首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2875篇
  免费   58篇
  国内免费   4篇
电工技术   67篇
综合类   8篇
化学工业   588篇
金属工艺   75篇
机械仪表   44篇
建筑科学   139篇
矿业工程   13篇
能源动力   36篇
轻工业   307篇
水利工程   11篇
石油天然气   7篇
无线电   216篇
一般工业技术   365篇
冶金工业   783篇
原子能技术   18篇
自动化技术   260篇
  2020年   27篇
  2019年   30篇
  2018年   29篇
  2016年   48篇
  2015年   40篇
  2014年   37篇
  2013年   134篇
  2012年   63篇
  2011年   94篇
  2010年   67篇
  2009年   80篇
  2008年   82篇
  2007年   85篇
  2006年   89篇
  2005年   84篇
  2004年   70篇
  2003年   71篇
  2002年   68篇
  2001年   42篇
  2000年   46篇
  1999年   56篇
  1998年   75篇
  1997年   74篇
  1996年   57篇
  1995年   43篇
  1994年   53篇
  1993年   59篇
  1992年   46篇
  1991年   41篇
  1990年   37篇
  1989年   51篇
  1988年   42篇
  1987年   32篇
  1986年   31篇
  1985年   44篇
  1984年   56篇
  1983年   53篇
  1982年   39篇
  1981年   38篇
  1980年   41篇
  1979年   35篇
  1978年   43篇
  1977年   41篇
  1976年   54篇
  1975年   35篇
  1974年   31篇
  1973年   27篇
  1972年   35篇
  1971年   30篇
  1966年   28篇
排序方式: 共有2937条查询结果,搜索用时 15 毫秒
61.
62.
63.
This work outlines a second order accurate, coupled, conservative new numerical scheme for solving a two dimensional incompressible turbulent flow filed. Mean vorticity, ω, and mean stream function, ψ, are used as the mean flow dependent variables. The turbulent kinetic energy k and the turbulent energy decay rate, ?, are used to define the turbulent state. In the present computational scheme two systems of equations and variables are considered: the mean flow system, ψ-ω, and the turbulent state system, k-?. Every system is solved implicity in a coupled double loop manner, and all the flow equations are solved iteratively in the global sense. Since the turbulence boundary conditions have a non-regular variation near a solid wall, they are coupled to the equations implicitly in both systems. In this way the numerical instabilities due to the irregular form of the equations near the solid walls are suppressed. The rate of convergence of the new numerical scheme of the coupled systems ψ-ω and k-? is twice that realized when solving these equations separately. The necessary conditions for convergence of the numerical equations are investigated as well as the rate of convergence features. The detailed stability conditions are derived. As an example, the axisymmetric mixing of two confined jets with an internal heat source is considered with this numerical scheme.  相似文献   
64.
Suppose a Turing machine is equipped with an extra tape. At each step of a computation being performed, it prints symbol read move symbol symbol printed on a square of the extra tape. It then moves the extra tape one square to the left. This procedure yields arecord of the computation.If is a finite alphabet, let be the set of triples (a, b, c) wherea ,c , andb {–1, 0, 1}. We will characterize those sequences of symbols of that are records of computations of Turing machines.This research was supported in part by AFOSR Grant GP-68-1402.  相似文献   
65.
An efficient procedure for solving the fully linearized form of the boundary-layer equations is described for turbulent flows. The procedure makes use of the so-called bordering algorithm and is applicable to problems in which the structure of the linearized system of equations deviates from the block triagonal matrix form which may be caused by boundary conditions.  相似文献   
66.
Many reverse engineering techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose on the system’s malloc and free functions, and track each chunk of memory thus allocated as a data structure. However, many performance-critical applications implement their own custom memory allocators. Examples include webservers, database management systems, and compilers like gcc and clang. As a result, current binary analysis techniques for tracking data structures fail on such binaries. We present MemBrush, a new tool to detect memory allocation and deallocation functions in stripped binaries with high accuracy. We evaluated the technique on a large number of real world applications that use custom memory allocators. We demonstrate that MemBrush can detect allocators/deallocators with a high accuracy which is 52 out of 59 for allocators, and 29 out of 31 for deallocators in SPECINT 2006. As we show, we can furnish existing reverse engineering tools with detailed information about the memory management API, and as a result perform an analysis of the actual application specific data structures designed by the programmer. Our system uses dynamic analysis and detects memory allocation and deallocation routines by searching for functions that comply with a set of generic characteristics of allocators and deallocators.  相似文献   
67.
