首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   826篇
  免费   21篇
  国内免费   3篇
工业技术   850篇
  2023年   6篇
  2022年   30篇
  2021年   27篇
  2020年   24篇
  2019年   28篇
  2018年   26篇
  2017年   35篇
  2016年   34篇
  2015年   18篇
  2014年   48篇
  2013年   69篇
  2012年   32篇
  2011年   35篇
  2010年   42篇
  2009年   36篇
  2008年   28篇
  2007年   31篇
  2006年   26篇
  2005年   15篇
  2004年   13篇
  2003年   15篇
  2002年   7篇
  2001年   8篇
  2000年   7篇
  1999年   12篇
  1998年   17篇
  1997年   10篇
  1996年   15篇
  1995年   16篇
  1994年   13篇
  1993年   12篇
  1992年   15篇
  1991年   12篇
  1990年   13篇
  1989年   12篇
  1988年   8篇
  1987年   6篇
  1986年   6篇
  1985年   6篇
  1984年   3篇
  1982年   3篇
  1981年   4篇
  1980年   4篇
  1979年   3篇
  1978年   4篇
  1977年   4篇
  1976年   4篇
  1957年   1篇
  1955年   2篇
  1954年   1篇
排序方式: 共有850条查询结果,搜索用时 15 毫秒
1.
2.
Many researchers approach the problem of programming distributed memory machines by assuming a global shared name space. Thus the user views the distributed memory of the machine as though it were shared. A major issue that arises at this point is how to manage the memory. When a processor accesses data stored on another processor's memory, data must be moved between the two processors. Once these data are retrieved from another processor's memory, several interesting issues are raised. Where should these data be stored locally? What transformations must be performed to the code to guarantee that the nonlocal accesses reference the correct memory location? What optimizations can be performed to reduce the time spent in accessing the nonlocal data? In this paper we examine various data migration mechanisms that allow an explicit and controlled mapping of data to memory. We describe, experimentally evaluate, and model a set of schemes for storing and retrieving off-processor array elements. The schemes are all based on using hash tables for efficient access of nonlocal data. The three different techniques evaluated are the basic hashed cache, partial enumeration, and full enumeration, the details of which are described in the paper. In all three schemes, nonlocal data are stored in hash tables—the difference is in the amount of memory used by the schemes and the retrieval mechanisms for nonlocal data.  相似文献   
3.
4.
Haemangiopericytoma of nose and paranasal sinuses is relatively uncommon tumour. It occurs in adults in sixth and seventh decades of life. In view of paucity of intranasal haemangiopericytoma old in Indian literature and young age of patient, we are reporting one case in 28-year-old female who presented with recurrent, profuse epistaxis.  相似文献   
5.
6.
Defects in molecular beam epitaxial GaAs grown at low temperatures   总被引:1,自引:0,他引:1  
We have utilized a variable energy positron beam and infrared transmission spectroscopy to study defects in GaAs epilayers grown at low temperatures (LT-GaAs) by molecular beam epitaxy. We have measured the Doppler broadening of the positron-electron annihilation gamma ray spectra as a function of positron implantation energy. From these measurements, we have obtained results for the depth profiles of Ga monovacancies in unannealed LT-GaAs and Ga monovacancies and arsenic cluster related defects in annealed LT-GaAs. We have also studied the effects of the Si impurities in annealed LT-GaAs. The infrared transmission measurements on unannealed LT-GaAs furnish a broad defect band, related to As antisites, centered at 0.370 eV below the conduction band.  相似文献   
7.
Electrochemical impedance measurements have been used to characterize zinc selenide films prepared by electrochemical co-deposition at a platinum rotating disk electrode. Estimations of capacitance and polarization resistance of variously prepared electrodeposits have been carried out to determine charge carrier density and corrosion rates.  相似文献   
8.
Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate two systematic approaches to low-cost, low-latency CED for symmetric encryption algorithm RC6. The proposed techniques have been validated on FPGA implementations of RC6, one of the advanced encryption standard finalists.  相似文献   
9.
The present study reports for first time the blending of psyllium husk (PH) powder/gelatin (G) in the polymer-rich composition of polyvinyl alcohol (PVA) to make an electrospinnable solution. The composite was prepared in 3 different ratios viz., 100% (wt/wt) (PVA + PH), 75% + 25% (PVA + 75PH + 25G) (wt/wt) and 50% + 50% (PVA + 50PH + 50G) (wt/wt) in 6% PVA solution. Optimum electrospinning parameters were evaluated for all the prepared blends. The fabricated nanofibers were characterized by scanning electron microscopy (SEM), attenuated total reflectance-Fourier transform infrared, differential scanning calorimetry, porosity percentage, and fiber orientation using ImageJ software. A qualitative in vitro degradation study at room temperature is supported by SEM images. The cellular interactions were characterized by MTT assay of NIH-3T3 fibroblast cells for 2 and 4 days with an optimum cell growth of >50% by fourth day of culture and long-term cultivation of L929-RFP cells was observed for 10 days. The nanofibers were formed in the range of 49–600 nm. PVA + 75PH + 25G when cultured with L929-RFP cells exhibited highest fluorescence intensity and thus supported cellular proliferation significantly. Based on the results obtained from various analyses, we anticipate that fabricated psyllium-based nanofiber can be used as a promising candidate for wound healing and other biomedical applications.  相似文献   
10.
In the past several years, various ontologies and terminologies such as the Gene Ontology have been developed to enable interoperability across multiple diverse medical information systems. They provide a standard way of representing terms and concepts thereby supporting easy transmission and interpretation of data for various applications. However, with their growing utilization, not only has the number of available ontologies increased considerably, but they are also becoming larger and more complex to manage. Toward this end, a growing body of work is emerging in the area of modular ontologies where the emphasis is on either extracting and managing "modules" of an ontology relevant to a particular application scenario (ontology decomposition) or developing them independently and integrating into a larger ontology (ontology composition). In this paper, we investigate state-of-the-art approaches in modular ontologies focusing on techniques that are based on rigorous logical formalisms as well as well-studied graph theories. We analyze and compare how such approaches can be leveraged in developing tools and applications in the biomedical domain. We conclude by highlighting some of the limitations of the modular ontology formalisms and put forward additional requirements to steer their future development.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号