首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3975篇
  免费   176篇
  国内免费   26篇
电工技术   79篇
综合类   4篇
化学工业   832篇
金属工艺   114篇
机械仪表   78篇
建筑科学   71篇
矿业工程   2篇
能源动力   208篇
轻工业   205篇
水利工程   28篇
石油天然气   29篇
无线电   481篇
一般工业技术   962篇
冶金工业   398篇
原子能技术   17篇
自动化技术   669篇
  2023年   51篇
  2022年   110篇
  2021年   146篇
  2020年   128篇
  2019年   123篇
  2018年   171篇
  2017年   157篇
  2016年   162篇
  2015年   101篇
  2014年   149篇
  2013年   275篇
  2012年   200篇
  2011年   258篇
  2010年   191篇
  2009年   200篇
  2008年   175篇
  2007年   141篇
  2006年   114篇
  2005年   103篇
  2004年   78篇
  2003年   81篇
  2002年   65篇
  2001年   63篇
  2000年   54篇
  1999年   41篇
  1998年   81篇
  1997年   73篇
  1996年   51篇
  1995年   53篇
  1994年   50篇
  1993年   48篇
  1992年   27篇
  1991年   27篇
  1990年   24篇
  1989年   17篇
  1988年   26篇
  1987年   23篇
  1986年   18篇
  1985年   35篇
  1984年   32篇
  1983年   25篇
  1982年   23篇
  1981年   21篇
  1980年   24篇
  1979年   15篇
  1977年   21篇
  1976年   32篇
  1975年   17篇
  1974年   14篇
  1973年   18篇
排序方式: 共有4177条查询结果,搜索用时 390 毫秒
991.
Graph partitioning is a traditional problem with many applications and a number of high-quality algorithms have been developed. Recently, demand for social network analysis arouses the new research interest on graph partitioning/clustering. Social networks differ from conventional graphs in that they exhibit some key properties like power-law and small-world property. Currently, these features are largely neglected in popular partitioning algorithms. In this paper, we present a novel framework which leverages the small-world property for finding clusters in social networks. The framework consists of several key features. Firstly, we define a total order, which combines the edge weight, the small-world weight, and the hub value, to better reflect the connection strength between two vertices. Secondly, we design a strategy using this ordered list, to greedily, yet effectively, refine existing partitioning algorithms for common objective functions. Thirdly, the proposed method is independent of the original approach, such that it could be integrated with any types of existing graph clustering algorithms. We conduct an extensive performance study on both real-life and synthetic datasets. The empirical results clearly demonstrate that our framework significantly improves the output of the state-of-the-art methods. Furthermore, we show that the proposed method returns clusters with both internal and external higher qualities.  相似文献   
992.
Activation of CO2 and its utilization in the synthesis of chloropropene and styrene carbonates over functionalized, mesoporous SBA-15 solids, have been investigated. The surface basicity of SBA-15 was modified with nitrogen-based organic molecules of varying basicity viz., alkyl amines (–NH2), adenine (Ade), imidazole (Im) and guanine (Gua). The surface of SBA-15 was also functionalized with Ti4+ and Al3+ species. The acid–base properties of these modified SBA-15 materials were investigated by temperature-programmed desorption (TPD) and diffuse-reflectance infrared Fourier transform (DRIFT) spectroscopy. NH3 and pyridine were used as probe molecules for acid sites, while CO2 was used to characterize the basic sites. CO2 was activated at the basic amine sites forming surface carbamate species (IR peaks: 1609 and 1446 cm−1). The latter reacted further with epoxides adsorbed on the acid sites forming cyclic carbonates. A correlation between the intensity of the IR peak at 1609 cm−1 and cyclic carbonate yield has been observed. The cyclic carbonate yields were higher when both the acid and base functionalities were present on the surface. The Ti- and Al-SBA-15 functionalized with adenine exhibited the highest catalytic activity and selectivity. There is an optimal dependence (“volcanic plot”) of the yield of cyclic carbonates on the desorption temperature, Tmax(CO2) in the TPD experiments. These solid catalysts were structurally stable up to 473 K and could be recycled for repeated use. In addition to density, the strength and type of amine sites play a crucial role on CO2 activation and utilization.  相似文献   
993.
The electrodeposition has been studied of nickel-cobalt-zinc alloys from a borate bath containing nickel sulphate (120–140 g dm–3), cobalt sulphate (30–46 g dm–3), zinc sulphate (144–168 g dm–3), boric acid (30 g dm–3) and ammonium chloride (2 g dm–3). The operating conditions were: current density, 2.0–5.0 A dm–2; temperature, 30–40°C and pH, 2.4 to 5.4. Light grey, semibright, stressed films have been obtained. However, the deposits consist partially of black powder when the concentration of the various components is increased. The brightness is found to increase with decreasing temperature and pH of the solution. The total cathode efficiency increases when the pH and temperature of the solution decrease, whereas at any particular pH and temperature it first decreases, reaches a minimum and then increases with increasing current density.  相似文献   
994.
Endometriosis is a complex gynecological disease, characterized by the presence and growth of endometrial tissue outside the uterus, resulting in pelvic pain and infertility. It occurs in 10% of women in their reproductive age. The viable endometrial cells enter the peritoneal cavity by retrograde menstruation, implant, and cause lesions ectopically; depending on their ability to survive, attach, grow, and invade. These “normal” endometrial cells turn “endometriotic” apparently because of inherent abnormalities present in them. Information on these molecular abnormalities is now being sought through proteomic approaches. Recent proteome-based comparisons between the eutopic endometrium from normal women and patients with endometriosis have revealed several proteins (many of which are shown to have a role in several cancers), of which a few have been validated as potential players in the etiology of endometriosis. After an initial in-flow of information from these proteome studies of eutopic endometrium, focus now needs to be expanded to the changes in the various protein PTMs and their upstream effectors present in these tissues. Early diagnosis of endometriosis through noninvasive means is the need of the hour as well—which would require the use of the presently existing immunoassays, along with the advancing MS-based proteomics. In this review, we aim to discuss these future thrust areas of human endometriosis proteomics and also present the proteomic advances made so far in understanding the molecular basis of endometriosis.  相似文献   
995.
