首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1351篇
  免费   81篇
  国内免费   2篇
电工技术   19篇
综合类   7篇
化学工业   249篇
金属工艺   30篇
机械仪表   19篇
建筑科学   38篇
矿业工程   2篇
能源动力   30篇
轻工业   162篇
水利工程   4篇
石油天然气   7篇
无线电   170篇
一般工业技术   240篇
冶金工业   229篇
原子能技术   7篇
自动化技术   221篇
  2023年   16篇
  2022年   25篇
  2021年   57篇
  2020年   46篇
  2019年   57篇
  2018年   50篇
  2017年   40篇
  2016年   70篇
  2015年   39篇
  2014年   57篇
  2013年   97篇
  2012年   73篇
  2011年   68篇
  2010年   38篇
  2009年   45篇
  2008年   55篇
  2007年   35篇
  2006年   35篇
  2005年   40篇
  2004年   26篇
  2003年   27篇
  2002年   25篇
  2001年   19篇
  2000年   11篇
  1999年   22篇
  1998年   81篇
  1997年   46篇
  1996年   29篇
  1995年   22篇
  1994年   20篇
  1993年   16篇
  1992年   7篇
  1991年   8篇
  1990年   4篇
  1989年   9篇
  1988年   6篇
  1987年   6篇
  1986年   4篇
  1985年   11篇
  1984年   8篇
  1983年   7篇
  1981年   4篇
  1980年   5篇
  1979年   4篇
  1977年   11篇
  1976年   9篇
  1975年   3篇
  1974年   5篇
  1973年   6篇
  1968年   4篇
排序方式: 共有1434条查询结果,搜索用时 15 毫秒
41.
WLAN (Wireless Local Area Network) has been seen to be one of the promising access technologies that adapts to 4G cellular network systems in providing very high speed connection with QoS guarantee through the polling function. However, when the handover happens, the contention-based medium access mechanism which is mainly used in WLAN is invoked and introduces unbounded transmission delay due to idle time periods and retransmission because of collision during the handover. If this technique is expanded to use in a microcellular network such as connected WLAN micro-cells, contention-based mechanism, therefore, should not be used to handle the MT’s handover, especially for vehicular users who change access point every few seconds. To overcome these difficulties in handover, we introduce parallel polling scheme in dynamic LMC (Logical Macro Cell) which can reduce delays much and remove packet loss rate. LMC is a virtual single macro cell which is built on a multicast group of adjacent micro-cells. In the same LMC, polling signals are sent from every BS (base station) to give MT (mobile terminal) permission to access one of these BSs. Instead of wasting much time to contend for resources of a new BS during handover, the MT answers the polling as an acknowledgment to connect to that new BS. The polling response is controlled to multicast to all BSs of the same LMC via the core network to synchronize for the next polling cycle. LMC is controlled to dynamically change when the MT comes in a new BS to make polling signals be continuous in a new LMC. Through analytical and simulation results, we show that the parallel polling scheme can achieve no handover latency, no packet loss and maintain mobile users’ throughput stably in the high traffic load condition though it causes overhead on the neighboring cells in both of wired and wireless sections. At speeds of up to70 m/s, the MT can still maintain its stable connection. OMNeT++ simulator with INET project is used to evaluate our proposal.  相似文献   
42.
In a previous paper (part I), new strategy was used for raising antibodies against hapten (< 300 Da) and the quantification of these hapten by ELISA using derivatization by chloroethyl nitrosourea (CENU). After raising antibodies against histamine, they were characterized and used for ELISA measurements. Optimal detection conditions were determined for the histamine quantification by ELISA method. The present study investigates the derivatization step of the histamine by chloroethylnitrosourea (CENU). Five factors (2 qualitative: nature of the solvent and nature of the antibodies and 3 quantitative: pH, % of solvent and time of derivatization) have been considered. Optimal reaction conditions were established by calculation of a validated model.  相似文献   
43.
On September 11, 2001, an airliner was intentionally crashed into the Pentagon. It struck at the first elevated slab on the west wall, and slid approximately 310?ft (94.5?m) diagonally into the building. The force of the collision demolished numerous columns and the fa?ade of the exterior wall, and induced damage to first-floor columns and the first elevated slab over an area approximately 90?ft (27.4?m) wide and 310?ft (94.5?m) long. None of the building collapsed immediately. The portion that remained standing, even after an intense fire, sustained substantial damage at the first-floor level.  相似文献   
44.
