首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1953篇
  免费   200篇
  国内免费   2篇
电工技术   8篇
综合类   1篇
化学工业   380篇
金属工艺   44篇
机械仪表   49篇
建筑科学   50篇
矿业工程   1篇
能源动力   50篇
轻工业   483篇
水利工程   12篇
石油天然气   10篇
无线电   72篇
一般工业技术   317篇
冶金工业   443篇
原子能技术   3篇
自动化技术   232篇
  2024年   5篇
  2023年   10篇
  2022年   16篇
  2021年   47篇
  2020年   38篇
  2019年   45篇
  2018年   111篇
  2017年   108篇
  2016年   87篇
  2015年   79篇
  2014年   89篇
  2013年   146篇
  2012年   111篇
  2011年   138篇
  2010年   90篇
  2009年   76篇
  2008年   85篇
  2007年   98篇
  2006年   46篇
  2005年   46篇
  2004年   44篇
  2003年   42篇
  2002年   26篇
  2001年   19篇
  2000年   22篇
  1999年   30篇
  1998年   153篇
  1997年   103篇
  1996年   57篇
  1995年   29篇
  1994年   35篇
  1993年   27篇
  1992年   10篇
  1991年   12篇
  1990年   7篇
  1989年   6篇
  1988年   11篇
  1987年   9篇
  1986年   6篇
  1985年   4篇
  1984年   4篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1980年   2篇
  1977年   3篇
  1976年   17篇
  1972年   1篇
排序方式: 共有2155条查询结果,搜索用时 31 毫秒
31.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
32.
Cloud gaming is a new paradigm that is envisaged to play a pivotal role in the video game industry in forthcoming years. Cloud gaming, or gaming on demand, is a type of online gaming that allows on-demand streaming of game content onto non-specialised devices (e.g. PC, smart TV, etc.). This approach requires no downloads or game installation because the actual game is executed on the game company’s server and is streamed directly to the client. Nonetheless, this revolutionary approach significantly affects the network load generated by online games. As cloud gaming presents new challenges for both network engineers and the research community, both groups need to be fully conversant with these new cloud gaming platforms. The purpose of this paper is to investigate OnLive, one of the most popular cloud gaming platforms. Our key contributions are: (a) a review of the state-of-the-art of cloud gaming; (b) reverse engineering of the OnLive protocol; and (c) a synthetic traffic model for OnLive.  相似文献   
33.
Prior studies have proven that ozonated vegetable oils present a high germicidal power. Ozonation of sunflower oil at different applied ozone dosage was carried out and peroxide and aldehydes indices along with antimicrobial activity were determined. The reaction products were identified using Proton Nuclear Magnetic Resonance Spectroscopy (1H NMR). The principal signals intensity values were used for following the reaction course between ozone and sunflower oil. The reaction was following up to peroxide index values of 1202 mmol-equi/kg. The intensities of olefinic proton signals decreased with the gradual increase in ozone concentration but without disappearing completely. The Criegee ozonides obtained at 107.1 mg/g of ozone doses were approximately 3.9-fold higher than that at beginning of the reaction. The aldehyde protons were observed as a weak intensity signal in all the spectra. The signals belonging to olefinic protons from hydroperoxides appeared weak and increased with the increase in ozone doses. Signals from other oxygenated groups were assigned. The highest action spectrum of antimicrobial activity was obtained with the higher peroxide index. It was concluded that at higher applied ozone doses, the higher the antimicrobial activity potential of ozonized sunflower oil  相似文献   
34.
A polystyrene (PS)/poly(butyl acrylate) (PBA) composite emulsion was produced by seeded emulsion polymerization of butyl acrylate (BA) with PS seed particles which were prepared by emulsifier‐free polymerization of styrene with potassium persulfate (KPS) under a nitrogen atmosphere at 70°C for 24 h with stirring at 60 rpm and swelled with the BA monomer in an ethanol/water medium. The structure of the PS/PBA composite particles was confirmed by the presence of the characteristic absorption band attributed to PS and PBA from FTIR spectra. The particles for pure PS and PS/PBA with a low content of the BA monomer were almost spherical and regular. As the BA monomer content was increased, the particle size of the PS/PBA composite particles became larger, and more golf ball‐like particles were produced. The surface morphology of the PS/PBA composite particles was investigated by AFM and SEM. The Tg's attributed to PS and PBA in the PS/PBA composite particles were found at 110 and ?49°C, respectively. The thermal degradation of the pure PS and PS/PBA composite particles occurred in one and two steps, respectively. With an increasing amount of PBA, the initial thermal decomposition temperature increased. On the contrary the residual weight at 450°C decreased with an increasing amount of PBA. © 2003 Wiley Periodicals, Inc. J Appl Polym Sci 88: 595–601, 2003  相似文献   
35.
