首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2603篇
  免费   141篇
  国内免费   2篇
电工技术   14篇
综合类   1篇
化学工业   863篇
金属工艺   26篇
机械仪表   53篇
建筑科学   77篇
矿业工程   2篇
能源动力   85篇
轻工业   524篇
水利工程   17篇
石油天然气   9篇
无线电   144篇
一般工业技术   343篇
冶金工业   284篇
原子能技术   13篇
自动化技术   291篇
  2024年   5篇
  2023年   35篇
  2022年   195篇
  2021年   196篇
  2020年   92篇
  2019年   83篇
  2018年   101篇
  2017年   84篇
  2016年   97篇
  2015年   81篇
  2014年   112篇
  2013年   160篇
  2012年   161篇
  2011年   180篇
  2010年   125篇
  2009年   112篇
  2008年   103篇
  2007年   93篇
  2006年   83篇
  2005年   55篇
  2004年   52篇
  2003年   67篇
  2002年   58篇
  2001年   22篇
  2000年   30篇
  1999年   35篇
  1998年   93篇
  1997年   57篇
  1996年   40篇
  1995年   22篇
  1994年   13篇
  1993年   20篇
  1992年   10篇
  1991年   8篇
  1990年   8篇
  1989年   5篇
  1988年   7篇
  1987年   2篇
  1986年   6篇
  1985年   9篇
  1984年   3篇
  1983年   5篇
  1982年   9篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1976年   7篇
排序方式: 共有2746条查询结果,搜索用时 15 毫秒
31.
Recently the action systems formalism for parallel and distributed systems has been extended with the procedure mechanism. This gives us a very general framework for describing different communication paradigms for action systems, e.g. remote procedure calls. Action systems come with a design methodology based on the refinement calculus. Data refinement is a powerful technique for refining action systems. In this paper we will develop a theory and proof rules for the refinement of action systems that communicate via remote procedures based on the data refinement approach. The proof rules we develop are compositional so that modular refinement of action systems is supported. As an example we will especially study the atomicity refinement of actions. This is an important refinement strategy, as it potentially increases the degree of parallelism in an action system. Received February 1999 / Accepted in revised form July 2000  相似文献   
32.
Two complex perovskite-related structures were solved by ab initio from precession electron diffraction intensities. Structure models were firstly derived from HREM images and than have been confirmed independently using two and three-dimensional sets of precession intensities. Patterson techniques prove to be effective for ab initio structure resolution, specially in case of projections with no overlapping atoms. Quality of precession intensity data may be suitable enough to resolve unknown heavy oxide structures.  相似文献   
33.
In this paper, an extension of the natural element method (NEM) is presented to solve finite deformation problems. Since NEM is a meshless method, its implementation does not require an explicit connectivity definition. Consequently, it is quite adequate to simulate large strain problems with important mesh distortions, reducing the need for remeshing and projection of results (extremely important in three‐dimensional problems). NEM has important advantages over other meshless methods, such as the interpolant character of its shape functions and the ability of exactly reproducing essential boundary conditions along convex boundaries. The α‐NEM extension generalizes this behaviour to non‐convex boundaries. A total Lagrangian formulation has been employed to solve different problems with large strains, considering hyperelastic behaviour. Several examples are presented in two and three dimensions, comparing the results with the ones of the finite element method. NEM performs better showing its important capabilities in this kind of applications. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
34.
A software environment, called EDEN, that prototypes a recent approach to model-based diagnosis of discrete-event systems, is presented. The environment integrates a specification language, called SMILE, a model base, and a diagnostic engine. SMILE enables the user to create libraries of models and systems, which are permanently stored in the model base, wherein both final and intermediate results of the diagnostic sessions are hosted as well. Given the observation of a physical system gathered during its reaction to an external event, the diagnostic engine performs the a posteriori reconstruction of all the possible evolutions of the system over time and, then, draws candidate diagnoses out of them. The diagnostic method is described using a simplified example within the domain of power transmission networks. Strong points of the method include compositional modeling, support for model update, ability to focus on any sub-system, amenability to parallel execution, management of multiple faults, and broad notions of system and observation.  相似文献   
35.
Presents reflections on the life and achievements of Josef Maria Bro?ek. The author notes that, in his way, Bro?ek turned psychology historiography into an international domain involving, in this construction, researchers from countries not only of Anglo Saxon languages but also those of Slavic and Latin languages, including Brazil. Quoting from Braque, he affirmed that "knowledge of the past enables the revelation of the present." However, he believed that "reality is not revealed if it is not sparkled by a poetic beam." The poetry of life illuminated Bro?ek and his actions. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
36.
