首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2268篇
  免费   76篇
  国内免费   9篇
电工技术   29篇
综合类   134篇
化学工业   474篇
金属工艺   77篇
机械仪表   82篇
建筑科学   30篇
矿业工程   27篇
能源动力   22篇
轻工业   102篇
水利工程   10篇
石油天然气   7篇
无线电   199篇
一般工业技术   447篇
冶金工业   74篇
原子能技术   16篇
自动化技术   623篇
  2023年   1篇
  2022年   1篇
  2018年   201篇
  2017年   231篇
  2016年   306篇
  2015年   122篇
  2014年   46篇
  2013年   32篇
  2012年   103篇
  2011年   204篇
  2010年   12篇
  2009年   19篇
  2008年   17篇
  2007年   24篇
  2006年   27篇
  2005年   468篇
  2004年   264篇
  2003年   239篇
  2002年   22篇
  2001年   3篇
  2000年   6篇
  1999年   4篇
  1998年   1篇
排序方式: 共有2353条查询结果,搜索用时 15 毫秒
1.
2.
STS310S and SC-STS310S (simultaneously co-deposited chromium and aluminum onto 310S austenitic stainless steel substrate by pack-cementation process) were used as separator materials on the cathode side of a molten carbonate fuel cell. With the STS310S, corrosion proceeded via three steps; a formation step of unstable corrosion product, a protection step against corrosion until breakaway, and an advance step of corrosion after breakaway. The final corrosion product was LiFeO2 and the loss of mass was 6.5 mg/cm2 after a corrosion test of 480 hr at 650°C. The SC-STS310S showed more effective corrosion resistance, however, than did common STS310S. There was especially no corrosion loss on the SC-STS310S after the 480 hr corrosion test. It is anticipated that it will be very useful as an alternative separator on the cathode side off the MCFC in the future.  相似文献   
3.
In the binary space of large dimension we analyze the nearest neighbor search problem where the required point is a distorted version of one of the patterns. Previously it was shown that the only algorithms able to solve the set problem are the exhaustive search and the neural network search tree. For the given problem the speed of operation of the last algorithm is dozens of times larger comparing with the exhaustive search. Moreover, in the case of large dimensions the neural network tree can be regarded as an accurate algorithm since the probability of its error is so small that cannot be measured. In the present publication, we propose a modification of the scalar neural network tree allowing the speeding of the algorithm’s operation up to hundred times without losses in its reliability.  相似文献   
4.
A depth-based classification method underlain by a remote concentration measure for processing asymmetric data is developed and investigated. The motivation for the construction of the method was the inefficient use of affine invariant classifiers in combination with depth functions vanishing outside the convex hull of data. The idea of the proposed method is to map a remote space using a remote concentration measure, the Stahel–Donoho remoteness measure, and a corrected remoteness measure.  相似文献   
5.
This paper analyzes a real set of large-volume medico-statistical data used for the recognition of actions of medical workers on the basis of accelerometer readings at definite moments of time. During the recognition process, a deep belief network was applied to unlabeled data, and then it was supervisedly learned using the error backpropagation method. The obtained results demonstrate higher recognition accuracy in comparison with basic methods. A considerable improvement in medical staff productivity is also achieved.  相似文献   
6.
With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sensor nodes that are in a normal status. Currently, two kinds of approaches exist to identify the substitute sensor nodes: the most common approach is to prepare redundancy nodes, though the involved tasks such as maintaining redundancy nodes, i.e., relocating the new node, lead to an extra burden on the wireless sensor networks. More recently, other approaches without using redundancy nodes are emerging, and they merely select the substitute nodes in a sensor node’s perspective i.e., migrating the service of faulty node to it’s nearest sensor node, though usually neglecting the requirements of the application level. Even a few work consider the need of the application level, they perform at packets granularity and don’t fit well at service granularity. In this paper, we aim to remove these limitations in the wireless sensor network with the service-oriented architecture. Instead of deploying redundancy nodes, the proposed mechanism replaces the faulty sensor node with consideration of the similarity on the application level, as well as on the sensor level. On the application level, we apply the Bloom Filter for its high efficiency and low space costs. While on the sensor level, we design an objective solution via the coefficient of a variation as an evaluation for choosing the substitute on the sensor level.  相似文献   
7.
In this paper we provide a method for computing and estimating the impact of interference on real-time online 1080p@30Hz and 1080p@60Hz high-definition video streaming in 60 GHz wireless smart TV platforms. The analysis involves two different interference scenarios: 1) downlink interference from deployed 60 GHz access points to the associated mobile ad-hoc devices, and 2) uplink interference from randomly deployed 60 GHz ad-hoc mobile devices to their associated access points. With these interference scenarios, the interference impact on the quality of main 1080p@30Hz and 1080p@60Hz wireless high-definition video streaming with various simulation settings are measured and estimated in terms of signal-to-interference-plus-noise ratio.  相似文献   
8.
Windows 7操作系统在市场上热卖,给微软带来了巨大的商业利润,越来越多的用户也喜欢上了它。近日,安全专家罗格·科瑞姆从较为客观的角度对Windows 7的安全功能进行了盘点,让我们一同来看看吧!  相似文献   
9.
A radiometric method based on redox substoichiometry was applied to accurate and precise determination of manganese. The proposed technique is based on the substoichiometric oxidation of bivalent manganese to permanganate ions with potassium periodate, followed by isolation of the oxidized species by the extraction with tri-n-octylamine in chloroform. The method was successfully applied to the estimation of manganese content of various certified ores and alloys.  相似文献   
10.
A thermo-damage-viscoelastic model for hydroxyl-terminated polybutadiene (HTPB) composite propellant with consideration for the effect of temperature was implemented in ABAQUS. The damage evolution law of the model has the same form as the crack growth equation for viscoelastic materials, and only a single damage variable \(S\) is considered. The HTPB propellant was considered as an isotropic material, and the deviatoric and volumetric strain-stress relations are decoupled and described by the bulk and shear relaxation moduli, respectively. The stress update equations were expressed by the principal stresses \(\sigma_{ii}^{R}\) and the rotation tensor \(M\), the Jacobian matrix in the global coordinate system \(J_{ijkl}\) was obtained according to the fourth-order tensor transformation rules. Two models having complex stress states were used to verify the accuracy of the constitutive model. The test results showed good agreement with the strain responses of characteristic points measured by a contactless optical deformation test system, which illustrates that the thermo-damage-viscoelastic model perform well at describing the mechanical properties of an HTPB propellant.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号