首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10884篇
  免费   84篇
  国内免费   153篇
电工技术   190篇
综合类   15篇
化学工业   360篇
金属工艺   456篇
机械仪表   93篇
建筑科学   63篇
矿业工程   5篇
能源动力   60篇
轻工业   37篇
水利工程   30篇
石油天然气   20篇
武器工业   7篇
无线电   381篇
一般工业技术   258篇
冶金工业   158篇
原子能技术   93篇
自动化技术   8895篇
  2023年   9篇
  2022年   31篇
  2021年   28篇
  2020年   32篇
  2019年   32篇
  2018年   34篇
  2017年   23篇
  2016年   22篇
  2015年   20篇
  2014年   242篇
  2013年   229篇
  2012年   812篇
  2011年   3095篇
  2010年   1160篇
  2009年   1039篇
  2008年   692篇
  2007年   613篇
  2006年   458篇
  2005年   589篇
  2004年   538篇
  2003年   589篇
  2002年   292篇
  2001年   21篇
  2000年   20篇
  1999年   33篇
  1998年   116篇
  1997年   47篇
  1996年   36篇
  1995年   22篇
  1994年   17篇
  1993年   12篇
  1992年   11篇
  1991年   11篇
  1990年   15篇
  1989年   18篇
  1988年   11篇
  1987年   11篇
  1986年   14篇
  1985年   9篇
  1984年   28篇
  1983年   19篇
  1982年   7篇
  1981年   9篇
  1980年   13篇
  1979年   7篇
  1978年   5篇
  1977年   11篇
  1976年   6篇
  1974年   4篇
  1967年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost and can be integrated into the ubiquitous EPCglobal Class 1 Generation 2 tag protocol (C1G2) are still needed and being investigated. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-ofth-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the EPCglobal C1G2 tag protocol, which assures low implementation cost. We also present a successful implementation of our protocol on real-world components such as the INTEL WISP UHF RFID tag and a C1G2 compliant reader.  相似文献   
122.
Due to a tremendous increase in internet traffic, backbone routers must have the capability to forward massive incoming packets at several gigabits per second. IP address lookup is one of the most challenging tasks for high-speed packet forwarding. Some high-end routers have been implemented with hardware parallelism using ternary content addressable memory (TCAM). However, TCAM is much more expensive in terms of circuit complexity as well as power consumption. Therefore, efficient algorithmic solutions are essentially required to be implemented using network processors as low cost solutions.Among the state-of-the-art algorithms for IP address lookup, a binary search based on a balanced tree is effective in providing a low-cost solution. In order to construct a balanced search tree, the prefixes with the nesting relationship should be converted into completely disjointed prefixes. A leaf-pushing technique is very useful to eliminate the nesting relationship among prefixes [V. Srinivasan, G. Varghese, Fast address lookups using controlled prefix expansion, ACM Transactions on Computer Systems 17 (1) (1999) 1-40]. However, it creates duplicate prefixes, thus expanding the search tree.This paper proposes an efficient IP address lookup algorithm based on a small balanced tree using entry reduction. The leaf-pushing technique is used for creating the completely disjointed entries. In the leaf-pushed prefixes, there are numerous pairs of adjacent prefixes with similarities in prefix strings and output ports. The number of entries can be significantly reduced by the use of a new entry reduction method which merges pairs with these similar prefixes. After sorting the reduced disjointed entries, a small balanced tree is constructed with a very small node size. Based on this small balanced tree, a native binary search can be effectively used in address lookup issue. In addition, we propose a new multi-way search algorithm to improve a binary search for IPv4 address lookup. As a result, the proposed algorithms offer excellent lookup performance along with reduced memory requirements. Besides, these provide good scalability for large amounts of routing data and for the address migration toward IPv6. Using both various IPv4 and IPv6 routing data, the performance evaluation results demonstrate that the proposed algorithms have better performance in terms of lookup speed, memory requirement and scalability for the growth of entries and IPv6, as compared with other algorithms based on a binary search.  相似文献   
123.
124.
This paper presents an on-line learning adaptive neural control scheme for helicopters performing highly nonlinear maneuvers. The online learning adaptive neural controller compensates the nonlinearities in the system and uncertainties in the modeling of the dynamics to provide the desired performance. The control strategy uses a neural controller aiding an existing conventional controller. The neural controller is based on a online learning dynamic radial basis function network, which uses a Lyapunov based on-line parameter update rule integrated with a neuron growth and pruning criteria. The online learning dynamic radial basis function network does not require a priori training and also it develops a compact network for implementation. The proposed adaptive law provides necessary global stability and better tracking performance. Simulation studies have been carried-out using a nonlinear (desktop) simulation model similar to that of a BO105 helicopter. The performances of the proposed adaptive controller clearly shows that it is very effective when the helicopter is performing highly nonlinear maneuvers. Finally, the robustness of the controller has been evaluated using the attitude quickness parameters (handling quality index) at different speed and flight conditions. The results indicate that the proposed online learning neural controller adapts faster and provides the necessary tracking performance for the helicopter executing highly nonlinear maneuvers.  相似文献   
125.
