首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4083篇
  免费   223篇
  国内免费   17篇
电工技术   69篇
综合类   8篇
化学工业   1012篇
金属工艺   132篇
机械仪表   106篇
建筑科学   131篇
矿业工程   3篇
能源动力   263篇
轻工业   372篇
水利工程   44篇
石油天然气   83篇
无线电   463篇
一般工业技术   749篇
冶金工业   175篇
原子能技术   16篇
自动化技术   697篇
  2024年   15篇
  2023年   132篇
  2022年   266篇
  2021年   314篇
  2020年   209篇
  2019年   208篇
  2018年   255篇
  2017年   209篇
  2016年   211篇
  2015年   133篇
  2014年   157篇
  2013年   329篇
  2012年   210篇
  2011年   248篇
  2010年   169篇
  2009年   179篇
  2008年   144篇
  2007年   105篇
  2006年   102篇
  2005年   88篇
  2004年   61篇
  2003年   43篇
  2002年   52篇
  2001年   38篇
  2000年   28篇
  1999年   38篇
  1998年   49篇
  1997年   27篇
  1996年   32篇
  1995年   22篇
  1994年   27篇
  1993年   26篇
  1992年   27篇
  1991年   9篇
  1990年   11篇
  1989年   20篇
  1988年   18篇
  1987年   8篇
  1986年   12篇
  1985年   13篇
  1984年   7篇
  1983年   10篇
  1982年   6篇
  1981年   8篇
  1980年   9篇
  1979年   6篇
  1978年   12篇
  1977年   4篇
  1976年   7篇
  1974年   4篇
排序方式: 共有4323条查询结果,搜索用时 0 毫秒
991.
Pitting corrosion of Pb in Na2CO3 solutions (pH=10.8) containing NaNO3 as a pitting corrosion agent has been studied using potentiodynamic anodic polarization, cyclic voltammetry and chronoamperometry techniques, complemented with scanning electron microscopy (SEM) examinations of the electrode surface. In the absence of NO3, the anodic voltammetric response exhibits three anodic peaks prior to oxygen evolution. The first anodic peak A1 corresponds to the formation of PbCO3 layer and soluble Pb2+ species in solution. The second anodic peak A2 is due to the formation of PbO beneath the carbonate layer. Peak A2 is followed by a wide passive region which extends up to the appearance of the third anodic peak A3. The later is related to the formation of PbO2. Addition of NO3 to the carbonate solution stimulates the anodic dissolution through peaks A1 and A2 and breaks down the dual passive layer prior to peak A3. The breakdown potential decreases with an increase in nitrate concentration, temperature and electrode rotation rate, but increases with an increase in carbonate concentration and potential scan rate. Successive cycling leads to a progressive increase in breakdown potential. The current/time transients show that the incubation time for passivity breakdown decreases with increasing the applied anodic potential, nitrate concentration and temperature.  相似文献   
992.
MICROWAVE VACUUM DRYING OF BANANA SLICES   总被引:10,自引:0,他引:10  
Vacuum drying of banana slices was studied in a domestic microwave oven. The results show that banana temperature rises uniformly and rapidly to the saturation water vapor temperature corresponding to the vacuum used then rises slowly until most of the free moisture is lost. The thermal and drying efficiencies were found to drop from almost 100% at the beginning of the drying (high moisture content) to as low as 40% and 30% respectively at the end of drying. Both efficiencies were found to increase with the use of vacuum, especially at low moisture content.  相似文献   
993.
New algorithms for the DFT and the 2-dimensional DFT are presented. The DFT and the 2-dimensional DFT matrices can be expressed as the Kronecker product of DFT matrices of smaller dimension. These algorithms are synthesized by combining the efficient factorization of the Kronecker product of matrices with the highly hardware efficient recursive implementation of the smaller DFT matrices, to yield these algorithms. The architectures of the processors implementing these algorithms consist of 2-dimensional grid of processing elements, have temporal and spatial locality of connections. For computing the DFT of sizeN or for the 2D DFT of sizeN=N 1 byN 1, these algorithms require 2N multipliers and adders, take approximately computational steps for computing a transform vector, and take approximately computation steps between the computation of two successive transform vectors.  相似文献   
994.
995.
