首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1371篇
  免费   86篇
  国内免费   9篇
电工技术   21篇
化学工业   298篇
金属工艺   39篇
机械仪表   31篇
建筑科学   20篇
矿业工程   4篇
能源动力   53篇
轻工业   86篇
水利工程   14篇
石油天然气   1篇
无线电   168篇
一般工业技术   358篇
冶金工业   138篇
原子能技术   6篇
自动化技术   229篇
  2024年   5篇
  2023年   24篇
  2022年   43篇
  2021年   77篇
  2020年   64篇
  2019年   63篇
  2018年   64篇
  2017年   59篇
  2016年   56篇
  2015年   48篇
  2014年   66篇
  2013年   98篇
  2012年   57篇
  2011年   66篇
  2010年   68篇
  2009年   55篇
  2008年   47篇
  2007年   51篇
  2006年   32篇
  2005年   25篇
  2004年   15篇
  2003年   23篇
  2002年   27篇
  2001年   16篇
  2000年   13篇
  1999年   14篇
  1998年   37篇
  1997年   24篇
  1996年   17篇
  1995年   10篇
  1994年   11篇
  1993年   16篇
  1992年   8篇
  1991年   3篇
  1990年   10篇
  1989年   10篇
  1988年   9篇
  1987年   10篇
  1986年   6篇
  1985年   20篇
  1984年   11篇
  1983年   10篇
  1982年   9篇
  1981年   10篇
  1980年   15篇
  1979年   10篇
  1977年   3篇
  1976年   11篇
  1975年   3篇
  1974年   3篇
排序方式: 共有1466条查询结果,搜索用时 312 毫秒
21.
Dense (~97%) CaO-stabilized ZrO2 ceramic was stabilized with minimum (3 mol%) doping (reported to date) and processed via conventional sintering at a low temperature (~1200°C); compositional analysis via X-ray florescence confirmed the CaO doping accuracy. Phase-pure tetragonal structure (characterized via both X-ray diffraction and Raman spectroscopy) along with uniform nanograins (90 nm) of the ceramic ensured the evolution of no monoclinic phase even after vigorous low-temperature degradation experiments (both thermal and hydrothermal aging for 80-100 h). The sintered ceramic recorded a high hardness (~15 GPa); the indentation toughness value was also comparable to a 3 mol% yttria-stabilized zirconia system. The remarkable structure–property correlations in the 3 mol% CaO-stabilized ZrO2 ceramic suggests that the same may be worth examining for suitable future applications (e.g., in dental ceramics).  相似文献   
22.
Free riding is a major problem in peer-to-peer networks. Reputation management systems are generally employed to overcome this problem. In this paper, a new reputation based scheme called probabilistic resource allocation is proposed. This strategy probabilistically decide whether to provide the resource to requesting peer or not. Aforesaid method gives selection preference to higher reputation peers and at the same time provides some finite probability of interaction between those peers who don’t have good reputation about each other. This avoids disconnection between the aforesaid peers. The proposed scheme also introduces a new mechanism for resource distribution which not only allocates resources based on peers’ reputation but simultaneously maximizes network utility also. Algorithm for formation of interest groups based upon both similarity of interests and reputation between peers is also presented.  相似文献   
23.
Tree index structures are crucial components in data management systems. Existing tree index structure are designed with the implicit assumption that the underlying external memory storage is the conventional magnetic hard disk drives. This assumption is going to be invalid soon, as flash memory storage is increasingly adopted as the main storage media in mobile devices, digital cameras, embedded sensors, and notebooks. Though it is direct and simple to port existing tree index structures on the flash memory storage, that direct approach does not consider the unique characteristics of flash memory, i.e., slow write operations, and erase-before-update property, which would result in a sub optimal performance. In this paper, we introduce FAST (i.e., Flash-Aware Search Trees) as a generic framework for flash-aware tree index structures. FAST distinguishes itself from all previous attempts of flash memory indexing in two aspects: (1) FAST is a generic framework that can be applied to a wide class of data partitioning tree structures including R-tree and its variants, and (2) FAST achieves both efficiency and durability of read and write flash operations through memory flushing and crash recovery techniques. Extensive experimental results, based on an actual implementation of FAST inside the GiST index structure in PostgreSQL, show that FAST achieves better performance than its competitors.  相似文献   
24.
Porous silicon formation has been simulated by the finite diffusion length (FDL) model. This considers a dynamic isoconcentration profile from which the aggregating particles begin their random walks. In this paper we report on the isoconcentration profile non-uniformities which increase as the finite diffusion length is increased. The implementation of the FDL model with zero diffusion length generates non-fractal structures with a fractal dimension close to 1. It is found that Eden clusters cannot be generated at zero diffusion length, due to the problem of sinking isoconcentration profile. We conclude that these are limitations that should be considered in the FDL model for improving the understanding of physical phenomena such as formation and morphology of porous silicon.  相似文献   
25.
Perovskite light-emitting diodes (PeLEDs) are advancing because of their superior external quantum efficiencies (EQEs) and color purity. Still, additional work is needed for blue PeLEDs to achieve the same benchmarks as the other visible colors. This study demonstrates an extremely efficient blue PeLED with a 488 nm peak emission, a maximum luminance of 8600 cd m−2, and a maximum EQE of 12.2% by incorporating the double-sided ethane-1,2-diammonium bromide (EDBr2) ligand salt along with the long-chain ligand methylphenylammonium chloride (MeCl). The EDBr2 successfully improves the interaction between 2D perovskite layers by reducing the weak van der Waals interaction and creating a Dion–Jacobson (DJ) structure. Whereas the pristine sample (without EDBr2) is inhibited by small stacking number (n) 2D phases with nonradiative recombination regions that diminish the PeLED performance, adding EDBr2 successfully enables better energy transfer from small n phases to larger n phases. As evidenced by photoluminescence (PL), scanning electron microscopy (SEM), and atomic force microscopy (AFM) characterization, EDBr2 improves the morphology by reduction of pinholes and passivation of defects, subsequently improving the efficiencies and operational lifetimes of quasi-2D blue PeLEDs.  相似文献   
26.
From information security point of view, an enterprise is considered as a collection of assets and their interrelationships. These interrelationships may be built into the enterprise information infrastructure, as in the case of connection of hardware elements in network architecture, or in the installation of software or in the information assets. As a result, access to one element may enable access to another if they are connected. An enterprise may specify conditions on the access of certain assets in certain mode (read, write etc.) as policies. The interconnection of assets, along with specified policies, may lead to managerial vulnerabilities in the enterprise information system. These vulnerabilities, if exploited by threats, may cause disruption to the normal functioning of information systems. This paper presents a formal methodology for detection of managerial vulnerabilities of, and threats to, enterprise information systems in linear time.  相似文献   
27.
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. We demonstrate that high attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered Approach. Experimental results on the benchmark KDD '99 intrusion data set show that our proposed system based on Layered Conditional Random Fields outperforms other well-known methods such as the decision trees and the naive Bayes. The improvement in attack detection accuracy is very high, particularly, for the U2R attacks (34.8 percent improvement) and the R2L attacks (34.5 percent improvement). Statistical Tests also demonstrate higher confidence in detection accuracy for our method. Finally, we show that our system is robust and is able to handle noisy data without compromising performance.  相似文献   
28.
29.
30.
Multimedia Tools and Applications - Identification and authentication are ubiquitous questions which pan across various systems. In certain domains, they are of paramount importance. Like, security...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号