首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5186篇
  免费   268篇
  国内免费   4篇
电工技术   56篇
综合类   7篇
化学工业   1120篇
金属工艺   84篇
机械仪表   175篇
建筑科学   252篇
矿业工程   8篇
能源动力   161篇
轻工业   627篇
水利工程   39篇
石油天然气   13篇
无线电   395篇
一般工业技术   857篇
冶金工业   579篇
原子能技术   52篇
自动化技术   1033篇
  2023年   31篇
  2022年   49篇
  2021年   223篇
  2020年   107篇
  2019年   131篇
  2018年   161篇
  2017年   147篇
  2016年   203篇
  2015年   119篇
  2014年   180篇
  2013年   343篇
  2012年   307篇
  2011年   363篇
  2010年   252篇
  2009年   278篇
  2008年   276篇
  2007年   234篇
  2006年   229篇
  2005年   189篇
  2004年   127篇
  2003年   129篇
  2002年   101篇
  2001年   79篇
  2000年   76篇
  1999年   80篇
  1998年   156篇
  1997年   106篇
  1996年   96篇
  1995年   68篇
  1994年   64篇
  1993年   50篇
  1992年   30篇
  1991年   24篇
  1990年   33篇
  1989年   32篇
  1988年   18篇
  1987年   25篇
  1986年   31篇
  1985年   26篇
  1984年   26篇
  1983年   22篇
  1982年   27篇
  1981年   21篇
  1980年   22篇
  1979年   20篇
  1978年   16篇
  1977年   18篇
  1976年   33篇
  1974年   15篇
  1973年   16篇
排序方式: 共有5458条查询结果,搜索用时 750 毫秒
91.
The quality of machined components is currently of high interest, for the market demands mechanical components of increasingly high performance, not only from the standpoint of functionality but also from that of safety. Components produced through operations involving the removal of material display surface irregularities resulting not only from the action of the tool itself, but also from other factors that contribute to their superficial texture. This texture can exert a decisive influence on the application and performance of the machined component. This article analyzes the behavior of the minimum quantity lubricant (MQL) technique and compares it with the conventional cooling method. To this end, an optimized fluid application method was devised using a specially designed nozzle, by the authors, through which a minimum amount of oil is sprayed in a compressed air flow, thus meeting environmental requirements. This paper, therefore, explores and discusses the concept of the MQL in the grinding process. The performance of the MQL technique in the grinding process was evaluated based on an analysis of the surface integrity (roughness, residual stress, microstructure and microhardness). The results presented here are expected to lead to technological and ecological gains in the grinding process using MQL.  相似文献   
92.
When developing a complex, multi‐authored code, daily testing on multiple platforms and under a variety of conditions is essential. It is therefore necessary to have a regression test suite that is easily administered and configured, as well as a way to easily view and interpret the test suite results. We describe the methodology for verification of FLASH, a highly capable multiphysics scientific application code with a wide user base. The methodology uses a combination of unit and regression tests and an in‐house testing software that is optimized for operation under limited resources. Although our practical implementations do not always comply with theoretical regression‐testing research, our methodology provides a comprehensive verification of a large scientific code under resource constraints.Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
93.
We consider an initial-boundary-value problem for a time-fractional diffusion equation with initial condition u0(x) and homogeneous Dirichlet boundary conditions in a bounded interval [0, L]. We study a semidiscrete approximation scheme based on the pseudo-spectral method on Chebyshev–Gauss–Lobatto nodes. In order to preserve the high accuracy of the spectral approximation we use an approach based on the evaluation of the Mittag-Leffler function on matrix arguments for the integration along the time variable. Some examples are presented and numerical experiments illustrate the effectiveness of the proposed approach.  相似文献   
94.
We introduce a framework for the generation of polygonal gridshell architectural structures, whose topology is designed in order to excel in static performances. We start from the analysis of stress on the input surface and we use the resulting tensor field to induce an anisotropic nonEuclidean metric over it. This metric is derived by studying the relation between the stress tensor over a continuous shell and the optimal shape of polygons in a corresponding gridshell. Polygonal meshes with uniform density and isotropic cells under this metric exhibit variable density and anisotropy in Euclidean space, thus achieving a better distribution of the strain energy over their elements. Meshes are further optimized taking into account symmetry and regularity of cells to improve aesthetics. We experiment with quad meshes and hexdominant meshes, demonstrating that our gridshells achieve better static performances than stateoftheart gridshells.  相似文献   
95.
