首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   464篇
  免费   17篇
  国内免费   5篇
电工技术   5篇
综合类   1篇
化学工业   92篇
金属工艺   10篇
机械仪表   17篇
建筑科学   23篇
矿业工程   1篇
能源动力   25篇
轻工业   43篇
水利工程   7篇
石油天然气   3篇
无线电   52篇
一般工业技术   99篇
冶金工业   15篇
原子能技术   3篇
自动化技术   90篇
  2024年   3篇
  2023年   8篇
  2022年   23篇
  2021年   25篇
  2020年   20篇
  2019年   20篇
  2018年   27篇
  2017年   16篇
  2016年   21篇
  2015年   14篇
  2014年   22篇
  2013年   37篇
  2012年   32篇
  2011年   39篇
  2010年   19篇
  2009年   18篇
  2008年   21篇
  2007年   15篇
  2006年   13篇
  2005年   13篇
  2004年   7篇
  2003年   2篇
  2002年   12篇
  2001年   4篇
  2000年   1篇
  1999年   3篇
  1998年   5篇
  1997年   11篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1993年   4篇
  1991年   3篇
  1990年   1篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1984年   2篇
  1983年   3篇
  1982年   3篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有486条查询结果,搜索用时 15 毫秒
1.
The research aims at exploring the relationship between small business enterprises and their environments through an empirical investigation of the methods and strategies adopted by a number of industrial firms operating in the West Bank and the Gaza Strip in response to the exigencies and challenges of the uprising in the occupied territories in order to survive. Though the problems faced by the industrial sector as a result of the unique situation in the areas are almost unparalleled in other parts of the world, it has been possible to gain fresh insight into the dynamics of the environmental factors and their impact on organizational structure and function. Despite innumerable obstacles, the industrial sector has achieved a reasonable degree of growth.  相似文献   
2.
Constant stress creep data for a wrought 1%Cr, 12%Mo, 14%V steel obtained from six tests carried out at 565°C have been fitted and extrapolated using the θ-projection method. Creep curves for high stresses were fitted well, but curves extrapolated to stress levels below those used in the θ-projection did not represent well the available data for primary-secondary creep. To enable a satisfactory extrapolation of results, it was found necessary to redefine the failure condition to be less sensitive to the shape of the latter sections of the tertiary creep curve. This was achieved by defining lifetime as the point on the curve at which the strain rate reached a fixed multiple of the creep rate at half the rupture time. The extrapolated data compare well with the results of tests carried out independently on a cast 1%Cr, 12%Mo, 14%V steel. The extrapolation procedure not only predicts the ‘knee’ in the log stress-log lifetime curve but allows extrapolation of lifetimes by over a factor of thirty. In addition, acceptable predictions have been made of constant load experimental data.  相似文献   
3.
The collared peccary (Tayassu tajacu) is widely distributed over the American continent, being found from the south of the USA to the north of Argentina. In Brazil, it is spread all over the country, being one of the potential species to be raised in captivity. Therefore, the cytogenetic techniques could be a potential tool for reproductive monitoring of animals raised in captivity, mainly when destined for commercial purposes. This study had the objective of determining the chromosome number of two populations raised in captivity and characterizing them by GTG banding. For this purpose, an analysis was made of mitotic metaphases obtained from lymphocyte cultures made from blood samples of 11 animals, six of which from the Northeast and five from the North of Brazil. The results of this analysis showed the same karyotype pattern for the species (2n=30 chromosomes and NF=48), besides corresponding to the South American pattern of the species, i.e., without a translocation between autosomes 1 and 8, chromosome X acrocentric, and no differences were found between the two populations studied. However, chromosomal polymorphisms were observed compared to data from the literature on populations from North and South America.  相似文献   
4.
5.
The relationship between the stability of crack propagation in, and the fracture surface appearance of, DGEBA epoxy resins cured with TETA has been investigated using a linear elastic fracture mechanics approach. In particular, the effect of varying the amount of curing agent and curing conditions and altering external variables such as testing rate, temperature and environment have been studied. Under certain conditions, propagation is found to be stable and fracture surfaces have a smooth appearance. Under other conditions the cracks propagate in an unstable stick-slip manner. In this case, arrest lines can be seen on the fracture surfaces and their intensity and roughness increases with the magnitude of the crack jumps. The roughness of the fracture surfaces has been measured using a Talysurf and this has been shown to be due principally to deviation of the cracks from the original fracture plane rather than any gross plastic deformation.  相似文献   
6.
