首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9083篇
  免费   319篇
  国内免费   39篇
电工技术   122篇
综合类   22篇
化学工业   2139篇
金属工艺   167篇
机械仪表   232篇
建筑科学   574篇
矿业工程   31篇
能源动力   172篇
轻工业   778篇
水利工程   54篇
石油天然气   11篇
武器工业   1篇
无线电   600篇
一般工业技术   1447篇
冶金工业   1542篇
原子能技术   70篇
自动化技术   1479篇
  2023年   58篇
  2022年   120篇
  2021年   144篇
  2020年   105篇
  2019年   120篇
  2018年   170篇
  2017年   110篇
  2016年   192篇
  2015年   192篇
  2014年   250篇
  2013年   572篇
  2012年   397篇
  2011年   545篇
  2010年   410篇
  2009年   389篇
  2008年   434篇
  2007年   424篇
  2006年   364篇
  2005年   313篇
  2004年   291篇
  2003年   221篇
  2002年   227篇
  2001年   177篇
  2000年   165篇
  1999年   160篇
  1998年   268篇
  1997年   198篇
  1996年   160篇
  1995年   142篇
  1994年   124篇
  1993年   139篇
  1992年   132篇
  1991年   80篇
  1990年   94篇
  1989年   80篇
  1988年   94篇
  1987年   69篇
  1986年   57篇
  1985年   82篇
  1984年   94篇
  1983年   62篇
  1982年   68篇
  1981年   84篇
  1980年   69篇
  1979年   89篇
  1978年   69篇
  1977年   68篇
  1976年   56篇
  1975年   61篇
  1973年   48篇
排序方式: 共有9441条查询结果,搜索用时 15 毫秒
101.
Frank.C. 《微型计算机》2009,(12):140-143
“好小啊!”几乎所有人第一次看到NVIDIA离子平台的时候,都会发出这样的惊呼,然后人们会有三种反应,要反围观之后走开,要么打听哪里可以买到,而我们发烧级DLYer则会想:它为什么这么小,我们能自己搭建一台出来吗?为了实现打造超迷你平台客厅电脑的愿望,  相似文献   
102.
看着扫描仪的规格说明书,2400dpi×4800dpi的光学分辩率、19200dpi×19200dpi的插值分辩率并列写在上面;准备扫描资料,结果发现可以选择的分辨率从75dpi到2400dpi,项目似乎更多了。这些分辨率究竟是怎么回事呢?  相似文献   
103.
根据本刊2007年的年度调查结果显示,有高达70%的读者是有固定收入的上班族,其中信息传播、计算机服务和软件行业的读者比例达到18.47%、教育行业的读者有14.63%、制造业的读者达10.96%,国家机构和金融业的读者也有10%左右。他们一直希望在本刊看到更多关于商务产品、技术和解决方案的内容报道。而对于大多数企业来说,如何能用经济的成本买到最适合需要的办公设备也一直是个难题。  相似文献   
104.
A fast heuristic for quay crane scheduling with interference constraints   总被引:5,自引:0,他引:5  
This paper considers the problem of scheduling quay cranes which are used at sea port container terminals to load and unload containers. This problem is studied intensively in a recent stream of research but still lacks a correct treatment of crane interference constraints. We present a revised optimization model for the scheduling of quay cranes and propose a heuristic solution procedure. At its core a Branch-and-Bound algorithm is applied for searching a subset of above average quality schedules. The heuristic takes advantage from efficient criteria for branching and bounding the search with respect to the impact of crane interference. Although the used techniques are quite standard, the new heuristic produces much better solutions in considerably shorter run times than all algorithms known from the literature.  相似文献   
105.
Among the many 3D face matching techniques that have been developed, are variants of 3D facial curve matching, which reduce the amount of face data to one or a few 3D curves. The face’s central profile, for instance, proved to work well. However, the selection of the optimal set of 3D curves and the best way to match them has not been researched systematically. We propose a 3D face matching framework that allows profile and contour based face matching. Using this framework we evaluate profile and contour types including those described in the literature, and select subsets of facial curves for effective and efficient face matching. With a set of eight geodesic contours we achieve a mean average precision (MAP) of 0.70 and 92.5% recognition rate (RR) on the 3D face retrieval track of the Shape Retrieval Contest (SHREC’08), and a MAP of 0.96 and 97.6% RR on the University of Notre Dame (UND) test set. Face matching with these curves is time-efficient and performs better than other sets of facial curves and depth map comparison.  相似文献   
106.
