymerization was evaluated. It was observed that both catalytic systems were affected by reaction parameters and that the heterogeneous catalyst presented higher activity than the homogeneous one. Polystyrenes with different molecular weight, stereoregularity and polydispersity were obtained. These results suggest that different active catalyst species could have been present. In addition, two types of methylaluminoxane (MAO) with different molecular weights were also evaluated as cocatalyst. As a result, the catalyst activity and stereospecificity were strongly affected by the MAO type.  相似文献   
34.
A number of hyperbranched polymers containing cyclopentadienyliron moieties were prepared using the A2+B3 method. The A2 compounds used were common diols, dithiols or dichloroarenecomplexes. B3 compounds included either prepared star-shaped molecules or a purchased triol. The effect of the reaction conditions on the properties of the products was probed. Analysis of the prepared polymers was conducted using 1H and 13C NMR, viscometry, differential scanning calorimetry (DSC) and thermogravimetric analysis (TGA). Viscometry values were generally found to be low, in the range of 0.175–0.300 dl/g. TGA showed losses starting at approximately 230°C and ending at 280°C, corresponding to the decomposition of the cyclopentadienyliron moiety. Degradation of the polyether backbone was found to occur starting at 390–567°C. Glass transition temperatures were found to be between 60 and 134°C, whereas melting temperatures ranged from 155 to 190°C.  相似文献   
35.

For an autonomous system to perform maintenance tasks in a networking device or a radio base station (RBS), it has to deal with a series of technological challenges ranging from identifying hardware-related problems to manipulating connectors. This paper describes the development of a robot maintenance system dedicated to detect and resolve faulty links caused by unplugged or poorly connected cables. Although the maintenance system relies on four subsystems, we significantly focus on our low-cost and efficient custom gripper solution developed to handle RJ45 Ethernet connectors. To examine our gripper, we conducted three experiments. First, a qualitative questionnaire was submitted to 30 users in the case of the teleoperated scenario of the gripper attached to a robotic arm. Similarly, we also tested the automatic operation mode. The results showed that our system is reliable and delivers a highly efficient maintenance tool in both teleoperated and autonomous operation modes. The practical experiment containing the removal or unplugging of connectors demonstrated our gripper’s ability to adequately handle these, whereas the feedback from the questionnaire pointed to a positive user experience. The automatic test assessed the gripper’s robustness against the continuous operation.

  相似文献   
36.
A model for atmospheric pollutant transport is proposed considering an advection–diffusion–reaction equation. A splitting method is used to decouple the advection, diffusion and reaction parts. A scheme based on finite volume, finite difference and backward differentiation formula is used for solving an atmospheric transport-chemistry problem.  相似文献   
37.
Modelling students' behaviours has reached a status that can only be overcome by improving the ability of predicting the results on teamwork. Indeed, teamwork is an important piece on the learning process, but understanding their mechanisms and predicting the results achieved is far from being solved by traditional classifiers. In this paper, we address the problem of predicting teamwork results, and propose a recommender system that suggests new teams, in the context of a given curricular unit. Any student, who is looking for a team, may use the system; in particular, he may ask for the best team to join, either considering all available colleagues or just the set of his previous teammates. Our system makes use of social network analysis and classification methods as the algorithmic core of the decision‐making process. System evaluation is presented through a set of experimental results, which report the performance of social network analysis and classification algorithms over real datasets.  相似文献   
38.
This paper presents a novel integrated guidance and control strategy for docking of autonomous underwater vehicles. The approach to the base, and hence the control design, is divided in two steps: (i) in the first, at higher speed, the vehicle dynamics is assumed to be underactuated, and an appropriate control law is derived to steer the vehicle towards the final docking path, achieving convergence to zero of the appropriate error variables for almost all initial conditions; (ii) in the second stage, at low speed, the vehicle is assumed to be fully actuated, and a robust control law is designed that achieves convergence to zero of the appropriate error variables for all initial conditions, in the presence of parametric model uncertainty. Simulations are presented illustrating the performance of the proposed controllers, including model uncertainty and sensor noise. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
39.
Recently, a new peer-assisted architecture to build content delivery systems has been presented. This architecture is based on the use of the storage capacity of end-users’ set-top boxes (STBs), connected in a peer-to-peer (P2P) manner in order to help the content servers in the delivery process. In these systems, the contents are usually split into a set of smaller pieces, called sub-streams, which are randomly injected at the STBs. The present paper is focused on Video on Demand (VoD) streaming and it is assumed that the STB-based content delivery system is deployed over the global Internet, where the clients are distributed over different ISP networks. In this scenario, three different strategies are studied for increasing the percentage of data uploaded by peers, in order to offload the content servers as much as possible. First of all, a new mechanism is presented which determines which sub-stream has to be placed at which STB by a Non-Linear Programming (NLP) formulation. A different strategy for reducing the content server load is to take advantage of the available bandwidth in the different ISP networks. In this sense, two new mechanisms for forwarding the VoD requests to different ISP networks are presented. Finally, the present paper also shows that in some situations the available uplink bandwidth is associated with STBs that do not have the required sub-streams. Regarding this concern, a new mechanism has been designed that dynamically re-allocates some streams, which are being transmitted from specific STBs, to different STBs, in order to find the necessary resources to start new streaming sessions.  相似文献   
40.
Regularization is a well-known technique in statistics for model estimation which is used to improve the generalization ability of the estimated model. Some of the regularization methods can also be used for variable selection that is especially useful in high-dimensional problems. This paper studies the use of regularized model learning in estimation of distribution algorithms (EDAs) for continuous optimization based on Gaussian distributions. We introduce two approaches to the regularized model estimation and analyze their effect on the accuracy and computational complexity of model learning in EDAs. We then apply the proposed algorithms to a number of continuous optimization functions and compare their results with other Gaussian distribution-based EDAs. The results show that the optimization performance of the proposed RegEDAs is less affected by the increase in the problem size than other EDAs, and they are able to obtain significantly better optimization values for many of the functions in high-dimensional settings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号