首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   351篇
  免费   13篇
  国内免费   1篇
工业技术   365篇
  2024年   1篇
  2023年   7篇
  2022年   15篇
  2021年   20篇
  2020年   14篇
  2019年   6篇
  2018年   15篇
  2017年   13篇
  2016年   9篇
  2015年   10篇
  2014年   15篇
  2013年   31篇
  2012年   23篇
  2011年   37篇
  2010年   20篇
  2009年   25篇
  2008年   16篇
  2007年   14篇
  2006年   11篇
  2005年   8篇
  2004年   6篇
  2003年   7篇
  2002年   10篇
  2001年   3篇
  2000年   4篇
  1999年   1篇
  1998年   6篇
  1996年   3篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
  1988年   2篇
  1984年   1篇
  1983年   3篇
  1982年   2篇
  1979年   1篇
  1977年   1篇
  1975年   1篇
排序方式: 共有365条查询结果,搜索用时 15 毫秒
71.
针对不同打印层厚度对熔融沉积成型(fused deposition modeling,简称FDM)薄板固有特性的影响规律及相应的机理进行了研究。首先,以悬臂边界条件下的FDM薄板为研究对象,创建了固有特性理论模型;其次,完成了薄板样件的制备,同时搭建了样件的动力学测试系统,实验研究了样件的固有特性参数;最后,对比分析理论与实验结果,以验证理论模型的正确性。研究结果表明,所建模型可以准确预测FDM薄板结构的固有特征参数;打印层越厚,样件的固有频率越高,但其模态振型不会随着打印层厚度的变化而变化。该研究为提高FDM产品动力学性能提供了理论基础和技术支持。  相似文献   
72.
Masking schemes based on tables recomputation are classical countermeasures against high-order side-channel attacks. Still, they are known to be attackable at order d in the case the masking involves d shares. In this work, we mathematically show that an attack of order strictly greater than d can be more successful than an attack at order d. To do so, we leverage the idea presented by Tunstall, Whitnall and Oswald at FSE 2013: We exhibit attacks which exploit the multiple leakages linked to one mask during the recomputation of tables. Specifically, regarding first-order table recomputation, improved by a shuffled execution, we show that there is a window of opportunity, in terms of noise variance, where a novel highly multivariate third-order attack is more efficient than a classical bivariate second-order attack. Moreover, we show on the example of the high-order secure table computation presented by Coron at EUROCRYPT 2014 that the window of opportunity enlarges linearly with the security order d. These results extend that of the CHES ’15 eponymous paper. Here, we also investigate the case of degree one leakage models and formally show that the Hamming weight model is the less favorable to the attacker. Eventually, we validate our attack on a real ATMEL smartcard.  相似文献   
73.
Mixed-dimensional heterostructures formed by the stacking of 2D materials with nanostructures of distinct dimensionality constitute a new class of nanomaterials that offers multifunctionality that goes beyond those of single dimensional systems. An unexplored architecture of single electron transistor (SET) is developed that employs heterostructures made of nanoclusters (0D) grown on a 2D molybdenum disulfide (MoS2) channel. Combining the large Coulomb energy of the nanoclusters with the electronic capabilities of the 2D layer, the concept of 0D–2D vertical SET is unveiled. The MoS2 underneath serves both as a charge tunable channel interconnecting the electrode, and as bottom electrode for each v-SET cell. In addition, its atomic thickness makes it thinner than the Debye screening length, providing electric field transparency functionality that allows for an efficient electric back gate control of the nanoclusters charge state. The Coulomb diamond pattern characteristics of SET are reported, with specific doping dependent nonlinear features arising from the 0D/2D geometry that are elucidated by theoretical modeling. These results hold promise for multifunctional single electron device taking advantage of the versatility of the 2D materials library, with as example envisioned spintronics applications while coupling quantum dots to magnetic 2D material, or to ferroelectric layers for neuromorphic devices.  相似文献   
74.
The fifth‐generation (5G) wireless networks have to deal with the high data rate and stringent latency requirements due to the massive invasion of connected devices and data‐hungry applications. Edge caching is a promising technique to overcome these challenges by prefetching the content closer to the end users at the edge node's local storage. In this paper, we analyze the performance of edge caching 5G networks with the aid of satellite communication systems. First, we investigate the satellite‐aided edge caching systems in two promising use cases: (a) in dense urban areas and (b) in sparsely populated regions, eg, rural areas. Second, we study the effectiveness of satellite systems via the proposed satellite‐aided caching algorithm, which can be used in three configurations: (a) mono‐beam satellite, (b) multi‐beam satellite, and (c) hybrid mode. Third, the proposed caching algorithm is evaluated by using both empirical Zipf‐distribution data and the more realistic Movielens dataset. Last but not least, the proposed caching scheme is implemented and tested by our developed demonstrators which allow real‐time analysis of the cache hit ratio and cost analysis.  相似文献   
75.
