首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7098篇
  免费   324篇
  国内免费   53篇
电工技术   135篇
综合类   26篇
化学工业   1786篇
金属工艺   118篇
机械仪表   211篇
建筑科学   277篇
矿业工程   6篇
能源动力   464篇
轻工业   725篇
水利工程   76篇
石油天然气   115篇
无线电   654篇
一般工业技术   1142篇
冶金工业   337篇
原子能技术   83篇
自动化技术   1320篇
  2024年   24篇
  2023年   151篇
  2022年   317篇
  2021年   405篇
  2020年   295篇
  2019年   335篇
  2018年   416篇
  2017年   358篇
  2016年   355篇
  2015年   236篇
  2014年   319篇
  2013年   642篇
  2012年   357篇
  2011年   506篇
  2010年   351篇
  2009年   327篇
  2008年   288篇
  2007年   217篇
  2006年   201篇
  2005年   140篇
  2004年   111篇
  2003年   117篇
  2002年   90篇
  2001年   64篇
  2000年   73篇
  1999年   50篇
  1998年   77篇
  1997年   41篇
  1996年   49篇
  1995年   40篇
  1994年   36篇
  1993年   44篇
  1992年   36篇
  1991年   32篇
  1990年   30篇
  1989年   20篇
  1988年   35篇
  1987年   30篇
  1986年   20篇
  1985年   15篇
  1984年   27篇
  1983年   22篇
  1982年   22篇
  1981年   16篇
  1980年   20篇
  1979年   16篇
  1978年   17篇
  1976年   18篇
  1975年   19篇
  1974年   12篇
排序方式: 共有7475条查询结果,搜索用时 15 毫秒
21.
Quality function deployment (QFD) is a customer-oriented design tool for developing new or improved products to achieve higher customer satisfaction by integrating various functions of an organization. The engineering characteristics (ECs) affecting the product performances are designed to match the customer attributes (CAs). However, from the viewpoint of the QFD team, product design processes are performed in imprecise environments, and more than one factor must be taken into account in determining the target levels of ECs, especially the limited resources and increased market competition. This paper presents an imprecise goal programming (GP) approach to determine the optimum target levels of ECs in QFD for maximizing customer satisfaction under resource limitation and considerations of market competition. Based on benchmarking data of CAs, the concept of satisfaction functions is utilized to formulate explicitly the customer's preferences and to integrate the competitive analysis of target market into the modelling and solution process. In addition, the relationships linking CAs and ECs and the ECs to each other are integrated by functional relationships. The proposed approach will be illustrated through a car door design example.  相似文献   
22.
We present a secure routing protocol that is immune to Sybil attacks and that can tolerate collusion of Byzantine routers. It can tolerate either initial collusion of Byzantine routers or runtime collusion of non-adjacent Byzantine routers, both in the absence of runtime collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also simultaneously tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, it guarantees a bound on the difference between the calculated distance and the actual shortest distance. The bound depends on the number of Byzantine routers on a path. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes.  相似文献   
23.
Numerical modelling of the deformation of a polymer using the finite elements method in axisymetrical mode was performed using the LsDyna® software to describe the filling of micro-cavities during the forming process of the material using the hot embossing. These simulations firstly allow verifying whether the chosen forming process conditions promote or not an optimized filling of the superficial cavities in order to achieve precise replicas which best reproduce the superficial topography of the mould. The simulations were carried out to evaluate the filling of the cavities taking into account the mechanical behaviour of the selected polymer into the model. Moreover, these models were developed to verify the effect of the distribution of the mould cavities on their filling. The influence of the mobility of non deformable rigid plates on the filling of the cavities represents an auxiliary variable. In the approach presented, the compression plates are assumed to be parallel and non deformable, whereas the polymer disk follows a rubbery behaviour around a temperature equal to 140°C. Globally the modelling results are satisfactory for they are rather close to the experimental observations conducted. In summary, the effect of the normal stress as also the distribution of micro-cavities at the mould surface seem to prevail in the case of the forming process by hot embossing.  相似文献   
24.
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs. Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases, automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors. Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case study using the virus suggests the approximations may be effective in practice for countering mutated malware. R. Mathur is presently at McAfee AVERT Labs.  相似文献   
25.
