首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1500篇
  免费   80篇
  国内免费   1篇
电工技术   17篇
综合类   4篇
化学工业   454篇
金属工艺   26篇
机械仪表   43篇
建筑科学   45篇
矿业工程   9篇
能源动力   39篇
轻工业   228篇
水利工程   16篇
石油天然气   8篇
无线电   69篇
一般工业技术   235篇
冶金工业   120篇
原子能技术   3篇
自动化技术   265篇
  2024年   6篇
  2023年   11篇
  2022年   60篇
  2021年   87篇
  2020年   57篇
  2019年   54篇
  2018年   71篇
  2017年   72篇
  2016年   70篇
  2015年   56篇
  2014年   60篇
  2013年   116篇
  2012年   102篇
  2011年   109篇
  2010年   93篇
  2009年   110篇
  2008年   66篇
  2007年   60篇
  2006年   58篇
  2005年   29篇
  2004年   19篇
  2003年   31篇
  2002年   24篇
  2001年   13篇
  2000年   7篇
  1999年   12篇
  1998年   34篇
  1997年   27篇
  1996年   14篇
  1995年   10篇
  1994年   11篇
  1993年   4篇
  1992年   4篇
  1991年   2篇
  1989年   3篇
  1988年   3篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   4篇
  1977年   1篇
  1976年   2篇
  1973年   1篇
  1970年   2篇
排序方式: 共有1581条查询结果,搜索用时 0 毫秒
21.
This paper presents the Clearing Fund Protocol, a three layered protocol designed to schedule soft real-time sets of precedence related tasks with shared resources. These sets are processed in an open dynamic environment. Open because new applications may enter the system at any time and dynamic because the schedulability is tested on-line as tasks request admission. Top-down, the three layers are the Clearing Fund, the Bandwidth Inheritance and two versions of the Constant Bandwidth Server algorithms. Bandwidth Inheritance applies a priority inheritance mechanism to the Constant Bandwidth Server. However, a serious drawback is its unfairness. In fact, a task executing in a server can potentially steal the bandwidth of another server without paying any penalty. The main idea of the Clearing Fund Algorithm is to keep track of processor-time debts contracted by lower priority tasks that block higher priority ones and are executed in the higher priority servers by having inherited the higher priority. The proposed algorithm reduces the undesirable effects of those priority inversions because the blocked task can finish its execution in its own server or in the server of the blocking task, whichever has the nearest deadline. If demanded, debts are paid back in that way. Inheritors are therefore debtors. Moreover, at certain instants in time, all existing debts may be waived and the servers are reset making a clear restart of the system. The Clearing Fund Protocol showed definite better performances when evaluated by simulations against Bandwidth Inheritance, the protocol it tries to improve.  相似文献   
22.
Large-scale simulation of separation phenomena in solids such as fracture, branching, and fragmentation requires a scalable data structure representation of the evolving model. Modeling of such phenomena can be successfully accomplished by means of cohesive models of fracture, which are versatile and effective tools for computational analysis. A common approach to insert cohesive elements in finite element meshes consists of adding discrete special interfaces (cohesive elements) between bulk elements. The insertion of cohesive elements along bulk element interfaces for fragmentation simulation imposes changes in the topology of the mesh. This paper presents a unified topology-based framework for supporting adaptive fragmentation simulations, being able to handle two- and three-dimensional models, with finite elements of any order. We represent the finite element model using a compact and “complete” topological data structure, which is capable of retrieving all adjacency relationships needed for the simulation. Moreover, we introduce a new topology-based algorithm that systematically classifies fractured facets (i.e., facets along which fracture has occurred). The algorithm follows a set of procedures that consistently perform all the topological changes needed to update the model. The proposed topology-based framework is general and ensures that the model representation remains always valid during fragmentation, even when very complex crack patterns are involved. The framework correctness and efficiency are illustrated by arbitrary insertion of cohesive elements in various finite element meshes of self-similar geometries, including both two- and three-dimensional models. These computational tests clearly show linear scaling in time, which is a key feature of the present data-structure representation. The effectiveness of the proposed approach is also demonstrated by dynamic fracture analysis through finite element simulations of actual engineering problems.
Glaucio H. PaulinoEmail:
  相似文献   
23.
Redox and acid–base properties of thionine immobilized in crosslinked chitosan films are analyzed. The experimental conditions for the preparation of the films are described. Results obtained with cyclic voltammetry, spectroelectrochemistry and spectrophotometry indicate that the immobilized dye retains the redox and acid–base activity of free thionine. An acid dissociation constant (Ka) for the immobilized dye of Ka = 2.7 × 10−11 was obtained.

Due to the stable and reversible pH dependent optical signal of the studied film, this membrane can be used as a building component of an optical pH sensor.  相似文献   

24.