Bandwidth abuse is a critical Internet service violation. However, its origins are difficult to detect and trace given similarities between abusive and normal traffic. So far, there is no capable and scalable mechanism to deal with bandwidth abuse. This paper proposes a distributed edge-to-edge model for monitoring service level agreement (SLA) violations and tracing abusive traffic to its origins. The mechanism of policing misbehaving user traffic at a single random early detection (RED) gateway is used in the distributed monitoring of SLA violations, including violations carried out through several gateways. Each RED gateway reports misbehaving users who have been sent notifications of traffic policing to an SLA monitoring unit. Misbehaving users are considered suspicious users and their consumed bandwidth shares are aggregated at every gateway to be compared with SLA-specified ratios. Bandwidth is abused when SLA-specified ratios are exceeded. By reporting bandwidth abuse, illegitimate users can be isolated from legitimate ones and source hosts of abusive traffic may be traced. Approximate simulation results show that the proposed model can detect any SLA violation and identify abusive users. In addition, the proposed model can trace user violations back to their source machines in real time.  相似文献   
996.
Ever since the wireless relay network (RN) was introduced, it has led to the discovery of several new protocols, which have been consistently improved by researchers to overcome many constraints such as throughput, capacity bound, symbol error rate, outage probability, and power allocations. Meanwhile, network coding (NC) was invented as an efficient technique to address these problems. To the best of our knowledge, there has been no comprehensive discussion about wireless-RN modes in the literature. We therefore provide a tutorial concerning the basic concepts of NC, dealing with the classification of particular relay modes, and presenting new wireless-RN protocols with/without NC in this paper. Under appropriate categories (i.e., fixed and dynamic), much attention has been given to various proposed wireless-RN protocols because they may differ individually depending on their processing at relay nodes and network topology. We compare the available wireless-RN protocols with/without NC, and conclude that the wireless-RN based on NC outperforms the traditional wireless-RN in certain scenarios.  相似文献   
997.
Network mobility (NEMO) basic support protocol maintains the connectivity when mobile router (MR) of a mobile network changes its point of attachment to the Internet by establishing a bi-directional tunnel between the MR and the home agent (HA). A packet from a correspondent node (CN) traverses through the tunnel to reach the mobile network. Nesting occurs in NEMO when a MR's new attachment point is in another mobile network that has also moved away from its home link. The level of tunneling increases as the level of nesting increases. Multiple levels of tunneling in nested NEMO adds multiple legs to a non-optimized routing path that the IP packets have to traverse in order to reach the final destination. As per our study, an efficient route optimization technique in NEMO, particularly in nested NEMO, is still a research challenge. In this paper, we propose an efficient route optimization scheme for nested NEMO. We use two care-of Addresses for each MR, as well as two types of entries, such as fixed and visiting, in the routing table in each MR. Our route optimization scheme removes the tunnels completely from the nested NEMO in a single step using only one binding update message irrespective of the number of levels in the nest. Our route optimization scheme also works for non-nested NEMO.  相似文献   
998.
Jacobian-based performance indices such as the manipulability ellipsoid, the condition number and the minimum singular value, have been very helpful tools both for mechanical manipulator design and for determining suitable manipulator postures to execute a given task. For a manipulator having complex degrees of freedom (translations and rotations), Jacobian matrix becomes non-homogeneous, i.e. it contains elements with different physical units; therefore, the evaluation of its determinant, eigenvalues or singular values needs the combination of quantities of different nature, which is physically inconsistent and moreover it corresponds to a noncommensurable system. In this paper, a new performance index of robot manipulators is proposed. It is fully homogeneous and it constitutes a physically consistent system whether the manipulator contains joints of different natures, or the task space combines both translation and rotation motion. The development is concerned with the study of power within the mechanism. Given that the power has the same physical units in translation and rotation, it can be used as a homogeneous or natural performance index of manipulators by examining the behaviour of its basic components namely, force and speed, at different kinematics configurations. Furthermore, the new concept of vectorial power is introduced, followed by to the quadrivector of apparent power, and leading to the final homogeneous performance index of the power manipulability (PM). This new approach matches perfectly with mechanisms having joints of different natures, as well as with a task space combining both translation and rotation.  相似文献   
999.
The periodic wave solutions for the two component BKP hierarchy are obtained by using of Jacobi elliptic function method, in the limit cases, the multiple soliton solutions are also obtained. The properties of some periodic and soliton solution for this system are shown by some figures.  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号