Human T cell leukemia virus type 1 (HTLV-1) was identified as the first pathogenic human retrovirus and is estimated to infect 5 to 10 million individuals worldwide. Unlike other retroviruses, there is no effective therapy to prevent the onset of the most alarming diseases caused by HTLV-1, and the more severe cases manifest as the malignant phenotype of adult T cell leukemia (ATL). MicroRNA (miRNA) dysfunction is a common feature of leukemogenesis, and it is no different in ATL cases. Therefore, we sought to analyze studies that reported deregulated miRNA expression in HTLV-1 infected cells and patients’ samples to understand how this deregulation could induce malignancy. Through in silico analysis, we identified 12 miRNAs that stood out in the prediction of targets, and we performed functional annotation of the genes linked to these 12 miRNAs that appeared to have a major biological interaction. A total of 90 genes were enriched in 14 KEGG pathways with significant values, including TP53, WNT, MAPK, TGF-β, and Ras signaling pathways. These miRNAs and gene interactions are discussed in further detail for elucidation of how they may act as probable drivers for ATL onset, and while our data provide solid starting points for comprehension of miRNAs’ roles in HTLV-1 infection, continuous effort in oncologic research is still needed to improve our understanding of HTLV-1 induced leukemia.  相似文献   
7.
Tuning fuzzy PD and PI controllers using reinforcement learning   总被引:1,自引:0,他引:1  
In this paper, we propose a new auto-tuning fuzzy PD and PI controllers using reinforcement Q-learning (QL) algorithm for SISO (single-input single-output) and TITO (two-input two-output) systems. We first, investigate the design parameters and settings of a typical class of Fuzzy PD (FPD) and Fuzzy PI (FPI) controllers: zero-order Takagi–Sugeno controllers with equidistant triangular membership functions for inputs, equidistant singleton membership functions for output, Larsen’s implication method, and average sum defuzzification method. Secondly, the analytical structures of these typical fuzzy PD and PI controllers are compared to their classical counterpart PD and PI controllers. Finally, the effectiveness of the proposed method is proven through simulation examples.  相似文献   
8.
Privacy in Vehicular Ad Hoc Networks (VANET) is fundamental because the user's safety may be threatened by the identity and the real‐time spatiotemporal data exchanged on the network. This issue is commonly addressed by the use of certified temporal pseudonyms and their updating strategies to ensure the user's unlinkability and anonymity. IEEE 1609.2 Standard specified the process of certifying pseudonym along with certificates structure. However, the communication procedure between the certifying authority and the requesting vehicle was not defined. In this paper, a new privacy‐preserving solution for pseudonym on‐road on‐demand refilling is proposed where the vehicle anonymously authenticates itself to the regional authority subsidiary of the central trusted authority to request a new pseudonyms pool. The authentication method has two phases, the first one uses anonymous tickets, and the second one is a challenge‐based authentication. The anonymous tickets are certificates that do not include the identity of the user. Instead, it contains a reference number and the certifying authority signature. The challenge authentication is identity‐less to preserve the privacy, yet it is used to prevent the misuse of tickets and the impersonation of its owner. Our proposed scheme is analyzed by the use of Burrows, Abadi and Needham (BAN) logic to demonstrate its correctness. It is also specified and checked by using the Security Protocol ANimator (SPAN) and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. The logical demonstration proved that this privacy‐preserving authentication is assured. The SPAN and AVISPA tools illustrated that it is resilient to security attacks.  相似文献   
9.
Wireless sensor networks (WSNs) are composed of many low cost, low power devices with sensing, local processing and wireless communication capabilities. Recent advances in wireless networks have led to many new protocols specifically designed for WSNs where energy awareness is an essential consideration. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of routing protocols for WSNs. In this paper, the low-energy adaptive clustering hierarchy (LEACH) routing protocol is considered and improved. We propose a clustering routing protocol named intra-balanced LEACH (IBLEACH), which extends LEACH protocol by balancing the energy consumption in the network. The simulation results show that IBLEACH outperforms LEACH and the existing improvements of LEACH in terms of network lifetime and energy consumption minimization.  相似文献   
10.
Single point, sender based control does not scale well for multicast delivery. For applications, such as group video or teleconferencing a low total cost multicast tree is required. In this article we present a destination driven algorithm to minimize the total tree cost of multicast tree in a dynamic situation for the whole session duration. In this heuristic approach we considered the staying duration of participants are available at the time of joining. The performance of our algorithm is analyzed through extensive simulation and evaluated against several other existing dynamic multicast routing and also against one well known near optimum heuristic algorithm used for solving Steiner tree problem. We have further tested our algorithm using erroneous information given by the joining participants. Simulation results show that its performance does not degrade that much even when the range of error is considerably high, which proves the robustness of our algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号