首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1081篇
  免费   96篇
  国内免费   3篇
电工技术   15篇
综合类   1篇
化学工业   380篇
金属工艺   28篇
机械仪表   23篇
建筑科学   15篇
矿业工程   11篇
能源动力   27篇
轻工业   23篇
水利工程   1篇
石油天然气   15篇
武器工业   1篇
无线电   88篇
一般工业技术   319篇
冶金工业   58篇
原子能技术   17篇
自动化技术   158篇
  2024年   2篇
  2023年   18篇
  2022年   104篇
  2021年   93篇
  2020年   47篇
  2019年   51篇
  2018年   53篇
  2017年   45篇
  2016年   51篇
  2015年   41篇
  2014年   51篇
  2013年   82篇
  2012年   73篇
  2011年   86篇
  2010年   44篇
  2009年   46篇
  2008年   42篇
  2007年   44篇
  2006年   25篇
  2005年   43篇
  2004年   22篇
  2003年   14篇
  2002年   16篇
  2001年   13篇
  2000年   10篇
  1999年   10篇
  1998年   7篇
  1997年   11篇
  1996年   8篇
  1995年   1篇
  1994年   3篇
  1993年   3篇
  1992年   3篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   3篇
  1987年   3篇
  1985年   1篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1975年   1篇
  1972年   1篇
  1971年   1篇
  1968年   1篇
排序方式: 共有1180条查询结果,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - The paper addresses the problem of human activity recognition based on the data from wearable sensors. Human activity recognition depends on a wide context of...  相似文献   
2.
3.
Graphene has been predicted to develop a magnetic moment by proximity effect when placed on a ferromagnetic film, a promise that could open exciting possibilities in the fields of spintronics and magnetic data recording. In this work, the interplay between the magnetoresistance of graphene and the magnetization of an underlying ferromagnetic insulating film is studied in detail. A clear correlation between both magnitudes is observed but through a careful modeling of the magnetization and the weak localization measurements, that such correspondence can be explained by the effects of the magnetic stray fields arising from the ferromagnetic insulator is found. The results emphasize the complexity arising at the interface between magnetic and 2D materials.  相似文献   
4.
5.
The certainty equivalence approach to adaptive control is commonly used with two types of identifiers: passivity-based identifiers and swapping identifiers. The “passive” (also known as “observer-based”) approach is the prevalent identification technique in existing results on adaptive control for PDEs but has so far not been used in boundary control problems. The swapping approach, prevalent in finite-dimensional adaptive control is employed here for the first time in adaptive control of PDEs. For a class of unstable parabolic PDEs we prove a separation principle result for both the passive and swapping identifiers combined with the backstepping boundary controllers. The result is applicable in any dimension. For physical reasons we restrict our attention to dimensions no higher than three. The results of the paper are illustrated by simulations.  相似文献   
6.
This paper deals with qualitative analysis of the so-called switched fluid networks. Such networks are used to model communication, computer, and flexible manufacturing systems. We prove that for any deterministic network from a specific class, there exists a finite number of limit cycles attracting all the trajectories of the system. Furthermore, we determine this number. Date received: March 11, 2000. Date revised: January 19, 2001.  相似文献   
7.
This paper presents the information on the early period of an explosive head trauma and trauma to the auditory system. Different types of hearing impairment, the staging of the pathological process were determined along with various immunological and biochemical changes occurring in this group of patients. The results of the study call for necessity of the early ENT observation of all patients in whom an explosive trauma is suspected.  相似文献   
8.
The results of development work on an innovative low-capacity nuclear power plant (LCNPP) Uniterm together with substantiation of the need for a technical design of a reactor system and the basic design of the power plant are presented. The results of the work are used to determine the power range of the power generating unit where the main consumer qualities are guaranteed to be attained. Economic assessments of the development and operation of a two-block LCNPP under conditions in Russia are presented. __________ Translated from Atomnaya énergiya,Vol. 103, No. 1, pp. 44–48, July, 2007.  相似文献   
9.
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions for the second round candidates and review arguments and bounds against classes of differential attacks. We discuss all the SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential attacks. Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates with a suffix-free padding are covered.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号