首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   926篇
  免费   51篇
  国内免费   13篇
电工技术   19篇
技术理论   2篇
综合类   116篇
化学工业   31篇
金属工艺   9篇
机械仪表   16篇
建筑科学   73篇
矿业工程   10篇
能源动力   19篇
轻工业   13篇
水利工程   12篇
石油天然气   11篇
武器工业   3篇
无线电   43篇
一般工业技术   85篇
冶金工业   314篇
原子能技术   3篇
自动化技术   211篇
  2024年   9篇
  2022年   4篇
  2021年   7篇
  2020年   12篇
  2019年   9篇
  2018年   16篇
  2017年   12篇
  2016年   23篇
  2015年   19篇
  2014年   31篇
  2013年   49篇
  2012年   42篇
  2011年   41篇
  2010年   55篇
  2009年   40篇
  2008年   55篇
  2007年   58篇
  2006年   61篇
  2005年   58篇
  2004年   53篇
  2003年   52篇
  2002年   41篇
  2001年   32篇
  2000年   17篇
  1999年   21篇
  1998年   17篇
  1997年   12篇
  1996年   6篇
  1995年   9篇
  1994年   5篇
  1993年   5篇
  1992年   11篇
  1991年   9篇
  1990年   12篇
  1989年   9篇
  1988年   7篇
  1987年   9篇
  1986年   11篇
  1984年   4篇
  1982年   2篇
  1975年   2篇
  1971年   3篇
  1968年   2篇
  1966年   2篇
  1965年   2篇
  1964年   4篇
  1961年   2篇
  1959年   2篇
  1955年   6篇
  1954年   4篇
排序方式: 共有990条查询结果,搜索用时 0 毫秒
1.
This paper concerns the following problem: given a set of multi-attribute records, a fixed number of buckets and a two-disk system, arrange the records into the buckets and then store the buckets between the disks in such a way that, over all possible orthogonal range queries (ORQs), the disk access concurrency is maximized. We shall adopt the multiple key hashing (MKH) method for arranging records into buckets and use the disk modulo (DM) allocation method for storing buckets onto disks. Since the DM allocation method has been shown to be superior to any other allocation methods for allocating an MKH file onto a two-disk system for answering ORQs, the real issue is knowing how to determine an optimal way for organizing the records into buckets based upon the MKH concept.

A performance formula that can be used to evaluate the average response time, over all possible ORQs, of an MKH file in a two-disk system using the DM allocation method is first presented. Based upon this formula, it is shown that our design problem is related to a notoriously difficult problem, namely the Prime Number Problem. Then a performance lower bound and an efficient algorithm for designing optimal MKH files in certain cases are presented. It is pointed out that in some cases the optimal MKH file for ORQs in a two-disk system using the DM allocation method is identical to the optimal MKH file for ORQs in a single-disk system and the optimal average response time in a two-disk system is slightly greater than one half of that in a single-disk system.  相似文献   

2.
尚慧 《山西建筑》2010,36(19):14-15
介绍了拉斐尔.莫内欧的著作"Theoretical anxiety and design strategies in the work of eight contemporary architects"(以下简称"T"文)中对"雷姆.库哈斯"的论述,采用梳理建筑理论基础,比较大师思想差异,整理建筑实践案例的方式,借莫内欧之眼,以达到对库哈斯理论与实践的再审视与再思考。  相似文献   
3.
以C1对称C20富勒烯分子为模型,在Gussion03上做了结构优化、频率计算以及自然键轨道理论(NBO)计算,并在同样的方法和基组下分别对C20分子得失一个电子的情况做了计算,并进行了分析和比较.结果表明:C1对称C20富勒烯分子不稳定,易于得失电子而以离子形式存在.C20,C+20,C-20三者的能量关系为:EC2...  相似文献   
4.
    
