首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2820篇
  免费   232篇
  国内免费   10篇
电工技术   44篇
综合类   13篇
化学工业   806篇
金属工艺   129篇
机械仪表   107篇
建筑科学   71篇
矿业工程   3篇
能源动力   98篇
轻工业   218篇
水利工程   11篇
石油天然气   7篇
无线电   478篇
一般工业技术   572篇
冶金工业   125篇
原子能技术   31篇
自动化技术   349篇
  2024年   4篇
  2023年   47篇
  2022年   86篇
  2021年   139篇
  2020年   98篇
  2019年   120篇
  2018年   118篇
  2017年   130篇
  2016年   184篇
  2015年   94篇
  2014年   117篇
  2013年   184篇
  2012年   217篇
  2011年   223篇
  2010年   154篇
  2009年   147篇
  2008年   128篇
  2007年   108篇
  2006年   97篇
  2005年   76篇
  2004年   49篇
  2003年   58篇
  2002年   58篇
  2001年   39篇
  2000年   47篇
  1999年   24篇
  1998年   53篇
  1997年   27篇
  1996年   39篇
  1995年   25篇
  1994年   9篇
  1993年   10篇
  1992年   11篇
  1991年   11篇
  1990年   12篇
  1989年   16篇
  1988年   8篇
  1987年   10篇
  1986年   7篇
  1985年   6篇
  1984年   6篇
  1983年   11篇
  1982年   10篇
  1981年   9篇
  1980年   5篇
  1979年   7篇
  1977年   5篇
  1976年   4篇
  1973年   3篇
  1972年   3篇
排序方式: 共有3062条查询结果,搜索用时 15 毫秒
41.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results.  相似文献   
42.
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy with relatively small computational complexity compared with other conventional detection methods.  相似文献   
43.
WLAN (Wireless Local Area Network) has been seen to be one of the promising access technologies that adapts to 4G cellular network systems in providing very high speed connection with QoS guarantee through the polling function. However, when the handover happens, the contention-based medium access mechanism which is mainly used in WLAN is invoked and introduces unbounded transmission delay due to idle time periods and retransmission because of collision during the handover. If this technique is expanded to use in a microcellular network such as connected WLAN micro-cells, contention-based mechanism, therefore, should not be used to handle the MT’s handover, especially for vehicular users who change access point every few seconds. To overcome these difficulties in handover, we introduce parallel polling scheme in dynamic LMC (Logical Macro Cell) which can reduce delays much and remove packet loss rate. LMC is a virtual single macro cell which is built on a multicast group of adjacent micro-cells. In the same LMC, polling signals are sent from every BS (base station) to give MT (mobile terminal) permission to access one of these BSs. Instead of wasting much time to contend for resources of a new BS during handover, the MT answers the polling as an acknowledgment to connect to that new BS. The polling response is controlled to multicast to all BSs of the same LMC via the core network to synchronize for the next polling cycle. LMC is controlled to dynamically change when the MT comes in a new BS to make polling signals be continuous in a new LMC. Through analytical and simulation results, we show that the parallel polling scheme can achieve no handover latency, no packet loss and maintain mobile users’ throughput stably in the high traffic load condition though it causes overhead on the neighboring cells in both of wired and wireless sections. At speeds of up to70 m/s, the MT can still maintain its stable connection. OMNeT++ simulator with INET project is used to evaluate our proposal.  相似文献   
44.
Arterial bypass grafts tend to fail after some years due to the development of intimal thickening (restenosis). Non-uniform hemodynamics following a bypass operation contributes to restenosis and bypass failure can occur due to the focal development of anastomotic intimal hyperplasia. Additionally, surgical injury aggravated by compliance mismatch between the graft and artery has been suggested as an initiating factor for progress of wall thickening along the suture line Vascular grafts that are small in diameter tend to occlude rapidly. Computational fluid dynamics (CFD) methods have been effectively used to simulate the physical and geometrical parameters characterizing the hemodynamics of various arteries and bypass configurations. The effects of such changes on the pressure and flow characteristics as well as the wall shear stress during a cardiac cycle can be simulated. Recently, utilization of fluid and structure interactions have been used to determine fluid flow parameters and structure forces including stress and strains relationships under steady and transient conditions. In parallel to this, experimental diagnostics techniques such as Laser Doppler Anemometry, Particle Image Velocimetry, Doppler Guide wire and Magnetic Resonance Imaging have been used to provide essential information and to validate the numerical results. Moreover, clinical imaging techniques such as magnetic resonance or computed tomography have assisted considerably in gaining a detailed patient-specific picture of the blood flow and structure dynamics. This paper gives a review of recent numerical investigations of various configurations of coronary artery bypass grafts (CABG). In addition, the paper ends with a summary of the findings and the future directions.  相似文献   
45.
