首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2393篇
  免费   156篇
  国内免费   18篇
工业技术   2567篇
  2024年   5篇
  2023年   79篇
  2022年   107篇
  2021年   186篇
  2020年   145篇
  2019年   177篇
  2018年   169篇
  2017年   135篇
  2016年   151篇
  2015年   106篇
  2014年   128篇
  2013年   219篇
  2012年   169篇
  2011年   139篇
  2010年   108篇
  2009年   102篇
  2008年   64篇
  2007年   59篇
  2006年   40篇
  2005年   25篇
  2004年   26篇
  2003年   23篇
  2002年   16篇
  2001年   6篇
  2000年   18篇
  1999年   19篇
  1998年   27篇
  1997年   14篇
  1996年   11篇
  1995年   17篇
  1994年   15篇
  1993年   9篇
  1992年   7篇
  1991年   5篇
  1990年   7篇
  1989年   5篇
  1987年   3篇
  1985年   2篇
  1984年   5篇
  1983年   2篇
  1982年   1篇
  1981年   3篇
  1980年   3篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1974年   2篇
  1973年   1篇
  1972年   2篇
  1968年   1篇
排序方式: 共有2567条查询结果,搜索用时 406 毫秒
21.
A web operating system is an operating system that users can access from any hardware at any location. A peer-to-peer (P2P) grid uses P2P communication for resource management and communication between nodes in a grid and manages resources locally in each cluster, and this provides a proper architecture for a web operating system. Use of semantic technology in web operating systems is an emerging field that improves the management and discovery of resources and services. In this paper, we propose PGSW-OS (P2P grid semantic Web OS), a model based on a P2P grid architecture and semantic technology to improve resource management in a web operating system through resource discovery with the aid of semantic features. Our approach integrates distributed hash tables (DHTs) and semantic overlay networks to enable semantic-based resource management by advertising resources in the DHT based upon their annotations to enable semantic-based resource matchmaking. Our model includes ontologies and virtual organizations. Our technique decreases the computational complexity of searching in a web operating system environment. We perform a simulation study using the Gridsim simulator, and our experiments show that our model provides enhanced utilization of resources, better search expressiveness, scalability, and precision.  相似文献   
22.
Importance sampling is a technique that is commonly used to speed up Monte Carlo simulation of rare events. However, little is known regarding the design of efficient importance sampling algorithms in the context of queueing networks. The standard approach, which simulates the system using an a priori fixed change of measure suggested by large deviation analysis, has been shown to fail in even the simplest network settings. Estimating probabilities associated with rare events has been a topic of great importance in queueing theory, and in applied probability at large. In this article, we analyse the performance of an importance sampling estimator for a rare event probability in a Jackson network. This article carries out strict deadlines to a two-node Jackson network with feedback whose arrival and service rates are modulated by an exogenous finite state Markov process. We have estimated the probability of network blocking for various sets of parameters, and also the probability of missing the deadline of customers for different loads and deadlines. We have finally shown that the probability of total population overflow may be affected by various deadline values, service rates and arrival rates.  相似文献   
23.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent.  相似文献   
24.
A series of NbO x /ZrO2 catalysts containing up to 2.67wt Nb (ca. 80 nominal surface coverage) was prepared by incipient wetness impregnation from niobium oxalate and oxalic acid solution. The structure of the catalysts was monitored by X-ray diffraction and Raman spectroscopy. The results indicated the presence of a surface Nb phase. No evidence for the formation of crystalline Nb2O5 species was found. The development of the acidity as a function of Nb loading was monitored by adsorption of a basic probe molecule followed by infrared spectroscopy. The results indicated the appearance of Brnsted acid sites for a threshold of Nb loading. The abundance of Brnsted acid sites correlated well with the isopropanol dehydration activity. The overall behavior was very similar to that reported earlier for the WO x /ZrO2 system.  相似文献   
25.
Multiwalled carbon nanotube/polycaprolactone nanocomposites (MWNT/PCL) were prepared by in situ polymerization, whereby as‐received MWNTs (P‐MWNTs) and purified MWNTs (A‐MWNTs) were used as reinforcing materials. The A‐MWNTs were purified by nitric acid treatment, which introduced the carboxyl groups (COOH) on the MWNT. The micrographs of the fractured surfaces of the nanocomposites showed that the A‐MWNTs in A‐MWNT/PCL were better dispersed than P‐MWNTs in PCL matrix (P‐MWNT/PCL). Percolation thresholds of the P‐MWNT/PCL and A‐MWNT/PCL, which were studied by rheological properties, were found at ~2 wt % of the MWNT. The conductivity of the P‐MWNT/PCL was between 10?1 and 10?2 S/cm by loading of 2 wt % of MWNT although that of the A‐MWNT/PCL reached ~10?2 S/cm by loading of 7 wt % of MWNT. The conductivity of the P‐MWNT/PCL was higher than that of the A‐MWNT/PCL at the entire range of the studied MWNT loading, which might be due to the destruction of π‐network of the MWNT by acid treatment, although the A‐MWNT/PCL was better dispersed than the P‐MWNT/PCL. The amount of the MWNT at which the conductivity of the nanocomposite started to increase was strongly correlated with the percolation threshold. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci 104: 1957–1963, 2007  相似文献   
26.
