首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   92110篇
  免费   1900篇
  国内免费   906篇
工业技术   94916篇
  2024年   75篇
  2023年   173篇
  2022年   362篇
  2021年   455篇
  2020年   338篇
  2019年   267篇
  2018年   14714篇
  2017年   13711篇
  2016年   10216篇
  2015年   1022篇
  2014年   704篇
  2013年   766篇
  2012年   3767篇
  2011年   10008篇
  2010年   8855篇
  2009年   6081篇
  2008年   7218篇
  2007年   8181篇
  2006年   577篇
  2005年   1561篇
  2004年   1362篇
  2003年   1388篇
  2002年   752篇
  2001年   235篇
  2000年   360篇
  1999年   267篇
  1998年   189篇
  1997年   148篇
  1996年   173篇
  1995年   83篇
  1994年   83篇
  1993年   55篇
  1992年   46篇
  1991年   36篇
  1990年   28篇
  1988年   20篇
  1969年   24篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1963年   28篇
  1962年   22篇
  1960年   30篇
  1959年   37篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
1.
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms.  相似文献   
2.
3.
4.
Variations of Incomplete Open Cubes is the major project by the twentieth-century conceptual artist Sol LeWitt. In this paper we interpret the enumerative component of the project as embeddings of graphs. This formulation permits use of an algorithm to check the completeness of the list of the structures produced by the artist. Our conclusion is that the artist found the correct number of structures (that is, 122), but that his list contains a mistake in the presentation of a pair of incomplete cubes, a discovery that appears not to have been noted before.  相似文献   
5.
6.
牟立君  蒋艳菊 《鞍钢技术》2015,(3):19-21,42
介绍了北营公司X70配套埋弧焊丝用H08D盘条的开发研制情况.其生产工艺的关键点为:转炉采用“双渣法除磷”,脱氧合金化在转炉和LF炉两个阶段完成,连铸采用结晶器电磁搅拌及末端电磁搅拌、恒定拉速;盘条采用控冷控轧及轧后延迟型斯太尔摩冷却工艺等措施.生产的成品盘条成分、力学性能、金相组织等指标均满足客户拉拔工艺要求.  相似文献   
7.
Ferrite particles coated with biocompatible phases can be used for hyperthermia treatment of cancer. We have synthesized substituted calcium hexaferrite, which is not stable on its own but is stabilized with small substitution of La. Hexaferrite of chemical composition (CaO)0.75(La203)0.20(Fe2O3)6 was prepared using citrate gel method. Hydroxyapatite was prepared by precipitating it from aqueous solution of Ca(NO3)2 and (NH4)2HPO4 maintaining pH above 11. Four different methods were used for coating of hydroxyapatite on ferrite particles. SEM with EDX and X-ray diffraction analysis shows clear evidence of coating of hydroxyapatite on ferrite particles. These coated ferrite particles exhibited coercive field up to 2 kOe, which could be made useful for hysteresis heating in hyperthermia. Studies by culturing BHK-21 cells and WBC over the samples show evidence of biocompatibility. SEM micrographs and cell counts give clear indication of cell growth on the surface of the sample. Finally coated ferrite particle was implanted in Kasaulli mouse to test its biocompatibility. The magnetic properties and biocompatibility studies show that these hydroxyapatite coated ferrites could be useful for hyperthermia.  相似文献   
8.
Chloride doped polyaniline conducting polymer films have been prepared in a protic acid medium (HCl) by potentiodynamic method in an electrochemical cell and studied by cyclic voltammetry and FTIR techniques. The FTIR spectra confirmed Cl- ion doping in the polymers. The polymerization rate was found to increase with increasing concentration of aniline monomer. But the films obtained at high monomer concentration were rough having a nonuniform flaky polyaniline distribution. Results showed that the polymerization rate did not increase beyond a critical HCl concentration. Cyclic voltammetry suggested that, the oxidation-reduction current increased with an increase in scan rate and that the undoped polyaniline films were not hygroscopic whereas chloride doped polyaniline films were found to be highly hygroscopic.  相似文献   
9.
Uplink scheduling in wireless systems is gaining importance due to arising uplink intensive data services (ftp, image uploads etc.), which could be hampered by the currently in-built asymmetry in favor of the downlink. In this work, we propose and study algorithms for efficient uplink packet-data scheduling in a CDMA cell. The algorithms attempt to maximize system throughput under transmit power limitations on the mobiles assuming instantaneous knowledge of user queues and channels. However no channel statistics or traffic characterization is necessary. Apart from increasing throughput, the algorithms also improve fairness of service among users, hence reducing chances of buffer overflows for poorly located users. The major observation arising from our analysis is that it is advantageous on the uplink to schedule “strong” users one-at-a-time, and “weak” users in larger groups. This contrasts with the downlink where one-at-a-time transmission for all users has shown to be the preferred mode in much previous work. Based on the optimal schedules, we propose less complex and more practical approximate methods, both of which offer significant performance improvement compared to one-at-a-time transmission, and the widely acclaimed Proportional Fair (PF) algorithm, in simulations. When queue content cannot be fed back, we propose a simple modification of PF, Uplink PF (UPF), that offers similar improvement. Hereafter, we refer to users with low recieved power at the base even when transmitting at peak transmit power as “weak” users, and the strongly recieved users at the base as “strong” users. Krishnan Kumaran is currently a member of the Complex Systems Modeling section in the Corporate Strategic Research of ExxonMobil Corp., Clinton, NJ. Formerly, he was a Member of Technical Staff in the Mathematics of Networks and Systems Research Department at Bell Labs in Murray Hill, NJ, where his research interests were in modeling, analysis and simulation of design, resource management and scheduling issues in telecommunication networks. Lijun Qian is an assistant professor in the Department of Electrical Engineering at Prairie View A&M University. He received his B.S. from Tsinghua University in Beijing, M.S. from Technion-Israel Institute of Technology, and Ph.D. from WINLAB, Rutgers University, all in electrical engineering. Before joining PVAMU, he was a researcher at Networks and Systems Research Department of Bell Labs in Murray Hill, NJ. His major research interests are in wireless communications and networking technologies, especially in radio resource management, protocol design, TCP/RLP optimization and MPLS traffic engineering.  相似文献   
10.
陈旭  唐莉君 《现代电子技术》2006,29(23):119-120
随着各高校校园网络规模的不断扩大和各种应用的急剧增加,各种新的网络问题也在不断出现。Sniffer是网络管理员进行网络管理的有效工具,可以有效地对网络进行实时监控,及时发现网络中存在的各种问题。本文首先介绍了Sniffer的工作原理,其次给出了实现Sniffer功能的编程流程图,并用C语言给出了编程所需的关键代码。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号