首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6483篇
  免费   151篇
  国内免费   47篇
电工技术   81篇
综合类   30篇
化学工业   1369篇
金属工艺   84篇
机械仪表   285篇
建筑科学   119篇
矿业工程   9篇
能源动力   389篇
轻工业   882篇
水利工程   68篇
石油天然气   34篇
武器工业   1篇
无线电   802篇
一般工业技术   1360篇
冶金工业   85篇
原子能技术   56篇
自动化技术   1027篇
  2024年   271篇
  2023年   268篇
  2022年   505篇
  2021年   839篇
  2020年   553篇
  2019年   600篇
  2018年   488篇
  2017年   409篇
  2016年   417篇
  2015年   255篇
  2014年   303篇
  2013年   407篇
  2012年   238篇
  2011年   300篇
  2010年   175篇
  2009年   146篇
  2008年   89篇
  2007年   98篇
  2006年   35篇
  2005年   26篇
  2004年   37篇
  2003年   26篇
  2002年   17篇
  2001年   8篇
  2000年   10篇
  1999年   13篇
  1998年   18篇
  1997年   12篇
  1996年   12篇
  1995年   16篇
  1994年   10篇
  1993年   12篇
  1992年   8篇
  1991年   8篇
  1990年   2篇
  1989年   5篇
  1988年   4篇
  1987年   5篇
  1986年   2篇
  1985年   7篇
  1984年   3篇
  1983年   2篇
  1982年   4篇
  1981年   4篇
  1979年   3篇
  1978年   2篇
  1977年   4篇
  1969年   1篇
  1961年   1篇
  1953年   1篇
排序方式: 共有6681条查询结果,搜索用时 15 毫秒
981.
    
With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move towards more secure and reliable user authentication systems. It elevated the security level by requiring a user to possess something in addition to know something. In 2010, Sood et al. and Song independently examined a smart‐card‐based authentication scheme proposed by Xu et al. They showed that in the scheme of Xu et al., an internal user of the system can turn hostile to impersonate other users of the system. Both of them also proposed schemes to improve the scheme of Xu et al. Recently, Chen et al. identified some security problems in the improved schemes proposed by Sood et al. and Song. To fix these problems, Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand lost smart card attack. Undoubtedly, in their scheme, a user can also verify the legitimacy of server, but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide important features such as user anonymity, confidentiality to air messages, and revocation of lost/stolen smart card. Besides, the scheme defies the very purpose of two‐factor security. Furthermore, an attacker can guess a user's password from his or her lost/stolen smart card. To meet these challenges, we propose a user authentication method with user anonymity. We show through analysis and comparison that the proposed scheme exhibits enhanced efficiency in contrast to related schemes, including the scheme of Chen et al. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
982.
    
Fabrication of two and three‐dimensional nanostructures requires the development of new methodologies for the assembly of molecular/macromolecular objects on substrates in predetermined arrangements. Templated self‐assembly approach is a powerful strategy for the creation of materials from assembly of molecular components or nanoparticles. The present study describes the development of a facile, template directed self‐assembly of (metal/organic) nanomaterials into periodic micro‐ and nanostructures. The positioning and the organization of nanomaterials into spatially well‐defined arrays were achieved using an amphiphilic conjugated polymer‐aided, self‐organization process. Arrays of honeycomb patterns formed from conjugated C12PPPOH film with homogenous distribution of metal/organic nanomaterials. Our approach offers a straightforward and inexpensive method of preparation for hybrid thin films without environmentally controlled chambers or sophisticated instruments as compared to multistep micro‐fabrication techniques.  相似文献   
983.
    
The paper discusses a sequence detector based on univariate marginal distribution algorithm (UMDA) that jointly estimates the symbols transmitted in a multiple input multiple output (MIMO) communication system. While an optimal maximum likelihood detection using an exhaustive search method is prohibitively complex, it has been shown that sphere decoder (SD) achieves the optimal bit error rate (BER) performance with polynomial time complexity for smaller array sizes. However, the worst‐case complexity of SD is exponential in the problem dimensions, this brings in question its practical implementation for larger number of spatial layers and for higher‐order signal constellation. The proposed detector shows promising results for this overly difficult and complicated operating environment, confirmed through simulation results. A performance comparison of the UMDA detector with SD is presented for higher‐order complex MIMO architectures with limited average transmit power. The proposed detector achieves substantial performance gain for higher‐order systems attaining a near optimal BER performance with reduced computational complexity as compared with SD. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
984.
    
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution.  相似文献   
985.
    
