首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   373篇
  免费   23篇
电工技术   7篇
化学工业   68篇
金属工艺   8篇
机械仪表   8篇
建筑科学   13篇
能源动力   13篇
轻工业   50篇
水利工程   3篇
石油天然气   1篇
无线电   51篇
一般工业技术   41篇
冶金工业   21篇
原子能技术   4篇
自动化技术   108篇
  2023年   2篇
  2022年   7篇
  2021年   7篇
  2020年   11篇
  2019年   5篇
  2018年   12篇
  2017年   19篇
  2016年   14篇
  2015年   11篇
  2014年   15篇
  2013年   38篇
  2012年   18篇
  2011年   18篇
  2010年   17篇
  2009年   20篇
  2008年   23篇
  2007年   25篇
  2006年   20篇
  2005年   17篇
  2004年   15篇
  2003年   11篇
  2002年   13篇
  2001年   12篇
  2000年   3篇
  1999年   5篇
  1998年   4篇
  1997年   6篇
  1996年   2篇
  1995年   2篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1988年   3篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1984年   4篇
  1983年   5篇
  1982年   1篇
  1970年   1篇
排序方式: 共有396条查询结果,搜索用时 468 毫秒
51.
In this study an experimental method to measure convective heat transfer characteristics in liquid metals is presented. This method involves the immersion into a metal bath of a solid specimen whose melting point is equal to or lower than that of the metal or alloy in the metal bath, and which will not react chemically with the liquid metal or alloys used. The specimen should have a hollow bore whose opening is held above the surface of the liquid metal; immersion continues until such a time as the liquid metal penetrates the hollow bore. The apparent weight of the specimen is monitored to determine the rate at which the net downward force changes. Experimental results are reported for liquid aluminum, liquid copper, and liquid steel. Those experimental results were conducted under different fluid flow conditions. The applicability of this method to liquid slags is also discussed. Formerly Postdoctoral Research Fellow with the Department of Metallurgy and Materials Science, University of Toronto  相似文献   
52.
This paper presents an on-the-fly and symbolic technique for efficiently checking timed automata emptiness. It is symbolic because it uses the simulation graph (instead of the region graph). It is on-the-fly because the simulation graph is generated during the test for emptiness. We have implemented a verification tool called Profounder based on this technique. To our knowledge, Profounder is the only available tool for checking emptiness of timed Büchi automata. To illustrate the practical interest of our approach, we show the performances of the tool on a non-trivial case study.  相似文献   
53.
54.
55.
This paper proposes a power efficient multipath video packet scheduling scheme for minimum video distortion transmission (optimised Video QoS) over wireless multimedia sensor networks. The transmission of video packets over multiple paths in a wireless sensor network improves the aggregate data rate of the network and minimizes the traffic load handled by each node. However, due to the lossy behavior of the wireless channel the aggregate transmission rate cannot always support the requested video source data rate. In such cases a packet scheduling algorithm is applied that can selectively drop combinations of video packets prior to transmission to adapt the source requirements to the channel capacity. The scheduling algorithm selects the less important video packets to drop using a recursive distortion prediction model. This model predicts accurately the resulting video distortion in case of isolated errors, burst of errors and errors separated by a lag. Two scheduling algorithms are proposed in this paper. The Baseline scheme is a simplified scheduler that can only decide upon which packet can be dropped prior to transmission based on the packet’s impact on the video distortion. This algorithm is compared against the Power aware packet scheduling that is an extension of the Baseline capable of estimating the power that will be consumed by each node in every available path depending on its traffic load, during the transmission. The proposed Power aware packet scheduling is able to identify the available paths connecting the video source to the receiver and schedule the packet transmission among the selected paths according to the perceived video QoS (Peak Signal to Noise Ratio—PSNR) and the energy efficiency of the participating wireless video sensor nodes, by dropping packets if necessary based on the distortion prediction model. The simulation results indicate that the proposed Power aware video packet scheduling can achieve energy efficiency in the wireless multimedia sensor network by minimizing the power dissipation across all nodes, while the perceived video quality is kept to very high levels even at extreme network conditions (many sensor nodes dropped due to power consumption and high background noise in the channel).  相似文献   
56.
The application of Kluyveromyces marxianus (IFO 288), Lactobacillus delbrueckii ssp. bulgaricus (ATCC 11842) and Lactobacillus helveticus (ATCC 15009) as starter cultures for sourdough bread making was examined. Production of lactic and acetic acids, bread rising, volatile composition, shelf-life and organoleptic quality of the sourdough breads were evaluated. The amount of starter culture added to the flour, the dough fermentation temperature and the amount of sourdough used were examined in order to optimise the bread making process. The use of mixed cultures led to higher total titratable acidities and lactic acid concentrations compared to traditionally made breads. Highest acidity (3.41 g lactic acid/kg of bread) and highest resistance to mould spoilage were observed when bread was made using 50% sourdough containing 1% K. marxianus and 4% L. delbrueckii ssp. bulgaricus. The use of these cultures also improved the aroma of sourdough breads, as shown by sensory evaluations and as revealed by GC–MS analysis.  相似文献   
57.
Journal of Computer Virology and Hacking Techniques - In this work we present a graph-based approach for behavior-based malware detection and classification utilizing the Group Relation Graphs...  相似文献   
58.
59.
Requirements Engineering - Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two...  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号