首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1184篇
  免费   43篇
  国内免费   2篇
电工技术   24篇
综合类   4篇
化学工业   166篇
金属工艺   84篇
机械仪表   42篇
建筑科学   31篇
矿业工程   8篇
能源动力   65篇
轻工业   57篇
水利工程   19篇
石油天然气   5篇
无线电   147篇
一般工业技术   318篇
冶金工业   105篇
原子能技术   7篇
自动化技术   147篇
  2024年   2篇
  2023年   16篇
  2022年   29篇
  2021年   35篇
  2020年   28篇
  2019年   42篇
  2018年   59篇
  2017年   35篇
  2016年   40篇
  2015年   38篇
  2014年   62篇
  2013年   99篇
  2012年   51篇
  2011年   69篇
  2010年   65篇
  2009年   64篇
  2008年   48篇
  2007年   41篇
  2006年   27篇
  2005年   32篇
  2004年   31篇
  2003年   28篇
  2002年   22篇
  2001年   16篇
  2000年   17篇
  1999年   20篇
  1998年   29篇
  1997年   10篇
  1996年   18篇
  1995年   15篇
  1994年   12篇
  1993年   20篇
  1992年   11篇
  1991年   12篇
  1990年   8篇
  1989年   9篇
  1988年   9篇
  1987年   11篇
  1986年   8篇
  1985年   9篇
  1984年   2篇
  1983年   7篇
  1981年   4篇
  1980年   8篇
  1978年   2篇
  1977年   1篇
  1976年   4篇
  1970年   3篇
  1968年   1篇
排序方式: 共有1229条查询结果,搜索用时 15 毫秒
1.
Wireless Personal Communications - In the present scenario, there is a boom in the demand of the users to achieve increased capacity, high data, low latency, and high-performance rates. 5G New...  相似文献   
2.

A fuzzy set based cost model for additive manufacturing is proposed. The model is illustrated through an example of selective laser sintering (SLS), a commonly used additive manufacturing (AM) process. Initially, a deterministic cost model is developed. It is then converted to a fuzzy set based model by considering uncertainty in build time estimation and cost components. For the specific case of SLS, a build time estimation procedure is developed as a part of the cost model. A method to evaluate the reliability of the cost estimate in AM and its significance is also introduced. The cost model is illustrated through two examples of products manufactured by SLS.

  相似文献   
3.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
4.
Considers the applicability of algorithm based fault tolerance (ABET) to massively parallel scientific computation. Existing ABET schemes can provide effective fault tolerance at a low cost For computation on matrices of moderate size; however, the methods do not scale well to floating-point operations on large systems. This short note proposes the use of a partitioned linear encoding scheme to provide scalability. Matrix algorithms employing this scheme are presented and compared to current ABET schemes. It is shown that the partitioned scheme provides scalable linear codes with improved numerical properties with only a small increase in hardware and time overhead  相似文献   
5.
Vascular injuries may occur as complications of elbow dislocation and usually involve the brachial artery. A case report is presented in which only the radial artery was compromised as a result of the dislocation.  相似文献   
6.
Selective laser sintering (SLS) uses a computer controlled laser beam to create objects directly from the CAD data without part-specific tooling. In this paper, the effect of material and processing parameters on the microstructure and mechanical properties of an alumina/aluminum phosphate composite fabricated by SLS is described. The precursor material is a blend of alumina and ammonium phosphate powder. This paper deals primarily with the effect of alumina particle size and material composition on the strength of the composite. A constitutive equation is also proposed to relate the mechanical properties of the composite to its microstructural characteristics.  相似文献   
7.
8.
9.
In this paper, we present a new economics-based power-aware protocol, called the distributed economic subcontracting protocol (DESP) that dynamically distributes task computation among mobile devices in an ad hoc wireless network. Mobile computation devices may be energy buyers, contractors, or subcontractors. Tasks are transferred between devices via distributed bargaining and transactions. When additional energy is required, buyers and contractors negotiate energy prices within their local markets. Contractors and subcontractors spend communication and computation energy to relay or execute buyers' tasks. Buyers pay the negotiated price for this energy. Decision-making algorithms are proposed for buyers, contractors, and subcontractors, each of which has a different optimization goal. We have built a wireless network simulator, called ESIM, to assist in the design and analysis of these algorithms. When the average communication energy required transferring a task is less than the average energy required to execute a task, our experimental results indicate that markets based on our protocol and decision-making algorithms fairly and effectively allocate energy resources among different tasks in both cooperative and competitive scenarios.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号