Within the Constraint Satisfaction Problems (CSP) context, a methodology that has proven to be particularly performant consists of using a portfolio of different constraint solvers. Nevertheless, comparatively few studies and investigations have been done in the world of Constraint Optimization Problems (COP). In this work, we provide a generalization to COP as well as an empirical evaluation of different state of the art existing CSP portfolio approaches properly adapted to deal with COP. The results obtained by measuring several evaluation metrics confirm the effectiveness of portfolios even in the optimization field, and could give rise to some interesting future research.  相似文献   
96.
Semantic similarity has typically been measured across items of approximately similar sizes. As a result, similarity measures have largely ignored the fact that different types of linguistic item can potentially have similar or even identical meanings, and therefore are designed to compare only one type of linguistic item. Furthermore, nearly all current similarity benchmarks within NLP contain pairs of approximately the same size, such as word or sentence pairs, preventing the evaluation of methods that are capable of comparing different sized items. To address this, we introduce a new semantic evaluation called cross-level semantic similarity (CLSS), which measures the degree to which the meaning of a larger linguistic item, such as a paragraph, is captured by a smaller item, such as a sentence. Our pilot CLSS task was presented as part of SemEval-2014, which attracted 19 teams who submitted 38 systems. CLSS data contains a rich mixture of pairs, spanning from paragraphs to word senses to fully evaluate similarity measures that are capable of comparing items of any type. Furthermore, data sources were drawn from diverse corpora beyond just newswire, including domain-specific texts and social media. We describe the annotation process and its challenges, including a comparison with crowdsourcing, and identify the factors that make the dataset a rigorous assessment of a method’s quality. Furthermore, we examine in detail the systems participating in the SemEval task to identify the common factors associated with high performance and which aspects proved difficult to all systems. Our findings demonstrate that CLSS poses a significant challenge for similarity methods and provides clear directions for future work on universal similarity methods that can compare any pair of items.  相似文献   
97.
98.
Enterprise activities are governed by regulations and laws that are multiple, heterogeneous and not always easy to understand. The arising and/or the modification of these regulations and laws can cause a significant impact in the business context, especially in terms of enterprise information systems adaptation. Currently, there are many methodological and technological tools that facilitate the application of regulations and procedures, but they are not integrated enough to ensure a complete problem management. Therefore, they are not sufficient to support organizations and companies in the management of their business processes. In this paper we propose a methodological and technological solution, able to model, manage, execute and monitor business processes of complex domains. The system allows both the design of an information system and its prototyping as a web application, by the extension of an appropriately selected Business Process Management suite. During both the design and the usage phases of the prototyped information system, it is possible to interface with a knowledge base that contains information about regulations and aspects that characterize the enterprise (organizational chart, tasks, etc.).  相似文献   
99.
This paper presents a heuristic method based on column generation for the EDF (Electricité De France) long-term electricity production planning problem proposed as subject of the ROADEF/EURO 2010 Challenge. This is to our knowledge the first-ranked method among those methods based on mathematical programming, and was ranked fourth overall. The problem consists in determining a production plan over the whole time horizon for each thermal power plant of the French electricity company, and for nuclear plants, a schedule of plant outages which are necessary for refueling and maintenance operations. The average cost of the overall outage and production planning, computed over a set of demand scenarios, is to be minimized. The method proceeds in two stages. In the first stage, dates for outages are fixed once for all for each nuclear plant. Data are aggregated with a single average scenario and reduced time steps, and a set-partitioning reformulation of this aggregated problem is solved for fixing outage dates with a heuristic based on column generation. The pricing problem associated with each nuclear plant is a shortest path problem in an appropriately constructed graph. In the second stage, the reload level is determined at each date of an outage, considering now all scenarios. Finally, the production quantities between two outages are optimized for each plant and each scenario by solving independent linear programming problems.  相似文献   
100.
Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus.The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware—and Zeus in particular—that could pave the way for further investigation in this field.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号