This paper proposes a nodal ant colony optimization (NACO) technique to solve profit based unit commitment problem (PBUCP). Generation companies (GENCOs) in a competitive restructured power market, schedule their generators with an objective to maximize their own profit without any regard for system social benefit. Power and reserve prices become important factors in decision process. Ant colony optimization that mimics the behavior of ants foraging activities is suitably implemented to search the UCP search space. Here a search space consisting of optimal combination of binary nodes for unit ON/OFF status is represented for the movement of the ants to maintain good exploration and exploitation search capabilities. The proposed model help GENCOs to make decisions on the quantity of power and reserve that must be put up for sale in the markets and also to schedule generators in order to receive the maximum profit. The effectiveness of the proposed technique for PBUCP is validated on 10 and 36 generating unit systems available in the literature. NACO yields an increase of profit, greater than 1.5%, in comparison with the basic ACO, Muller method and hybrid LR-GA.  相似文献   
126.
An inductively coupled (ic) radio-frequency (rf) stabilized argon plasma was generated in a quartz tube using a 7 MHzrf generator. The electrical and thermal powers were measured and the efficiency of energy conversion was computed. The results indicate that for a constant power input, there is an optimum argon flow rate for which maximum energy conversion efficiency occurs.  相似文献   
127.
Copper coating on carbon fibres and their composites with aluminium matrix   总被引:2,自引:0,他引:2  
A uniform and continuous coating of copper was given to carbon fibres by cementation or electroless techniques. In both cases, when coating thicknesses were less than 0.2 m, copper deposition was discontinuous over the fibres, and above 0.2 m, coatings were continuous. In electroless coating, about 75% of the continuously coated fibres had a coating thickness range 0.2–0.5 m and above this showed isolated dendrite deposits of copper. In the cementation process, about 75% of the continuously coated fibres had a coating thickness range 0.2–0.6 m, and above this thickness, fine crystallite-type copper deposition was found over smoothly coated copper. The ultimate tensile strength of continuously electroless-coated fibres were nearer to the uncoated fibres, suggesting defect-free coating, while fibres coated by the cementation process exhibited lower ultimate tensile strength values. The tensile fracture of both electroless- and cementation-coated fibres showed delamination of the coating, suggesting poor bonding between coating and the fibre. In composites, prepared by dispersing the coated chopped fibres in a pure aluminium matrix, uniform and random distribution of the fibres were observed without appreciable fibre-metal interaction. The CuAl2 intermetallics were largely found in the matrix and only very small amounts were observed at fibre/matrix interfaces. Additions of about 2 wt% Mg to the matrix prior to the fibre dispersion did not appreciably change the distribution pattern of the fibres, but in addition to CuAl2 phase, Mg2Si phases were observed in the matrix as well as at the interface.  相似文献   
128.
In the present paper, we investigate the output-controllability and optimal output control problems of a state-dependent switched Boolean control network. By using the semi-tensor product, the algebraic form of the system is obtained. Then, output-controllability problems of the system are discussed and some necessary and sufficient conditions are given. Next, the Mayer-type optimal output control issue is considered and an algorithm is provided to find out the control sequence. At last, an example is given to show the effectiveness of the main results.  相似文献   
129.
The two standard models used for communication in concurrent programs, shared memory and message passing, have been the focus of much debate for a long time. Still, we believe the main issue at stake should not be the choice between these models, but rather how to ensure that communication is structured, i.e., it occurs only in syntactically restricted code regions. In this survey, we explore concurrency control models and evaluate how their characteristics contribute positively or negatively to the support for structured communication. We focus the evaluation on three properties: reasonability, which is the main property we are interested in and determines how easily programmers can reason about a concurrent program’s execution; performance, which determines whether there are any distinct features which can prevent or facilitate efficient implementations; and composability, which determines whether a model offers constructs that can be used as building blocks for coarser-grained, or higher-level, concurrency abstractions.  相似文献   
130.
本文旨在通过对石墨防爆片的变形、应力分布及爆破压力的试验研究,探讨以石墨电极为原材料加工石墨防爆片的可行性。文中运用有限单元法及薄板理论对该防爆破片的应力分布做了初步分析,并以电测和爆破试验验证了以薄板理论为基础的爆破压力计算公式,可供进一步研究时参考。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号