首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2074篇
  免费   80篇
  国内免费   6篇
电工技术   18篇
综合类   2篇
化学工业   685篇
金属工艺   70篇
机械仪表   28篇
建筑科学   52篇
能源动力   129篇
轻工业   127篇
水利工程   13篇
石油天然气   9篇
无线电   157篇
一般工业技术   442篇
冶金工业   151篇
原子能技术   30篇
自动化技术   247篇
  2024年   6篇
  2023年   23篇
  2022年   44篇
  2021年   69篇
  2020年   55篇
  2019年   51篇
  2018年   87篇
  2017年   66篇
  2016年   88篇
  2015年   33篇
  2014年   63篇
  2013年   147篇
  2012年   109篇
  2011年   142篇
  2010年   88篇
  2009年   88篇
  2008年   101篇
  2007年   81篇
  2006年   81篇
  2005年   66篇
  2004年   49篇
  2003年   32篇
  2002年   44篇
  2001年   21篇
  2000年   26篇
  1999年   27篇
  1998年   29篇
  1997年   24篇
  1996年   21篇
  1995年   32篇
  1994年   20篇
  1993年   31篇
  1992年   30篇
  1991年   20篇
  1990年   28篇
  1989年   18篇
  1988年   18篇
  1987年   26篇
  1986年   18篇
  1985年   21篇
  1984年   16篇
  1983年   25篇
  1982年   21篇
  1981年   21篇
  1980年   12篇
  1979年   12篇
  1978年   6篇
  1977年   5篇
  1976年   6篇
  1970年   3篇
排序方式: 共有2160条查询结果,搜索用时 328 毫秒
51.
Chlorinated ground rubber tire (Cl‐GRT) particles were used as filler in a plasticized polyvinylchloride (PVC) to develop a melt‐processable rubber composition. Physical properties of the Cl‐GRT‐filled PVC compound showed improvement compared to the nonchlorinated counterpart. Interaction between Cl‐GRT and PVC was examined on the basis of results of stress relaxation, dynamic mechanical thermal analysis, and solvent swelling studies. The Cl‐GRT could be loaded upto 40 parts per hundred parts of PVC, and the composition still retains the elastomeric characteristics. The Cl‐GRT‐filled composite was found to be reprocessable like the unfilled PVC compound. © 2002 Wiley Periodicals, Inc. J Appl Polym Sci 84: 622–631, 2002; DOI 10.1002/app.10352  相似文献   
52.
A technique that is sensitive to change in texture is more reliable than mechanical property measurements for the study of recrystallization behavior in alloys where recrystallization is coupled with precipitation. Hence, ultrasonic velocity measurements have been employed to characterize microstructural changes during annealing of cold worked Ti-modified austenitic stainless steel where precipitation of TiC is known to retard recrystallization. Mechanical property measurements, such as strength and hardness, could not distinguish the recovery and recrystallization regimes, and it was difficult to determine the exact time or temperature for onset of recrystallization. The variation of velocity with annealing time or annealing temperature exhibited a three-stage behavior. The velocity exhibited a slight increase in the recovery region followed by a sharp and continuous decrease in the recrystallization region and reached saturation on completion of recrystallization. Based on the microstructural investigations, the three stages were identified to be recovery, progress of recrystallization, and completion of recrystallization. Velocity measurements could sense the onset, progress, and completion of recrystallization more accurately compared with that of hardness and strength measurements.  相似文献   
53.
54.
Recent research suggests that social interactions in video games may lead to the development of community bonding and prosocial attitudes. Building on this line of research, a national survey of U.S. adults finds that gamers who develop ties with a community of fellow gamers possess gaming social capital, a new gaming‐related community construct that is shown to be a positive antecedent in predicting both face‐to‐face social capital and civic participation.  相似文献   
55.
P2P Botnets are one of the most malevolent threats to the Internet users due to their resiliency against takedown efforts. In this paper, we propose a bot detection system that is capable of detecting stealthy bots in a network. This system treats network traffic as a data stream, segregating the traffic into two parallel streams. The detection is based on failure traffic and communication traffic. The traffic is analyzed during small time window, and the infected hosts are reported immediately. The network administrator can monitor the status of hosts in the network and can take the necessary action before the infected hosts harm the system or can involve in the attacks. Experiments and evaluation of the proposed system on a variety of P2P data transfer applications and P2P botnets have demonstrated high accuracy of detection. The scalability of the proposed system is exhibited through its implementation on Hadoop MapReduce.  相似文献   
56.
57.
58.
In mobile commerce, companies provide location based services to mobile users, who report their locations with a certain level of granularity to maintain a degree of anonymity. This level of granularity depends on their perceived risk as well as the incentives they receive in the form of monetary benefits or improved mobile services. This paper formulates a quantitative model in which information theoretic metrics such as entropy, quantify the anonymity level of mobile users. The individual perceived risks of users and the benefits they obtain are defined as functions of their chosen location information granularity. The interaction between the mobile commerce company and its users is investigated using mechanism design techniques as a privacy game. The user best responses and optimal strategies for the company are derived under budgetary constraints on incentives, which are provided to users in order to convince them to share their private information at the desired level of granularity. Information limitations in the system are analyzed to capture more realistic scenarios where the companies do not have access to user utility functions. Iterative distributed algorithm and regression learning methods are investigated to design mechanisms that overcome these limitations. The results obtained are demonstrated with a numerical example and simulations based on real GPS data.  相似文献   
59.
The pre-processing stage of finite element analysis of the Navier–Stokes equations is becoming increasingly important as the desire for more general boundary conditions, as well as applications to parallel computers increases. The set up of general boundary conditions and communication structures for parallel computations should be accomplished during the pre-processing phase of the analysis, if possible, to ensure efficient computations for large scale problems in computational fluid dynamics. This paper introduces a general methodology for geometry based boundary condition application and pre-computing of parallel communication tasks. A. K. Karanam was supported by NSF Grant No. 9985340. C. H. Whiting was supported by a grant from NASA LaRC.  相似文献   
60.
The proliferation of accelerometers on consumer electronics has brought an opportunity for interaction based on gestures. We present uWave, an efficient recognition algorithm for such interaction using a single three-axis accelerometer. uWave requires a single training sample for each gesture pattern and allows users to employ personalized gestures. We evaluate uWave using a large gesture library with over 4000 samples for eight gesture patterns collected from eight users over one month. uWave achieves 98.6% accuracy, competitive with statistical methods that require significantly more training samples. We also present applications of uWave in gesture-based user authentication and interaction with 3D mobile user interfaces. In particular, we report a series of user studies that evaluates the feasibility and usability of lightweight user authentication. Our evaluation shows both the strength and limitations of gesture-based user authentication.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号