Disruption damage conditions for future large tokamaks like ITER are nearly impossible to simulate on current tokamaks. The electrothermal plasma source SIRENS has been designed, constructed, and operated to produce high density (> 1025/m3), low temperature (1–3 eV) plasma formed by the ablation of the insulator with currents of up to 100 kA (100 s pulse length) and energies up to 15 kJ. The source heat fluence (variable from 0.2 to 7 MJ/m2) is adequate for simulation of the thermal quench phase of plasma disruption in future fusion tokamaks. Different materials have been exposed to the high heat flux in SIRENS, where comparative erosion behavior was obtained. Vapor shield phenomena has been characterized for different materials, and the energy transmission factor through the shielding layer is obtained. The device is also equipped with a magnet capable of producing a parallel magnetic field (up to 16 T) over a 8 msec pulse length. The magnetic field is produced to decrease the turbulent energy transport through the vapor shield, which provides further reduction of surface erosion (magnetic vapor shield effect).  相似文献   
26.
27.
This study considers the content of the papers published by ASCE’s Journal of Management in Engineering, which has witnessed a growth in number of papers and breadth of participation, particularly of international origin, during the 1985–2002 period. The content is analyzed in two main dimensions: the type of subject and its composing topics, and the type of contributors to the journal. The analysis shows the evolution of the engineering management discipline as represented in the journal. Over the years the discipline has been enriched by an increasing number of contributions on corporate strategies and programs, organizational change, and cultures issues, as well as a growing interest in project management topics, such as quality planning and evaluation of alternative project delivery systems. The number of papers by practitioners, initially the largest contributing group to the journal, has declined significantly over the years.  相似文献   
28.
2,3,4,5-Tetrahydro-benzo[b]thiepin-5-one, its 7-methyl derivative, and their S, S-dioxides condense with aromatic aldehydes to give the corresponding 4-arylidene derivatives 3 and 4 . Compounds 4 react with hydrazine and phenylhydrazine to yield 3, 3a, 4, 5-tetrahydro-2 H-benzo-[b]thiepino[4, 5-c]pyrazole S, S-dioxide derivatives 5 and 6 . Some of the arylidene derivatives 4 add GRIGNARD reagents to give 7 . The IR spectra of representative examples are discussed.  相似文献   
29.
The reaction of 5-arylidene-4-arylimino-2-thiazolidinones 4 with GRIGNARD reagents effected 1,4-addition to the exocyclic  CC bond with the formation of 5 . Alkylation of the arylidene derivatives 4 with diazomethane or methyl iodide results in the formation of the N-methyl derivatives 6 . Treatment of 6 with phenylmagnesium bromide effects addition of the reagent to the double bond of the lateral chain to yield products, proved to have structure 8 . The 5-arylazo derivatives 9 of 4-arylimino-2-thiazolidinones were obtained by coupling 4 with aromatic diazonium chlorides. Compounds 9 were N-methylated with diazomethane to yield 10 .  相似文献   
30.
Spent Ni–Cd batteries are now considered an important source for many valuable metals. The recovery of cadmium, cobalt, and nickel from spent Ni–Cd Batteries has been performed in this study. The optimum leaching process was achieved using 20% H2SO4, solid/liquid (S/L) 1/5 at 80 °C for 6 h. The leaching efficiency of Fe, Cd, and Co was nearly 100%, whereas the leaching efficiency of Ni was 95%. The recovery of the concerned elements was attained using successive different separation techniques. Cd(II) ions were extracted by a solvent, namely, Adogen® 464, and precipitated as CdS with 0.5% Na2S solution at pH of 1.25 and room temperature. The extraction process corresponded to pseudo-2nd-order. The prepared PTU-MS silica was applied for adsorption of Co(II) ions from aqueous solution, while the desorption process was performed using 0.3 M H2SO4. Cobalt was precipitated at pH 9.0 as Co(OH)2 using NH4OH. The kinetic and thermodynamic parameters were also investigated. Nickel was directly precipitated at pH 8.25 using a 10% NaOH solution at ambient temperature. FTIR, SEM, and EDX confirm the structure of the products.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号