首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   820篇
  免费   34篇
  国内免费   1篇
电工技术   15篇
综合类   4篇
化学工业   162篇
金属工艺   26篇
机械仪表   19篇
建筑科学   17篇
能源动力   69篇
轻工业   59篇
水利工程   4篇
石油天然气   2篇
无线电   85篇
一般工业技术   181篇
冶金工业   87篇
原子能技术   10篇
自动化技术   115篇
  2024年   2篇
  2023年   11篇
  2022年   20篇
  2021年   34篇
  2020年   19篇
  2019年   15篇
  2018年   31篇
  2017年   28篇
  2016年   26篇
  2015年   27篇
  2014年   31篇
  2013年   66篇
  2012年   29篇
  2011年   67篇
  2010年   36篇
  2009年   51篇
  2008年   36篇
  2007年   18篇
  2006年   25篇
  2005年   21篇
  2004年   17篇
  2003年   16篇
  2002年   12篇
  2001年   15篇
  2000年   16篇
  1999年   13篇
  1998年   33篇
  1997年   17篇
  1996年   15篇
  1995年   11篇
  1994年   23篇
  1993年   15篇
  1992年   6篇
  1991年   4篇
  1990年   6篇
  1989年   9篇
  1988年   2篇
  1987年   3篇
  1986年   2篇
  1984年   4篇
  1983年   3篇
  1982年   3篇
  1981年   3篇
  1980年   3篇
  1979年   1篇
  1977年   4篇
  1976年   1篇
  1975年   1篇
  1973年   2篇
  1968年   1篇
排序方式: 共有855条查询结果,搜索用时 15 毫秒
21.
Editor's note:Physical unclonable functions (PUFs) offer a promising mechanism that can be used in many security, protection, and digital rights management applications. One key issue is the stability of PUF responses that is often addressed by error correction codes. The authors propose a new syndrome coding scheme that limits the amount of leaked information by the PUF error-correcting codes.—Farinaz Koushanfar, Rice University  相似文献   
22.
In this paper we propose a novel algorithm for multi-task learning with boosted decision trees. We learn several different learning tasks with a joint model, explicitly addressing their commonalities through shared parameters and their differences with task-specific ones. This enables implicit data sharing and regularization. Our algorithm is derived using the relationship between ? 1-regularization and boosting. We evaluate our learning method on web-search ranking data sets from several countries. Here, multi-task learning is particularly helpful as data sets from different countries vary largely in size because of the cost of editorial judgments. Further, the proposed method obtains state-of-the-art results on a publicly available multi-task dataset. Our experiments validate that learning various tasks jointly can lead to significant improvements in performance with surprising reliability.  相似文献   
23.
In the literature, surfing technique has been proposed for differential on-chip wave-pipelined serial interconnects with uniform repeaters (UR) and non-uniform repeaters to increase the data transfer rate for unidirectional schemes. In this paper, a novel bidirectional data transfer through the differential wave-pipelined serial interconnects with surfing for UR is proposed. A new circuit called ‘Bidirectional surfing inverter pair’ is proposed for differential wave-pipelined serial interconnects. The method of logical effort is used for the design of surfing circuits. To evaluate the efficiency of these techniques, 40 mm metal 4 interconnects using the proposed surfing techniques are implemented along with transmitter, receiver and delay locked loop in UMC 180 nm technology and their performances are studied through post layout simulations. The proposed bidirectional differential surfing scheme has a maximum data transfer rate of 2 Gb/s and has allowable jitter of 52 ps on both directions through the same interconnects.  相似文献   
24.
Cryptographic algorithms rely on the strengths of all their fundamental components and expect them to be harmonious in accomplishing desired levels of security in applications. In order for a security solution to be sophisticated and to provide high security (measured in terms of the security goals it satisfies), the solution needs to typically involve complex mathematical operations and/or multiple stages of operation. While these might offer increased security, such solutions might not be applicable to all systems. We refer to resource-constrained wireless networks, such as radio frequency identification and wireless body area networks, where the resources available on-chip are often decided by the balance between device costs, requirements of longevity and usability. The constraints, thus, require designing solutions that use simple logical operations and are based on reuse of functions, while introducing sufficient unpredictability to increase security. In this paper, we present a key management and message signature generation scheme called HiveSec, whose design is inspired by the symmetry in beehives and the nature of bee swarms, and which offers security through unpredictability and reduced resource usage. We validate our work through simulation studies and security analysis.  相似文献   
25.
An optical wave-guide based two-color capillary electrophoresis laser induced fluorescence (CE-LIF) instrument is described. The wave-guide based approach allows for on column excitation and detection with two-color discrimination. The instrument is designed to allow either electrokinetic or hydrodynamic injections. In its present configuration, the attainable limit of detection (LOD, S/N = 3) was 50 X 10−21 moles of fluorescein with a 488-nm excitation source. This study was designed to test the instrument design for applications in protein analyses. Fluorescent dyes with two different wavelengths were simultaneously separated and detected as were complexes formed by labeled antibodies to NFκB p65 and cdc2p34. Quantification of both proteins in THP-1 cell lysates performed using this approach illustrates a rapid screening application of this instrument.  相似文献   
26.
Networks and Spatial Economics - In traditional emergency evacuation planning, shelter assignment and contraflow operations are determined sequentially. In this paper, we show that these two types...  相似文献   
27.
With a view to investigate the influence of nanometric size on the structural, surface, and magnetic properties of nanocrystalline Ti0.95Co0.05O2-diluted magnetic semiconductors, prepared by a novel simple controllable peroxide-assisted reflux chemical route followed by annealing at different temperatures, a systematic investigation has been undertaken. Structural characterizations such as X-ray diffraction followed by Rietveld refinement, electron diffraction pattern, Fourier transform infrared, Raman scattering, and X-ray photoelectron spectroscopy (XPS) measurements have shown anatase phase formation in nanocrystalline Ti0.95Co0.05O2 without any additional impurity phases. The modified reflux chemical route was effective in obtaining pure phase Ti0.95Co0.05O2 nanoparticles. Surface morphological investigations by using transmission electron microscopy and atomic force microscopy measurements showed the predominant effect of random distribution of nanoparticles on the aggregation behavior and local microstructural changes. The deconvoluted XPS core level Co 2p spectral study manifested the oxidation state of Co as + 2 and is found to be stable with varying particle size and annealing temperature. The ferromagnetic behavior was investigated by vibrating sample magnetometer, magnetic force microscopy, and electron spin resonance measurements. These magnetization studies showed all the samples are ferromagnetic at room temperature without any magnetic clusters. The correlation between structure, surface condition of the nanoparticles and local electronic interactions, and magnetization of the samples was analyzed and explored the origin of ferromagnetism.  相似文献   
28.
29.
30.
Engineering properties of sands mainly depend on the integrity of the particles, which in turn has a strong bearing on their crushing strength. Seven different Aegean sands were tested for mineralogy, particle shape, size and specific gravity and the influence of aspect ratio, particle composition, particle shape and size on the crushing strength was examined. As the Aegean sands have a small range of sphericity and roundness, crushing strength tests were also performed on five Anatolian sands. A multiple regression analysis was carried out and an equation proposed to determine the crushing strength value of the Aegean sands. The computed values were found to be in good agreement with those obtained from the experimental investigations. It is concluded that the equation is sufficiently accurate to be a useful, time- and cost-effective way of obtaining crushing strength estimations at the preliminary stage of site investigations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号