首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2145篇
  免费   96篇
  国内免费   8篇
电工技术   28篇
综合类   2篇
化学工业   434篇
金属工艺   133篇
机械仪表   49篇
建筑科学   41篇
矿业工程   2篇
能源动力   118篇
轻工业   152篇
水利工程   32篇
石油天然气   7篇
无线电   287篇
一般工业技术   527篇
冶金工业   201篇
原子能技术   16篇
自动化技术   220篇
  2024年   5篇
  2023年   30篇
  2022年   61篇
  2021年   60篇
  2020年   52篇
  2019年   75篇
  2018年   96篇
  2017年   75篇
  2016年   77篇
  2015年   63篇
  2014年   92篇
  2013年   194篇
  2012年   97篇
  2011年   117篇
  2010年   101篇
  2009年   92篇
  2008年   80篇
  2007年   79篇
  2006年   78篇
  2005年   62篇
  2004年   51篇
  2003年   42篇
  2002年   41篇
  2001年   24篇
  2000年   36篇
  1999年   30篇
  1998年   60篇
  1997年   27篇
  1996年   36篇
  1995年   30篇
  1994年   23篇
  1993年   29篇
  1992年   18篇
  1991年   29篇
  1990年   15篇
  1989年   20篇
  1988年   15篇
  1987年   14篇
  1986年   11篇
  1985年   9篇
  1984年   9篇
  1983年   10篇
  1982年   9篇
  1981年   9篇
  1980年   8篇
  1977年   4篇
  1976年   9篇
  1975年   9篇
  1973年   6篇
  1970年   7篇
排序方式: 共有2249条查询结果,搜索用时 15 毫秒
1.
Wireless Personal Communications - In the present scenario, there is a boom in the demand of the users to achieve increased capacity, high data, low latency, and high-performance rates. 5G New...  相似文献   
2.
3.
4.
Most embedded systems have limited amount of memory. In contrast, the memory requirements of the digital signal processing (DSP) and video processing codes (in nested loops, in particular) running on embedded systems is significant. This paper addresses the problem of estimating and reducing the amount of memory needed for transfers of data in embedded systems. First, the problem of estimating the region associated with a statement or the set of elements referenced by a statement during the execution of nested loops is analyzed. For a fixed execution ordering, a quantitative analysis of the number of elements referenced is presented; exact expressions for uniformly generated references and a close upper and lower bound for nonuniformly generated references are derived. Second, in addition to presenting an algorithm that computes the total memory required, this paper also discusses the effect of transformations (that change the execution ordering) on the lifetimes of array variables, i.e., the time between the first and last accesses to a given array location. The term maximum window size is introduced, and quantitative expressions are derived to compute the maximum window size. A detailed analysis of the effect of unimodular transformations on data locality, including the calculation of the maximum window size, is presented.  相似文献   
5.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
6.
Considers the applicability of algorithm based fault tolerance (ABET) to massively parallel scientific computation. Existing ABET schemes can provide effective fault tolerance at a low cost For computation on matrices of moderate size; however, the methods do not scale well to floating-point operations on large systems. This short note proposes the use of a partitioned linear encoding scheme to provide scalability. Matrix algorithms employing this scheme are presented and compared to current ABET schemes. It is shown that the partitioned scheme provides scalable linear codes with improved numerical properties with only a small increase in hardware and time overhead  相似文献   
7.
Vascular injuries may occur as complications of elbow dislocation and usually involve the brachial artery. A case report is presented in which only the radial artery was compromised as a result of the dislocation.  相似文献   
8.
The UV-Visible absorption spectra of virgin and gamma irradiated (20–800 kGy) CR-39 polymer have been deduced by using Shimadzu Double beam Double Monochromator UV-Visible Spectrophotometer (UV-2550). The existence of the peaks, their shifting and broadening as a result of gamma irradiation has been discussed. Finally the indirect and direct band gap in virgin and gamma irradiated CR-39 has been determined. The values of indirect band gap have been found to be lower than the corresponding values of direct band gap.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号