首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2620篇
  免费   151篇
  国内免费   12篇
电工技术   28篇
化学工业   772篇
金属工艺   56篇
机械仪表   81篇
建筑科学   91篇
矿业工程   21篇
能源动力   85篇
轻工业   194篇
水利工程   18篇
石油天然气   8篇
武器工业   1篇
无线电   226篇
一般工业技术   522篇
冶金工业   158篇
原子能技术   33篇
自动化技术   489篇
  2023年   26篇
  2022年   88篇
  2021年   116篇
  2020年   86篇
  2019年   65篇
  2018年   97篇
  2017年   100篇
  2016年   98篇
  2015年   92篇
  2014年   128篇
  2013年   207篇
  2012年   155篇
  2011年   180篇
  2010年   134篇
  2009年   124篇
  2008年   134篇
  2007年   102篇
  2006年   89篇
  2005年   83篇
  2004年   59篇
  2003年   56篇
  2002年   48篇
  2001年   31篇
  2000年   27篇
  1999年   29篇
  1998年   39篇
  1997年   23篇
  1996年   18篇
  1995年   25篇
  1994年   24篇
  1993年   22篇
  1992年   16篇
  1991年   16篇
  1990年   11篇
  1989年   13篇
  1988年   11篇
  1987年   24篇
  1986年   15篇
  1985年   15篇
  1984年   13篇
  1983年   9篇
  1982年   16篇
  1981年   9篇
  1980年   8篇
  1979年   11篇
  1976年   7篇
  1975年   9篇
  1974年   7篇
  1973年   13篇
  1972年   8篇
排序方式: 共有2783条查询结果,搜索用时 609 毫秒
41.
The flow structure of a continuous‐flow reactor stirred by a Rushton turbine was investigated by laser Doppler velocimetry for two different mean residence time‐mixing time ratios. Velocity measurements were obtained for two inlet locations, corresponding to the incoming liquid stream being fed co‐currently or counter‐currently to the flow discharged by the turbine. In all investigated configurations and for all operating conditions, it was found that the flow disruption caused by the incoming liquid stream was observable mainly in the first vessel quarter, which followed the feed‐tube plane. From comparison of the velocities encountered in the various planes in the continuous‐flow reactor to the velocities of the batch reactor, it was also concluded that it may be possible to intensify the usage of the turbine‐stirred vessel by decreasing the characteristic times ratio, without considerable flow by‐pass and/or short‐circuiting problems.  相似文献   
42.
The diffusion of nonspherical particles has not been well understood due to the complexity of their contact mechanics and self-organization of their orientations. We perform discrete element method simulations of monodisperse ellipsoids in a shear flow with Lees-Edwards boundary conditions to quantify the relation between the diffusion coefficient and the flow parameters. The results indicate that the particle aspect ratio strongly affects the diffusion coefficient by influencing the particle orientation and alignment. We develop a scaling law for the diffusion coefficient perpendicular to the flow direction, Dyy, which combines the influences of the shear rate , the solids fraction f, the effective particle diameter deff and the particle aspect ratio Z. We show that , where kd is a dimensionless pre-factor, and a fit is obtained for the functional form of χ(f, Z). This scaling law will be useful in developing continuum transport models for applications.  相似文献   
43.
Fast, simple, accurate, and inexpensive methods for obtaining analyte concentration data are desirable in the industrial sector. In the present study, the use of Fourier transform mid‐infrared (FT‐MIR) spectroscopy, combined with partial least squares (PLS) regression, was investigated as a tool for real‐time monitoring of processes of ethanol absorption in glycols. Calibration was performed using simple synthetic samples containing ethanol, water, and monoethylene glycol (MEG) or diethylene glycol (DEG). The PLS models presented excellent performance, with correlation coefficients (R2) close to unity and root‐mean‐square errors of cross‐validation (RMSECV) and prediction (RMSEP) lower than 2% of the calibration data ranges for both analytes (ethanol and water) in both absorbents (MEG and DEG). The monitoring technique developed has potential to be applied in absorption processes and could also be used in other large‐scale unit operations, providing information in real time and enhancing process control.  相似文献   
44.