This article proposes an approach for reconstructing physical parameters of a sample in a rectangular resonator during microwave radiation, knowing a priori, its electric field distribution. The inverse problem was solved using two global optimization algorithms and the peak signal-to-noise ratio (PSNR) criterion. First, the Self-regulated Fretwidth Harmony Search algorithm (SFHS) identified suitable resonant frequencies for a given configuration. Next, the unified Particle Swarm Optimization (UPSO) optimized said configuration. Together, they became a maximization strategy of the PSNR through a dual optimization process. Results showed the ability of the approach for estimating the height of each sample block and the resonating frequency of the cavity. This process takes longer to finish as a higher PSNR is demanded (mainly due to the aforementioned dual optimization). Even so, it allows for more similar electric field distributions between both, the direct and inverse problems.  相似文献   
25.
This paper presents three projects involving the design and fabrication of architectural structures through the use of different parametric software and digital manufacturing methods. The first project is a flexible partition composed of interlocking elements shaped using a laser-cutter. The second project is a university exhibition unit made with various wooden panels manufactured through a computer numerical controlled (CNC) system. The third project is a system of metal sheets folded by digital machines to create urban circulation spaces. The three works develop a parametric programming of geometry based on certain technical factors, enabling the recognition of patterns of interaction between formal and constructive issues involved in the definition of shapes through parametric controls. Differences in materials and processes are contrasted by similarities of function and conditions involved, creating a system of local, global, productive and environmental parameters that produces a repertoire of self-similar dimensions and variations as well as multiple possibilities of initial setups and final configurations. It suggests a specific field of design exploration focusing on the development of differentiated components and variable architectural configurations, in a kind of open parametric system.  相似文献   
26.
College students (n = 140) were examined to test whether sensation seeking and perceived stress would predict abuse of the Internet. Previous studies have found that disinhibition, boredom susceptibility, and total sensation seeking scores were related to Internet abuse ( 9 and 30). Because stress has been documented to have a negative effect on students ( Pierceall & Keim, 2007), and may be linked to Internet use ( Lavoie & Pychyl, 2001), it was tested as a possible predictor of Internet abuse. This study also analyzed abuse of the Internet for sexual purposes, because sexuality is prevalent online, and college students are in an age of sexual exploration. Results of stepwise regression analyses revealed that disinhibition and total perceived stress were predictive of Internet abuse for sexual purposes, and perceived hopelessness and boredom susceptibility were predictive of Internet abuse for non-sexual purposes. Implications for students and Internet abuse are discussed.  相似文献   
27.
The main objective of this paper is to relieve the power system engineers from the burden of the complex and time-consuming process of power system stabilizer (PSS) tuning. To achieve this goal, the paper proposes an automatic process for computerized tuning of PSSs, which is based on an iterative process that uses a linear matrix inequality (LMI) solver to find the PSS parameters. It is shown in the paper that PSS tuning can be written as a search problem over a non-convex feasible set. The proposed algorithm solves this feasibility problem using an iterative LMI approach and a suitable initial condition, corresponding to a PSS designed for nominal operating conditions only (which is a quite simple task, since the required phase compensation is uniquely defined). Some knowledge about the PSS tuning is also incorporated in the algorithm through the specification of bounds defining the allowable PSS parameters. The application of the proposed algorithm to a benchmark test system and the nonlinear simulation of the resulting closed-loop models demonstrate the efficiency of this algorithm.  相似文献   
28.
29.
This paper presents modular dynamics for dual-arms, expressed in terms of the kinematics and dynamics of each of the stand-alone manipulators. The two arms are controlled as a single manipulator in the task space that is relative to the two end-effectors of the dual-arm robot. A modular relative Jacobian, derived from a previous work, is used which is expressed in terms of the stand-alone manipulator Jacobians. The task space inertia is expressed in terms of the Jacobians and dynamics of each of the stand-alone manipulators. When manipulators are combined and controlled as a single manipulator, as in the case of dual-arms, our proposed approach will not require an entirely new dynamics model for the resulting combined manipulator. But one will use the existing Jacobians and dynamics model for each of the stand-alone manipulators to come up with the dynamics model of the combined manipulator. A dual-arm KUKA is used in the experimental implementation.  相似文献   
30.
Compromising legitimate accounts has been the most used strategy to spread malicious content on OSN (Online Social Network). To address this problem, we propose a pure text mining approach to check if an account has been compromised based on its posts content. In the first step, the proposed approach extracts the writing style from the user account. The second step comprehends the k-Nearest Neighbors algorithm (k-NN) to evaluate the post content and identify the user. Finally, Baseline Updating (third step) consists of a continuous updating of the user baseline to support the current trends and seasonality issues of user’s posts. Experiments were carried out using a dataset from Twitter composed by tweets of 1000 users. All the three steps were individually evaluated, and the results show that the developed method is stable and can detect the compromised accounts. An important observation is the Baseline Updating contribution, which leads to an enhancement of accuracy superior of 60 %. Regarding average accuracy, the developed method achieved results over 93 %.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号