首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   961篇
  免费   60篇
电工技术   13篇
综合类   2篇
化学工业   244篇
金属工艺   5篇
机械仪表   12篇
建筑科学   34篇
矿业工程   1篇
能源动力   48篇
轻工业   103篇
水利工程   9篇
石油天然气   1篇
无线电   131篇
一般工业技术   141篇
冶金工业   23篇
原子能技术   1篇
自动化技术   253篇
  2024年   2篇
  2023年   16篇
  2022年   45篇
  2021年   45篇
  2020年   31篇
  2019年   19篇
  2018年   36篇
  2017年   43篇
  2016年   46篇
  2015年   33篇
  2014年   39篇
  2013年   63篇
  2012年   65篇
  2011年   81篇
  2010年   50篇
  2009年   63篇
  2008年   61篇
  2007年   47篇
  2006年   40篇
  2005年   34篇
  2004年   20篇
  2003年   14篇
  2002年   16篇
  2001年   9篇
  2000年   7篇
  1999年   8篇
  1998年   6篇
  1997年   15篇
  1996年   6篇
  1995年   4篇
  1994年   5篇
  1993年   5篇
  1992年   7篇
  1991年   5篇
  1990年   2篇
  1989年   6篇
  1988年   4篇
  1987年   4篇
  1986年   5篇
  1985年   3篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1979年   2篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有1021条查询结果,搜索用时 46 毫秒
51.
Mixed-valence polycyanides (Prussian Blue analogues) possess a rich palette of properties spanning from room-temperature ferromagnetism to zero thermal expansion, which can be tuned by chemical modifications or the application of external stimuli (temperature, pressure, light irradiation). While molecule-based materials can combine physical and chemical properties associated with molecular-scale building blocks, their successful integration into real devices depends primarily on higher-order properties such as crystal size, shape, morphology, and organization. Herein a study of a new reduced-dimensionality system based on Prussian Blue analogues (PBAs) is presented. The system is built up by means of a modified Langmuir-Blodgett technique, where the PBA is synthesized from precursors in a self-limited reaction on a clay mineral surface. The focus of this work is understanding the magnetic properties of the PBAs in different periodic, low-dimensional arrangements, and the influence of the "on surface" synthesis on the final properties and dimensionality of the system.  相似文献   
52.
A dielectric sphere with an eccentric spherical dielectric inclusion and an incident amplitude-modulated plane electromagnetic wave constitute an exterior radiation problem, which is solved in this paper. A solution is obtained by combined use of the Fourier transform and the indirect-mode-matching method. The analysis yields a set of linear equations for the wave amplitudes of the frequency-domain expansion of the electric-field intensity within and outside the externally spherical inhomogeneous body; that set is solved by truncation and matrix inversion. The shape of the backscattered pulse in the time domain is determined by application of the inverse fast Fourier transform. Numerical results are shown for a pulse backscattered by an acrylic sphere that contains an eccentric spherical cavity. The effects of cavity position and size on pulse spreading and delay are discussed.  相似文献   
53.
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer‐to‐peer network model. In this article, we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed. Such protocols, which are based on zero‐knowledge and challenge‐response techniques, are presented through proofs and simulation results. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
54.
Many scheduling techniques have been developed to solve the problem of sharing the common channel to multiple stations. TDMA has been increasingly used as a scheduling technique in ad-hoc networks. The current trend for QoS capable applications led to the deployment of numerous routing schemes that use TDMA. These schemes try to solve the problem of distributing the available slots among the wireless nodes and at the same time, to find paths within the network that fulfill some QoS related limitations, such as end-to-end delay. The exact way the slots are distributed among the transmitting nodes has an impact on the end-to-end delay and other performance parameters of the network, such as capacity. Therefore, the efficiency of the scheduling algorithms is closely related to the network topologies. In this paper, we propose two new end-to-end TDMA scheduling algorithms that try to enhance the network capacity by increasing the number of concurrent connections established in the network, without causing additional end-to-end delay. We study the efficiency of the proposed algorithms, when applied on various random topologies, and compare them in terms of end-to-end delay and network capacity.  相似文献   
55.