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library.  相似文献   
107.
Multiple sclerosis is characterized by inflammatory demyelination and axonal loss as pathophysiological correlates of relapsing activity and progressive development of clinical disability. The molecular processes involved in this pathogenesis are still unclear as they are quite complex and heterogeneous. In this article we present protein expression analysis of brain and spinal cord tissues from different models of murine experimental autoimmune encephalomyelitis (EAE), the most commonly used animal model for multiple sclerosis. We observed a number of EAE-specific protein expression and PTM differences. Proteome analysis was extended to multiple sclerosis specimens in order to validate the EAE findings. Our findings suggest the regulation of a number of proteins that shed light on the molecular mechanisms of the disease processes taking place in EAE and multiple sclerosis. We found consistent modulation of proteins including serum amyloid P component, sirtuin 2, dihydropyrimidinase-related protein family proteins, stathmin 1, creatine kinase B and chloride intracellular channel protein 1. Functional classification of the proteins by database and the literature mining reveals their association with neuronal development and myelinogenesis, suggesting possible disease processes that mediate neurodegeneration.  相似文献   
108.
We examined the high precision deposition of toner and polymer microparticles with a typical size of approximately 10 microm on electrode arrays with electrodes of 100 microm and below using custom-made microelectronic chips. Selective desorption of redundant particles was employed to obtain a given particle pattern from preadsorbed particle layers. Microparticle desorption was regulated by dielectrophoretic attracting forces generated by individual pixel electrodes, tangential detaching forces of an air flow, and adhesion forces on the microchip surface. A theoretical consideration of the acting forces showed that without pixel voltage, the tangential force applied for particle detachment exceeded the particle adhesion force. When the pixel voltage was switched on, however, the sum of attracting forces was larger than the tangential detaching force, which was crucial for desorption efficiency. In our experiments, appropriately large dielectrophoretic forces were achieved by applying high voltages of up to 100 V on the pixel electrodes. In addition, electrode geometries on the chip's surface as well as particle size influenced the desorption quality. We further demonstrated the compatibility of this procedure to complementary metal oxide semiconductor chip technology, which should allow for an easy technical implementation with respect to high-resolution microparticle deposition.  相似文献   
109.
110.
Plane strain fracture by hole growth in ordinary-sized parts of low-to-medium strength steels is essentially rigid-plastic, and may be approximated as non-hardening. Quasi-steady crack growth for such materials is predicted for crack-tip fields approximated by a pair of slip lines, such as unequally grooved specimens in tension and deep singly-face-cracked specimens under combined bending and tension. The crack growth increment a is given in terms of material parameters, far-field geometry, and loadings and their increments.For the rigid-plastic, non-hardening approximation, stress and strain increment fields for growing cracks are identical to those for stationary cracks. For fields with a pair of symmetric slip-lines, the flanks of the decohering zone turn out to be rigid, and the decohering zone does not affect the crack-tip opening angle (CTOA), which then depends only on the micromechanisms of hole nucleation, growth and linkage by flow localization or fine cracking. These mechanisms are in turn approximately controlled by the near-field plasticity parameters: the angle of the slip plane s, and the normal stress and displacement increment across the slip plane s and us. Note the three-parameter characterization of the near-tip fields, in contrast to the one- or two-parameter characterization in elastic or nonlinear elastic fracture mechanics.A sliding off and shear-cracking model for a growing crack, based on a hole growth equation, gives an approximate CTOA in terms of s, s, and material parameters. When hole nucleation strain is negligible, the estimated CTOA exhibits an inverse exponential dependence on s and a higher order parabolic dependence on s. For a given material, a series of fully plastic crack growth experiments is suggested to determine the approximate material parameters needed to characterize the dependence of CTOA on s and s, or from kinematics, of the shear strain behind the slip plane, f, on s.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号