This work investigates applicability of magnetic hysteresis method for non-destructive testing of plastically deformed low-carbon steel. Recently introduced Magnetic Adaptive Testing procedure was used for evaluation of hysteresis minor loop data-sets to find the most sensitive parameter/s for indication of the material degradation stage. Inductive measurements were carried out on two identically degraded series of samples: magnetically closed window-shaped specimens, equipped with the magnetizing and the induction coils, and magnetically open strips, measured by an attached magnetizing yoke. The aim was to compare the results between these sample series in order to determine applicability and limitations of the single-yoke measurement technique. As a result, new magnetic parameters with the best sensitivity–stability ratio in a wide deformation range were introduced and proposed for utilization. Good qualitative coincidence between the measurement results on the closed and the open sample series was obtained in all range of magnetization. Several quantitative distinctions were explained and analyzed in order to improve the single-yoke technique.  相似文献   
45.
As telecommunication networks grow in size and complexity, monitoring systems need to scale up accordingly. Alarm data generated in a large network are often highly correlated. These correlations can be explored to simplify the process of network fault management, by reducing the number of alarms presented to the network-monitoring operator. This makes it easier to react to network failures. But in some scenarios, it is highly desired to prevent the occurrence of these failures by predicting the occurrence of alarms before hand. This work investigates the usage of data mining methods to generate knowledge from historical alarm data, and using such knowledge to train a machine learning system, in order to predict the occurrence of the most relevant alarms in the network. The learning system was designed to be retrained periodically in order to keep an updated knowledge base.  相似文献   
46.
MV-algebras as well as orthomodular lattices can be seen as a particular case of so-called “basic algebras” which are an alter ego of bounded lattices whose sections are equipped with fixed antitone involutions. The class of basic algebras is an ideal variety. In the paper, we give an internal characterization of congruence kernels (ideals) and find a finite basis of ideal terms, with focus on monotone and effect basic algebras. We also axiomatize basic algebras that are subdirect products of linearly ordered ones.  相似文献   
47.
In this study we implemented a comprehensive analysis to validate the MODIS and GOES satellite active fire detection products (MOD14 and WFABBA, respectively) and characterize their major sources of omission and commission errors which have important implications for a large community of fire data users. Our analyses were primarily based on the use of 30 m resolution ASTER and ETM+ imagery as our validation data. We found that at the 50% true positive detection probability mark, WFABBA requires four times more active fire area than is necessary for MOD14 to achieve the same probability of detection, despite the 16× factor separating the nominal spatial resolutions of the two products. Approximately 75% and 95% of all fires sampled were omitted by the MOD14 and WFABBA instantaneous products, respectively; whereas an omission error of 38% was obtained for WFABBA when considering the 30-minute interval of the GOES data. Commission errors for MOD14 and WFABBA were found to be similar and highly dependent on the vegetation conditions of the areas imaged, with the larger commission errors (approximately 35%) estimated over regions of active deforestation. Nonetheless, the vast majority (> 80%) of the commission errors were indeed associated with recent burning activity where scars could be visually confirmed in the higher resolution data. Differences in thermal dynamics of vegetated and non-vegetated areas were found to produce a reduction of approximately 50% in the commission errors estimated towards the hours of maximum fire activity (i.e., early-afternoon hours) which coincided with the MODIS/Aqua overpass. Lastly, we demonstrate the potential use of temporal metrics applied to the mid-infrared bands of MODIS and GOES data to reduce the commission errors found with the validation analyses.  相似文献   
48.
49.
This paper discusses our methodology for formal analysis and automatic verification of software programs. It is applicable to a large subset of the C programming language that includes pointer arithmetic and bounded recursion. We consider reachability properties, in particular whether certain assertions or basic blocks are reachable in the source code, or whether certain standard property violations can occur. We perform this analysis via a translation to a Boolean circuit representation based on modeling basic blocks. The program is then analyzed by a back-end SAT-based bounded model checker, where each unrolling is mapped to one step in a block-wise execution of the program.  相似文献   
50.
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号