首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1116篇
  免费   58篇
  国内免费   3篇
电工技术   10篇
综合类   3篇
化学工业   263篇
金属工艺   17篇
机械仪表   13篇
建筑科学   66篇
矿业工程   1篇
能源动力   19篇
轻工业   107篇
水利工程   5篇
石油天然气   3篇
无线电   102篇
一般工业技术   194篇
冶金工业   178篇
原子能技术   6篇
自动化技术   190篇
  2021年   36篇
  2020年   12篇
  2019年   13篇
  2018年   23篇
  2017年   26篇
  2016年   25篇
  2015年   31篇
  2014年   48篇
  2013年   89篇
  2012年   59篇
  2011年   80篇
  2010年   59篇
  2009年   59篇
  2008年   67篇
  2007年   63篇
  2006年   53篇
  2005年   25篇
  2004年   38篇
  2003年   37篇
  2002年   32篇
  2001年   19篇
  2000年   17篇
  1999年   19篇
  1998年   19篇
  1997年   8篇
  1996年   16篇
  1995年   17篇
  1994年   16篇
  1993年   11篇
  1992年   6篇
  1991年   9篇
  1990年   9篇
  1989年   6篇
  1988年   10篇
  1987年   11篇
  1986年   4篇
  1985年   9篇
  1984年   9篇
  1983年   6篇
  1982年   4篇
  1981年   6篇
  1980年   8篇
  1979年   3篇
  1978年   7篇
  1977年   4篇
  1975年   10篇
  1974年   3篇
  1973年   3篇
  1961年   3篇
  1956年   3篇
排序方式: 共有1177条查询结果,搜索用时 250 毫秒
21.
This study uses a hostage negotiation setting to demonstrate how a team of strategic police officers can utilize specific coping strategies to minimize uncertainty at different stages of their decision-making in order to foster resilient decision-making to effectively manage a high-risk critical incident. The presented model extends the existing research on coping with uncertainty by (1) applying the RAWFS heuristic (Lipshitz and Strauss in Organ Behav Human Decis Process 69:149–163, 1997) of individual decision-making under uncertainty to a team critical incident decision-making domain; (2) testing the use of various coping strategies during “in situ” team decision-making by using a live simulated hostage negotiation exercise; and (3) including an additional coping strategy (“reflection-in-action”; Schön in The reflective practitioner: how professionals think in action. Temple Smith, London, 1983) that aids naturalistic team decision-making. The data for this study were derived from a videoed strategic command meeting held within a simulated live hostage training event; these video data were coded along three themes: (1) decision phase; (2) uncertainty management strategy; and (3) decision implemented or omitted. Results illustrate that, when assessing dynamic and high-risk situations, teams of police officers cope with uncertainty by relying on “reduction” strategies to seek additional information and iteratively update these assessments using “reflection-in-action” (Schön 1983) based on previous experience. They subsequently progress to a plan formulation phase and use “assumption-based reasoning” techniques in order to mentally simulate their intended courses of action (Klein et al. 2007), and identify a preferred formulated strategy through “weighing the pros and cons” of each option. In the unlikely event that uncertainty persists to the plan execution phase, it is managed by “reduction” in the form of relying on plans and standard operating procedures or by “forestalling” and intentionally deferring the decision while contingency planning for worst-case scenarios.  相似文献   
22.
A new test was developed to assess the efficiency of no-wiping hard-surface cleaning. The test allows cleaner comparisons according to their ability to remove greasy soils. The chosen approach minimizes the mechanical forces applied while cleaning so that the interactions between a detergent solution and the soil to be removed can be characterized. For this, immersion cleaning was chosen, with coated stainless steel as substrate and pigmented oils as the model soil. Several parameters were studied in defined ranges using the Experimental Design method and systematic comparisons. The test shows high reliability on degreasing assessments and is there-fore especially suited to optimization of nonionic surfactant mixes. The originality of the test lies in the possibility of keeping a visual trace of the cleaned substrate appearance by imprinting it on a piece of paper. The validation of the test leads to corroboration of several practical observations. Temperature and agitation play a major role in cleaning efficiency. Detergent solution concentration is a more relevant parameter than pH. Sodium carbonate is shown to have a higher buffering effect than pentahydrated sodium metasilicate. The test is easy to set up, highly sensitive, and can be adapted to solve the problems encountered by formulators of detergent cleaners, such as screening the best ethoxylated fatty alcohol mix for better degreasing properties.  相似文献   
23.
