首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1871篇
  免费   84篇
  国内免费   5篇
电工技术   17篇
综合类   2篇
化学工业   317篇
金属工艺   112篇
机械仪表   38篇
建筑科学   37篇
矿业工程   2篇
能源动力   106篇
轻工业   111篇
水利工程   5篇
石油天然气   3篇
无线电   207篇
一般工业技术   471篇
冶金工业   145篇
原子能技术   23篇
自动化技术   364篇
  2024年   7篇
  2023年   32篇
  2022年   60篇
  2021年   56篇
  2020年   52篇
  2019年   70篇
  2018年   86篇
  2017年   77篇
  2016年   86篇
  2015年   58篇
  2014年   69篇
  2013年   145篇
  2012年   109篇
  2011年   118篇
  2010年   89篇
  2009年   96篇
  2008年   95篇
  2007年   85篇
  2006年   60篇
  2005年   55篇
  2004年   47篇
  2003年   35篇
  2002年   35篇
  2001年   25篇
  2000年   21篇
  1999年   20篇
  1998年   19篇
  1997年   28篇
  1996年   17篇
  1995年   21篇
  1994年   22篇
  1993年   20篇
  1992年   16篇
  1991年   17篇
  1990年   9篇
  1989年   7篇
  1988年   16篇
  1987年   7篇
  1986年   8篇
  1985年   7篇
  1984年   16篇
  1983年   6篇
  1982年   12篇
  1981年   2篇
  1979年   4篇
  1976年   2篇
  1974年   2篇
  1973年   5篇
  1972年   2篇
  1971年   4篇
排序方式: 共有1960条查询结果,搜索用时 0 毫秒
1.
Wireless Networks - In Wireless Sensor Networks (WSNs), where power consumption is a huge concern, the improvement of the network’s lifetime is an area of constant study and innovation. The...  相似文献   
2.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
3.
The hot blow forming of magnesium sheet offers significant opportunity for forming complex, lightweight parts for automotive applications. This paper characterizes the elevated-temperature formability of AZ31 magnesium sheet materials and the effect of processing conditions on the performance of these materials. In addition, magnesium sheet application development at General Motors Corporation is reviewed.  相似文献   
4.
Carbon nanotubes (CNTs) have been synthesized using the arc discharge method with a rotating graphite disc as the cathode. Arcing was carried out in open air and without the use of catalysts. The current density was maintained constant through out the experiment, while, the rate of rotation of the cathode and atmosphere under which arcing was carried out were changed during experimentation. Characterization of the samples produced indicates that rotation of the cathode has a significant impact on the quality and yield of the process. It is proposed that rotation of the cathode drags plasma formed between two electrodes away from high temperature region. This results in a sudden quenching of the reactive plasma. The time available for nucleation and growth phenomena is significantly reduced and thus leads to the formation of highly graphitic multi walled CNTs (yield 60%) and traces of double walled CNTs.  相似文献   
5.
Lean philosophy: implementation in a forging company   总被引:2,自引:2,他引:0  
This research addresses the implementation of lean philosophy in a forging company with a focus on radial forging production flow lines. Here, the prime motive is to evolve and test several strategies to eliminate waste on the shop floor. In this research, a systematic approach is suggested for the implementation of lean principles. This paper describes an application of value stream mapping (VSM). Consequently, the present and future states of value stream maps are constructed to improve the production process by identifying waste and its sources. Furthermore, Taguchi’s method of design of experiments is pursued here to minimize the forging defects produced due to imperfect operating conditions. A noticeable reduction in set-up time and work-in-process (WIP) inventory level is substantiated. Finally, we conclude with a discussion of managerial implications and the future scope of research.  相似文献   
6.
7.
8.
We study the application of the geographic nearest neighbor approach to two problems. The first problem is the construction of an approximately minimum length rectilinear Steiner tree for a set ofn points in the plane. For this problem, we introduce a variation of a subgraph of sizeO(n) used by YaO [31] for constructing minimum spanning trees. Using this subgraph, we improve the running times of the heuristics discussed by Bern [6] fromO(n 2 log n) toO(n log2 n). The second problem is the construction of a rectilinear minimum spanning tree for a set ofn noncrossing line segments in the plane. We present an optimalO(n logn) algorithm for this problem. The rectilinear minimum spanning tree for a set of points can thus be computed optimally without using the Voronoi diagram. This algorithm can also be extended to obtain a rectilinear minimum spanning tree for a set of nonintersecting simple polygons.The results in this paper are a part of Y. C. Yee's Ph.D. thesis done at SUNY at Albany. He was supported in part by NSF Grants IRI-8703430 and CCR-8805782. S. S. Ravi was supported in part by NSF Grants DCI-86-03318 and CCR-89-05296.  相似文献   
9.
Fresh niobium hydroxide was first precipitated from NbF5 solution using an aqueous ammonium hydroxide under basic conditions. Then a simple procedure of mixing lithium and niobium hydroxides together and heating at a low temperature (400 °C) produced pure ultrafine single phase LiNbO3 (LN). In the literature, this is the lowest temperature so far reported on the formation of LN. The phase content and lattice parameters are determined by X-ray diffraction (XRD). The average particle size and morphology were studied by transmission electron microscopy (TEM).  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号