首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   981篇
  免费   66篇
  国内免费   1篇
工业技术   1048篇
  2023年   8篇
  2022年   8篇
  2021年   50篇
  2020年   25篇
  2019年   46篇
  2018年   33篇
  2017年   41篇
  2016年   44篇
  2015年   36篇
  2014年   38篇
  2013年   78篇
  2012年   51篇
  2011年   72篇
  2010年   65篇
  2009年   63篇
  2008年   46篇
  2007年   54篇
  2006年   32篇
  2005年   37篇
  2004年   32篇
  2003年   20篇
  2002年   24篇
  2001年   13篇
  2000年   12篇
  1999年   13篇
  1998年   14篇
  1997年   16篇
  1996年   3篇
  1995年   10篇
  1994年   8篇
  1993年   9篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1989年   5篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   5篇
  1984年   3篇
  1983年   3篇
  1982年   4篇
  1981年   3篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
排序方式: 共有1048条查询结果,搜索用时 15 毫秒
11.
The purpose of this article is to present an evolutionary model of the enablers and inhibitors affecting the implementation and sustainability of continuous improvement. With this aim, a qualitative study using the grounded theory was carried out. Interviews were conducted with managers responsible for continuous improvement in first‐tier suppliers in the automotive sector. As a result, two existing lines of research in the continuous improvement literature are synthesized: on one hand, the literature concerning the enablers and barriers associated with continuous improvement sustainability; and on the other, the literature concerning the evolutionary model. © 2011 Wiley Periodicals, Inc.  相似文献   
12.
Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process.  相似文献   
13.
The equation of state model developed by Lacombe and Sanchez (J Phys Chem 1976, 80, 2352) is used in the form proposed later by Sanchez and Stone (Polymer Blends, Vol. 1: Formulation, 2000; Chapter 2) to correlate experimental vapor‐liquid equilibrium (VLE) data for the three binaries and the ternary systems. Experimental data from the binary systems carbon dioxide‐isopropyl alcohol (CO2‐IPrOH), isopropyl alcohol‐polystyrene (IPrOH‐PS), and carbon dioxide‐polystyrene (CO2‐PS) are used to calculate VLE properties for the ternary system CO2‐IPrOH‐PS. Two‐dimensional VLE‐phase diagrams were calculated and used to describe from a thermodynamic point of view the pressure, volume, and temperature values that characterize a thermoplastic foam evolution process, from the extruder to the foaming die. For different initial mixture CO2 + IPrOH concentrations, pressure reduction produces liquid foaming until the vitrification curve arrests the final foam volume expansion. The dependence of the vitreous transition with the system CO2 + IPrOH concentration while foaming is represented by the Chow (Macromolecules 1980, 13, 362) equation. The calculation procedure is proposed as a design tool to reduce the amount of experimental data usually needed as a requirement previous to the design stage. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci 104: 2663–2671, 2007  相似文献   
14.
Binary and ternary experimental cloud‐point curves (CPCs) for systems formulated with a low molar mass synthesized divinylester (DVE) resin, styrene (St), and poly(methyl methacrylate) (PMMA) were determined. The CPCs results were analyzed with the Flory–Huggins (F‐H) thermodynamic model taking into account the polydispersity of the DVE and PMMA components, to calculate the different binary interaction parameters and their temperature dependences. The St‐DVE system is miscible in all the composition range and down to the crystallization temperature of the St; therefore, the interaction parameter expression reported for a higher molar mass DVE was adapted. The interaction parameters obtained were used to calculate the phase diagrams of the St‐PMMA and the DVE‐PMMA binary systems and that of the St‐DVE‐PMMA ternary system at three different temperatures. Quasiternary phase diagrams show liquid–liquid partial miscibility of the St‐PMMA and DVE‐PMMA pairs. At room temperature, the St‐DVE‐PMMA system is miscible at all compositions. Final morphologies of PMMA‐modified cured St‐DVE materials were generated by polymerization‐induced phase separation (PIPS) mechanism from initial homogeneous mixtures. SEM and TEM micrographs were obtained to analyze the generated final morphologies, which showed a direct correlation with the initial miscibility of the system. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 100: 4539–4549, 2006  相似文献   
15.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
16.