Reviews the book, Empirical studies of psychoanalytical theories, volume 1 by Joseph Masling (1983). Many psychoanalytic clinicians are comfortable functioning in the clinical world, using experience-near data. Many others are comfortable in the metapsychological world, using more experience-distant concepts. Some are even able to apply theory to practice, and modify one based on their experience of the other. But the bridge between the two, the middle-level described by Mayman, which represents the empirical joining of the theoretical and clinical, operationalized in the form of research which can inform either the clinical or the theoretical, is an area of lessened comfort for many. It is to this middle-level that Masling's book addresses itself, presenting examples of a wide variety of psychoanalytic research projects. Some are studies of psychoanalytic theory and others of psychoanalytic therapy; some are more empirical and others are more theoretical, some are original and others are reviews of already published material; but all provide an empirical grounding for practice. Stricker reviews the major findings and contributions of each of the seven chapters, and concludes with some general comments about psychoanalytic research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
5.
高聚物黏结炸药的力学性能研究进展   总被引:5,自引:0,他引:5  
从材料的力学行为特性、实验方法、本构模型和强度理论4个方面对高聚物黏结炸药(PBX)的力学性能特征进行了归纳和评述。指出应变率和温度对材料应力状况的影响及动态力学性能分析是目前PBX研究的热点和难点。认为可以借鉴研究混凝土和高聚物的一些方法来建立PBX的本构模型和失效准则。指出选择和改进现有测试技术时,须考虑PBX的含能敏感性、大变形等特性。对PBX力学性能的理论研究、实验技术及数值模拟等方面需要开展的工作提出了一些看法。认为复杂环境下的力学响应和细观建模模拟应是今后研究的重点方向。附参考文献93篇。  相似文献   
6.
In this article, we derive constitutive thermoelastic models for linear elastic materials with micro-structure. The elastic behavior is assumed to be consistent with Mindlins’ Form II gradient elasticity theory, whereas for the thermal behavior the generalization of Clausius-Duhem inequality, proposed by Green and Laws, is adopted. The resulting model is actually a generalization of the thermoelastic theory of Green and Lindsay for linear elastic materials with micro-structure, taking into account micro-inertia effects, as well. It is demonstrated that classical thermoelasticity models are retrieved from the present general formulation, when some of the model constants are set to zero. Finally, the uniqueness of solution for the general case of anisotropic materials is proved.  相似文献   
7.
This paper focuses on unresolved or poorly documented issues pertaining to Fresnel’s scalar diffraction theory and its modifications. In Sec. 2 it is pointed out that all thermal sources used in practice are finite in size and errors can result from insufficient coherence of the optical field. A quarter-wave criterion is applied to show how such errors can be avoided by placing the source at a large distance from the aperture plane, and it is found that in many cases it may be necessary to use collimated light as on the source side of a Fraunhofer experiment. If these precautions are not taken the theory of partial coherence may have to be used for the computations.In Sec. 3 it is recalled that for near-zone computations the Kirchhoff or Rayleigh-Sommerfeld integrals are applicable, but fail to correctly describe the energy flux across the aperture plane because they are not continuously differentiable with respect to the assumed geometrical field on the source side. This is remedied by formulating an improved theory in which the field on either side of a semi-reflecting screen is expressed as the superposition of mutually incoherent components which propagate in the opposite directions of the incident and reflected light.These components are defined as linear combinations of the Rayleigh-Sommerfeld integrals, so that they are rigorous solutions of the wave equation as well as continuously differentiable in the aperture plane. Algorithms for using the new theory for computing the diffraction patterns of circular apertures and slits at arbitrary distances z from either side of the aperture (down to z = ± 0.0003 λ) are presented, and numerical examples of the results are given. These results show that the incident geometrical field is modulated by diffraction before it reaches the aperture plane while the reflected field is spilled into the dark space. At distances from the aperture which are large compared to the wavelength λ these field expressions are reduced to the usual ones specified by Fresnel’s theory. In the specific case of a diffracting half plane the numerical results obtained were practically the same as those given by Sommerfeld’s rigorous theory.The modified theory developed in this paper is based on the explicit assumption that the scalar theory of light cannot explain plolarization effects. This premise is justified in Sec. 4, where it is shown that previous attempts to do so have produced dubious results.  相似文献   
8.
Mea culpa. My only excuse is that when I read Epstein I was not preparing a presidential address; when I read Brim (in a prepublication version minus footnotes), it fitted with what I wanted to say and is, I think, a unique and valuable contribution in itself. And while apologizing to Epstein, let me add apologies to George Kelly, Julian Rotter, Magda Arnold, Albert Ellis, and all other cognitive theorists, dead or alive, whom I failed to cite. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
9.
    
People involved in business are increasingly aware of the online social phenomenon and its potential as a marketing tool. Building upon the marketing, social psychology, and information system literature, this study empirically examines a set of functional determinants derived from the technology acceptance model and socio-psychological determinants drawn from the theory of reasoned action and social cognitive theory that may be responsible for the motivations of participants in online social networks. We propose a model by integrating functional, social, and psychological factors in predicting attitude and online social network usage. The survey outcomes from a cross-sectional study among 387 Facebook users in Malaysia support the hypothesised model. This study contributes by extending the cognitive learning theories in predicting online social networking usage. Particularly, this research presents a different perspective on online social networking by exploring the mediating effect of attitude and the moderating role of individual characteristics. This study demonstrates that desirable changes in the perception of functional benefits, self-efficacy, and need for cognition as well as perceptions of social pressure from significant others might lead to corresponding changes in attitude towards online social networking. Results of the study support the model efficacy and predictive ability of the proposed integrative model which may serve as a theoretical foundation for future researchers interested in examining other virtual community engagements such as blogging, online advertising, and online public relations activities.  相似文献   
10.
    
Web Service Business Process Execution Language (WS‐BPEL) is one of the most popular service‐oriented workflow applications. The unique features (e.g. dead path elimination semantics and correlation mechanism) of WS‐BPEL applications have raised enormous problems to its test case generation, especially in unit testing. Existing studies mainly assume that each path in the control flow graphs that correspond to WS‐BPEL applications is feasible, which always yields imprecise test cases or complicates testing results. The current study tackles this problem based on satisfiability modulo theory solvers. First, a new coverage criterion is proposed to measure the quality of test sets for testing WS‐BPEL applications. Second, decomposition algorithms are presented to obtain test paths that meet the proposed coverage criterion. Finally, this paper symbolically encodes each test path with several constraints by capturing the unique features of WS‐BPEL. These constraints are solved and the test cases (test paths and test data) are obtained with the help of satisfiability modulo theory solvers to test WS‐BPEL applications effectively. Experiments are conducted using our approach and other typical approaches (e.g. message‐sequence generation‐based approach and concurrent path analysis approach) with 10 WS‐BPEL applications. Experimental results demonstrate that the test cases generated by our approach can avoid instantiating idle instance and expose more faults. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号