An initial Raman study on the effects of intercalation for aprotic electrolyte-based electrochemical double-layer capacitors (EDLCs) is reported. In situ Raman microscopy is employed in the study of the electrochemical intercalation of tetraethylammonium (Et4N+) and tetrafluoroborate (BF4) into and out of microcrystalline graphite. During cyclic voltammetry experiments, the insertion of Et4N+ into graphite for the negative electrode occurs at an onset potential of +1.0 V versus Li/Li+. For the positive electrode, BF4 was shown to intercalate above +4.3 V versus Li/Li+. The characteristic G-band doublet peak (E2g2(i) (1578 cm−1) and E2g2(b) (1600 cm−1)) showed that various staged compounds were formed in both cases and the return of the single G-band (1578 cm−1) demonstrates that intercalation was fully reversible. The disappearance of the D-band (1329 cm−1) in intercalated graphite is also noted and when the intercalant is removed a more intense D-band reappears, indicating possible lattice damage. For cation intercalation, such irreversible changes of the graphite structure are confirmed by scanning electron microscopy (SEM).  相似文献   
24.
With the increasing growth of multimedia applications over the networking in recent years, users have put forward much higher requirements for multimedia quality of experience (QoE) than before. One of the representative requirements is the image quality. Therefore, the image quality assessment ranging from two-dimension (2D) image to three-dimension (3D) image has been getting much attention. In this paper, an efficient objective image quality assessment metric in block-based discrete cosine transform (DCT) coding is proposed. The metric incorporates properties of human visual system (HVS) to improve its validity and reliability in evaluating the quality of stereoscopic image. This is fulfilled by calculating the local pixel-based distortions in frequency domain, combining the simplified models of local visibility properties embodied in frequency domain, which consist of region of interest (ROI) mechanism (visual sensitivity), contrast sensitivity function (CSF) and contrast masking effect. The performance of the proposed metric is compared with other currently state-of-the-art objective image quality assessment metrics. The experimental results have demonstrated that the proposed metric is highly consistent with the subjective test scores. Moreover, the performance of the metric is also confirmed with the popular IRCCyN/IVC database. Therefore, the proposed metric is promising in term of the practical efficiency and reliability for real-life multimedia applications.  相似文献   
25.
26.
As a fundamental component in wireless networks, location management consists of two operations: location update and paging. These two supplementary operations enable the mobile user ubiquitous mobility. However, in case of failed location update, a significant consequence is the obsolete location identity in the network databases and thereafter the incapability in establishing the valid route for the potential call connection, which will seriously degrade the network quality-of-service (QoS). This issue is not theoretically studied in the literature. In this paper, we perform a quantitative analysis of the location management effect on QoS in the wireless networks. The metrics call blocking probability and the average number of blocked calls are introduced to reflect the QoS. For the sake of general applicability, the performance metrics are formulated with the relaxed tele-traffic parameters. Namely, the call inter-arrival time, cell residence time, location area residence time and location update inter-arrival time follow a general probability density function. The formulae are additionally specified in the static and several dynamic location management mechanisms. Numerical examples are presented to show the interaction between the performance metrics and location management schemes. The discussions on the sensitivity of tele-parameters are also given.  相似文献   
27.