Coho salmon (Oncorhynchus kisutch) is a fatty fish species whose farming production has greatly increased in recent years. Lipid damage produced during Coho salmon chilled storage was studied for up to 24 d. Lipid hydrolysis (free fatty acids, FFA) and oxidation (conjugated dienes; peroxide value, PV; thiobarbituric acid index, TBA‐i; fluorescent compounds formation, FR; browning development) were determined and compared to lipid composition (polyene index, PI; astaxanthin, AX) changes and sensory assessment (rancid odour development) results. Most lipid damage indices developed slowly during storage; thus, values obtained for FFA, PV, TBA‐i and FR were in all cases under 1.5 g/100 g, 4.0 meq oxygen/kg lipid, 0.40 mg malondialdehyde/kg muscle and 0.40, respectively. Odour assessment showed a significant (p <0.05) rancidity development at day 10, when compared to starting fish material; then, non‐acceptable values were obtained at days 19 and 24. The PI analysis showed not many differences during the storage time, with the lowest mean value at day 19. AX analysis indicated a relatively high content in the white muscle, which was maintained till the end of the experiment. A low oxidation development is concluded for Coho salmon lipids when compared to other fatty fish species under the same chilling conditions. AX was found to contribute to the oxidation stability of Coho salmon lipids, due to its free radical scavenger properties.  相似文献   
17.
Two samples of poly(diethoxyphosphazene) (PDEP) having very different molecular weights have been studied by viscometry and size exclusion chromatography in THF solution. The results obtained, together with light scattering data of these samples, allow the calculation of the Mark-Houwink constants a=0.65 and K=2.5 10-4 in THF at 25°C. The method of calculation employed takes into account the great polydispersity of the samples. The characteristic ratio of the unperturbed dimensions was also calculated giving Cn = r2o/n2 18, a value slightly higher than those previously reported for poly(dihexoxyphosphazene), Cn13 and poly (dichlorophosphazene), Cn13.5.  相似文献   
18.
Timely run‐time software replacement techniques are a corner stone for reconciling real‐time systems development and dynamic behavior. Typical real‐time systems do not consider dynamic behavior because it deeply challenges predictability and timeliness. Current efforts are starting to merge the safe and predictable execution with a controllable level of dynamicity by imposing a set of bounds and limitations to the system dynamic behavior. One of the obstacles for this is how to time‐bound the different operations required to effectively implement component replacement. In this paper, the main challenges for this problem are identified, and a model to ensure that components can be replaced at run time preserving the temporal properties of the system is provided that also avoids failures in replacements. A real example and simulations of our replacement model are provided that validate the presented ideas. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
19.
Social network services (SNSs) have brought new possibilities and challenges to the design of software environments that respect people’s cultural differences. These systems may represent an opportunity for social and digital inclusion. However, search mechanisms in these systems impose serious barriers for people in the process of acquiring digital literacy. One of the barriers is the difficulty of using the adequate terms/keywords to perform content searches. This paper presents an approach to allow ordinary, non-technology proficient people to access the content of a network through the use of search parameters that make sense to them. The proposal is grounded on Semantic Web technologies (Web ontology) combined with Organizational Semiotics concepts and methods to identify the users’ profile and language. A case study was conducted with the search mechanism integrated into a SNS, and a preliminary evaluation reveals the advantages and drawbacks of the approach.  相似文献   
20.
Summary The Stefan-Winkelmann diffusion technique has been used to determine vapor pressures of high boiling point compound-solvents mixtures. Data are reported at a temperature of 67°C for the mixtures polyphenyl ether (6 rings) — benzene and carbowax 1500 — benzene and at a temperature of 100°C for the mixtures polyphenyl ether (6 rings) — toluene and tricresylphosphate-toluene. The range of concentration is only limited by the appearance of a solid phase, and results are in good agreement with those determined by vapor pressure osmometry.Nomenclature A Vapour source - B Flowing gas phase - c Concentration, g-mol/cm3 - DAB Molecular diffusion coefficient, cm2/s - hi Total interface depth, cm - K Parameter defined by equation (6), dimensionless - I Polymer or high boiling point compound - MA Molecular weight - NAZ Molar flux, g-mol/(cm2) (s) - PA Partial pressure at the interface, atm - P Total pressure, atm - R Gas constant, (atm) (cm3) / (°K) (g-mol) - T Temperature, °K - t Time, s - YA Molar fraction at the interface, dimensionless - zo Initial interface depth, cm - zi Drop of the interface depth, cm - z Interface position Greek Letters A Density of the liquid phase, g/cm3  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号