首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1278篇
  免费   89篇
  国内免费   11篇
电工技术   40篇
综合类   3篇
化学工业   307篇
金属工艺   34篇
机械仪表   62篇
建筑科学   61篇
能源动力   111篇
轻工业   95篇
水利工程   8篇
石油天然气   15篇
无线电   112篇
一般工业技术   242篇
冶金工业   58篇
原子能技术   4篇
自动化技术   226篇
  2024年   3篇
  2023年   25篇
  2022年   37篇
  2021年   74篇
  2020年   62篇
  2019年   83篇
  2018年   101篇
  2017年   113篇
  2016年   88篇
  2015年   74篇
  2014年   89篇
  2013年   136篇
  2012年   80篇
  2011年   95篇
  2010年   66篇
  2009年   63篇
  2008年   40篇
  2007年   24篇
  2006年   20篇
  2005年   16篇
  2004年   10篇
  2003年   11篇
  2002年   8篇
  2001年   10篇
  2000年   5篇
  1999年   4篇
  1998年   4篇
  1997年   5篇
  1996年   2篇
  1995年   4篇
  1994年   5篇
  1992年   3篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   3篇
  1987年   3篇
  1986年   1篇
  1985年   1篇
  1982年   3篇
  1981年   1篇
  1980年   1篇
  1976年   2篇
排序方式: 共有1378条查询结果,搜索用时 0 毫秒
1.
2.
3.
This paper presents an energy-efficient switching scheme for successive approximation register (SAR) analogue-to-digital converter (ADC). The proposed scheme employs charge recycling method to keep the capacitor arrays free of transitional energy between bit generations except reset phase. In comparison with the conventional switching scheme, the proposed one achieves 100% transitional energy saving without considering reset phase. In addition, configuration of a 10-bit SAR ADC shows that the proposed switching scheme reduces the capacitor area by 25% compared with the conventional switching scheme.  相似文献   
4.
The notion of extended filter of a filter associated to a subset of Rl-monoids is defined and related properties are investigated. Rachunek and Salounova proved that positive implicative filters and Boolean filters in Rl-monoids coincide with a condition in Rachunek and Salounova (Acta Univ Palacki Olomuc Fac rer nat Math 48(1):93–107, 2009). In this paper, we prove that positive implicative filters and Boolean filters coincide without any condition and get some results on various types of filters.  相似文献   
5.
In this paper, an iterative algorithm is established for finding the generalized bisymmetric solution group to the coupled matrix equations (including the generalized (coupled) Lyapunov and Sylvester matrix equations as special cases). It is proved that proposed algorithm consistently converges to the generalized bisymmetric solution group for any initial generalized bisymmetric matrix group. Finally a numerical example indicates that proposed algorithm works quite effectively in practice.  相似文献   
6.
Iranian Polymer Journal - Effects of graphene oxide (GO) on various properties of rubber hybrid nanocomposites based on PVMQ/XNBR-g-GMA/XNBR (phenyl-vinyl-methyl-polysiloxane/carboxylated nitrile...  相似文献   
7.
Although leather has a number of desirable properties such as thermal stability and fire retardancey, in addition to high toughness, it has a few drawbacks such as weight, high water absorption, poor soil and rot resistance, and nonuniformity. If these defects are overcome, leather's usefulness would be further enhanced and its competitive position with respect to synthetics would increase. This study reports the physical and mechanical properties of buffalo leather after chemical graft copolymerization with ethyl acrylate, butyl acrylate, and 2‐ethyl hexyl acrylate using benzoyl peroxide as an initiator. The optimum conditions for grafting (e.g., monomer and initiator concentrations, temperature and time of grafting, and solvent leather ratio) were extensively investigated. The study achieved outstanding properties for buffalo leather in reduction of water uptake after grafting, especially on using 2‐ethyl hexyl acrylate and butyl acrylate monomers. FT‐IR and solid 13C‐NMR for leather before and after grafting confirmed the grafting process.© 2003 Wiley Periodicals, Inc. J Appl Polym Sci 89: 1478–1483, 2003  相似文献   
8.
Importance sampling is a technique that is commonly used to speed up Monte Carlo simulation of rare events. However, little is known regarding the design of efficient importance sampling algorithms in the context of queueing networks. The standard approach, which simulates the system using an a priori fixed change of measure suggested by large deviation analysis, has been shown to fail in even the simplest network settings. Estimating probabilities associated with rare events has been a topic of great importance in queueing theory, and in applied probability at large. In this article, we analyse the performance of an importance sampling estimator for a rare event probability in a Jackson network. This article carries out strict deadlines to a two-node Jackson network with feedback whose arrival and service rates are modulated by an exogenous finite state Markov process. We have estimated the probability of network blocking for various sets of parameters, and also the probability of missing the deadline of customers for different loads and deadlines. We have finally shown that the probability of total population overflow may be affected by various deadline values, service rates and arrival rates.  相似文献   
9.
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud.  相似文献   
10.
In order to evaluate performance of protocols for ad hoc networks, the protocols have to be tested under realistic conditions. These conditions may include a reasonable transmission range, a limited buffer size, and realistic movement of mobile users (mobility models). In this paper, we propose a new and realistic type of random mobility models in which the mobile node has to decelerate to reach the point of direction change and accelerates with a defined acceleration to reach its intended speed. This realistic mobility model is proposed based on random mobility models. In reality, mobile objects tend to change their speed when they are going to change their direction, i.e. decelerate when approaching a direction change point and accelerate when they start their movement in a new direction. Therefore, in this paper, we implement this behavior in random mobility models which lack such specification. In fact, this paper represents our effort to use this accelerated movement to anticipate a probable direction change of a mobile node with reasonable confidence. The simulation type of this paper is based on traces produced by a mobility trace generator tool. We use a data mining concept called association rule mining to find any possible correlations between accelerated movement of mobile node and the probability that mobile node wants to change its direction. We calculate confidence and lift parameters for this matter, and simulate this mobility model based on random mobility models. These simulations show a meaningful correlation between occurrence of an accelerated movement and event of mobile node's direction change.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号