首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   762篇
  免费   49篇
电工技术   11篇
化学工业   158篇
金属工艺   2篇
机械仪表   7篇
建筑科学   28篇
矿业工程   1篇
能源动力   3篇
轻工业   108篇
水利工程   1篇
石油天然气   1篇
无线电   67篇
一般工业技术   137篇
冶金工业   39篇
原子能技术   1篇
自动化技术   247篇
  2024年   2篇
  2023年   7篇
  2022年   25篇
  2021年   24篇
  2020年   10篇
  2019年   24篇
  2018年   20篇
  2017年   26篇
  2016年   31篇
  2015年   26篇
  2014年   41篇
  2013年   63篇
  2012年   57篇
  2011年   66篇
  2010年   51篇
  2009年   62篇
  2008年   47篇
  2007年   42篇
  2006年   33篇
  2005年   23篇
  2004年   31篇
  2003年   26篇
  2002年   18篇
  2001年   11篇
  2000年   6篇
  1999年   3篇
  1998年   4篇
  1997年   5篇
  1996年   6篇
  1995年   4篇
  1994年   6篇
  1993年   3篇
  1992年   1篇
  1990年   2篇
  1989年   2篇
  1986年   1篇
  1984年   1篇
  1974年   1篇
排序方式: 共有811条查询结果,搜索用时 15 毫秒
91.
The first models of optimization of inventory management costs have undergone few changes since they were developed at the beginning of the last century. It is only with the passage of time that new scenarios have appeared with the introduction of new systems of production, and consequently of new strategies in the logistics chain. In this article, we analyze and propose a revision of the basic inventory model of economic order quantity first defined by Harris in 1913 for a scenario in which the owner of the stock receives a bonus or reward each time he replenishes his stock. This situation arises when the supplier receives a benefit (which he then shares with the customer) when managing his stock replenishment. An array of nested models is shown to illustrate this scenario, from which the constraints of previous scenarios have been removed. The model provides insights into the negotiation of batch size between supplier and buyer in a win‐win environment in the specific situation in which the supplier gives a bonus to the buyer at each stock replenishment. © 2011 Wiley Periodicals, Inc.  相似文献   
92.
A characteristic of Peer-to-Peer (P2P) computing networks is their huge number of different computational resources scattered across the Internet. Gathering peers into markets according to their multi-attribute computational resources makes it easier to manage these environments. This solution is known as market overlay. In this context, the closeness of the markets with similar resources, known as locality, is a key feature for ensuring good P2P resource management. Thus, the locality feature over a market overlay allows a lack of resources in a given market to be compensated quickly by any other market with similar resources, whenever these are close to each other. Consequently, locality becomes an essential challenge.This paper addresses the analysis of the locality of P2P market over-lays. According to this, a new procedure for measuring locality is applied together with an extensive analysis of some well-known structured P2P overlays. Based on this analysis, a new P2P computing architecture, named DisCoP, oriented towards optimizing locality is proposed. Our proposal gathers the peers into markets according to their computational resources. A Hilbert function is used to arrange multi-attribute markets in an ordered and mono-dimensional space and the markets are linked by means of a Bruijn graph. In order to maintain the DisCoP locality whenever the overlay is not completed, a solution based on the virtualization of markets is also proposed. Finally, the DisCoP locality is tested together with the proposed virtualization method for approximate searches over uncompleted overlays. The simulation results show that approximate searches exploit the DisCoP locality efficiently.  相似文献   
93.
There have been many proposals of shared memory systems, each one providing different types of memory coherence for interprocess communication. However, they have usually been defined using different formalisms. This makes it difficult to compare among them the different proposals put forward. In this paper we present a formal framework for specifying memory models with different coherency properties. We specify most of the known shared memory models using our framework, showing some of the relationships that hold among them.  相似文献   
94.
Industrial control applications are usually developed in two phases: control design and real-time system implementation. In the control design stage a regulator is obtained and later it is translated into an algorithm in the implementation phase. Traditionally, these two phases have been developed in separate ways. Recently, some works have pointed out the necessity of the integration of the control design and its implementation. One of these works reduce the delay variance of control tasks (defined as the control action interval (CAI) and data acquisition interval (DAI) parameters) splitting every task into three parts. The CAI reduction method highly reduces the delay variance and improves the control performance. This work shows how to evaluate these delays under static and dynamic scheduling policies. A new task model is proposed in order to reduce the CAI and DAI parameters, which implies an improvement in the control performance. The new task model will be implemented in a real process, and the experimental measurements will show how, effectively, the control performance is highly improved with the methods presented in this paper.  相似文献   
95.
Simulatable certificateless two-party authenticated key agreement protocol   总被引:1,自引:0,他引:1  
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the so-called key escrow problem. Recently, certificateless cryptography was introduced to mitigate these limitations. In this paper, we first propose a security model for AKA protocols using certificateless cryptography. Following this model, we then propose a simulatable certificateless two-party AKA protocol. Security is proven under the standard computational Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions. Our protocol is efficient and practical, because it requires only one pairing operation and five multiplications by each party.  相似文献   
96.
