首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2110篇
  免费   206篇
  国内免费   26篇
电工技术   53篇
综合类   9篇
化学工业   605篇
金属工艺   93篇
机械仪表   79篇
建筑科学   97篇
矿业工程   6篇
能源动力   169篇
轻工业   197篇
水利工程   28篇
石油天然气   29篇
无线电   208篇
一般工业技术   321篇
冶金工业   95篇
原子能技术   22篇
自动化技术   331篇
  2024年   7篇
  2023年   46篇
  2022年   59篇
  2021年   117篇
  2020年   116篇
  2019年   135篇
  2018年   195篇
  2017年   172篇
  2016年   198篇
  2015年   98篇
  2014年   153篇
  2013年   232篇
  2012年   149篇
  2011年   132篇
  2010年   106篇
  2009年   85篇
  2008年   58篇
  2007年   46篇
  2006年   31篇
  2005年   20篇
  2004年   18篇
  2003年   19篇
  2002年   16篇
  2001年   11篇
  2000年   12篇
  1999年   8篇
  1998年   15篇
  1997年   5篇
  1996年   6篇
  1995年   12篇
  1994年   5篇
  1993年   5篇
  1992年   6篇
  1991年   5篇
  1990年   4篇
  1989年   7篇
  1988年   3篇
  1987年   3篇
  1986年   6篇
  1985年   3篇
  1984年   1篇
  1983年   3篇
  1982年   5篇
  1979年   3篇
  1975年   1篇
  1973年   2篇
  1970年   2篇
  1969年   1篇
排序方式: 共有2342条查询结果,搜索用时 15 毫秒
41.

The Peer to Peer-Cloud (P2P-Cloud) is a suitable alternative to distributed cloud-based or peer-to-peer (P2P)-based content on a large scale. The P2P-Cloud is used in many applications such as IPTV, Video-On-Demand, and so on. In the P2P-Cloud network, overload is a common problem during overcrowds. If a node receives many requests simultaneously, the node may not be able to respond quickly to user requests, and this access latency in P2P-Cloud networks is a major problem for their users. The replication method in P2P-Cloud environments reduces the time to access and uses network bandwidth by making multiple data copies in diverse locations. The replication improves access to the information and increases the reliability of the system. The data replication's main problem is identifying the best possible placement of replica data nodes based on user requests for data access time and an NP-hard optimization problem. This paper proposes a new replica replacement to improve average access time and replica cost using fuzzy logic and Ant Colony Optimization algorithm. Ants can find the shortest path to discover the optimal node to place the duplicate file with the least access time latency. The fuzzy module evaluates the historical information of each node to analyze the pheromone value per iteration. The fuzzy membership function is also used to determine each node's degree based on the four characteristics. The simulation results showed that the access time and replica cost are improved compared to other replica replacement algorithms.

  相似文献   
42.
The Journal of Supercomputing - Internet of Things (IoT) is an emerging paradigm that consists of numerous connected and interrelated devices with embedded sensors, exchanging data with each other...  相似文献   
43.
Journal of Intelligent Manufacturing - In recent years, driven by Industry 4.0 wave, academic research has focused on the science, engineering, and enabling technologies for intelligent and cyber...  相似文献   
44.

Software design patterns are well-known solutions for solving commonly occurring problems in software design. Detecting design patterns used in the code can help to understand the structure and behavior of the software, evaluate the quality of the software, and trace important design decisions. To develop and maintain a software system, we need sufficient knowledge of design decisions and software implementation processes. However, the acquisition of knowledge related to design patterns used in complex software systems is a challenging, time-consuming, and costly task. Therefore, using a suitable method to detect the design patterns used in the code reduces software development and maintenance costs. In this paper, we proposed a new method based on conceptual signatures to improve the accuracy of design pattern detection. So we used the conceptual signatures based on the purpose of patterns to detect the patterns’ instances that conform to the standard structure of patterns, and cover more instances of patterns’ variants and implementation versions of the patterns and improve the accuracy of pattern detection. The proposed method is a specific process in two main phases. In the first phase, the conceptual signature and detection formula for each pattern is determined manually. Then in the second phase, each pattern in the code is detected in a semi-automatic process using the conceptual signature and pattern detection formula. To implement the proposed method, we focused on GoF design patterns and their variants. We evaluated the accuracy of our proposed method on five open-source projects, namely, Junit v3.7, JHotDraw v5.1, QuickUML 2001, JRefactory v2.6.24, and MapperXML v1.9.7. Also, we performed our experiments on a set of source codes containing the instances of GoF design patterns’ variants for a comprehensive and fair evaluation. The evaluation results indicate that the proposed method has improved the accuracy of design pattern detection in the code.

  相似文献   
45.
The Journal of Supercomputing - Fast execution of functions is an inevitable challenge in the serverless computing landscape. Inefficient dispatching, fluctuations in invocation rates, burstiness...  相似文献   
46.
In this paper, the effects of dilute charged impurity doping on electronic heat capacity (EHC) and magnetic susceptibility (MS) of a two-dimensional material ferromagnetic gapped graphene-like, MoS2, are investigated within the Green’s function approach by using the Kane-Mele Hamiltonian and self-consistent Born approximation (SCBA) at Dirac points. Our findings show that there is a critical impurity concentration (IC) and scattering strength (ISS) for each valley in EHC and MS curves. Also, we have found that the spin band gap decreases with impurity only for valley K, and \(K^{\prime }, \downarrow \) due to the existence of inversion symmetry between valleys. On the other hand, a magnetic phase transition from ferromagnetic to antiferromagnetic and paramagnetic has been observed. The increase of scattering rate of carriers in the presence of impurity is the main reason of these behaviors.  相似文献   
47.
Shunting effect is the loss of electrical current via the secondary circuit provided due to existence of previous nugget in a series of welding spots. This phenomenon is important for products containing intermittent spots. In this study, a theoretical model is developed for shunting effect in resistance spot welding for aluminum alloy 2219. Welding distance together with welding current and time is included in the model to analyze the shunting effect on final nugget quality. Thermal and electrical interactions are considered in the model as well as geometrical aspects of the process. Temperature dependence of material properties, integration through the whole volume of the nugget and heat-affected zone, and assuming a simple cooling mechanism are the most important modifications designated in the proposed theoretical model. Predicted results of nugget diameter are compatible with experimental and finite element analysis results.  相似文献   
48.
49.
50.
Mixing sand or soil with small pieces of tire is common practice in civil engineering applications. Although the properties of the soil are changed, it is environmentally friendly and sometimes economical. Nevertheless, the mechanical behavior of such mixtures is still not fully understood and more numerical investigations are required. This paper presents a novel approach for the modeling of sand–tire mixtures based on the discrete element method. The sand grains are represented by rigid agglomerates whereas the tire grains are represented by deformable agglomerates. The approach considers both grain shape and deformability. The micromechanical parameters of the contact law are calibrated based on experimental results from the literature. The effects of tire content and confining pressure on the stress–strain response are investigated in detail by performing numerical triaxial compression tests. The main results indicate that both strength and stiffness of the samples decrease with increasing tire content. A tire contact of 40% is identified as the boundary between rubber-like and sand-like behavior.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号