首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1024篇
  免费   56篇
  国内免费   1篇
电工技术   8篇
化学工业   312篇
金属工艺   5篇
机械仪表   19篇
建筑科学   36篇
矿业工程   7篇
能源动力   43篇
轻工业   149篇
水利工程   12篇
石油天然气   4篇
无线电   50篇
一般工业技术   172篇
冶金工业   45篇
原子能技术   5篇
自动化技术   214篇
  2023年   9篇
  2022年   28篇
  2021年   53篇
  2020年   27篇
  2019年   46篇
  2018年   33篇
  2017年   41篇
  2016年   44篇
  2015年   36篇
  2014年   38篇
  2013年   78篇
  2012年   51篇
  2011年   72篇
  2010年   65篇
  2009年   63篇
  2008年   46篇
  2007年   54篇
  2006年   32篇
  2005年   37篇
  2004年   32篇
  2003年   20篇
  2002年   24篇
  2001年   13篇
  2000年   12篇
  1999年   13篇
  1998年   14篇
  1997年   16篇
  1996年   7篇
  1995年   10篇
  1994年   8篇
  1993年   9篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1989年   5篇
  1988年   3篇
  1987年   2篇
  1986年   3篇
  1985年   5篇
  1984年   3篇
  1983年   4篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
排序方式: 共有1081条查询结果,搜索用时 15 毫秒
51.
The availability of multicore processors and programmable NICs, such as TOEs (TCP/IP Offloading Engines), provides new opportunities for designing efficient network interfaces to cope with the gap between the improvement rates of link bandwidths and microprocessor performance. This gap poses important challenges related with the high computational requirements associated to the traffic volumes and wider functionality that the network interface has to support. This way, taking into account the rate of link bandwidth improvement and the ever changing and increasing application demands, efficient network interface architectures require scalability and flexibility. An opportunity to reach these goals comes from the exploitation of the parallelism in the communication path by distributing the protocol processing work across processors which are available in the computer, i.e. multicore microprocessors and programmable NICs.Thus, after a brief review of the different solutions that have been previously proposed for speeding up network interfaces, this paper analyzes the onloading and offloading alternatives. Both strategies try to release host CPU cycles by taking advantage of the communication workload execution in other processors present in the node. Nevertheless, whereas onloading uses another general-purpose processor, either included in a chip multiprocessor (CMP) or in a symmetric multiprocessor (SMP), offloading takes advantage of processors in programmable network interface cards (NICs). From our experiments, implemented by using a full-system simulator, we provide a fair and more complete comparison between onloading and offloading. Thus, it is shown that the relative improvement on peak throughput offered by offloading and onloading depends on the rate of application workload to communication overhead, the message sizes, and on the characteristics of the system architecture, more specifically the bandwidth of the buses and the way the NIC is connected to the system processor and memory. In our implementations, offloading provides lower latencies than onloading, although the CPU utilization and interrupts are lower for onloading. Taking into account the conclusions of our experimental results, we propose a hybrid network interface that can take advantage of both, programmable NICs and multicore processors.  相似文献   
52.
53.
The paper focuses on collaborative STEP-based CAD/CAM/CNC supply chains to program and automate machining process data monitoring and traceability activities. A traceability interface (traceability nc_functions) is defined for the new CNC programming standard ISO STEP-NC. CAM systems will be able to program monitoring and data access activities by inserting traceability nc_function calls in CNC programs. On the shop floor, controllers will automatically interpret these nc_functions to access process data while machining and will relate data records with the corresponding machining operations in a STEP-NC part program. With both types of information—process data and standard machining program (STEP-NC part program)—spread and technologically heterogeneous engineering systems will have full knowledge about what has happened in production. Traceability data access automation will assure data reliability. The paper describes a traceability scenario where standards such as MTConnect and ISA-95 support, rather than interfere with, the STEP-NC traceability proposal.  相似文献   
54.
Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process.  相似文献   
55.
56.
Mud plasters or soil stuccos are commonly used to protect adobe walls from water erosion. Due to drying shrinkage cracks and high permeability, the commonly used soil stuccos are not durable. Stucco stabilizers such as Portland cement, lime and asphalt are expensive. An experimental study undertaken to evaluate some of the locally available, inexpensive, stucco stabilizers is reported here. Crack-resistant stucco compositions made with a cactus solution are described and techniques to make the stucco surface impervious to water are discussed. The results of durability tests involving simulated rainfall on stucco panels, and stucco applied to adobe walls, are presented. Recommendations for field practice are also given.  相似文献   
57.
The Capacitated Vehicle Routing Problem with Time Windows is an important combinatorial optimization problem consisting in the determination of the set of routes of minimum distance to deliver goods, using a fleet of identical vehicles with restricted capacity, so that vehicles must visit customers within a time frame. A large number of algorithms have been proposed to solve single-objective formulations of this problem, including meta-heuristic approaches, which provide high quality solutions in reasonable runtimes. Nevertheless, in recent years some authors have analyzed multi-objective variants that consider additional objectives to the distance travelled. This paper considers not only the minimum distance required to deliver goods, but also the workload imbalance in terms of the distances travelled by the used vehicles and their loads. Thus, MMOEASA, a Pareto-based hybrid algorithm that combines evolutionary computation and simulated annealing, is here proposed and analyzed for solving these multi-objective formulations of the VRPTW. The results obtained when solving a subset of Solomon’s benchmark problems show the good performance of this hybrid approach.  相似文献   
58.
A simple method to design PID controllers in the frequency domain based on a simplified constrained optimisation is proposed. The method is based on the use of a single tuning parameter, defined as the quotient between the final crossover frequency and the zero of the controller. The tuning procedure is based on the maximisation of the controller gain subject to an equality constraint in the phase margin and an inequality constraint in the gain margin. The main advantage of the proposed method is that, even though the maximisation of the controller gain is straightforward, since there is only one parameter to be tuned, the solution is close to the optimal tuning obtained with direct numerical optimisation methods. Moreover the method is applicable to any linear model structure, including dead time and non-minimum phase systems.  相似文献   
59.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
60.
Social network services (SNSs) have brought new possibilities and challenges to the design of software environments that respect people’s cultural differences. These systems may represent an opportunity for social and digital inclusion. However, search mechanisms in these systems impose serious barriers for people in the process of acquiring digital literacy. One of the barriers is the difficulty of using the adequate terms/keywords to perform content searches. This paper presents an approach to allow ordinary, non-technology proficient people to access the content of a network through the use of search parameters that make sense to them. The proposal is grounded on Semantic Web technologies (Web ontology) combined with Organizational Semiotics concepts and methods to identify the users’ profile and language. A case study was conducted with the search mechanism integrated into a SNS, and a preliminary evaluation reveals the advantages and drawbacks of the approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号