首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   533篇
  免费   50篇
  国内免费   4篇
电工技术   8篇
化学工业   130篇
金属工艺   19篇
机械仪表   27篇
建筑科学   23篇
能源动力   23篇
轻工业   72篇
水利工程   7篇
石油天然气   20篇
无线电   55篇
一般工业技术   103篇
冶金工业   19篇
原子能技术   1篇
自动化技术   80篇
  2024年   1篇
  2023年   1篇
  2022年   19篇
  2021年   22篇
  2020年   25篇
  2019年   38篇
  2018年   33篇
  2017年   38篇
  2016年   43篇
  2015年   21篇
  2014年   38篇
  2013年   53篇
  2012年   28篇
  2011年   36篇
  2010年   22篇
  2009年   15篇
  2008年   17篇
  2007年   15篇
  2006年   7篇
  2005年   6篇
  2004年   3篇
  2003年   3篇
  2002年   5篇
  2001年   6篇
  2000年   9篇
  1999年   3篇
  1998年   13篇
  1997年   9篇
  1996年   6篇
  1995年   2篇
  1994年   7篇
  1993年   11篇
  1992年   4篇
  1991年   3篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1984年   3篇
  1983年   2篇
  1978年   1篇
排序方式: 共有587条查询结果,搜索用时 0 毫秒
1.
Essential work of fracture methodology was used to determine plane-stress ductile fracture toughness of high impact polystyrene film of thickness 0.26 mm. Results obtained indicated that specific essential work of fracture, w e, is independent of loading rate, and for certain specimen sizes, independent of both gauge length and width of the specimen. On the other hand, w e was found to be affected by the temperature, molecular anisotropy and the geometry of the test specimens. Reasonable estimate of w e was obtained via crack opening displacement value.  相似文献   
2.
For characterization of the fracture resistance of materials used in the upper shelf toughness regime,J-R curves are widely considered the most promising candidates. However, there still remain problems concerning both the generation and measurement ofJ-R curves as material characterizing parameters and their application in ductile fracture analyses for failure prediction in polymeric materials. This paper reports the results of investigations conducted on two rubbertoughened nylons at room temperature. Two different methods ofJ-R curve determination are covered, namely multi-specimen and single specimen test methods. The resultingJ-R curves have also been evaluated to obtain values of the initiation toughness,J IC, following the extrapolation and interpolation schemes prescribed by ASTM E813-81 and ASTM E813-87 test procedures, respectively. The results show that the multiple specimen unloading method and the single specimen partial unloading compliance method can be used to generate comparable crack growth resistanceJ-R curves of the toughened nylons. The value ofJ IC for the crystalline rubber-toughened nylon was approximately twice the value obtained for the amorphous rubber-toughened nylon. The former material also exhibited a greater resistance to ductile crack growth.  相似文献   
3.
A technology for increasing both the two-terminal gate-drain breakdown and subsequently the three-terminal-off-state breakdown of AlInAs/GaInAs high-electron-mobility transistors (HEMTs) to record values without substantial impact on other parameters is presented. The breakdown in these structures is dependent on the multiplication of electrons injected from the source (channel current) and the gate (gate leakage) into the channel. In addition, holes are generated by high fields at the drain and are injected back into the gate and source electrodes. These phenomena can be suppressed by increasing the gate barrier height and alleviating the fields at the drain. Both have been achieved by incorporating a p+-2DEG junction as the gate that modulates the 2DEG gas and by utilizing selective regrowth of the source and drain regions by MOCVD. The 1-μm-gate-length devices fabricated have two-terminal gate-drain and three-terminal-off-state breakdown voltages of 31 V and 28 V, respectively  相似文献   
4.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
5.
Engineering with Computers - In the paper, we derive a geometric meshless method for coupled nonlinear sine-Gordon (CNSG) equations. Approximate solutions of the CNSG equations are supposed to be...  相似文献   
6.