Cooperative Caching in Wireless Multimedia Sensor Networks   总被引:1,自引:0,他引:1  
The recent advances in miniaturization and the creation of low-power circuits, combined with small-sized batteries have made the development of wireless sensor networks a working reality. Lately, the production of cheap complementary metal-oxide semiconductor cameras and microphones, which are able to capture rich multimedia content, gave birth to what is called Wireless Multimedia Sensor Networks (WMSNs). WMSNs will boost the capabilities of current wireless sensor networks, and will fuel several novel applications, like multimedia surveillance sensor networks. WMSNs introduce several new research challenges, mainly related to mechanisms to deliver application-level Quality-of-Service (e.g., latency minimization). To address this goal in an environment with extreme resource constraints, with variable channel capacity and with requirements for multimedia in-network processing, the caching of multimedia data, exploiting the cooperation among sensor nodes is vital. This article presents a cooperative caching solution particularly suitable for WMSNs. The proposed caching solution exploits sensor nodes which reside in “positions” of the network that allow them to forward packets or communicate decisions within short latency. These so-called “mediator” nodes are selected dynamically, so as to avoid the creation of hot-spots in the communication and the depletion of their energy. The mediators are not more powerful than the rest of the nodes, but they have some special role in implementing the cooperation among the sensors. The proposed cooperative caching protocol includes components for locating cached data as well as for implementing data purging out of the sensor caches. The proposed solution is evaluated extensively in an advanced simulation environment, and it is compared to the state-of-the-art cooperative caching algorithm for mobile ad hoc networks. The results confirm that the proposed caching mechanism prevails over its competitor.  相似文献   
56.
Moving between devices is omnipresent, but not for people with disabilities or those who require specific accessibility options. Setting up assistive technologies or finding settings to overcome a certain barrier can be a demanding task for people without technical skills. Context-sensitive adaptive user interfaces are advancing, although migrating access features from one device to another is very rarely addressed. In this paper, we describe the knowledge-based component of the Global Public Inclusive Infrastructure that infers how a device shall be best configured at the operating system layer, the application layer and the web layer to meet the requirements of a user including possible special needs or disabilities. In this regard, a mechanism to detect and resolve conflicting accessibility policies as well as recommending preference substitutes is a main requirement, as elaborated in this paper. As the proposed system emulates decision-making of accessibility experts, we validated the automatic deduced configurations against manual configurations of ten accessibility experts. The assessment result shows that the average matching score of the developed system is high. Thus, the proposed system can be considered capable of making precise decisions towards personalizing user interfaces based on user needs and preferences.  相似文献   
57.
This paper deals with the synthesis of geopolymers utilizing ferronickel slag as raw material. The utilized slag is produced in the Greek plant LARCO during the pyrometallurgical treatment of laterites for the production of ferronickel, specifically at the step of the reductive smelting in electric arc furnaces. The performed work includes the optimization of the slag-based geopolymeric system through the study of the effect of the synthesis parameters on the mechanical properties of the produced materials. The structure of geopolymers was determined with X-ray diffractometry (XRD), Fourier-transform infrared (FTIR) spectroscopy and scanning electron microscopy (SEM). The obtained results showed that the ferronickel slag is an excellent raw material for the production of inorganic polymers using the geopolymerization technology. The materials produced under the optimum synthesis conditions were compact and rigid and presented high compressive strength (118 MPa), as well as extremely low water absorption (0.7–0.8%).  相似文献   
58.
In this paper, we investigate algorithms for some related graph parameters. Each of these asks for a linear ordering of the vertices of the graph (or can be formulated as such), and constructive linear time algorithms for the fixed parameter versions of the problems have been published for several of these. Examples are cutwidth, pathwidth, and directed or weighted variants of these. However, these algorithms have complicated technical details. This paper attempts to present ideas in these algorithms in a different more easily accessible manner, by showing that the algorithms can be obtained by a stepwise modification of a trivial hypothetical non-deterministic algorithm. The methodology is applied to rederive known results for the cutwidth and the pathwidth problem, and obtain new results for several variants of these problems, like directed and weighted variants of cutwidth and modified cutwidth.  相似文献   
59.
Nowadays traffic monitoring and analysis tools provide poor information about traffic volume without giving any clear view of what the hidden rules and relationships that govern these flows are. Since the majority of flows is generated by services (web browsing, email, p2p) and most of these applications are dependent on many network assets (servers and databases) we should discover the underlying relationships of every application. We present a technique that discovers the hidden relationships among components of a network that consist of parts of specific applications. From time information and flow attributes, such as IP addresses and service ports, our method using a novel hybrid genetic algorithm produces a small set of fuzzy rules that can reveal the underlying relationships over a network without any guidance. These dependencies build a service graph which can become a useful tool for fault localization, monitoring service performance, designing changes and anomaly detection. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
60.
Flood events demonstrate devastating effects not only on materials and structures in contact with flowing surface water. Equally important is the behavior of foundations in interaction with subsoil. This contribution gives an overview of different phenomena which arise in subsoil and at the foundation level during the groundwater rise accompanied by several case histories related to cultural heritage. Possible geotechnical measures are discussed as well.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号