首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1028篇
  免费   27篇
  国内免费   4篇
电工技术   10篇
综合类   1篇
化学工业   251篇
金属工艺   24篇
机械仪表   30篇
建筑科学   16篇
能源动力   76篇
轻工业   100篇
水利工程   10篇
石油天然气   4篇
无线电   113篇
一般工业技术   225篇
冶金工业   69篇
原子能技术   9篇
自动化技术   121篇
  2023年   13篇
  2022年   20篇
  2021年   35篇
  2020年   24篇
  2019年   27篇
  2018年   40篇
  2017年   32篇
  2016年   34篇
  2015年   13篇
  2014年   35篇
  2013年   70篇
  2012年   48篇
  2011年   82篇
  2010年   61篇
  2009年   60篇
  2008年   68篇
  2007年   43篇
  2006年   41篇
  2005年   28篇
  2004年   32篇
  2003年   16篇
  2002年   28篇
  2001年   17篇
  2000年   8篇
  1999年   12篇
  1998年   23篇
  1997年   24篇
  1996年   13篇
  1995年   12篇
  1994年   9篇
  1993年   5篇
  1992年   12篇
  1991年   5篇
  1990年   6篇
  1988年   3篇
  1987年   4篇
  1986年   2篇
  1985年   3篇
  1984年   6篇
  1983年   4篇
  1982年   7篇
  1981年   4篇
  1980年   2篇
  1979年   2篇
  1978年   5篇
  1977年   4篇
  1976年   4篇
  1974年   2篇
  1973年   2篇
  1967年   3篇
排序方式: 共有1059条查询结果,搜索用时 15 毫秒
11.
Exploring mesh and tree-based multicast. Routing protocols for MANETs   总被引:2,自引:0,他引:2  
Recently, it became apparent that group-oriented services are one of the primary application classes targeted by MANETs. As a result, several MANET-specific multicast routing protocols have been proposed. Although these protocols perform well under specific mobility scenarios, traffic loads, and network conditions, no single protocol has been shown to be optimal in all scenarios. The goal of this paper is to characterize the performance of multicast protocols over a wide range of MANET scenarios. To this end, we evaluate the performance of mesh and tree-based multicast routing schemes relative to flooding and recommend protocols most suitable for specific MANET scenarios. Based on the analysis and simulation results, we also propose two variations of flooding, scoped flooding and hyper flooding, as a means to reduce overhead and increase reliability, respectively. Another contribution of the paper is a simulation-based comparative study of the proposed flooding variations against plain flooding, mesh, and tree-based MANET routing. In our simulations, in addition to "synthetic" scenarios, we also used more realistic MANET settings, such as conferencing and emergency response.  相似文献   
12.
数据通信和便携式系统成为当今SRAM的重要应用领域.某些SRAM由于能够提供实现较高带宽所需的性能(比如在网络系统中)或维持较长电池使用寿命所需的低功耗(比如在便携式设备中)而在许多应用中起着主导作用.  相似文献   
13.
Nonlinear ultrasonic (NLU) technique is used for characterization of microstructures in M250 grade maraging steel subjected to solution annealing at 1093 K for 1 h followed by ageing at 755 K for various ageing durations in the range from 0.25 to 100 h. Using pulse inversion technique, feeble second harmonic is extracted to determine nonlinear ultrasonic parameter, β, and the relative β parameter (RBP) which is the ratio of β parameter of the precipitation hardened specimen to that of the solution annealed specimen. Normalized mean square strain, volume fraction of reverted austenite and hardness have been measured and transmission electron microscopy (TEM) has been carried out to understand the microstructural changes that occur during ageing and to study the correlation between these measured parameters. Hardness and normalized mean square strain are found to increase during initial stages of ageing due to precipitation of intermetallics and decrease at longer durations due to formation of reverted austenite and coarsening of precipitates. This study establishes that NLU technique can be used for non-destructive characterization of ageing behaviour of M250 grade maraging steel.  相似文献   
14.
Journal of Materials Science: Materials in Electronics - In the current research work, NiMo thin films were successfully co-deposited with W on the copper substrate (NiMoW) by varying the plating...  相似文献   
15.
16.
17.
18.
Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately traced. Because the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. An intrusion detection system (IDS) is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current IDS depends on the system operators in working out the tuning solution and in integrating it into the detection model. Furthermore, an extensive effort is required to tackle the newly evolving attacks and a deep study is necessary to categorize it into the respective classes. To reduce this dependence, an automatically evolving anomaly IDS using neuro-genetic algorithm is presented. The proposed system automatically tunes the detection model on the fly according to the feedback provided by the system operator when false predictions are encountered. The system has been evaluated using the Knowledge Discovery in Databases Conference (KDD 2009) intrusion detection dataset. Genetic paradigm is employed to choose the predominant features, which reveal the occurrence of intrusions. The neuro-genetic IDS (NGIDS) involves calculation of weightage value for each of the categorical attributes so that data of uniform representation can be processed by the neuro-genetic algorithm. In this system unauthorized invasion of a user are identified and newer types of attacks are sensed and classified respectively by the neuro-genetic algorithm. The experimental results obtained in this work show that the system achieves improvement in terms of misclassification cost when compared with conventional IDS. The results of the experiments show that this system can be deployed based on a real network or database environment for effective prediction of both normal attacks and new attacks.  相似文献   
19.
Bioaccumulation of synthetic musks in a marine food chain was investigated by analyzing marine organisms at various trophic levels, including lugworm, clam, crustacean, fish, marine mammal, and bird samples collected from tidal flat and shallow water areas of the Ariake Sea, Japan. Two of the polycyclic musks, HHCB and AHTN, were the dominant compounds found in most of the samples analyzed, whereas nitro musks were not detected in any of the organisms, suggesting greater usage of polycyclic musks relative to the nitro musks in Japan. The highest concentrations of HHCB were detected in clams (258-2730 ng/g lipid wt.), whereas HHCB concentrations in mallard and black-headed gull were low, and comparable with concentrations in fish and crab. These results are in contrast to the bioaccumulation pattern of polychlorinated biphenyls; for which a positive correlation between the concentration and the trophic status of organisms was found. Such a difference in the bioaccumulation is probably due to the metabolism and elimination of HHCB in higher trophic organisms. Temporal trends in concentrations of synthetic musks were examined by analyzing tissues of marine mammals from Japanese coastal waters collected during 1977-2005. HHCB concentrations in marine mammals have shown significant increase since the early 1990s, suggesting a continuous input of this compound into the marine environment. Comparison of the time trend for HHCB with those for PCBs and PBDEs suggested that the rates of increase in HHCB concentrations were higher than the other classes of pollutants. To examine the geographical distribution of HHCB, we have analyzed tissues of fish, marine mammals, and birds collected from several locations. Synthetic musks were not detected in a sperm whale (pelagic species) from Japanese coastal water and in eggs of south polar skua from Antarctica. While the number of samples analyzed is limited, these results imply a lack of long-range transportation potential of synthetic musks in the environment.  相似文献   
20.
Liver, muscle, fat, kidney, and gall bladder of eight bald eagles (Haliaeetus leucocephalus) found dead in the Upper Peninsula of Michigan during 2000 were analyzed for the presence of polychlorinated dibenzo-p-dioxins (PCDDs), dibenzofurans (PCDFs), and biphenyls (including coplanar PCBs), p,p'-DDE, and hexachlorobenzene (HCB). Necropsy results showed that the birds suffered from peritonitis, bacterial infection, or trauma. Concentrations of PCDD/DFs in livers ranged from 23 to 4500 pg/g on a wet weight basis (wet wt), whereas the least concentrations were found in blood plasma of bald eagle nestlings (2.3-49 pg/g, wet wt). A maximum total PCB concentration of 280,000 ng/g, wet wt, was found in the liver of a dead bald eagle affected by peritonitis. The greatest concentrations of p,p'-DDE and HCB in eagle livers were 17,000 and 120 ng/g, wet wt, respectively. Eagles with elevated 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD) or total PCB concentrations tended to have great TCDD/TCDF or PCB126/PCB77 ratios, hypothesized to be due to induction of cytochrome P450 enzymes and subsequent metabolism of TCDF and PCB77. Concentrations of TCDD toxic equivalents (TEQs) in the tissues of bald eagles exceeded the thresholds for toxicity in a few avian species. Non-ortho coplanar PCBs accounted for 68-88% of the total TEQs in bald eagle tissues. PCDDs and PCDFs collectively accounted for, on average, 17% of the total TEQs. On the basis of the analysis of a single gall bladder with bile, biliary excretion rates of PCDDs, PCDFs, and PCBs were estimated as 0.015-0.02% per day.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号