首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5191篇
  免费   481篇
  国内免费   217篇
电工技术   362篇
综合类   314篇
化学工业   309篇
金属工艺   56篇
机械仪表   193篇
建筑科学   210篇
矿业工程   26篇
能源动力   69篇
轻工业   102篇
水利工程   72篇
石油天然气   39篇
武器工业   19篇
无线电   1552篇
一般工业技术   281篇
冶金工业   54篇
原子能技术   82篇
自动化技术   2149篇
  2023年   17篇
  2022年   25篇
  2021年   44篇
  2020年   91篇
  2019年   75篇
  2018年   97篇
  2017年   99篇
  2016年   153篇
  2015年   174篇
  2014年   238篇
  2013年   250篇
  2012年   301篇
  2011年   459篇
  2010年   358篇
  2009年   476篇
  2008年   451篇
  2007年   463篇
  2006年   386篇
  2005年   319篇
  2004年   283篇
  2003年   337篇
  2002年   186篇
  2001年   145篇
  2000年   81篇
  1999年   44篇
  1998年   26篇
  1997年   25篇
  1996年   27篇
  1995年   32篇
  1994年   39篇
  1993年   17篇
  1992年   17篇
  1991年   27篇
  1990年   13篇
  1989年   7篇
  1988年   10篇
  1987年   8篇
  1986年   8篇
  1985年   18篇
  1984年   16篇
  1983年   9篇
  1982年   8篇
  1981年   5篇
  1978年   7篇
  1977年   3篇
  1976年   4篇
  1975年   3篇
  1974年   4篇
  1973年   1篇
  1965年   1篇
排序方式: 共有5889条查询结果,搜索用时 15 毫秒
1.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
2.
《Ceramics International》2022,48(2):1451-1483
Metal/ceramic composites are in high demand in several industries because of their superior thermo-mechanical properties. Among various composite types, the interpenetrating phase composites (IPCs) with percolating metallic and ceramic phases offer manifold benefits, such as a good combination of strength, toughness, and stiffness, very good thermal properties, excellent wear resistance, as well as the flexibility of microstructure and processing route selection, etc. The fabrication of metal/ceramic IPCs typically involves two steps - i) processing of an open porous ceramic body, and ii) infiltration of metallic melt in the pores to fabricate the IPC. Although significant progress has been made in recent years for developing both porous ceramics and melt infiltration methods, to the best of the knowledge of the authors, no review article summarizing all the aspects of processing and properties of IPCs has been published till date. This review article is aimed at filling this gap. Starting with a brief introduction about the current status and applications of IPCs, the various processing routes for fabricating open porous ceramic preforms and melt infiltration techniques have been discussed. Subsequently, the data available for various important physical, mechanical, and thermal properties for IPCs have been critically analyzed to thoroughly understand their dependence on various structural and processing parameters. To compare the properties of IPCs with other relevant materials, seven different Ashby material property maps have been used, and the domains for IPCs have been created in them. For each map, the concept of material indices has been employed to critically discuss how IPCs perform in relation to other material classes for various optimum design conditions. Finally, a detailed future outlook for further research on IPCs has been provided.  相似文献   
3.
We have developed, based on the oscillating-center transformation, a general theoretical approach for self-consistent plasma dynamics including, explicitly, effects of nonlinear(higherorder) wave-particle resonances. A specific example is then given for low-frequency responses of trapped particles in axisymmetric tokamaks. Possible applications to transport as well as nonlinear wave growth/damping are also briefly discussed.  相似文献   
4.
ABSTRACT

Wireless Interoperability for Multiple Access (WiMAX) is one of the emerging fields of high-speed wireless communication that has enormous capabilities due to its range and the connection speed. Like wireless local area networks (LANs), WiMAX networks implement multiple quality of service (QoS) frameworks at the Media Access Control (MAC) level for assured data, voice, and video services. The question of ensuring QoS is basically how to distribute available resources to users in order to satisfy QoS parameters such as latency, jitter and throughput requirements. IEEE 802.16 standard does not have any particular guidelines on scheduling of incoming and outgoing data. This has caught the attention of researchers working on WiMAX. This article discusses the various issues in WiMAX along with a classification of various scheduling approaches based upon the type of scheduler for the sake of better understanding the scheduling problem and analyzing various available theories.  相似文献   
5.
6.
