首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4735篇
  免费   334篇
  国内免费   7篇
电工技术   72篇
综合类   3篇
化学工业   1287篇
金属工艺   105篇
机械仪表   150篇
建筑科学   162篇
矿业工程   7篇
能源动力   183篇
轻工业   1024篇
水利工程   38篇
石油天然气   34篇
无线电   215篇
一般工业技术   726篇
冶金工业   456篇
原子能技术   27篇
自动化技术   587篇
  2024年   30篇
  2023年   69篇
  2022年   194篇
  2021年   258篇
  2020年   169篇
  2019年   197篇
  2018年   216篇
  2017年   216篇
  2016年   228篇
  2015年   131篇
  2014年   205篇
  2013年   387篇
  2012年   314篇
  2011年   320篇
  2010年   261篇
  2009年   276篇
  2008年   211篇
  2007年   176篇
  2006年   146篇
  2005年   104篇
  2004年   80篇
  2003年   72篇
  2002年   70篇
  2001年   55篇
  2000年   45篇
  1999年   57篇
  1998年   123篇
  1997年   71篇
  1996年   75篇
  1995年   50篇
  1994年   30篇
  1993年   30篇
  1992年   22篇
  1991年   21篇
  1990年   20篇
  1989年   23篇
  1988年   13篇
  1987年   11篇
  1986年   13篇
  1985年   12篇
  1984年   5篇
  1983年   8篇
  1981年   8篇
  1980年   6篇
  1979年   7篇
  1978年   8篇
  1977年   5篇
  1976年   11篇
  1975年   3篇
  1972年   5篇
排序方式: 共有5076条查询结果,搜索用时 15 毫秒
61.
Security is an important concern in any modern network. This also applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors imposes a difficult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For this reason, the choice of the most memory-, processing- and energy-efficient security solutions is of vital importance in WSNs. To date, a number of extensive analyses comparing different encryption algorithms and key management schemes have been developed, while very little attention has been given to message authentication solutions. In this paper, aiming to close this gap, we identify cipher-based Message Authentication Codes (MACs) and Authenticated Encryption with Associated Data (AEAD) schemes suitable for WSNs and then evaluate their features and performance on a real platform (TelosB). As a result of this analysis, we identify the recommended choices depending on the characteristics of the target network and available hardware.  相似文献   
62.
The major goal of this paper is to help detect breast cancer early based on infrared images. Some procedures, protocols and numerical simulations were developed or performed. Two different issues are presented. The first is the development of a standardized protocol for the acquisition of breast thermal images including the design, construction and installation of mechanical apparatus. The second part is related to the greatest difficulty for the numerical computation of breast temperature profiles that is caused by the uncertainty of the real values of the thermophysical parameters of some tissues. Then, a methodology for estimating thermal properties based on these infrared images is presented. The commercial software FLUENTTM was used for the numerical simulation. A Sequential Quadratic Programming (SQP) method was used to solve the inverse problem and to estimate the thermal conductivity and blood perfusion of breast tissues. The results showed that it is possible to estimate the thermophysical properties using the thermography. The next stage will be to use the geometry of a real breast for the numerical simulation in conjunction with a linear mapping of the temperatures measured over the breast volume.  相似文献   
63.
Clock-gating techniques are very effective in the reduction of the switching activity in sequential logic circuits. In this paper, we describe a clock-gating technique based on finite-state machine (FSM) decomposition. The approach is based on the computation of two sub-FSMs that together have the same functionality as the original FSM. For all the transitions within one sub-FSM, the clock for the other sub-FSM is disabled. To minimize the average switching activity, we search for a small cluster of states with high stationary state probability and use it to create the small sub-FSM. Explicit manipulation of the state transition graph requires time and space exponential on the number of registers in the circuit, thereby restricting the applicability of explicit methods to relatively small circuits. The approach we propose is based on a method that implicitly performs the FSM decomposition. Using this technique, the FSM decomposition is performed by direct manipulation of the circuit. We provide a set of experiments that show that power consumption can be substantially reduced, in some cases by more than 70%.  相似文献   
64.
The wireless sensor networks (WSNs) concept was appeared in the middle of 90s and have been a subject under intensive research in the past few years. Several factors have contributed to this, but the potential for application of WSNs in almost every aspect of day-to-day life is the predominant one. This type of networks has been developed using proprietary solutions instead of standard solutions. More recently, the importance of standards motivated the use of IETF standards in WSNs, making the Internet integration easier. However, more efforts are necessary in order to provide a full integration. The WSNs use mainly IPv6 protocol, but the IPv4 is the predominant one in the Internet. As a consequence, IPv4 to IPv6 transition mechanisms must be provided to allow the interaction between all Internet connected devices independently of the supported IP version. It is also critical to provide a standard application interface to make easier the application development and independently of the hardware platform used. The RESTfull Web services can provide this standard interface. So, combine RESTfull Web services with IPv4 to IPv6 transition mechanisms can increase the WSN services dissemination. The transition mechanisms and the REST Web services are supported in the gateway in order to save the wireless sensor device resources’. The smartphone with Internet connectivity can also be the drive to the WSNs growth, because user-friendly applications can be used to retrieve and collect sensed data. This paper proposes a solution based on REST web services to permit the interaction between a mobile application and the IPv6 compliant WSN.  相似文献   
65.