Bottom-up evaluation of a program-query pair in a constraint query language (CQL) starts with the facts in the database and repeatedly applies the rules of the program, in iterations, to compute new facts, until we have reached a fixpoint. Checking if a fixpoint has been reached amounts to checking if any new facts were computed in an iteration. Such a check also enhances efficiency in that subsumed facts can be discarded, and not be used to make any further derivations in subsequent iterations, if we use Semi-naive evaluation. We show that the problem of subsumption in CQLs with linear arithmetic constraints is co-NP complete, and present a deterministic algorithm, based on the divide and conquer strategy, for this problem. We also identify polynomial-time sufficient conditions for subsumption and non-subsumption in CQLs with linear arithmetic constraints. We adapt indexing strategies from spatial databases for efficiently indexing facts in such a CQL: such indexing is crucial for performance in the presence of large databases. Based on a recent algorithm by C. Lassez and J.-L. Lassez for quantifier elimination, we present an incremental version of the algorithm to check for subsumption in CQLs with linear arithmetic constraints.This work was supported by a David and Lucile Packard Foundation Fellowship in Science and Engineering, a Presidential Young Investigator Award, with matching grants from the Digital Equipment Corporation, Tandem and Xerox, and NSF Grant No. IRI-9011563.  相似文献   
996.
Deformable template models for emission tomography   总被引:1,自引:0,他引:1  
The reconstruction of emission tomography data is an ill-posed inverse problem and, as such, requires some form of regularization. Previous efforts to regularize the restoration process have incorporated rather general assumptions about the isotope distribution within a patient's body. A theoretical and algorithmic framework is presented in which the notion of a deformable template can be used to identify and quantify brain tumors in pediatric patients. Patient data and computer simulation experiments are presented which illustrate the performance of the deformable template approach to single photon emission computed tomography  相似文献   
997.
In this article, we disclose a method to fabricate the three‐dimensional (3D) image on an optically rewritable (ORW) electronic paper (e‐paper) by deploying the lenticular lenses array on the top of the ORW e‐paper. Unlike other autostereoscopic 3D liquid crystal displays, our autostereoscopic 3D ORW e‐paper is actually a green technology, which is without electrode and voltage. No electricity is needed to maintain the 3D image on the ORW e‐paper. We can easily change a 3D image by erasing and rewriting with photoalignment technology.  相似文献   
998.
With the vision of "Internet as a computer", complex software-intensive systems running on the Internet, or the "Internetwares", can be also divided into multiple layers. Each layer has a different focus, implementation technique, and stakeholders. Monitoring and adaptation of such multilayer systems are challenging, because the mismatches and adaptations are interrelated across the layers. This interrelation makes it difficult to find out: 1) When a system change causes mismatches in one layer, how to identify all the cascaded mismatches on the other layers? 2) When an adaptation is performed at one layer, how to find out all the complementary adaptations required in other layers? This paper presents a model-based approach towards cross-layer monitoring and adaptation of multilayer systems. We provide standard meta-modelling languages for system experts to specify the concepts and constraints separately for each layer, as well as the relations among the concepts from different layers. Within each individual layer, we use run-time models to represent the system state specific to this layer, monitor the systems by evaluating model changes according to specified constraints, and support manual or semi-automated adaption by modifying the models. When a change happens in the run-time model for one layer, either caused by system changes or by the adaptation, we synchronize the models for other layers to identify cascaded mismatches and complementary adaptations across the layers. We illustrate the approach on a simulated crisis management system, and are using it on a number of ongoing projects.  相似文献   
999.
This paper proposes a region based digital watermarking scheme to serve the purpose of copyright protection and integrity verification of image database using discrete cosine transform (DCT). The objective is achieved by embedding watermark into visually significant regions of the image(s) using quantization index modulation (QIM). The main contributions of this work are, (1) the use of quad tree decomposition for image segmentation to find visually significant regions, and (2) the use of image database as a single entity for watermarking, instead of watermarking on individual image, so that integrity of the database is checked. Simulation results validate the above claims. Simulation results also show that the proposed scheme is robust and secured against a wide range of attacks available in StirMark 4.0 package.  相似文献   
1000.
Policy analysis for Administrative Role-Based Access Control   总被引:1,自引:0,他引:1  
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many administrators. Administrative RBAC (ARBAC) models express the authority of administrators, thereby specifying how an organization’s RBAC policy may change. Changes by one administrator may interact in unintended ways with changes by other administrators. Consequently, the effect of an ARBAC policy is hard to understand by simple inspection. In this paper, we consider the problem of analyzing ARBAC policies. Specifically, we consider reachability properties (e.g., whether a user can eventually be assigned to a role by a group of administrators), availability properties (e.g., whether a user cannot be removed from a role by a group of administrators), containment properties (e.g., every member of one role is also a member of another role) satisfied by a policy, and information flow properties. We show that reachability analysis for ARBAC is PSPACE-complete. We also give algorithms and complexity results for reachability and related analysis problems for several categories of ARBAC policies, defined by simple restrictions on the policy language. Some of these results are based on the connection we establish between security policy analysis and planning problems in Artificial Intelligence.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号