A physical system can be studied as either continuous time or discrete-time system depending upon the control objectives. Discrete-time control systems can be further classified into two categories based on the sampling: (1) time-triggered control systems and (2) event-triggered control systems. Time-triggered systems sample states and calculate controls at every sampling instant in a periodic fashion, even in cases when states and calculated control do not change much. This indicates unnecessary and useless data transmission and computation efforts of a time-triggered system, thus inefficiency. For networked systems, the transmission of measurement and control signals, thus, cause unnecessary network traffic. Event-triggered systems, on the other hand, have potential to reduce the communication burden in addition to reducing the computation of control signals. This paper provides an up-to-date survey on the event-triggered methods for control systems and highlights the potential research directions.  相似文献   
986.
    
The interpretation of way-finding symbols for healthcare facilities in a multicultural community was assessed in a cross-sectional study. One hundred participants recruited from Al Ain city in the United Arab Emirates were asked to interpret 28 healthcare symbols developed at Hablamos Juntos (such as vaccinations and laboratory) as well as 18 general-purpose symbols (such as elevators and restrooms). The mean age was 27.6 years (16–55 years) of whom 84 (84%) were females. Healthcare symbols were more difficult to comprehend than general-purpose signs. Symbols referring to abstract concepts were the most misinterpreted including oncology, diabetes education, outpatient clinic, interpretive services, pharmacy, internal medicine, registration, social services, obstetrics and gynecology, pediatrics and infectious diseases. Interpretation rates varied across cultural backgrounds and increased with higher education and younger age. Signage within healthcare facilities should be tested among older persons, those with limited literacy and across a wide range of cultures.  相似文献   
987.
    
Component‐based development has emerged as a system engineering approach that promises rapid software development with fewer resources. Yet, improved reuse and reduced cost benefits from software components can only be achieved in practice if the components provide reliable services, thereby rendering component analysis and testing a key activity. This paper discusses various issues that can arise in component testing by the component user at the stage of its integration within the target system. The crucial problem is the lack of information for analysis and testing of externally developed components. Several testing techniques for component integration have recently been proposed. These techniques are surveyed here and classified according to a proposed set of relevant attributes. The paper thus provides a comprehensive overview which can be useful as introductory reading for newcomers in this research field, as well as to stimulate further investigation. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
988.
    
Abstract

Increasing water scarcity, degradation of land and water resources, continuing low agricultural productivity, and increasing populations are posing the largest ever challenges for development of agricultural economies in many developing countries including Pakistan. Using panel data from irrigated settings in Chaj sub-basin of the Indus basin in Pakistani Punjab, we attempt to: (a) analyze the causes of low productivity; (b) disentangle factors (both land, water and other factors) contributing to productivity variations; and (c) identify limits and opportunities for narrowing productivity gaps and increasing overall wheat production, with a view to enhance food security for the poor. The results of the study indicate that locational inequities in distribution of canal water, use of groundwater of varying quality, differences in use of seed varieties, and other inputs lead to significant variations in wheat productivity. Key implications are that large gains in wheat productivity are possible by (a) improving the production environment at the tail-end through integrated water management practices; (b) adjusting the mix of canal and groundwater use; and (c) using technological interventions to improve the adoption of modern wheat varieties and dissemination of knowledge on planting dates and timings and application rates of inputs, especially water and fertilizer. Not only such interventions are economically, financially, and environmentally desirable, they are also pro-poor. What is needed is a strong political will and commitment.  相似文献   
989.
    
This paper reviews the challenges facing the Saudi Arabian dairy industry dominated by a few companies engaged in aggressive price war strategies. The key players and the main drivers for milk production and consumption are discussed in detail. The latest developments in the ‘Saudisation’ policy and ‘Nitaqat’ scheme have also affected the quality of the labour force in the industry. The paper concludes that although the future prospects are promising, smaller milk‐producing companies might not survive unless they adopt alternate strategies. The latest push for job replacement with the domestic labour will also create difficulties for dairy firms to produce high quality products at a sustaining labour cost.  相似文献   
990.
    
BACKGROUND: The production of watermelon in China has been seriously hampered by fruit blotch disease and limited control measures are now applied. Chitosan has been employed to control a variety of plant diseases and is considered to be the most promising biochemical to control this disease. RESULTS: The in vitro antibacterial effect of chitosan and its ability in protection of watermelon seedlings from bacterial fruit blotch were evaluated. Results showed that three types of chitosan, in particular, chitosan A at 0.40 mg mL?1 significantly inhibited the growth of Acidovorax citrulli. The antibacterial activity of chitosan A was affected by chitosan concentration and incubation time. The direct antibacterial activity of chitosan may be attributed to membrane lysis evidenced by transmission electron microscopic observation. The disease index of watermelon seedlings planted in soil and the death rate of seedlings planted in perlite were significantly reduced by chitosan A at 0.40 mg mL?1 compared to the pathogen control. Fresh and dry weight of watermelon seedlings planted in soil was increased by chitosan seed treatment, but not by chitosan leaf spraying. CONCLUSION: The results indicated that chitosan solution may have a potential in controlling bacterial fruit blotch of watermelon. © 2013 Society of Chemical Industry  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号