Bengu E  Marks LD  Ovali RV  Gulseren O 《Ultramicroscopy》2008,108(11):1484-1489
Cubic boron nitride (c-BN) nucleation takes place on hexagonal boron nitride (h-BN) layers growing perpendicular to the substrate surface during thin film synthesis. Studies focused on the nucleation of the cubic phase suggest the possibility that transient phases and/or defects on these h-BN structures have a role in sp3-bonded cubic phase nucleation. In this study, we have investigated the nature, energetics, and structure of several possible defects on BN basal planes, including point defects, 4-, and 5-fold BN rings, that may possibly match the experimentally observed transient phase fine structure. TEM image observations are used to build approximate atomic models for the proposed structures, and DFT calculations are used to relax these structures while minimizing their respective total energies. These optimized atomic geometries are then used to simulate TEM images, which are compared to the experimentally observed structures. Data from DFT calculations and analysis of simulated images from the proposed atomic structures suggest that 4-fold BN rings are more likely to exist on the transient phase possibly leading to c-BN nucleation.  相似文献   
28.
Structural features associated with the ability of a monoclonalantibody (mAb) to discriminate between protein variants areidentified and engineered. The variants are the curaremimetictoxin from Naja nigricollis and erabutoxin a or b from Laticaudasemifasciata which differ from each other by 16 substitutionsand one insertion. The neutralizing mAb M1 recognizes with highaffinity a topographical epitope on the surface of toxin , butfails to recognize the erabutoxins although they possess mostof the residues forming the presumed epitope. Examinations ofthe toxin and erabutoxin 3-D structures and molecular dynamicssimulations reveal several differences between the variants.In particular, the region involving the ß-turn 17–24is organized differently. Analysis of the differences foundin this region suggests that the insertion (or deletion) atposition 18 of the variant amino add sequences is particularlyimportant in determining the differential cross-reactivity.To test this proposal, residue 18 was deleted in one erabutoxinusing sitedirected mutagenesis, and the biological propertiesof the resulting mutant were examined. We found that full antigenicitywas restored in the previously unrecognized variant. The implicationsof this finding are discussed.  相似文献   
29.
即时通信蠕虫传播建模   总被引:1,自引:1,他引:0       下载免费PDF全文
基于对即时通信蠕虫和即时通信网络特点的分析,使用离散时间方法,提出一个即时通信蠕虫离散数学传播模型。开发即时通信蠕虫传播仿真软件用于验证模型的正确性。基于仿真软件进行的大量仿真实验表明,该蠕虫传播模型是正确的,可以用于分析蠕虫的传播行为并预测传播趋势。  相似文献   
30.
Information security management has become an important research issue in distributed systems, and the detection of failures is a fundamental issue for fault tolerance in large distributed systems. Recently, many people have come to realize that failure detection ought to be provided as some form of generic service, similar to IP address lookup. However, this has not been successful so far; one of the reasons being the fact that classical failure detectors were not designed to satisfy several application requirements simultaneously. More specifically, traditional implementations of failure detectors are often tuned for running over local networks and fail to address some important problems found in wide-area distributed systems with a large number of monitored components, such as Grid systems. In this paper, we study the security management scheme for failure detector distributed systems. We first identify some of the most important QoS problems raised in the context of large wide-area distributed systems. Then we present a novel failure detector scheme combined with self-tuning control theory that can help in solving or optimizing some of these problems. Furthermore, this paper discusses the design and analysis of implementing a scalable failure detection service for such large wide-area distributed systems considering dynamically adjusting the heartbeat streams, so that it satisfies the bottleneck router requirements. The basic z-transformation stability test is used to achieve the stability criterion, which ensures the bounded rate allocation without steady state oscillation. We further show how the online failure detector control algorithm can be used to design a controller, analyze the theoretical aspects of the proposed algorithm and verify its agreement with the simulations in the LAN and WAN case. Simulation results show the efficiency of our scheme in terms of high utilization of the bottleneck link, fast response and good stability of the bottleneck router buffer occupancy as well as of the controlled sending rates. In conclusion, the new security management failure detector algorithm provides a better QoS than an algorithm that is proposed by Stelling et al. (Proceedings of 7th IEEE symposium on high performance distributed computing, pp. 268–278, 1998), Foster et al. (Int J Supercomput Appl, 2001).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号