首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   519篇
  免费   25篇
  国内免费   1篇
工业技术   545篇
  2023年   10篇
  2022年   31篇
  2021年   23篇
  2020年   18篇
  2019年   24篇
  2018年   23篇
  2017年   13篇
  2016年   29篇
  2015年   26篇
  2014年   31篇
  2013年   38篇
  2012年   45篇
  2011年   40篇
  2010年   36篇
  2009年   27篇
  2008年   19篇
  2007年   21篇
  2006年   11篇
  2005年   8篇
  2004年   12篇
  2003年   8篇
  2002年   5篇
  2001年   6篇
  2000年   1篇
  1999年   5篇
  1998年   5篇
  1997年   3篇
  1996年   1篇
  1995年   4篇
  1993年   1篇
  1991年   2篇
  1990年   3篇
  1989年   1篇
  1988年   1篇
  1987年   6篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1979年   1篇
  1968年   2篇
  1967年   1篇
排序方式: 共有545条查询结果,搜索用时 0 毫秒
1.
In this work, real-time ultraviolet photodetectors are realized through metal–semiconductor–metal (MSM) structures. Amorphous indium gallium zinc oxide (a-IGZO) is used as semiconductor material and gold as metal electrodes. The readout of an individual sensor is implemented by a transimpedance amplifier (TIA) consisting of an all-enhancement a-IGZO thin-film transistor (TFT) operational amplifier and a switched capacitor (SC) as feedback resistance. The photosensor and the transimpedance amplifier are both manufactured on glass substrates. The measured photosensor possesses a high responsivity R , a low response time t R E S , and a good noise equivalent power value NEP .  相似文献   
2.
Journal of Intelligent Manufacturing - Remanufacturing includes disassembly and reassembly of used products to save natural resources and reduce emissions. While assembly is widely understood in...  相似文献   
3.
4.
Service Composition Issues in Pervasive Computing   总被引:2,自引:0,他引:2  
Providing new services by combining existing ones—or service composition—is an idea pervading pervasive computing. Pervasive computing technologies seek to concurrently exhibit context awareness, manage contingencies, leverage device heterogeneity, and empower users. These four goals prompt service-composition-mechanism design requirements that are unique to pervasive computing. This article catalogs service composition mechanisms and describes their variation points, which indicate how well the resulting compositions meet the four goals.  相似文献   
5.
The main object of the present paper is to discuss some extensions of certain integral operators and to obtain their order of convexity. Several other closely related results are also considered.  相似文献   
6.
Securing Wireless Mesh Networks   总被引:1,自引:0,他引:1  
Now found in domestic, commercial, industrial, military, and healthcare applications, wireless networks are becoming ubiquitous. Wireless mesh networks (WMNs) combine the robustness and performance of conventional infrastructure networks with the large service area and self-organizing and self-healing properties of mobile ad hoc networks. In this article, the authors consider the problem of ensuring security in WMNs, introduce the IEEE 802.11s draft standard, and discuss the open security threats faced at the network and data-link layers.  相似文献   
7.
The study is focused on the external and internal mass transfers of lipids during their biodegradation process in a bioreactor with stationary basket bed of immobilized Bacillus spp. cells. By means of the lipid mass balance for a single particle of biocatalyst, considering the kinetic model adapted for the immobilized bacterial cells, specific mathematical models have been developed to estimate their mass flows in the liquid boundary layer surrounding the particle and inside the particle. The values of mass flows are significantly influenced by the internal diffusion velocity of lipids and the rate of their consumption, but also by the position inside the basket bed. These influences accumulated led to the appearance of a biological inactive region near the particle centre, its magnitude varying from 1.3 to 49.4% of the overall volume of particles.  相似文献   
8.
9.
An essential requirement to better understand activity-based travel behavior (ABTB) at the disaggregate level is the development of a spatio-temporal model able to support queries related to activities of individuals or groups of individuals. This paper describes the development and implementation of a temporal extension to a geographic information system (GIS) object-oriented model for the modeling of the time path and the retrieval of its event chaining. In this approach, time path is formulated as a totally time ordered set composed by activity events and trip events, themselves organized into time ordered sets. As sets, the time path and its components can be searched using their respective indexes. A series of methods were built that implement temporal predicates as an interface to temporally query the database. A set of positional operator methods were also designed that transform temporal topological queries into retrieval functions based on set ordering indices. Taken together, the temporal predicates and the positional operator methods define a temporal query extension that meets the retrieval needs of an ABTB database.  相似文献   
10.
The constant pressure for making functional verification more agile has led to the conception of coverage driven verification (CDV) techniques. CDV has been implemented in verification testbenches using supervised learning techniques to model the relationship between coverage events and stimuli generation, providing a feedback between them. One commonly used technique is the classification- or decision-tree data mining, which has shown to be appropriate due to the easy modeling. Learning techniques are applied in two steps: training and application. Training is made on one or more sets of examples, which relate datasets to pre-determined classes. Precision of results by applying the predictive learning concept has shown to be sensitive to the size of the training set and the amount of imbalance of associated classes, this last meaning the number of datasets associated to each class is very different from each other. This work presents experiments on the manipulation of data mining training sets, by changing the size and reducing the imbalances, in order to check their influence on the CDV efficiency. To do that, a circuit example with a large input space and strong class imbalance was selected from the application domain of multimedia systems and another one, with a small input space that affects the coverage occurrences, was selected from the communication area.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号