Prime pictures of emotional scenes appeared in parafoveal vision, followed by probe pictures either congruent or incongruent in affective valence. Participants responded whether the probe was pleasant or unpleasant (or whether it portrayed people or animals). Shorter latencies for congruent than for incongruent prime-probe pairs revealed affective priming. This occurred even when visual attention was focused on a concurrent verbal task and when foveal gaze-contingent masking prevented overt attention to the primes but only if these had been preexposed and appeared in the left visual field. The preexposure and laterality patterns were different for affective priming and semantic category priming. Affective priming was independent of the nature of the task (i.e., affective or category judgment), whereas semantic priming was not. The authors conclude that affective processing occurs without overt attention--although it is dependent on resources available for covert attention--and that prior experience of the stimulus is required and right-hemisphere dominance is involved. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
37.
Biofilms grow on various surfaces and in many different environments, a phenomenon that constitutes major problems in industry and medicine. Despite their importance little is known about the viscoelastic properties of biofilms and how these depend on the chemical microenvironment. Here, we find that the mechanical properties of Pseudomonas aeruginosa (P.a.) biofilms are highly robust towards chemical perturbations. Specifically, we observe that P.a. biofilms are able to fully regain their initial stiffness after yielding is enforced, even in the presence of chemicals. Moreover, only trivalent ions and citric acid significantly affect the biofilm elasticity, the first of which also alter the texture of the material. Finally, our results indicate that biofilm mechanics and bacteria viability inside the biofilm are not necessarily linked which suggests that targeting bacteria alone might not be sufficient for biofilm removal strategies.  相似文献   
38.
Pulmonary embolism is a life-threatening condition, which can result in respiratory insufficiency and death. Blood clots occluding branches of the pulmonary artery (PA) are traditionally considered to originate from thrombi in deep veins (usually in legs). However, growing evidence suggests that occlusion of the vessels in the lungs can develop without preceding deep vein thrombosis (DVT). In this work, we used an inferior vena cava (IVC) complete ligation model of DVT in Wistar rats to explore the possibility and mechanisms of PA thrombosis under the conditions where all routes of thrombotic mass migration from peripheral veins are blocked. We demonstrate that rats both with normal and reduced neutrophil counts developed thrombi in the IVC, although, neutropenia caused a substantial decrease in thrombus size and a shift from fresh fibrin toward mature fibrin and connective tissue inside the thrombus. Massive fibrin deposition was found in the PA branches in the majority of DVT rats with normal neutrophil counts, but in none of the neutropenic animals. Neutrophil ablation also abolished macroscopic signs of lung damage. Altogether, the results demonstrate that thrombi in the lung vasculature can form in situ by mechanisms that require local neutrophil recruitment taking place in the DVT setting.  相似文献   
39.
This paper presents a heuristic method based on column generation for the EDF (Electricité De France) long-term electricity production planning problem proposed as subject of the ROADEF/EURO 2010 Challenge. This is to our knowledge the first-ranked method among those methods based on mathematical programming, and was ranked fourth overall. The problem consists in determining a production plan over the whole time horizon for each thermal power plant of the French electricity company, and for nuclear plants, a schedule of plant outages which are necessary for refueling and maintenance operations. The average cost of the overall outage and production planning, computed over a set of demand scenarios, is to be minimized. The method proceeds in two stages. In the first stage, dates for outages are fixed once for all for each nuclear plant. Data are aggregated with a single average scenario and reduced time steps, and a set-partitioning reformulation of this aggregated problem is solved for fixing outage dates with a heuristic based on column generation. The pricing problem associated with each nuclear plant is a shortest path problem in an appropriately constructed graph. In the second stage, the reload level is determined at each date of an outage, considering now all scenarios. Finally, the production quantities between two outages are optimized for each plant and each scenario by solving independent linear programming problems.  相似文献   
40.
Hidden Markov model (HMM) is a popular statistical tool with a large number of applications in pattern recognition. In some of these applications, such as speaker recognition, the computation involves personal data that can identify individuals and must be protected. We thus treat the problem of designing privacy-preserving techniques for HMM and companion Gaussian mixture model computation suitable for use in speaker recognition and other applications. We provide secure solutions for both two-party and multi-party computation models and both semi-honest and malicious settings. In the two-party setting, the server does not have access in the clear to either the user-based HMM or user input (i.e., current observations) and thus the computation is based on threshold homomorphic encryption, while the multi-party setting uses threshold linear secret sharing as the underlying data protection mechanism. All solutions use floating-point arithmetic, which allows us to achieve high accuracy and provable security guarantees, while maintaining reasonable performance. A substantial part of this work is dedicated to building secure protocols for floating-point operations in the two-party setting, which are of independent interest.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号