首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1843篇
  免费   75篇
  国内免费   4篇
电工技术   21篇
综合类   1篇
化学工业   409篇
金属工艺   53篇
机械仪表   47篇
建筑科学   55篇
矿业工程   15篇
能源动力   49篇
轻工业   84篇
水利工程   17篇
石油天然气   34篇
无线电   129篇
一般工业技术   508篇
冶金工业   175篇
原子能技术   73篇
自动化技术   252篇
  2023年   17篇
  2022年   37篇
  2021年   63篇
  2020年   40篇
  2019年   43篇
  2018年   48篇
  2017年   68篇
  2016年   60篇
  2015年   61篇
  2014年   75篇
  2013年   131篇
  2012年   101篇
  2011年   125篇
  2010年   77篇
  2009年   72篇
  2008年   104篇
  2007年   103篇
  2006年   74篇
  2005年   62篇
  2004年   47篇
  2003年   61篇
  2002年   52篇
  2001年   28篇
  2000年   27篇
  1999年   18篇
  1998年   22篇
  1997年   24篇
  1996年   18篇
  1995年   13篇
  1994年   22篇
  1993年   18篇
  1992年   12篇
  1991年   11篇
  1990年   12篇
  1989年   17篇
  1987年   10篇
  1986年   7篇
  1984年   9篇
  1983年   9篇
  1982年   9篇
  1981年   7篇
  1980年   7篇
  1979年   13篇
  1978年   6篇
  1977年   9篇
  1976年   7篇
  1975年   7篇
  1973年   7篇
  1971年   10篇
  1970年   6篇
排序方式: 共有1922条查询结果,搜索用时 46 毫秒
41.
A variational method of generating a structured mesh on a two-dimensional domain is considered. To this end, a quasiconformal mapping of the parametric domain with a given Cartesian mesh onto the underlying physical domain is used. The functions implementing the mapping are sought by solving the Dirichlet problem for the system of elliptic second-order partial differential equations. An additional control for the cell shape is executed by introducing a local mapping which induces a control metric. In some particular cases, instead of an additional local mapping, a global mapping of the parametric domain onto the intermediate domain is used, where the curvilinear mesh is produced, and next this domain is mapped onto the underlying physical domain. The control metric allows to obtain a mesh with required properties: grid line orthogonality and prescribed mesh point clustering near the domain boundary. Examples of mesh in the annulus and near airfoil are presented.  相似文献   
42.
X-ray powder diffraction, scanning electron microscopy, and x-ray microanalysis data indicate that Ba, Ca, Sr, Cd, and Pb titanates contain defect structures associated with crystallographic shear. Spatially periodic shear gives rise to modulated displacements of the Ti and O atoms across the shear plane, resulting in long-period structures. The parameters of such structures depend on the nature of the sample (single crystal, ceramic, or powder), its microstructure, and the crystal chemistry of the titanate.__________Translated from Neorganicheskie Materialy, Vol. 41, No. 5, 2005, pp. 573–584.Original Russian Text Copyright © 2005 by Reznichenko, Shilkina, S. Titov, Razumovskaya, V. Titov, Shevtsov.  相似文献   
43.
The linear partially observed discrete-continuous (hybrid) stochastic controllable system described by differential equations with measures is considered. The optimal filtering equations in the form of generalized Kalman filter are obtained in the case of non-anticipating control. This result could be a theoretical basis for the optimal control in stochastic hybrid systems with incomplete information.  相似文献   
44.
A substantial portion of the database programming efforts are invested in integrity constraints enforcement. Traditionally, both the constraint semantics and their enforcement were embedded inside application programs. In recent years several studies have dealt with specifying integrity constraints as separate entities (e.g. rules), and relating the database consistency requirements to these rules. In this paper we deal with the complementary issue of stabilizing the database when update exceptions occur. While a simplistic approach is to abort any transaction that inflicts consistency violations, this is not always the desired action. We take advantage of the empirical observation that most of the exception-handling policies follow a small number of behavior patterns. Unlike some previous approaches that base their repair solution on syntactic analysis of the constraints and performance issues, we base our approach on the application semantics as reflected in these behavioral patterns. We describe a model that uses high-level abstractions called stabilizer types denoting these behavior patterns for consistency restorations, whose exact semantics is case dependent. It follows the fault tolerance's self-stabilization approach. An inference mechanism translates these abstractions into executable active rules. This approach provides high-level language to the exception handling portion of the application and substantially reduces the required programming.  相似文献   
45.
Ellipsoidal outer-bounding of the set of all feasible state vectors under model uncertainty is a natural extension of state estimation for deterministic models with unknown-but-bounded state perturbations and measurement noise. The technique described in this paper applies to linear discrete-time dynamic systems; it can also be applied to weakly non-linear systems if non-linearity is replaced by uncertainty. Many difficulties arise because of the non-convexity of feasible sets. Combined quadratic constraints on model uncertainty and additive disturbances are considered in order to simplify the analysis. Analytical optimal or suboptimal solutions of the basic problems involved in parameter or state estimation are presented, which are counterparts in this context of uncertain models to classical approximations of the sum and intersection of ellipsoids. The results obtained for combined quadratic constraints are extended to other types of model uncertainty.  相似文献   
46.
In large‐scale fires, the input of energy to burning materials occurs predominantly by radiative transfer. The in‐depth (rather than just surface) absorption of radiant energy by a polymer influences its ignition time and burning rate. The present investigation examines two methods for obtaining the absorption coefficient of polymers for infrared radiation from high‐temperature sources: a broadband method and a spectral method. Data on the total average broadband transmittance for 11 thermoplastics are presented (as are reflectance data), and the absorption coefficient is found to vary with thickness. Implications for modeling of mass loss experiments are discussed. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
47.
48.
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. ?kori? and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.  相似文献   
49.
Kolmogorov complexity furnishes many useful tools for studying different natural processes that can be expressed using sequences of symbols from a finite alphabet (texts), such as genetic texts, literary and music texts, animal communications, etc. Although Kolmogorov complexity is not algorithmically computable, in a certain sense it can be estimated by means of data compressors. Here we suggest a method of analysis of sequences based on ideas of Kolmogorov complexity and mathematical statistics, and apply this method to biological (ethological) ??texts.?? A distinction of the suggested method from other approaches to the analysis of sequential data by means of Kolmogorov complexity is that it belongs to the framework of mathematical statistics, more specifically, that of hypothesis testing. This makes it a promising candidate for being included in the toolbox of standard biological methods of analysis of different natural texts, from DNA sequences to animal behavioural patterns (ethological ??texts??). Two examples of analysis of ethological texts are considered in this paper. Theses examples show that the proposed method is a useful tool for distinguishing between stereotyped and flexible behaviours, which is important for behavioural and evolutionary studies.  相似文献   
50.
Abstract

Both [60]- and [70]fullerene react with either the Scherer radical (perfluorodiisopropylethylmethyl, C9F19), a mixture of branched perfluorononenes (C9F18, the product of hexafluoropropene trimerization), or β-fluorosulphatotetrafluoroethyldiheptafluoroisopropylmethyl radical (C9F18OSO2F) in the ionization chamber of a mass spectrometer to give the positive parent ions of trifluoromethylation products, the reaction being accompanied by hydrogen addition. The reaction occurs at least partly on the walls of the ionization chamber, by a radical mechanism employing CF3 radicals formed from the radical reactants both thermally and under electron impact; only the latter route occurs with the perfluorononenes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号