The global phenomenon of maritime expansion and the measures of control imposed by the interventionism of the Iberian crowns generated a context that sheds light on the Zilselian issue: the contact between artisans and university‐trained men in early modern Europe. This is an old and controversial topic. However, this article does not focus solely on the economic and social reasons for this contact, but also on epistemological and political motivations. With the specific aim of illustrating this collaboration, the article analyses some of the empirical practices developed under the Portuguese maritime empire throughout the 16th century. This is achieved through the reconstruction of the process of production of nautical charts in the Armazéns da Guiné e Índia (Storehouse of Guinea and Indies) of Lisbon, which I consider a large‐scale “trading zone.” This reconstruction throws light not only on the technical complexity of these cognitive processes and the coordinated work of the different agents involved in their production, but also on the emergence of new spaces of knowledge and new communities of practitioners (with new professional statuses) linked to them; new methods of collection and management of information; and, finally, new forms of circulation and standardization of knowledge in the early modern period.  相似文献   
7.
The current article discusses the H disturbance attenuation control design problem for one‐sided Lipschitz systems in finite frequency domain. Models containing norm‐bounded parameter uncertainties, disturbances, and input nonlinearities are considered. By contrast to existing full frequency methods, the H controller is computed depending on the frequency ranges of disturbances. The finite frequency disturbance attenuation index is initially defined. Thanks to Finsler's lemma, sufficient and less conservative analysis conditions are also derived for the closed‐loop system. Then, synthesis conditions in the low, middle, and high frequency ranges as well as the whole frequency range, are formulated in terms of linear matrix inequalities. At last, to prove the effectiveness and the superiority of the proposed approach, a physical example is used and a comparative study is done.  相似文献   
8.
This paper presents experimental data and analysis comparing the performance of an R410A ejector vapor compression system to those of a liquid-fed evaporator system and a conventional expansion valve system. The objective was to quantify separately two major improvements of the ejector system: work recovery and liquid-fed evaporator. The ejector system was first compared to a system with liquid-fed evaporator at matching cooling capacities and revealed improvements from 1.9% to 8.4% solely due to the work recovery of the ejector. When compared to a conventional expansion valve system at the same cooling capacity, the ejector setup improved COP from 8.2% to 14.8% due to simultaneous benefits of liquid-fed evaporator and work recovery. Overall ejector efficiencies from 12.2% to 19.2% were achieved.  相似文献   
9.
为了计算不同土体性质与不同掘进参数下盾构刮刀与土体之间的作用力以及由此带来的切削扭矩,引入了修正后的Kӧtter方程作为补充方程,求解出开挖面上土体在被动切削至破坏时滑动面上的应力分布,建立了被切削土体受力模型,求解出刮刀刃面与土体之间的正压力p、摩擦力Q与侧向土体间抗剪阻力U,进而推导出刀盘切削扭矩T的计算公式。分析得到特定刀盘上刮刀的p,Q,U值随土体c,φ值增大而增大,通过适当提高刮刀刃面粗糙度来增大摩擦可使土体更易被切至破坏;p,Q,U值随刀盘转速ω增大而减小,p,Q随支护荷载p线性增大且p对于被切削土体受力的影响在砂性土中较大,最终给出特定刀盘掘进至部分种类土体中的切削扭矩值作为工程参考。  相似文献   
10.
Lévy flights have gained prominence for analysis of animal movement. In a Lévy flight, step-lengths are drawn from a heavy-tailed distribution such as a power law (PL), and a large number of empirical demonstrations have been published. Others, however, have suggested that animal movement is ill fit by PL distributions or contend a state-switching process better explains apparent Lévy flight movement patterns. We used a mix of direct behavioural observations and GPS tracking to understand step-length patterns in females of two related butterflies. We initially found movement in one species (Euphydryas editha taylori) was best fit by a bounded PL, evidence of a Lévy flight, while the other (Euphydryas phaeton) was best fit by an exponential distribution. Subsequent analyses introduced additional candidate models and used behavioural observations to sort steps based on intraspecific interactions (interactions were rare in E. phaeton but common in E. e. taylori). These analyses showed a mixed-exponential is favoured over the bounded PL for E. e. taylori and that when step-lengths were sorted into states based on the influence of harassing conspecific males, both states were best fit by simple exponential distributions. The direct behavioural observations allowed us to infer the underlying behavioural mechanism is a state-switching process driven by intraspecific interactions rather than a Lévy flight.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号