On September 11, 2001, the reinforced concrete structure of the Pentagon Building was able to resist, without collapse, the impact of a large commercial airliner despite the total loss of 26 columns and severe damage to 15 columns at the ground level. The ensuing fire and related fire-fighting activities led to the collapse of a portion of the building approximately one-half hour after the impact. In this paper, the reasons for the demonstrated toughness of the reinforced concrete structure are examined and attributed to use of spiral columns, effective splicing of reinforcing bars, strong girders, and short span lengths.  相似文献   
45.
The dispersion of spray drops within a two-phase-flow is signified by an deformable phase interface where material properties suddenly change. The process of atomisation could previously only be modelled for standard applications simultaneously coupled with substantial simulations. In this case the process of atomisation is not coupled to the direct numerical simulation (DNS) of the interaction between two liquids. The approach of disintegration is modelled by statistics, describing the probability of generating liquid droplets. Therefore consideration of potential time and length for an intact liquid core are supposed from standard applications [1, 2]. Using this way of describing atomisation is utilised in a CFD-Code and then compared with PDA-measurements to control the process capability of this implementation.
Zusammenfassung  Zweiphasenströmungen zeichnen sich durch eine bewegliche und deformierbare Phasengrenze aus. An dieser Phasengrenze ändern sich die Stoffeigenschaften sprunghaft. Die Erfassung und Beschreibung dieser Grenzflächeneigenschaften ist sehr aufwendig, so dass die numerische Modellierung von Zerstäubungsprozessen bisher nur für exemplarische Einzelfälle eingesetzt wird. Bei dieser Simulation von Zerstäubungsprozessen ist ein hoher Rechenaufwand gegeben. Der Vorgang des Strahlzerfalls lässt sich, wie im Folgenden dargestellt, mittels Zerfallswahrscheinlichkeiten abbilden. Aerodynamische Grenzflächenbetrachtungen fließen bei dieser Betrachtungsweise nicht in das Modell ein. Bei der Verwendung von Zerfallswahrscheinlichkeiten werden Annahmen zu Länge und Zeit der intakten Strahllänge der flüssigen Phase getroffen, die sich aus ähnlichen technischen Fragestellungen in direkten numerischen Simulationen (DNS) ableiten lassen [1,2]. Durch Anwendung von statistisch erzeugten Tropfenspektren in einem Strömungscode und durch Messung mittels Phasen-Doppler-Anemometrie erfolgt die Überprüfung der Aussagefähigkeit des statistischen Modells.
  相似文献   
46.
In 2000, Biham and Keller [Cryptanalysis of reduced variants of Rijndael, 3rd AES Conference, in press] presented an impossible differential cryptanalysis of the Advanced Encryption Standard (AES) up to 5 rounds. This was later improved in 2001 by Cheon et al. [Improved impossible differential cryptanalysis of Rijndael and Crypton, in: Lecture Notes in Comput. Sci., vol.  2288, Springer-Verlag, Berlin, 2001, pp. 39-49] to apply to 6 rounds of the AES. In this paper, we extend on previous results to present an attack on the AES up to 7 rounds. This is the best-known impossible differential attack on the AES, and works by exploiting weaknesses in the AES key schedule.  相似文献   
47.
48.
This paper introduces a new method for estimating the angular difference between two tomographic projections belonging to a set of projections taken at unknown directions in 2D and 3D. Our method relies on the projection neighbor selection in projection moment space, the calculation of the angular differences between these neighboring projections using moment properties and a projection moment neighborhood graph. The accuracy and the robustness of our method are shown on a test database including fifty 2D and 3D gray-level images at different resolutions and with different levels of noise.  相似文献   
49.
After Vietnam’s Declaration of Independence on 2 September 1945, the country had to suffer through two long, brutal wars, first against the French and then against the Americans, before finally becoming a unified country free of colonial domination in 1975. The authors’ purpose is to examine the role of cryptography in those two wars. Despite the far greater technological resources of their opponents, the communications intelligence specialists of the Vi?t Minh, the National Liberation Front, and the Democratic Republic of Vietnam had considerable success in both protecting Vietnamese communications and acquiring tactical and strategic secrets from the enemy. Perhaps surprisingly, in both wars there was a balance between the sides. Generally speaking, cryptographic knowledge and protocol design were at a high level at the central commands, but deployment for tactical communications in the field was difficult, and there were many failures on all sides.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号