首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2595篇
  免费   191篇
  国内免费   1篇
电工技术   37篇
综合类   4篇
化学工业   703篇
金属工艺   52篇
机械仪表   60篇
建筑科学   72篇
矿业工程   11篇
能源动力   93篇
轻工业   442篇
水利工程   22篇
石油天然气   9篇
无线电   116篇
一般工业技术   398篇
冶金工业   393篇
原子能技术   11篇
自动化技术   364篇
  2024年   5篇
  2023年   17篇
  2022年   63篇
  2021年   118篇
  2020年   78篇
  2019年   89篇
  2018年   112篇
  2017年   110篇
  2016年   119篇
  2015年   83篇
  2014年   98篇
  2013年   191篇
  2012年   147篇
  2011年   162篇
  2010年   144篇
  2009年   164篇
  2008年   127篇
  2007年   110篇
  2006年   98篇
  2005年   60篇
  2004年   49篇
  2003年   60篇
  2002年   45篇
  2001年   42篇
  2000年   29篇
  1999年   29篇
  1998年   105篇
  1997年   82篇
  1996年   50篇
  1995年   36篇
  1994年   31篇
  1993年   27篇
  1992年   10篇
  1991年   8篇
  1990年   5篇
  1989年   12篇
  1988年   9篇
  1987年   5篇
  1986年   9篇
  1985年   10篇
  1983年   4篇
  1982年   3篇
  1981年   3篇
  1980年   5篇
  1977年   3篇
  1976年   12篇
  1974年   1篇
  1973年   1篇
  1970年   2篇
  1965年   1篇
排序方式: 共有2787条查询结果,搜索用时 46 毫秒
51.
Large-scale simulation of separation phenomena in solids such as fracture, branching, and fragmentation requires a scalable data structure representation of the evolving model. Modeling of such phenomena can be successfully accomplished by means of cohesive models of fracture, which are versatile and effective tools for computational analysis. A common approach to insert cohesive elements in finite element meshes consists of adding discrete special interfaces (cohesive elements) between bulk elements. The insertion of cohesive elements along bulk element interfaces for fragmentation simulation imposes changes in the topology of the mesh. This paper presents a unified topology-based framework for supporting adaptive fragmentation simulations, being able to handle two- and three-dimensional models, with finite elements of any order. We represent the finite element model using a compact and “complete” topological data structure, which is capable of retrieving all adjacency relationships needed for the simulation. Moreover, we introduce a new topology-based algorithm that systematically classifies fractured facets (i.e., facets along which fracture has occurred). The algorithm follows a set of procedures that consistently perform all the topological changes needed to update the model. The proposed topology-based framework is general and ensures that the model representation remains always valid during fragmentation, even when very complex crack patterns are involved. The framework correctness and efficiency are illustrated by arbitrary insertion of cohesive elements in various finite element meshes of self-similar geometries, including both two- and three-dimensional models. These computational tests clearly show linear scaling in time, which is a key feature of the present data-structure representation. The effectiveness of the proposed approach is also demonstrated by dynamic fracture analysis through finite element simulations of actual engineering problems.
Glaucio H. PaulinoEmail:
  相似文献   
52.
We define and study an optimization problem that is motivated by bandwidth allocation in radio networks. Because radio transmissions are subject to interference constraints in radio networks, physical space is a common resource that the nodes have to share in such a way, that concurrent transmissions do not interfere. The bandwidth allocation problem we study under these constraints is the following. Given bandwidth (traffic) demands between the nodes of the network, the objective is to schedule the radio transmissions in such a way that the traffic demands are satisfied. The problem is similar to a multicommodity flow problem, where the capacity constraints are replaced by the more complex notion of non-interfering transmissions. We provide a formal specification of the problem that we call round weighting  . By modeling non-interfering radio transmissions as independent sets, we relate the complexity of round weighting to the complexity of various independent set problems (e.g. maximum weight independent set, vertex coloring, fractional coloring). From this relation, we deduce that in general, round weighting is hard to approximate within n1−εn1ε (nn being the size of the radio network). We also provide polynomial (exact or approximation) algorithms e.g. in the following two cases: (a) when the interference constraints are specific (for instance for a network whose vertices belong to the Euclidean space), or (b) when the traffic demands are directed towards a unique node in the network (also called gathering, analogous to single commodity flow).  相似文献   
53.
Redox and acid–base properties of thionine immobilized in crosslinked chitosan films are analyzed. The experimental conditions for the preparation of the films are described. Results obtained with cyclic voltammetry, spectroelectrochemistry and spectrophotometry indicate that the immobilized dye retains the redox and acid–base activity of free thionine. An acid dissociation constant (Ka) for the immobilized dye of Ka = 2.7 × 10−11 was obtained.

Due to the stable and reversible pH dependent optical signal of the studied film, this membrane can be used as a building component of an optical pH sensor.  相似文献   

54.
