首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   613篇
  免费   27篇
  国内免费   1篇
电工技术   8篇
综合类   2篇
化学工业   225篇
金属工艺   8篇
机械仪表   15篇
建筑科学   16篇
能源动力   34篇
轻工业   68篇
水利工程   8篇
石油天然气   12篇
无线电   38篇
一般工业技术   93篇
冶金工业   21篇
原子能技术   1篇
自动化技术   92篇
  2024年   2篇
  2023年   17篇
  2022年   57篇
  2021年   53篇
  2020年   38篇
  2019年   41篇
  2018年   30篇
  2017年   27篇
  2016年   34篇
  2015年   21篇
  2014年   26篇
  2013年   43篇
  2012年   31篇
  2011年   27篇
  2010年   15篇
  2009年   18篇
  2008年   13篇
  2007年   15篇
  2006年   11篇
  2005年   10篇
  2004年   6篇
  2003年   6篇
  2002年   10篇
  2001年   9篇
  2000年   4篇
  1999年   10篇
  1998年   7篇
  1997年   3篇
  1996年   7篇
  1995年   2篇
  1994年   5篇
  1993年   3篇
  1992年   4篇
  1991年   6篇
  1990年   2篇
  1989年   1篇
  1988年   2篇
  1987年   3篇
  1986年   2篇
  1984年   5篇
  1983年   2篇
  1982年   4篇
  1981年   1篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
排序方式: 共有641条查询结果,搜索用时 15 毫秒
111.
This paper investigates the performance of the primary user in a multiuser cognitive radio environment. Using spectrum sharing method, multiple cognitive users compete to share a channel dedicated to the primary user in order to transmit their data to a common receiver unit. Only one cognitive user is scheduled to share the channel, and to do so, its transmit power should not increase the primary user’s outage probability above a certain limit. The average bit error rate and the average channel capacity of the primary user are derived in this setup for different cognitive scheduling schemes. The performance measures of the primary user are found to depend on the cognitive user’s scheduling criterion and on the parameters of the communication environment.  相似文献   
112.
113.
In this article, an adaptive denoising method is suggested to accurate investigate the optical and structural features of polymeric fibers from noisy phase shifting microinterferograms. The mixed class of noise that may produce in the phase-shifting interferometric techniques is established. To our knowledge, this is an early study considered the mixing noises that may occur in microinterferograms. The suggested method utilized the convolution neural networks to detect the noise class and then denoising, it according to its class. Four convolution neural networks (Googlenet, VGG-19, Alexnet, and Alexnet–SVM) are refined to perform the automatic classification process for the noise class in the established data set. The network with the highest validation and testing accuracy of these networks is considered to apply the suggested method on realistic noisy microinterferograms for polymeric fibers, polypropylene and antimicrobial polyethylene terephthalate)/titanium dioxide, recoded using interference microscope. Also, the suggested method is applied on noisy microinterferograms include crazing and nanocomposite material. The demodulated phase maps and the three-dimensional birefringence profiles are calculated for tested fibers according to the suggested method. The obtained results are compared with the published data for these fibers and found to be in good agreements.  相似文献   
114.
The role of nitrogen dioxide in the selective reduction of NO by propane over a Cu-MFI zeolite is investigated. NO2 and NO reductions were carried out under similar conditions of reaction. In the presence of oxygen, the reduction of NO by C3H8 does not differ significantly from that of NO2. In the absence of oxygen, the reduction of NO2 by propane occurs with a partial decomposition of the nitric dioxide molecule. Such a decomposition leads to the formation of oxygen, which is responsible for the increase in catalytic activity by comparison with the same reaction performed with NO. NO2 formed and released in the gas phase during the reduction of NO by propane in the presence of oxygen does not play a predominant role in the catalytic process.  相似文献   
115.
While conforming on the findings of prior researches regarding quality cost system in building companies, current research successfully illustrates the contractors' perceptions on the importance of the quality cost system and the barriers that may constrain the implementation of the system for recording and collecting quality cost data. A postal and email surveys were undertaken on Malaysian building companies, focusing on the benefits and difficulties associated with the implementation of quality cost system. Statistical analyses based on Chi-Squared test and Relative Importance Index techniques were used to investigate the significance of the findings and determine the relative importance of the factors. The most important benefit of measuring quality costs is “getting management attention and increase quality awareness” as perceived by the sample of the study. The possible barriers that may affect the management's decision to implement quality cost system are identified and grouped into three categories, which are culture and knowledge; system; and company. The study suggests that the level of the site staff's knowledge should be as important as that of the management to successfully collect and record quality costs data. The findings of this research will raise the level of awareness and sensitize managers and those involved with building industry about the importance of quality cost system and collecting quality costs data.  相似文献   
116.
117.
Extensive cracking of the type known as stack cracking was demonstrated in a cathodically charged X65 microalloyed pipeline steel containing a weldment. It is shown that the formation and propagation of rolling-plane cracks, which constitute the primary stages of the stack cracking, is due to local concentration of hydrogen gas pressure and a lowering of the cohesive strength of a number of interfaces by hydrogen. The characteristic S-shape of individual cracks which occurred during the linking up of cracks was attributed to stress interactions at crack tips and cleavage cracking normal to the rolling plane. An explanation of hydrogen embrittlement fracture is given in terms of electronic state modifications of the steel, including charge polarization.  相似文献   
118.
A total number of 50 rectangular specimens, made of hybrid visible light cured composite were used in the present study. The specimens were divided into 5 groups (10 specimens each). Each group was treated with one of the post-cure heat-treatment methods. It was found that, the specimens exposed to the normal post-cure heat-treatment method demonstrated the minimum dimensional change values (0.62%, 0.166%, 1.4% and 2.23%) for length, width, and volume respectively. On the other hand, the specimens exposed to the (delay-heat) water ageing method displayed the maximum values (2.9%, 0.56%, 9.2%, and 9.98%) for the length, width, height, and volume respectively.  相似文献   
119.
Wireless Personal Communications - Femtocells are the solution to improve cellular system capacity in indoor coverage. In two-tier networks, co-channel interference is a serious problem. In this...  相似文献   
120.
Masking schemes based on tables recomputation are classical countermeasures against high-order side-channel attacks. Still, they are known to be attackable at order d in the case the masking involves d shares. In this work, we mathematically show that an attack of order strictly greater than d can be more successful than an attack at order d. To do so, we leverage the idea presented by Tunstall, Whitnall and Oswald at FSE 2013: We exhibit attacks which exploit the multiple leakages linked to one mask during the recomputation of tables. Specifically, regarding first-order table recomputation, improved by a shuffled execution, we show that there is a window of opportunity, in terms of noise variance, where a novel highly multivariate third-order attack is more efficient than a classical bivariate second-order attack. Moreover, we show on the example of the high-order secure table computation presented by Coron at EUROCRYPT 2014 that the window of opportunity enlarges linearly with the security order d. These results extend that of the CHES ’15 eponymous paper. Here, we also investigate the case of degree one leakage models and formally show that the Hamming weight model is the less favorable to the attacker. Eventually, we validate our attack on a real ATMEL smartcard.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号