The Cova des Pas cave is a karstic cave in the cliffs of the Barranc (canyon) de Trebalúger. It is a small cave only 6.5 m deep, 4.5 m wide and 1.7 m high. Yet more than 70 burials, in foetal position, from the Early Iron Age were found in this small cave. The conservation of the archaeological remains was very unusual. Not only wood, ropes and other plant material was found, but also remains of body tissue, hair and leather. In spite of the remarkable preservation of the bodies and artefacts, the state of conservation of the bone material was very bad. The bones contained little and heavily deteriorated collagen and the organic plant material was very fragile. The special environmental conditions of the cave are the cause of these unusual preservation conditions. Although the cave is situated in a limestone cliff, the soil of the cave is very acid. Unexpectedly bad sample quality seemed to be the major drawback for AMS radiocarbon dating on hair, wood, ropes and bone collagen, as well as on bio-apatite.  相似文献   
97.
The possibilities of detecting hazelnut paste adulterated with refined and non-refined vegetable oils have been studied. Research was focussed mainly on peanut, high oleic-acid sunflower, corn and soybean oils which have a similar composition to hazelnut oil. The analytical procedures to detect fatty acid (FA), triacylglycerol (TAG) and tocopherol profiles as indicators of adulteration were determined. The better indicators experimentally determined were seven FA (palmitic, stearic, linoleic, linolenic, arachidonic, behenic and lignoceric acids) and different TAG with three unsaturated FA (the code letters used for FA are: P = C16:0; S = C18:0; O = C18:1; L = C18:2;; Ln = C18:3) (LLLn, LLL and OOO), two unsaturated FA (POL, PLL and SOO), and one unsaturated FA (PPL). As expected, when refined vegetable oils were added to hazelnut paste, the increment of stigmasta-3,5-diene allowed detection at levels of 2% oil added. Limits of detection were measured using standard and adulterated hazelnut with different amounts of non-refined vegetable oils added (5%, 10%, 20% and 30%). The distribution of tocopherols and tocotrienols is highly useful, except in the case of added sunflower oil. The differences between the experimental and theoretical values of the TAG with equivalent carbon number (ΔECN) of 42 does not improve the detection limit of hazelnut paste adulterated with peanut or sunflower oils. Similarly, tocopherols usually added to refined vegetable oils as an antioxidant were also determined.  相似文献   
98.
In this paper we show how to establish a reliable and efficient high level communication system in a randomly deployed network of sensors equipped with directional antennas. This high level communication system enables the programming of the sensor network using high level communication functionalities without the burden of taking care of their physical capacities (low range, unidirectional links, single frequency, presence of collisions, etc.). The high level communication functionalities we offer include point-to-point communication, point-to-area communication, and one-to-all communication. The basic idea to implement this system is to simulate a virtual network that emerges from the ad-hoc network using self-organization, self-discovery and collaborative methods. We also analyse the efficiency, scalability and robustness of the proposed protocols.  相似文献   
99.
A compact model that can be used to reproduce both quasi-static and dynamic characteristics of basic MOS cells with embedded Si-nc is presented. The structure is modeled through a device-like complex matrix of tunnel junctions, resulting in a time-dependent non-linear system of differential equations that is numerically solved, including calculation of the capacitance matrix, analytical tunneling expressions (direct and Fowler-Nordheim) for electrons/holes, and derivation of the effective tunneling area. The threshold evolution is calculated by monitoring the charge at each Si-nc as a function of time. The model is successfully validated against experimental data, showing its applicability to predict program/erase characteristics of nanocrystal memories as well as threshold voltage bit-to-bit dispersion as a consequence of geometrical non-uniformities in the nanocrystal layer position and/or gate areal coverage.  相似文献   
100.
HS-SPME coupled to GC/MS was applied to the analysis of the volatile fraction of Juniperus communis L. berries, which are the principal ingredient used for gin aromatization. Seventy seven compounds were identified by comparison with reference compounds or tentatively identified by comparing their mass spectra and retention index with those reported in mass spectra libraries and literature, respectively. Seventy four were detected by SPME and sixty eight were detected by solvent distillation extraction (SDE). These were mainly mono- and sesquiterpenic compounds that represented more than the 80% of the gin’s volatile composition. A high percent content was due to monoterpenoids, whose analysis could be important for the assessment of sensory quality control of juniper due to their impact on gin aroma. The main monoterpenoids detected in the headspace of the juniper berries from two periods of collection were terpinen-4-ol, p-cymene, β-myrcene, γ-terpinene, α-pinene and limonene. These represented more than the 70% of the sample’s volatile fraction. The proposed SPME method required short times and the low cost of analysis and enabled to detect a number of compounds comparable with SDE or much higher than the number of compounds reported by other extraction techniques. The results suggested the suitability of this technique for the assessment of the volatile composition of juniper berries intended for gin flavouring.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号