Summary The effects of blending sequence and the addition of an interfacial agent (triblock copolymer styrene-butylene ethylene/styrene, Kraton G1652) on the morphology and the mechanical properties of Polycarbonate (PC)/Polypropylene (PP) blends prepared by injection molding were studied. This study presents an analysis of impact resistance, tensile properties and morphology of the raw materials and the blends at different compositions. The blends, before being injected, were prepared in a twin-screw extruder by different sequences of blending. The results indicate that the blending sequence and the presence of humidity significantly affect the properties and morphology of the blends. For ternary blends (PC/PP/Kraton), only one-step mixing before injection molding proved to be sufficient to improve mechanical properties. Increasing the amount of blending steps did not present a significant change in properties. With the addition of the interfacial agent, higher impact resistance and particle size reduction were observed.  相似文献   
36.
Some supervised tasks are presented with a numerical output but decisions have to be made in a discrete, binarised, way, according to a particular cutoff. This binarised regression task is a very common situation that requires its own analysis, different from regression and classification—and ordinal regression. We first investigate the application cases in terms of the information about the distribution and range of the cutoffs and distinguish six possible scenarios, some of which are more common than others. Next, we study two basic approaches: the retraining approach, which discretises the training set whenever the cutoff is available and learns a new classifier from it, and the reframing approach, which learns a regression model and sets the cutoff when this is available during deployment. In order to assess the binarised regression task, we introduce context plots featuring error against cutoff. Two special cases are of interest, the \( UCE \) and \( OCE \) curves, showing that the area under the former is the mean absolute error and the latter is a new metric that is in between a ranking measure and a residual-based measure. A comprehensive evaluation of the retraining and reframing approaches is performed using a repository of binarised regression problems created on purpose, concluding that no method is clearly better than the other, except when the size of the training data is small.  相似文献   
37.
The article deals with the design and implementation of a flat filter tracking digital controller for a boost dc-dc power converter. A highly perturbed switched boost converter circuit is shown to be efficiently controlled, in a trajectory tracking task for its non-minimum phase output, by means of a suitable linear filter, here addressed as a flat filter. Flat filtering is a natural robust version of generalized proportional integral control (GPIC) by which the effects of arbitrary time varying exogenous disturbances, unknown endogenous nonlinearities and un-modeled dynamics can be jointly attenuated in a conceptually similar fashion to observer-based active disturbance rejection control (ADRC) and algebraic identification based model free control (MFC) but: a) without using extended state observers and b) respecting the original system order in a time-varying simplified model while avoiding algebraic estimation techniques. The proposed control technique based on the TMS320F28335 digital signal processor chip is tested by means of realistic simulations and experimental setup.  相似文献   
38.
In this work, we analyze variable space diversity of Pareto optimal solutions (POS) and study the effectiveness of crossover and mutation operators in evolutionary many-objective optimization. First we examine the diversity of variables in the true POS on many-objective 0/1 knapsack problems with up to 20 items (bits), showing that variables in POS become noticeably diverse as we increase the number of objectives. We also verify the effectiveness of conventional two-point and uniform crossovers, Local Recombination that selects mating parents based on proximity in objective space, and two-point and uniform crossover operators which Controls the maximum number of Crossed Genes (CCG). We use NSGA-II, SPEA2, IBEA ??+? and MSOPS, which adopt different selection methods, and many-objective 0/1 knapsack problems with $n=\{100,250,500,750,\mbox{1,000}\}$ items (bits) and m?=?{2,4,6,8,10} objectives to verify the search performance of each crossover operator. Simulation results reveal that Local Recombination and CCG operators significantly improve search performance especially for NSGA-II and MSOPS, which have high diversity of genes in the population. Also, results show that CCG operators achieve higher search performance than Local Recombination for m?≥?4 objectives and that their effectiveness becomes larger as the number of objectives m increases. In addition, the contribution of CCG and mutation operators for the solutions search is analyzed and discussed.  相似文献   
39.
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable.  相似文献   
40.
Cable supported bridges are wind prone structures. Therefore, their aerodynamic behaviour must be studied in depth in order to guarantee their safe performance. In the last decades important achievements have been reached in the study of bridges under wind-induced actions. On the other hand, non-conventional design techniques such as sensitivity analysis or optimum design have not been applied although they have proved their feasibility in the automobile or aeronautic industries. The aim of this research work is to demonstrate how non-conventional design techniques can help designers when dealing with long span bridges considering their aeroelastic behaviour. In that respect, the comprehensive analytical optimum design problem formulation is presented. In the application example the optimum design of the challenging Messina Strait Bridge is carried out. The chosen initial design has been the year 2002 design proposal. Up to a 33% deck material saving has been obtained after finishing the optimization process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号