The present study investigated fracture and various mechanical properties of polyoxymethylene (POM) hybrids in tension and in flexure. The hybrids examined consisted of short glass fibers (GF) and spherical glass beads (GB). Comparisons are made between experimentally observed values and predictions based on the rule-of-hybrid mixtures for hybrid strength, modulus, impact strength, fracture toughness, and strain energy release rates. Results indicated that tensile strength, flexural modulus, and fracture toughness of POM/GB/GF hybrid composites can be estimated from the following rule-of-hybrid mixtures where PPOM/GB and PPOM/GF are the measured properties of the POM/GB and POM/GF composites, and χPOM/GB and χPOM/GF are the hybrid ratio (by volume) of the glass bead and that of glass fiber, respectively. In view of this, none of the aforementioned properties show any signs of a hybrid effect. Flexural strengths, impact strengths, and strain energy release rate all showed the existence of a negative hybrid effect where negative deviation from the rule-of-mixtures behavior was observed. The latter was closer to the estimation based on the inverse rule-of mixtures.  相似文献   
7.
The widespread availability of broadband internet access and the growth in server-based processing have provided an opportunity to run games away from the player into the cloud and offer a new promising service known as cloud gaming. The concept of cloud gaming is to render a game in the cloud and stream the resulting game scenes to the player as a video sequence over a broadband connection. To meet the stringent network bandwidth requirements of cloud gaming and support more players, efficient bit rate reduction techniques are needed. In this paper, we introduce the concept of game attention model (GAM), which is basically a game context-based visual attention model, as a means for reducing the bit rate of the streaming video more efficiently. GAM estimates the importance of each macro-block in a game frame from the player’s perspective and allows encoding the less important macro-blocks with lower bit rate. We have evaluated nine game video sequences, covering a wide range of game genre and a spectrum of scene content in terms of details, motion and brightness. Our subjective assessment shows that by integrating this model into the cloud gaming framework, it is possible to decrease the required bit rate by nearly 25 % on average, while maintaining a relatively high user quality of experience. This clearly enables players with limited communication resources to benefit from cloud gaming with acceptable quality.  相似文献   
8.
X-ray photoelectron spectroscopy (XPS) has been employed to investigate the chemical nature of samples of dicadmium stannate (Cd2SnO4) in the as-fired, electrochemically reduced, and reoxidized states. The reduction of Cd2SnO4 was found to be associated with a dramatic color change from bright yellow to dark green, a phenomenon commonly known as the electrochromic effect. Both quantitative XPS results and binding energy measurements proved that, upon exposure of the reduced ceramic bodies to air, the Sn2+ to Sn4+ transition readily took place to produce the intermediate compound, Cd2SnO3 with divalent tin. Prolonged exposure to the atmosphere did not result in further progress of reoxidation extending to monovalent cadmium. However, complete reoxidation of the reduced samples was possible by annealing in air at 350°C for a short period of time, e.g., 3 h, by which the original features of the as-fired state such as color and electrical conductivity were restored. The results also showed that reoxidized samples at high temperature assume the same XPS characteristics as those of as-fired ceramics.  相似文献   
9.
Hubs are special facilities designed to act as switching, transshipment and sorting points in various distribution systems. Since hub facilities concentrate and consolidate flows, disruptions at hubs could have large effects on the performance of a hub network. In this paper, we have formulated the multiple allocation p-hub median problem under intentional disruptions as a bi-level game model. In this model, the follower’s objective is to identify those hubs the loss of which would most diminish service efficiency. Moreover, the leader’s objective is to identify the set of hubs to locate in order to minimize expected transportation cost while taking normal and failure conditions into account. We have applied two algorithms based on simulated annealing to solve the defined problem. In addition, the algorithms have been calibrated using the Taguchi method. Computational experiments on different instances indicate that the proposed algorithms would be efficient in practice.  相似文献   
10.
Duality properties have been investigated by many researchers in the recent literature. They are introduced in this paper for a fully fuzzified version of the minimal cost flow problem, which is a basic model in network flow theory. This model illustrates the least cost of the shipment of a commodity through a capacitated network in terms of the imprecisely known available supplies at certain nodes which should be transmitted to fulfil uncertain demands at other nodes. First, we review on the most valuable results on fuzzy duality concepts to facilitate the discussion of this paper. By applying Hukuhara’s difference, approximated and exact multiplication and Wu’s scalar production, we exhibit the flow in network models. Then, we use combinatorial algorithms on a reduced problem which is derived from fully fuzzified MCFP to acquire fuzzy optimal flows. To give duality theorems, we utilize a total order on fuzzy numbers due to the level of risk and realize optimality conditions for providing some efficient combinatorial algorithms. Finally, we compare our results with the previous worthwhile works to demonstrate the efficiency and power of our scheme and the reasonability of our solutions in actual decision-making problems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号