首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   114285篇
  免费   3116篇
  国内免费   447篇
工业技术   117848篇
  2023年   294篇
  2022年   306篇
  2021年   759篇
  2020年   668篇
  2019年   750篇
  2018年   15435篇
  2017年   14344篇
  2016年   11129篇
  2015年   1627篇
  2014年   1436篇
  2013年   2758篇
  2012年   4967篇
  2011年   10847篇
  2010年   9522篇
  2009年   6661篇
  2008年   7852篇
  2007年   8774篇
  2006年   880篇
  2005年   1869篇
  2004年   1746篇
  2003年   1719篇
  2002年   1082篇
  2001年   504篇
  2000年   561篇
  1999年   495篇
  1998年   2417篇
  1997年   1645篇
  1996年   1069篇
  1995年   627篇
  1994年   483篇
  1993年   573篇
  1992年   212篇
  1991年   227篇
  1990年   152篇
  1989年   156篇
  1988年   170篇
  1987年   142篇
  1986年   124篇
  1985年   142篇
  1984年   124篇
  1983年   93篇
  1982年   131篇
  1981年   145篇
  1980年   154篇
  1979年   77篇
  1978年   79篇
  1977年   279篇
  1976年   622篇
  1955年   65篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
991.
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack.  相似文献   
992.
Global outsourcing is a growing trend among independent software vendors. In these projects like other distributed work, distances have negative effects on communication and coordination, directly impacting performance. We present a normative model designed to address this issue by improving communication and knowledge exchange. The model consists of six distinct practices and a tool blueprint, each coming with practical guidelines. It is based in part on two case studies of Dutch software vendors who have successfully outsourced part of their activities to an Eastern European outsourcing vendor, and validated by a panel of six experts from industry and the scientific community. It is concluded that knowledge exchange in global software outsourcing is a by‐product of efforts to enhance communication and coordination, rather than specific technical solutions. By committing to sharing knowledge, emphasizing transparency and integrating the outsourcing team into their organizations, customers from the product software business can realize the benefits of global outsourcing.  相似文献   
993.
Graphic processing units (GPUs) emerged recently as an exciting new hardware environment for a truly parallel implementation and execution of Nature and Bio-inspired Algorithms with excellent price-to-power ratio. In contrast to common multicore CPUs that contain up to tens of independent cores, the GPUs represent a massively parallel single-instruction multiple-data devices that can nowadays reach peak performance of hundreds and thousands of giga floating-point operations per second. Nature and Bio-inspired Algorithms implement parallel optimization strategies in which a single candidate solution, a group of candidate solutions (population), or multiple populations seek for optimal solution or set of solutions of given problem. Genetic algorithms (GA) constitute a family of traditional and very well-known nature-inspired populational meta-heuristic algorithms that have proved its usefulness on a plethora of tasks through the years. Differential evolution (DE) is another efficient populational meta-heuristic algorithm for real-parameter optimization. Particle swarm optimization (PSO) can be seen as nature-inspired multiagent method in which the interaction of simple independent agents yields intelligent collective behavior. Simulated annealing (SA) is global optimization algorithm which combines statistical mechanics and combinatorial optimization with inspiration in metallurgy. This survey provides a brief overview of the latest state-of-the-art research on the design, implementation, and applications of parallel GA, DE, PSO, and SA-based methods on the GPUs.  相似文献   
994.
The parallelization of irregular algorithms has not been as widely studied as the one of regular codes. In particular, while there are many proposals of parallel skeletons and libraries very well suited to regular algorithms, this is not the case for irregular ones. This is probably due to the complexity of finding common patterns, behaviors and semantics in these algorithms. This is unfortunate, as the parallelization of irregular algorithms would benefit even more than that of regular codes from the higher degree of abstraction provided by skeletons. This work proposes to exploit the concept of domain defined on some property of the elements to process in order to enable the simple and effective parallelization of irregular applications. Namely, we propose to use such domains both to decompose the computations in parallel tasks and to detect and avoid conflicts between these tasks. A generic C++ library providing a skeleton for multicore systems built on this idea is described and evaluated. Our experimental results show that this library is a very practical tool for the parallelization of irregular algorithms with little programming effort.  相似文献   
995.
