首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3927篇
  免费   184篇
  国内免费   8篇
电工技术   66篇
综合类   6篇
化学工业   863篇
金属工艺   88篇
机械仪表   66篇
建筑科学   285篇
矿业工程   6篇
能源动力   124篇
轻工业   350篇
水利工程   22篇
石油天然气   20篇
无线电   310篇
一般工业技术   699篇
冶金工业   514篇
原子能技术   26篇
自动化技术   674篇
  2023年   31篇
  2022年   57篇
  2021年   104篇
  2020年   61篇
  2019年   91篇
  2018年   76篇
  2017年   81篇
  2016年   124篇
  2015年   115篇
  2014年   154篇
  2013年   212篇
  2012年   193篇
  2011年   287篇
  2010年   173篇
  2009年   210篇
  2008年   241篇
  2007年   206篇
  2006年   161篇
  2005年   143篇
  2004年   139篇
  2003年   94篇
  2002年   90篇
  2001年   67篇
  2000年   77篇
  1999年   70篇
  1998年   158篇
  1997年   109篇
  1996年   84篇
  1995年   58篇
  1994年   60篇
  1993年   52篇
  1992年   33篇
  1991年   25篇
  1990年   27篇
  1989年   26篇
  1988年   25篇
  1987年   14篇
  1986年   16篇
  1985年   15篇
  1984年   23篇
  1983年   8篇
  1982年   8篇
  1981年   11篇
  1980年   8篇
  1977年   15篇
  1976年   16篇
  1975年   7篇
  1974年   7篇
  1969年   6篇
  1968年   6篇
排序方式: 共有4119条查询结果,搜索用时 296 毫秒
71.
Severe slugging flow is always challenging in oil & gas production, especially for the current offshore based production. The slugging flow can cause a lot of problems, such as those relevant to production safety, fatigue as well as capability. As one typical phenomenon in multi-phase flow dynamics, the slug can be avoided or eliminated by proper facility design or control of operational conditions. Based on a testing facility which can emulate a pipeline-riser or a gas-lifted production well in a scaled-down manner, this paper experimentally studies the correlations of key operational parameters with severe slugging flows. These correlations are reflected through an obtained stable surface in the parameter space, which is a natural extension of the bifurcation plot. The maximal production opportunity without compromising the stability is also studied. Relevant studies have already showed that the capability, performance and efficiency of anti-slug control can be dramatically improved if these stable surfaces can be experimentally determined beforehand. The paper concludes that obtaining the stable surface on the new developed map can significantly improve the production rate in a control scheme. Even though the production rate can be further improved by moving the stable surface using advanced control strategies, the constant inputs can in some cases be preferable due to the easier implementation.  相似文献   
72.
This paper explores how different forms of anticipatory work contribute to reliability in high-risk space operations. It is based on ethnographic field work, participant observation and interviews supplemented with video recordings from a control room responsible for operating a microgravity greenhouse at the International Space Station (ISS). Drawing on examples from different stages of a biological experiment on the ISS, we demonstrate how engineers, researchers and technicians work to anticipate and proactively mitigate possible problems. Space research is expensive and risky. The experiments are planned over the course of many years by a globally distributed network of organizations. Owing to the inaccessibility of the ISS, every trivial detail that could possibly cause a problem is subject to scrutiny. We discuss what we label anticipatory work: practices constituted of an entanglement of cognitive, social and technical elements involved in anticipating and proactively mitigating everything that might go wrong. We show how the nature of anticipatory work changes between planning and the operational phases of an experiment. In the planning phase, operators inscribe their anticipation into technology and procedures. In the operational phase, we show how troubleshooting involves the ability to look ahead in the evolving temporal trajectory of the ISS operations and to juggle pre-planned fixes along these trajectories. A key objective of this paper is to illustrate how anticipation is shared between humans and different forms of technology. Moreover, it illustrates the importance of including considerations of temporality in safety and reliability research.  相似文献   
73.
“Simply, people can no longer remember passwords good enough to reliably defend against dictionary attacks, and are much more secure if they choose a password too complicated to remember and then write it down. We’re all good at securing small pieces of paper. I recommend that people write their passwords down on a small piece of paper, and keep it with their other valuable small pieces of paper: in their wallet.”  相似文献   
74.
75.
Meta-heuristics are frequently used to tackle NP-hard combinatorial optimization problems. With this paper we contribute to the understanding of the success of 2-opt based local search algorithms for solving the traveling salesperson problem (TSP). Although 2-opt is widely used in practice, it is hard to understand its success from a theoretical perspective. We take a statistical approach and examine the features of TSP instances that make the problem either hard or easy to solve. As a measure of problem difficulty for 2-opt we use the approximation ratio that it achieves on a given instance. Our investigations point out important features that make TSP instances hard or easy to be approximated by 2-opt.  相似文献   
76.