This paper considers the problem of sequencing mixed-model assembly lines (MMALs). Our goal is to determine the sequence of products to minimise work overload. This problem is known as the MMAL sequencing problem with work overload minimisation: we explicitly use task operation times to find the product sequence. This paper is based on an industrial case study of a truck assembly line. In this industrial context, as a reaction to work overloads, operators at the workstations finish their tasks before the product reaches the next workstation, but at the expense of fatigue. Furthermore, there are different types of operators, each with different task responsibilities. The originality of this work is to model this new way of reacting against work overloads, to integrate three operator types in the sequencing model and to apply the developed methods in a real industrial context. To solve this problem, we propose three meta-heuristic procedures: genetic algorithm, simulated annealing and a combination of these two meta-heuristics. All the methods proposed are tested on industrial data and compared to the solutions obtained using a mixed-integer linear programme. The results show that the proposed methods considerably improve the results of the current procedure used in the case study.  相似文献   
76.
This paper addresses the problem of localizing people in low and high density crowds with a network of heterogeneous cameras. The problem is recast as a linear inverse problem. It relies on deducing the discretized occupancy vector of people on the ground, from the noisy binary silhouettes observed as foreground pixels in each camera. This inverse problem is regularized by imposing a sparse occupancy vector, i.e., made of few non-zero elements, while a particular dictionary of silhouettes linearly maps these non-empty grid locations to the multiple silhouettes viewed by the cameras network. The proposed framework is (i) generic to any scene of people, i.e., people are located in low and high density crowds, (ii) scalable to any number of cameras and already working with a single camera, (iii) unconstrained by the scene surface to be monitored, and (iv) versatile with respect to the camera??s geometry, e.g., planar or omnidirectional. Qualitative and quantitative results are presented on the APIDIS and the PETS 2009 Benchmark datasets. The proposed algorithm successfully detects people occluding each other given severely degraded extracted features, while outperforming state-of-the-art people localization techniques.  相似文献   
77.
A clinically relevant subset of patients with soft tissue sarcoma presents with either locally advanced or upfront metastatic disease, or will develop distant metastases over time, despite successful treatment of their primary tumour. The currently available systemic agents to treat such advanced cases only provide modest disease control and are not active in all histological subtypes. Thus, there is an unmet need for novel and more efficacious agents to improve the outcome of this rare disease. In the current preclinical in vivo study, we evaluated plocabulin, a novel tubulin inhibitor, in five distinct histological subtypes of soft tissue sarcoma: dedifferentiated liposarcoma, leiomyosarcoma, undifferentiated sarcoma, intimal sarcoma and CIC-rearranged sarcoma. The efficacy was tested in seven patient-derived xenograft models, which were generated by the engraftment of tumour fragments from patients directly into nude mice. The treatment lasted 22 days, and the efficacy of the drug was assessed and compared to the doxorubicin and vehicle groups by volumetric analysis, histopathology and immunohistochemistry. We observed tumour volume control in all the tested histological subtypes. Additionally, in three sarcoma subtypes, extensive central necrosis, associated with significant tumour regression, was seen. This histological response is explained by the drug’s vascular-disruptive properties, reflected by a decreased total vascular area in the xenografts. Our results demonstrate the in vivo efficacy of plocabulin in the preclinical models of soft tissue sarcoma and corroborate the findings of our previous study, which demonstrated similar vascular-disruptive effects in gastrointestinal stromal tumours—another subtype of soft tissue sarcoma. Our data provide a convincing rationale for further clinical exploration of plocabulin in soft tissue sarcomas.  相似文献   
78.
Analytical methods have been proposed in the literature for performance evaluation of kanban control systems. Among them, the method presented by Di Mascolo and colleagues appears to be of special interest since it can handle manufacturing stages consisting of any number of machines and it is fairly accurate. This paper presents a new way of deriving the analytical method presented by Di Mascolo et al. The approach is to see the queueing network of the kanban control system as a multiclass queueing network in which each kanban loop is represented by a class of customers. This allows one to use the general technique proposed in Baynat and Dallery for analysing multiclass queueing network using product-form approximation methods. In terms of equations, the new method is equivalent to that previously presented. However, the computational algorithm is much more efficient since it avoids the two levels of iterations involved in the original algorithm. Another major advantage of the new method over that originally proposed is that it provides a general framework for the analysis of more general kanban systems. Indeed, it is shown in this paper how this approach can easily be extended in order to handle kanban systems with multiple consumers and multiple suppliers, kanban-controlled assembly systems and generalized kanban systems.  相似文献   
79.
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号