首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1024篇
  免费   67篇
  国内免费   1篇
电工技术   13篇
化学工业   302篇
金属工艺   11篇
机械仪表   21篇
建筑科学   54篇
能源动力   47篇
轻工业   130篇
水利工程   8篇
石油天然气   8篇
无线电   80篇
一般工业技术   158篇
冶金工业   40篇
原子能技术   2篇
自动化技术   218篇
  2023年   9篇
  2022年   25篇
  2021年   46篇
  2020年   43篇
  2019年   36篇
  2018年   32篇
  2017年   33篇
  2016年   47篇
  2015年   42篇
  2014年   57篇
  2013年   91篇
  2012年   86篇
  2011年   92篇
  2010年   65篇
  2009年   57篇
  2008年   65篇
  2007年   59篇
  2006年   34篇
  2005年   35篇
  2004年   24篇
  2003年   25篇
  2002年   14篇
  2001年   6篇
  2000年   12篇
  1999年   7篇
  1998年   11篇
  1997年   14篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1992年   2篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1985年   4篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1976年   2篇
排序方式: 共有1092条查询结果,搜索用时 663 毫秒
11.
Three new dihydro--agarofuran sesquiterpenes from two species ofMaytenus were isolated and their structures were elucidated by means of1H and13C NMR studies. The differences and similarities noted in the chemical content of the dihydro--agarofuran sesquiterpenes from the fourMaytenus species from Chile are in line with the taxonomic characterization of these species; their geographical distribution is also given.  相似文献   
12.
13.
The transmission of information has gone through various stages of evolution throughout its history. A stage before that of the electric telegraph was the so-called aerial/optical telegraph. It was developed towards the end of the 18th century and was in service until the middle of the 19th century. Chappe's system was widely used in France, and was the first to be in consistent use. However, a new and technologically superior system was developed soon afterwards which superseded it. Its inventor was Agustín de Betancourt, considered by some authors one of the founders of the Theory of Machines and Mechanisms, who, together with the distinguished clockmaker Breguet, presented it to the French Authorities in the turbulent decade of the 1790s.This article presents a historical review of this telegraph and analyzes its technical characteristics. It presents analytically, numerically and graphically some of the statements made about the telegraph, and corrects other subsequent observations. Lastly, a detailed reconstruction of the telegraph is made using different advanced CAD techniques, which provide an accurate static and dynamic view of each of its parts.  相似文献   
14.
15.
Applications of wireless communications networks are emerging continuously. To offer a good level of security in these applications, new standards for wireless communications propose solutions based on cryptographic algorithms working on special modes of operation. This work presents a custom hardware architecture for the AES-CCM protocol (AES-CCMP) which is the basis for the security architecture of the IEEE 802.11i standard. AES-CCMP is based on the AES-CCM algorithm that performs the Advanced Encryption Standard (AES) in CTR with CBC-MAC mode (CCM mode), plus specialized data formatting modules, providing different security services through iterative and complex operations. Results of implementing the proposed architecture targeting FPGA devices are presented and discussed. A comparison against similar works shows significant improvements in terms of both throughput and efficiency.  相似文献   
16.
This article proposes a new type of discretizations for initial boundary value problems of thermodynamical systems. Based on a combination of finite elements in space and fractional step methods in time, we formulate algorithms that exactly preserve the symmetries and the laws of thermodynamics of the continuum problem. The algorithmic design is based on the GENERIC formalism of irreversible thermodynamics which naturally suggests the split of the evolution operator upon which our fractional step method is based. Although the emphasis of the article is on the generality of the results, as an illustration, a discretization of nonlinear, finite strain, thermoelasticity is presented. Numerical simulations are provided that verify the excellent performance of the new methods.  相似文献   
17.
ContextModel-Driven Development (MDD) is an alternative approach for information systems development. The basic underlying concept of this approach is the definition of abstract models that can be transformed to obtain models near implementation. One fairly widespread proposal in this sphere is that of Model Driven Architecture (MDA). Business process models are abstract models which additionally contain key information about the tasks that are being carried out to achieve the company’s goals, and two notations currently exist for modelling business processes: the Unified Modelling Language (UML), through activity diagrams, and the Business Process Modelling Notation (BPMN).ObjectiveOur research is particularly focused on security requirements, in such a way that security is modelled along with the other aspects that are included in a business process. To this end, in earlier works we have defined a metamodel called secure business process (SBP), which may assist in the process of developing software as a source of highly valuable requirements (including very abstract security requirements), which are transformed into models with a lower abstraction level, such as analysis class diagrams and use case diagrams through the approach presented in this paper.MethodWe have defined all the transformation rules necessary to obtain analysis class diagrams and use case diagrams from SBP, and refined them through the characteristic iterative process of the action-research method.ResultsWe have obtained a set of rules and a checklist that make it possible to automatically obtain a set of UML analysis classes and use cases, starting from SBP models. Our approach has additionally been applied in a real environment in the area of the payment of electrical energy consumption.ConclusionsThe application of our proposal shows that our semi-automatic process can be used to obtain a set of useful artifacts for software development processes.  相似文献   
18.
This paper presents a new procedure to construct families of spatial approximation-prediction functions which depend on several parameters. The method is based on partitions of the unity. In order to find optimal functions in these families we introduce a Vietoris simplicial set associated to an influence radius. We consider error estimators induced by these Vietoris simplicial sets. A computational implementation of these mathematical models has been developed to be applied to any kind of finite discrete data. Our methods provide a useful tool for the analysis of the spatial distribution of species, which is imperative for developing accurate and efficient management of endangered and invasive species, biological conservation programs, etc. We demonstrate the application of our method to the analysis of the spatial distribution of the grape moth Lobesia botrana (Lepidoptera: Tortricidae) in the vineyards of La Rioja obtaining useful results for the management of this pest.  相似文献   
19.
The IEEE 802.21 standard facilitates media independent handovers by providing higher layer mobility management functions with common service primitives for all technologies. Right after the base specification was published, several voices rose up in the working group advocating to broaden the scope of IEEE 802.21 beyond handovers. This paper aims at updating the reader with the main challenges and functionalities required to create a Media Independence Service Layer, through the analysis of scenarios which are being discussed within the working group: 1) Wireless Coexistence, and 2) Heterogeneous Wireless Multihop Backhaul Networks.  相似文献   
20.
Hosts with several, possibly heterogeneous and/or multicore, processors provide new challenges and opportunities to accelerate applications with high communications bandwidth requirements. Many opportunities to scale these network applications with the increase in the link bandwidths are related to the exploitation of the available parallelism provided by the presence of several processing cores in the servers, not only for computing the workload of the user application but also for decreasing the overhead associated to the network interface and the system software.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号