Global asymptotic stabilization of underactuated surface vessels is generally achieved only by designing complicated controllers. This paper proposes a very simple control law that globally asymptotically stabilizes the position of underactuated surface vessel to a desired constant location and its velocities to zero. The proposed controller is independent of velocity signals and is robust to model parameters. It neither includes an observer nor an adaptive/sliding‐mode law. Controller development and stability analysis rely on a novel Lyapunov function and LaSalle's theorem. Furthermore, by extending the proposed control strategy, a saturated control law is also obtained ensuring the semiglobal asymptotic stability of position error system. Effectiveness of the proposed control schemes is demonstrated by simulation examples. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   
68.
Hardware accelerators such as GPUs or Intel Xeon Phi comprise hundreds or thousands of cores on a single chip and promise to deliver high performance. They are widely used to boost the performance of highly parallel applications. However, because of their diverging architectures programmers are facing diverging programming paradigms. Programmers also have to deal with low-level concepts of parallel programming that make it a cumbersome task. In order to assist programmers in developing parallel applications Algorithmic Skeletons have been proposed. They encapsulate well-defined, frequently recurring parallel programming patterns, thereby shielding programmers from low-level aspects of parallel programming. The main contribution of this paper is a comparison of two skeleton library implementations, one in C++ and one in Java, in terms of library design and programmability. Besides, on the basis of four benchmark applications we evaluate the performance of the presented implementations on two test systems, a GPU cluster and a Xeon Phi system. The two implementations achieve comparable performance with a slight advantage for the C++ implementation. Xeon Phi performance ranges between CPU and GPU performance.  相似文献   
69.
 Immunochemical methods are recommended for the quantitation of small amounts of gluten in food produced for those with coeliac disease. A major problem, however, is the reduced extractability of gliadin, the toxic factor of gluten, with aqueous alcohol, when foods have been heat-processed. A combined extraction/HPLC procedure was used to study the extractability of all gluten protein types from wheat flour and bread under both non-reducing and reducing conditions. Gliadin isolated from wheat flour was used as a reference protein for quantitation. The results indicate that the extractability of gliadin from bread with 60% ethanol under non-reducing conditions is strongly reduced. α- and γ-gliadins are much more affected than ω-gliadins, and less gliadin was extracted from the crust than from the crumb. For a complete extraction of gliadins from bread, reducing conditions and increased temperature are required. However, glutenin subunits are coextracted with the gliadins. This extract can be used for the quantitation of total gluten proteins by RP-HPLC. The recovery of gliadin added to flour before dough-mixing and bread-making is 98%. Received: 16 February 1998  相似文献   
70.
To provide the first nationwide reconnaissance of the occurrence of pharmaceuticals, hormones, and other organic wastewater contaminants (OWCs) in water resources, the U.S. Geological Survey used five newly developed analytical methods to measure concentrations of 95 OWCs in water samples from a network of 139 streams across 30 states during 1999 and 2000. The selection of sampling sites was biased toward streams susceptible to contamination (i.e. downstream of intense urbanization and livestock production). OWCs were prevalent during this study, being found in 80% of the streams sampled. The compounds detected represent a wide range of residential, industrial, and agricultural origins and uses with 82 of the 95 OWCs being found during this study. The most frequently detected compounds were coprostanol (fecal steroid), cholesterol (plant and animal steroid), N,N-diethyltoluamide (insect repellant), caffeine (stimulant), triclosan (antimicrobial disinfectant), tri(2-chloroethyl)phosphate (fire retardant), and 4-nonylphenol (nonionic detergent metabolite). Measured concentrations for this study were generally low and rarely exceeded drinking-water guidelines, drinking-water health advisories, or aquatic-life criteria. Many compounds, however, do not have such guidelines established. The detection of multiple OWCs was common for this study, with a median of seven and as many as 38 OWCs being found in a given water sample. Little is known about the potential interactive effects (such as synergistic or antagonistic toxicity) that may occur from complex mixtures of OWCs in the environment. In addition, results of this study demonstrate the importance of obtaining data on metabolites to fully understand not only the fate and transport of OWCs in the hydrologic system but also their ultimate overall effect on human health and the environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号