Mechanical properties of wood plastic composites (WPCs) manufactured from sawdust and virgin and/or recycled plastics, namely high density polyethylene (HDPE) and polypropylene (PP), were studied. Sawdust was prepared from beech industrial sawdust by screening to the desired particle size and was mixed with different virgin or recycled plastics at 50% by weight fiber loading. The mixed materials were then compression molded into panels. Flexural and tensile properties and impact strength of the manufactured WPCs were determined according to the relevant standard specifications. Although composites containing PP (virgin and recycled) exhibited higher stiffness and strength than those made from HDPE (virgin and recycled), they had lower unnotched impact strengths. Mechanical properties of specimens containing recycled plastics (HDPE and PP) were statistically similar and comparable to those of composites made from virgin plastics. This was considered as a possibility to expand the use of recycled plastics in the manufacture of WPCs. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 100: 3641–3645, 2006  相似文献   
27.
In this paper, a novel approach is proposed to design a robust fault detection observer for uncertain linear time delay systems. The system is composed of both norm‐bounded uncertainties and exogenous signals (noise, disturbance, and fault) which are considered to be unknown. The main contribution of this paper is to present unknown input observer (UIO)‐based fault detection system which shows the maximum sensitivity to fault signals and the minimum sensitivity to other signals. Since the system contains uncertainty terms, an H model‐matching approach is used in design procedure. The reference residual signal generator system is designed so that the fault signal has maximum sensitivity while the exogenous signals have minimum sensitivity on the residual signal. Then, the fault detection system is designed by minimizing the estimation error between the reference residual signal and the UIO residual signal in the sense of H norm. A sufficient condition for the existence of such a filter is exploited in terms of certain linear matrix inequalities (LMIs). Application of the proposed method in a numerical example and an engineering process are simulated to demonstrate the effectiveness of the proposed algorithm. Simulation results show the validity of the proposed approach to detect the occurrence of faults in the presence of modeling errors, disturbances, and noise.  相似文献   
28.
A series of organic/inorganic hybrid (OIH) films were prepared using cellulose acetate (CA) as the organic component and tetraethyl orthosilicate (TEOS) as the inorganic component. The chemical, morphological, and mechanical properties of these films were evaluated with a variety of analytical techniques. The results of these evaluations showed that crosslinked CA OIH films were formed during the sol-gel reactions. The structure of OIH films was very sensitive to the CA/TEOS ratio and film formation conditions. All of the films with added TEOS were two phase on a molecular level, i.e., inorganic TEOS domains surrounded by a CA matrix. Under some film formation conditions the presence of TEOS, a nonsolvent for CA, led to solvent/nonsolvent phase separation on the micron scale. © 1995 John Wiley & Sons, Inc.  相似文献   
29.
Considering the fact that faults may be revealed as undesired mutual effect of program predicates on each other, a new approach for localizing latent bugs, namely Hierarchy-Debug, is presented in this paper. To analyze the vertical effect of predicates on each other and on program termination status, the predicates are fitted into a logistic lasso model. To support scalability, a hierarchical clustering algorithm is applied to cluster the predicates according to their presence in different executions. Considering each cluster as a pseudo-predicate, a distinct lasso model is built for intermediate levels of the hierarchy. Then, we apply a majority voting technique to score the predicates according to their lasso coefficients at different levels of the hierarchy. The predicates with relatively higher scores are ranked as fault relevant predicates. To provide the context of failure, faulty sub-paths are identified as sequences of fault relevant predicates. The grouping effect of Hierarchy-Debug helps programmers to detect multiple bugs. Four case studies have been designed to evaluate the proposed approach on three well-known test suites, SpaceSiemens, and Bash. The evaluations show that Hierarchy-Debug produces more precise results compared with prior fault localization techniques on the subject programs.  相似文献   
30.
ABSTRACT

A green and efficient dispersive liquid-liquid microextraction method based on a new deep eutectic solvent has been developed for the preconcentration and extraction of cobalt and nickel ions. The deep eutectic solvent is formed by mixing choline chloride (hydrogen bond acceptor) and 4-aminophenol (hydrogen bond donor). Then, it is used as a chelating agent as well as extraction solvent. Under the optimum experimental conditions, the linear ranges for Ni(II) and Co(II) were 0.80–50 and 0.50–50 µgL?1, respectively, by flame atomic absorption spectrometry. The obtained detection limits were 0.30 and 0.22 µg L?1 for Ni(II) and Co(II), respectively.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号