Using Java-based tools in multimedia collaborative environments accessed over the Internet can increase an application's client base. Most operating systems support Java, and its "compile once-run everywhere" architecture is easy to maintain and update. The Java-based tools presented here let users share Internet resources, including resources originally designed for single use.  相似文献   
66.
67.
This work discusses the uncertainty quantification aspect of quantification of margin and uncertainty (QMU) in the context of two linked computer codes. Specifically, we present a physics based reduction technique to deal with functional data from the first code and then develop an emulator for this reduced data. Our particular application deals with conditions created by laser deposition in a radiating shock experiment modeled using the Lagrangian, radiation-hydrodynamics code Hyades. Our goal is to construct an emulator and perform a sensitivity analysis of the functional output from Hyades to be used as an initial condition for a three-dimensional code that will compute the evolution of the radiating shock at later times. Initial attempts at purely statistical data reduction techniques, were not successful at reducing the number of parameters required to describe the Hyades output. We decided on an alternate approach using physical arguments to decide what features/locations of the output were relevant (e.g., the location of the shock front or the location of the maximum pressure) and then used a piecewise linear fit between these locations. This reduced the number of outputs needed from the emulator to 40, down from the O(1000) points in the Hyades output. Then, using Bayesian MARS and Gaussian process regression, we were able to build emulators for Hyades and study sensitivities to input parameters.  相似文献   
68.
This article shows the role that fuzzy sets may play in the prospect of analysing qualitative data. To underline this role, a human-computer interaction (HCI) study is presented. The data coming from 20 experts concerns their judgment regarding 33 questions related to the use of HCI approaches in order to support interactive system development phases. Each response scale features three main modalities, that is Agree, Partially agree and Disagree. The dataset example is analysed using multiple correspondence analysis (MCA) with both crisp and fuzzy coding models where the intermediate modality, Partially agree, is removed and considered with ½ membership values to the two extreme modalities. A comparative analysis is performed and the discussion states the interest of fuzzy coding with several kinds of qualitative factors or measurement variables. With qualitative measurement variables (our example), the main drawback of fuzzy coding could be the information loss, which is counterbalanced by the possibility of having fewer modalities and therefore of simplifying the multivariate analysis.  相似文献   
69.
ABSTRACT:  Shelf life of pasteurized milk in Brazil ranges from 3 to 8 d, mainly due to poor cold chain conditions that prevail throughout the country and subject the product to repeated and/or severe temperature abuse. This study evaluated the influence of storage temperature on the microbiological stability of homogenized whole pasteurized milk (75 °C/15 s) packaged in high-density polyethylene (HDPE) bottle and low-density polyethylene (LDPE) pouch, both monolayer materials pigmented with titanium dioxide (TiO2). The storage temperatures investigated were 2, 4, 9, 14, and 16 °C. Microbiological evaluation was based on mesophilic and psychrotrophic counts with 7 log CFU/mL and 6 log CFU/mL, respectively, set as upper limits of acceptability for maintaining the quality of milk. The microbiological stability for pasteurized milk packaged in HDPE bottle and stored at 2, 4, 9, 14, and 16 °C was estimated at 43, 36, 8, 5, and 3 d, respectively. For milk samples packaged in LDPE pouch, shelf life was estimated at 37, 35, 7, 3, and 2 d, respectively. The determination of Q10 and z values demonstrated that storage temperature has a greater influence on microbiological shelf life of pasteurized milk packaged in LDPE pouch compared to HDPE bottle. Based on the results of this study, HDPE bottle was better for storing pasteurized milk as compared to LDPE pouch.  相似文献   
70.
Accurate identification of seafood in the marketplace is an issue of international concern, due to high rates of market substitution of cheaper or more widely available species for expensive or high-demand species. Salmon samples from stores and restaurants throughout western Washington, USA were tested using DNA sequencing of a short section of the mitochondrial cytochrome c oxidase I (COI) gene (DNA barcoding) to identify Atlantic salmon substituted for Pacific salmon. Of 99 salmon samples, 11 (11%) were Atlantic salmon sold as Pacific salmon. More than 38% of restaurant samples were mislabeled to species, while only 7% of store samples were mislabeled. Market substitution rates were significantly greater in restaurants compared to stores, and consistently greater in winter compared to spring, although not significantly. The high market substitution rate in restaurants documents a pressing need for more monitoring and enforcement specifically in restaurants. DNA barcoding is a valuable tool for rapid and definitive authentication of salmon in the marketplace, and should be more widely adopted to discourage market substitution.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号