首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   409篇
  免费   5篇
  国内免费   2篇
电工技术   1篇
化学工业   62篇
金属工艺   12篇
机械仪表   7篇
能源动力   17篇
轻工业   11篇
无线电   70篇
一般工业技术   94篇
冶金工业   104篇
原子能技术   5篇
自动化技术   33篇
  2021年   4篇
  2020年   4篇
  2019年   4篇
  2018年   6篇
  2017年   5篇
  2016年   7篇
  2015年   4篇
  2014年   5篇
  2013年   23篇
  2012年   16篇
  2011年   15篇
  2010年   21篇
  2009年   11篇
  2008年   15篇
  2007年   20篇
  2006年   10篇
  2005年   12篇
  2004年   11篇
  2003年   15篇
  2002年   11篇
  2001年   8篇
  2000年   12篇
  1999年   9篇
  1998年   19篇
  1997年   10篇
  1996年   6篇
  1995年   7篇
  1994年   10篇
  1993年   11篇
  1992年   5篇
  1991年   5篇
  1990年   3篇
  1989年   5篇
  1988年   7篇
  1987年   5篇
  1986年   4篇
  1985年   7篇
  1984年   7篇
  1983年   4篇
  1982年   5篇
  1981年   3篇
  1979年   4篇
  1978年   6篇
  1977年   4篇
  1976年   2篇
  1974年   3篇
  1973年   4篇
  1966年   5篇
  1965年   8篇
  1963年   3篇
排序方式: 共有416条查询结果,搜索用时 15 毫秒
31.
Spectra of D-T neutrons transmitted through different densities of concrete containing rare-earth oxides are measured using a neutron generator. The NE-213 Liquid Scintillation Spectrometer is used in these measurements. The count spectra have been unfolded using the code ‘DUST’. The experimental results are compared with the one dimensional transport code ‘ASFIT’ and also the Monte-Carlo code ‘MORSE-CG’. The computations agree reasonably well with the experimental measurements. The characteristic features of the transmitted neutron spectra are explained based on the available cross-section data.  相似文献   
32.
New group testing protocols are studied for a random multiple access, collision-type, slotted channel with binary feedback of either the success/failure or something/nothing variety. The protocols introduced here exhibit better performance than the ones suggested earlier. Implementation issues are considered.  相似文献   
33.
This paper presents a protocol called Software Attestation for Key Establishment (SAKE), for establishing a shared key between any two neighboring nodes of a sensor network. SAKE guarantees the secrecy and authenticity of the key that is established, without requiring any prior authentic or secret cryptographic information in either node. In other words, the attacker can read and modify the entire memory contents of both nodes before SAKE executes. Further, to the best of our knowledge, SAKE is the only protocol that can perform key re-establishment after sensor nodes are compromised, because the presence of the attacker’s code in the memory of either protocol participant does not compromise the security of SAKE. Also, the attacker can perform any active or passive attack using an arbitrary number of malicious, colluding nodes. SAKE does not require any hardware modification to the sensor nodes, human mediation, or secure side channels. However, we do assume the setting of a computationally-limited attacker that does not introduce its own computationally-powerful nodes into the sensor network.SAKE is based on Indisputable Code Execution (ICE), a primitive we introduce in previous work to dynamically establish a trusted execution environment on a remote, untrusted sensor node.  相似文献   
34.
The fabless-foundry partnership for integrated circuit (IC) manufacturing business is expected to grow from 12% in 1995 to approximately 17% (i.e., $45B) of the total IC market in 2000. The growth of this market will be even more significant for subquarter micron technologies-whose growth is driven by the multimedia industry. The customer base will extend beyond traditional fabless IC companies into vertically integrated IC manufacturers and system vendors. Given the rate of growth and the high technology profile of products, substantial investments in capital, technology, and skilled workforce have to be dedicated and managed effectively for ensuring a successful partnership. In this paper, we outline the potential coordination problems that may arise in such partnerships, and propose a framework for analyzing issues related to yield information sharing and yield improvement. Our analysis indicates that fabless-foundry contracts that are based on a fixed number of good dies, and better yield information are more profitable  相似文献   
35.
Abstract

The effect of trace elements, used for modification, on the cooling curves obtained during solidification, microstructure and mechanical properties of eutectic aluminium-silicon alloy was investigated. The results of this study indicate the following: 1 The addition of sodium or sodium plus strontium or antimony modifies the eutectic silicon while the addition of sulphur does not alter the microstructure.

2 Those elements which modify the eutectic-silicon, lower the eutectic solidification temperature, while those elements which do not bring about modification, do not alter the eutectic solidification temperature.

3 The addition of those elements which modify the eutectic aluminium-silicon alloy, viz., sodium or sodium plus strontium or antimony improves the UTS and percentage elongation. The addition of titanium to eutectic aluminium-silicon alloy containing these trace elements improves the UTS and percentage elongation to a further extent. Among the various trace elements added to eutectic aluminium-silicon alloy, the addition of sodium plus titanium improves the UTS and percentage elongation to the maximum extent.

  相似文献   
36.
37.
Molybdenum and tungsten are refractory metals in the elemental form with the largest production volume in the world. The fabrication of these refractory metals, as well as their alloys and intermetallics, using high-temperature powder metallurgy (PM) is reviewed in this article. The primary focus is on the role of traditional high-temperature PM in producing alloys with tailor-made properties. An insight into the bulk production of molybdenum and tungsten alloys with nano-grains is highlighted. For more information, contact R.E. Aune, Royal Institute of Technology, Department of Materials Science and Engineering, SE-100 44 Stockholm, Sweden;+46-8-790-8363;fax+46-8-790-0939;e-mail aune@mse.kth.se.  相似文献   
38.
The optimization of metallurgical processes requires reliable data of the slag phase. This paper focuses on three properties that are relevant to heat and mass-transfer calculations — viscosities,thermal diffusivities, and surface tensions of silicate melts. A brief account of the experimental techniques used for the measurements of these properties, with special reference to the work carried out in the Division of Metallurgy, Royal Institute of Technology, Stockholm, Sweden, are presented, along with the advantages and limitations. As these properties are structure-oriented, the impact of structure on these properties is also presented. The paper is intended as a state-of-the-art review of the subject.  相似文献   
39.
The effects of digital transmission errors on a family of variable-rate embedded subband speech coders (SBC) are analyzed in detail. It is shown that there is a difference in error sensitivity of four orders of magnitude between the most and the least sensitive bits of the speech coder. As a result, a family of rate-compatible punctured convolutional codes with flexible unequal error protection capabilities have been matched to the speech coder. These codes are optimally decoded with the Viterbi algorithm. Among the results, analysis and informal listening tests show that with a 4-level unequal error protection scheme transmission of 12 kb/s speech is possible with very little degradation in quality over a 16 kb/s channel with an average bit error rate (BER) of 2×10-2 at a vehicle speed of 60 m.p.h. and with interleaving over two 16 ms speech frames  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号