This paper examines four different strategies, each one with its own data distribution, for implementing the parallel conjugate gradient (CG) method and how they impact communication and overall performance. Firstly, typical 1D and 2D distributions of the matrix involved in CG computations are considered. Then, a new 2D version of the CG method with asymmetric workload, based on leaving some threads idle during part of the computation to reduce communication, is proposed. The four strategies are independent of sparse storage schemes and are implemented using Unified Parallel C (UPC), a Partitioned Global Address Space (PGAS) language. The strategies are evaluated on two different platforms through a set of matrices that exhibit distinct sparse patterns, demonstrating that our asymmetric proposal outperforms the others except for one matrix on one platform.  相似文献   
996.
997.
Optimization of reduction potential for electroseparation was studied for the recovery of gold, copper, and lead from acidic solution. A linear sweep voltammetric method enabled us to determine characteristic reduction potentials for each metal and the kinetics of the metal deposition indicated by current-voltage curves. In order to precipitate the metal species sequentially, reduction potentials were examined for the individual and mixed solutions of Au(III), Cu(II), and Pb(II). The three metals were reasonably well isolated from the mixed solutions such as Cu(II)/ Pb(II) and Au(III)/Cu(II)/Pb(II) in the order of the corresponding reduction potentials, in particular, the mass transfer controlled reduction potentials, obtained from linear sweep voltammetry (LSV) measurement.  相似文献   
998.
All commercial corn oil is obtained by pressing corn germ and/or extracting the germ with hexane. In the current study, six types of corn oil were prepared by extracting corn germ, corn fiber and ground corn, each with hexane or with ethanol. The levels of lutein, zeaxanthin and other carotenoids were quantitatively analyzed in the six corn oils. The levels of lutein + zeaxanthin in the oil ranged from 2.3 μg/g for hexane-extracted corn germ oil to 220.9 μg/g for ethanol-extracted ground corn oil. These results indicate that a diet that includes 30 g (~2 tbsp) per day of the unrefined corn oil obtained by extracting ground corn with ethanol would provide ~6 mg of lutein + zeaxanthin, the daily dosage that is currently considered to be necessary to slow the progression of age-related macular degeneration. Mention of trade names or commercial products in this publication is solely for the purpose of providing specific information and does not imply recommendation or endorsement by the U.S. Department of Agriculture.  相似文献   
999.
The stability of indium chloride and oxide as well as the electrochemical behaviour of indium ions have been studied in the equimolar CaCl2–NaCl melt at 550 C by X-ray diffraction (XRD) and different electrochemical techniques, using molybdenum and tungsten wires as working electrodes. Voltammetric and chronopotentiometric studies showed signals attributed to the presence of three oxidation states of indium, i.e. 0, i and iii. The standard potential of the redox couples, as well as the solubility products of indium oxides have been determined, showing that In(iii) ions are completely reduced to monovalent indium by the indium metal according to the reaction: In () + 2 In 3 In () and that In2O is a strong oxide donor according to the reaction: In2O(s) 2 In() + O2- These results have allowed the construction of E-pO2– equilibrium diagrams summarising the properties of In–O compounds. The electrodeposition of indium was uncomplicated at Mo and W electrodes. Very good adherence of liquid indium to the electrode materials was observed, with the formation of Na–In alloys at highly reducing potentials, and there was no evidence of indium dissolution into the melt. Moreover, the voltammograms corresponding to the electrochemical In(iii)/In(i) exchange were well defined. The two electrochemical steps were found to be quasi-reversible, and the values of the kinetic parameters, ko and , for both reactions, as well as the diffusion coefficients, DIn(III) and DIn(I) were calculated.  相似文献   
1000.
Poly(1‐trimethylsilyl‐1‐propyne) (PTMSP) membranes have been used to separate ethanol–water mixtures by pervaporation. This polyacetylene is known to present high affinity toward ethanol, showing high selectivity and ethanol permeation flux. The performance of this polymer in the separation of alcohol–water solutions has been evaluated over long periods (572 h) at a high temperature (75°C) to examine the deterioration of the transport properties in the separation of 50 wt % ethanol–water solutions. Although PTMSP membranes present good characteristics for the separation of gases and liquid mixtures, their organic selectivity decrease with the operating time because of the relaxation processes of the polymeric chains, which affect the free volume of the polymer, the deterioration being more evident for concentrated solutions. The effects of the operation temperature on the characteristic parameters of pervaporation have also been studied to establish how this variable affects the performance of PTMSP membranes. The selectivity increases slightly with the operation temperature, but the effect of the temperature on the separation factor decreases as membranes are degraded with the operation time. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 103: 2843–2848, 2007  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号