The characteristics of the prevention of electrolytic corrosion during micro electrical discharge machining (EDM) using deionized water and high frequency bipolar pulse were investigated. Electrolytic corrosion during micro EDM using deionized water was analyzed using an equivalent electrical circuit based on the electrical double layer theory. Based on the analysis and experimental verification, a narrow positive pulse duration should be provided to the workpiece to prevent corrosion. A negative voltage with zero average applied voltage (Vavg, app) is also essential for this purpose. If Vavg, app is positive or negative, electrolytic corrosion occurs on the workpiece or tool, respectively. Micro holes and 3D structures without corrosion were successfully fabricated using a high frequency bipolar pulse with a pulse duration of 0.2?μs and a period of 1?μs, as well as Vavg, app?=?0?V.  相似文献   
46.
47.
1.  The long-term strength of polygonized aluminum at 100°C depends on the subgrain size and on the dislocation density within the subgrains, while that of the recrystallized metal depends on the grain size: The long-term strength of aluminum increases (at least for lives up to 1000h) with reduction in the grain or subgrain size and with increase in the density of internal dislocations.
2.  The rate of loss of strength (the tangent of the angle of slope of the long-term strength curves) decreases with increase in the grain or subgrain size of aluminum; this leads to the convergence of the long-term strength curves of metal with different subgrains (or grains) at long lives.
3.  An analogy has been found between the behavior of polygonized and recrystallized in long-term strength tests at relatively short times to failure and that in short-term tensile tests.
  相似文献   
48.
Using predeveloped software, a digital safety system is designed that meets the quality standards of a safety system. To demonstrate the quality, the design process and operating history of the product are reviewed along with configuration management practices. The application software of the safety system is developed in accordance with the planned life cycle. Testing, which is a major phase that takes a significant time in the overall life cycle, can be optimized if the testability of the software can be evaluated. The proposed testability measure of the software is based on the entropy of the importance of basic statements and the failure probability from a software fault tree. To calculate testability, a fault tree is used in the analysis of a source code. With a quantitative measure of testability, testing can be optimized. The proposed testability can also be used to demonstrate whether the test cases based on uniform partitions, such as branch coverage criteria, result in homogeneous partitions that is known to be more effective than random testing. In this paper, the testability measure is calculated for the modules of a nuclear power plant's safety software. The module testing with branch coverage criteria required fewer test cases if the module has higher testability. The result shows that the testability measure can be used to evaluate whether partitions have homogeneous characteristics.  相似文献   
49.
This paper describes the development of an equivalent circuit model of on-wafer interconnects for high-speed CMOS integrated circuits. By strategically cascading two-pi blocks together, the lumped model can characterize the distributed effects. Besides, the elaborately proposed model characterizes the frequency-variant characteristics with frequency-independent components. Thus, the model can be easily plugged into commercial computer-aided design tools. By adopting a newly invented optimization algorithm, namely, particle swarm optimization (PSO), the model parameters are extracted and formulated as empirical expressions. Therein, with each set of the geometrical parameters, the interconnect behaviors can be accurately predicted. The accuracy of the model is validated by comparisons with the on-wafer measurements up to 30 GHz. Moreover, the scalability of the proposed model is also discussed  相似文献   
50.
We present a new approach to the modelling of time constrained systems. It is based on untimed high-level Petri nets using the concept of causal time. With this concept, the progression of time is modelled in the system by the occurrence of a distinguished event, tick, which serves as a reference to the rest of the system. In order to validate this approach as suitable for automated verification, a case study is provided and the results obtained using a model-checker on high-level Petri nets are compared with those obtained for timed automata using prominent tools. The comparison is encouraging and shows that the causal time approach is intuitive and modular. It also potentially allows for efficient verification.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号