We analyze the class of surfaces which are equipped with rational support functions. Any rational support function can be decomposed into a symmetric (even) and an antisymmetric (odd) part. We analyze certain geometric properties of surfaces with odd and even rational support functions. In particular it is shown that odd rational support functions correspond to those rational surfaces which can be equipped with a linear field of normal vectors, which were discussed by Sampoli et al. (Sampoli, M.L., Peternell, M., Jüttler, B., 2006. Rational surfaces with linear normals and their convolutions with rational surfaces. Comput. Aided Geom. Design 23, 179–192). As shown recently, this class of surfaces includes non-developable quadratic triangular Bézier surface patches (Lávička, M., Bastl, B., 2007. Rational hypersurfaces with rational convolutions. Comput. Aided Geom. Design 24, 410–426; Peternell, M., Odehnal, B., 2008. Convolution surfaces of quadratic triangular Bézier surfaces. Comput. Aided Geom. Design 25, 116–129).  相似文献   
77.
A large number of network services rely on IP and reliable transport protocols. For applications that provide abundant data for transmission, loss is usually handled satisfactorily, even if the application is latency-sensitive (Wang et al. 2004). For data streams where small packets are sent intermittently, however, applications can occasionally experience extreme latencies (Griwodz and Halvorsen 2006). As it is not uncommon that such thin-stream applications are time-dependent, any unnecessarily induced delay can have severe consequences for the service provided. Massively Multiplayer Online Games (MMOGs) are a defining example of thin streams. Many MMOGs (like World of Warcraft and Age of Conan) use TCP for the benefits of reliability, in-order delivery and NAT/firewall traversal. It has been shown that TCP has several shortcomings with respect to the latency requirements of thin streams because of the way it handles retransmissions (Griwodz and Halvorsen 2006). As such, an alternative to TCP may be SCTP (Stewart et al. 2000), which was originally developed to meet the requirements of signaling transport. In this paper, we evaluate the Linux-kernel SCTP implementation in the context of thin streams. To address the identified latency challenges, we propose sender-side only enhancements that reduce the application-layer latency in a manner that is compatible with unmodified receivers. These enhancements can be switched on by applications and are used only when the system identifies the stream as thin. To evaluate the latency performance, we have performed several tests over various real networks and over an emulated network, varying parameters like RTT, packet loss and amount of competing cross traffic. When comparing our modifications with SCTP on Linux and FreeBSD and TCP New Reno, our results show great latency improvements and indicate the need for a separate handling of thin and thick streams.  相似文献   
78.
Automatic classification of high-resolution mass spectrometry data has increasing potential to support physicians in diagnosis of diseases like cancer. The proteomic data exhibit variations among different disease states. A precise and reliable classification of mass spectra is essential for a successful diagnosis and treatment. The underlying process to obtain such reliable classification results is a crucial point. In this paper such a method is explained and a corresponding semi automatic parameterization procedure is derived. Thereby a simple straightforward classification procedure to assign mass spectra to a particular disease state is derived. The method is based on an initial preprocessing stage of the whole set of spectra followed by the bi-orthogonal discrete wavelet transform (DWT) for feature extraction. The approximation coefficients calculated from the scaling function exhibit a high peak pattern matching property and feature a denoising of the spectrum. The discriminating coefficients, selected by the Kolmogorov–Smirnov test are finally used as features for training and testing a support vector machine with both a linear and a radial basis kernel. For comparison the peak areas obtained with the it ClinProt-System 1 [33] were analyzed using the same support vector machines. The introduced approach was evaluated on clinical MALDI-MS data sets with two classes each originating from cancer studies. The cross validated error rates using the wavelet coefficients where better than those obtained from the peak areas2.  相似文献   
79.
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library.  相似文献   
80.
This paper is a contribution to the discussion on compiling computational lexical resources from conventional dictionaries. It describes the theoretical as well as practical problems that are encountered when reusing a conventional dictionary for compiling a lexical-semantic resource in terms of a wordnet. More specifically, it describes the methodological issues of compiling a wordnet for Danish, DanNet, from a monolingual basis, and not—as is often seen—by applying the translational expansion method with Princeton WordNet as the English source. Thus, we apply as our basis a large, corpus-based printed dictionary of modern Danish. Using this approach, we discuss the issues of readjusting inconsistent and/or underspecified hyponymy hierarchies taken from the conventional dictionary, sense distinctions as opposed to the synonym sets of wordnets, generating semantic wordnet relations on the basis of sense definitions, and finally, supplementing missing or implicit information.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号