Aggregation of system-wide information in large-scale distributed systems, such as p2p systems and Grids, can be unfairly influenced by nodes that are selfish, colluding with each other, or are offline most of the time. We present AVCOL, which uses probabilistic and gossip-style techniques to provide availability-aware aggregation. Concretely, AVCOL is the first aggregation system that: (1) implements any (arbitrary) global predicate that explicitly specifies any node’s probability of inclusion in the global aggregate, as a mathematical function of that node’s availability (i.e., percentage time online); (2) probabilistically tolerates large numbers of selfish nodes and large groups of colluders; and (3) scales well with hundreds to thousands of nodes. AVCOL uses several unique design decisions: per-aggregation tree construction where nodes are allowed a limited but flexible probabilistic choice of parents or children, probabilistic aggregation along trees, and auditing of nodes both during aggregation as well as in gossip-style (i.e., periodically). We have implemented AVCOL, and we experimentally evaluated it using real-life churn traces. Our evaluation and our mathematical analysis show that AVCOL satisfies arbitrary predicates, scales well, and withstands a variety of selfish and colluding attacks.  相似文献   
55.
This article proposes an approach for reconstructing physical parameters of a sample in a rectangular resonator during microwave radiation, knowing a priori, its electric field distribution. The inverse problem was solved using two global optimization algorithms and the peak signal-to-noise ratio (PSNR) criterion. First, the Self-regulated Fretwidth Harmony Search algorithm (SFHS) identified suitable resonant frequencies for a given configuration. Next, the unified Particle Swarm Optimization (UPSO) optimized said configuration. Together, they became a maximization strategy of the PSNR through a dual optimization process. Results showed the ability of the approach for estimating the height of each sample block and the resonating frequency of the cavity. This process takes longer to finish as a higher PSNR is demanded (mainly due to the aforementioned dual optimization). Even so, it allows for more similar electric field distributions between both, the direct and inverse problems.  相似文献   
56.
Many optimization models in engineering are formulated as bilevel problems. Bilevel optimization problems are mathematical programs where a subset of variables is constrained to be an optimal solution of another mathematical program. Due to the lack of optimization software that can directly handle and solve bilevel problems, most existing solution methods reformulate the bilevel problem as a mathematical program with complementarity conditions (MPCC) by replacing the lower-level problem with its necessary and sufficient optimality conditions. MPCCs are single-level non-convex optimization problems that do not satisfy the standard constraint qualifications and therefore, nonlinear solvers may fail to provide even local optimal solutions. In this paper we propose a method that first solves iteratively a set of regularized MPCCs using an off-the-shelf nonlinear solver to find a local optimal solution. Local optimal information is then used to reduce the computational burden of solving the Fortuny-Amat reformulation of the MPCC to global optimality using off-the-shelf mixed-integer solvers. This method is tested using a wide range of randomly generated examples. The results show that our method outperforms existing general-purpose methods in terms of computational burden and global optimality.  相似文献   
57.
Morales A  Servin M  Malacara D 《Applied optics》1996,35(10):1590-1592
To perform a null test of aspherical surfaces we used a computer-generated hologram or a lens or a mirror compensator to compensate the aspherical aberration. When compensating in a convergent light beam the axial position of this hologram or compensator is critical. A holographic compensator to be used in the convergent beam of light was designed and constructed. We have established some relations to determine the tolerance in the axial positioning of these compensators.  相似文献   
58.
Corynebacterium urealyticum is usually resistant to multiple antibiotics. We analyzed whether previous hospitalization and/or the use of antibiotics was a factor associated with the appearance of resistance to different antibiotics in C. urealyticum. Our findings suggest that resistant strains of C. urealyticum are likely to be acquired directly from the hospital environment and that the use of antibiotics in the hospital setting could favor the appearance of multiresistant strains.  相似文献   
59.
This paper presents three projects involving the design and fabrication of architectural structures through the use of different parametric software and digital manufacturing methods. The first project is a flexible partition composed of interlocking elements shaped using a laser-cutter. The second project is a university exhibition unit made with various wooden panels manufactured through a computer numerical controlled (CNC) system. The third project is a system of metal sheets folded by digital machines to create urban circulation spaces. The three works develop a parametric programming of geometry based on certain technical factors, enabling the recognition of patterns of interaction between formal and constructive issues involved in the definition of shapes through parametric controls. Differences in materials and processes are contrasted by similarities of function and conditions involved, creating a system of local, global, productive and environmental parameters that produces a repertoire of self-similar dimensions and variations as well as multiple possibilities of initial setups and final configurations. It suggests a specific field of design exploration focusing on the development of differentiated components and variable architectural configurations, in a kind of open parametric system.  相似文献   
60.
College students (n = 140) were examined to test whether sensation seeking and perceived stress would predict abuse of the Internet. Previous studies have found that disinhibition, boredom susceptibility, and total sensation seeking scores were related to Internet abuse ( 9 and 30). Because stress has been documented to have a negative effect on students ( Pierceall & Keim, 2007), and may be linked to Internet use ( Lavoie & Pychyl, 2001), it was tested as a possible predictor of Internet abuse. This study also analyzed abuse of the Internet for sexual purposes, because sexuality is prevalent online, and college students are in an age of sexual exploration. Results of stepwise regression analyses revealed that disinhibition and total perceived stress were predictive of Internet abuse for sexual purposes, and perceived hopelessness and boredom susceptibility were predictive of Internet abuse for non-sexual purposes. Implications for students and Internet abuse are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号