首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2735篇
  免费   91篇
电工技术   36篇
综合类   4篇
化学工业   555篇
金属工艺   63篇
机械仪表   37篇
建筑科学   102篇
矿业工程   3篇
能源动力   63篇
轻工业   211篇
水利工程   18篇
石油天然气   8篇
无线电   187篇
一般工业技术   359篇
冶金工业   668篇
原子能技术   35篇
自动化技术   477篇
  2023年   21篇
  2022年   39篇
  2021年   71篇
  2020年   47篇
  2019年   41篇
  2018年   51篇
  2017年   50篇
  2016年   71篇
  2015年   69篇
  2014年   81篇
  2013年   137篇
  2012年   101篇
  2011年   145篇
  2010年   109篇
  2009年   112篇
  2008年   129篇
  2007年   110篇
  2006年   101篇
  2005年   76篇
  2004年   60篇
  2003年   47篇
  2002年   44篇
  2001年   44篇
  2000年   40篇
  1999年   67篇
  1998年   168篇
  1997年   108篇
  1996年   65篇
  1995年   49篇
  1994年   57篇
  1993年   48篇
  1992年   18篇
  1991年   23篇
  1990年   26篇
  1989年   23篇
  1988年   18篇
  1987年   21篇
  1986年   16篇
  1985年   23篇
  1984年   22篇
  1983年   12篇
  1982年   21篇
  1981年   23篇
  1980年   20篇
  1979年   19篇
  1977年   32篇
  1976年   25篇
  1974年   13篇
  1973年   11篇
  1972年   11篇
排序方式: 共有2826条查询结果,搜索用时 359 毫秒
51.
Extrusions of hollow profiles with weld seams were conducted using the magnesium alloy ME21 applying various extrusion ratios. Subsequent analysis of the profiles’ microstructure was performed comparing weld free with weld seam containing material using (polarized) light optical microscopy (LOM). Additionally, the local texture and microstructure in the weld-free material as well as in the weld seam region has been examined with a scanning electron microscope coupled with electron backscatter diffraction technique (SEM-EBSD). The weld-free material and the weld seam are characterized by recrystallized microstructures, whereas few residual cast grains were identified. The local texture distinctively changes from the weld-free material to the weld seam. The texture of the weld-free material is comparable with the typical ME21 sheet texture. In the weld seam area, a pole density is found, which is distributed towards the transverse direction (TD) combined with a split and broadening of the pole density in the extrusion direction (ED). This texture influences the mechanical anisotropy due to the dependence of the activation of basal 〈a〉-slip and \( \{ 10\bar{1}2\} \;\langle 10\bar{1}1\rangle \)-extension twinning on the loading direction in favorably oriented grains.  相似文献   
52.
TiN paths have been created on the surface of the titanium alloy OT4-1 by the use of a laser beam. The results of investigations of structure, phase composition, microhardness and surface roughness of the created TiN paths are given in the paper. The paths created in the work are inhomogenous two-phase mixtures of TiN and -Ti, in which the TiN phase with strong (2 0 0) texture is predominant over the other phase and presents a dendritic structure. © 1998 Chapman & Hall  相似文献   
53.
Pancreatic cancer is a highly aggressive and treatment-refractory cancer. A clinically-relevant animal model is necessary to develop therapy for metastatic pancreatic cancer. In this study we evaluated the efficacy of mitomycin C (MMC) and 5-FU against the human pancreatic adenocarcinoma cell line PAN-12 in an orthotopic human metastatic pancreatic cancer nude mice model. The model is constructed by surgical orthotopic implantation (SOI) of histologically intact tumor tissue in the tail portion of the pancreas near the spleen. PAN-12 grew very aggressively in the control group of nude mice with extensive local invasion and distant metastasis to various organs with a propensity for the lung but to other organs as well, including the liver, kidney and regional and distant lymph nodes. In a striking effect none of the mice in the MMC-treated group developed tumor. Although mice in the 5-FU treated group survived statistically significantly longer than those in the untreated control, the overall incidence of metastasis in these mice was equivalent to those in the control. However no liver or kidney metastases were found in the 5-FU treated animals perhaps accounting in part for their longer survival. This "clinical" nude mouse model of highly metastatic pancreatic cancer can now be used to discover new effective agents for this disease.  相似文献   
54.
Design science research is an essential part of IS research since the field should not only try to understand how the world is, but also how to change it. We argue that the aim of IS design science research should be to develop practical knowledge not only for the design of novel information technology (IT), but also for IS governance and management. Whereas at least some methodological support exists for researchers engaged in IT-centric design science research, limited support is available for researchers who want to develop design knowledge and theory for IS governance and management. To overcome this shortcoming, we suggest a socio-technical IS design science research approach. The approach has four main activities: (1) identifying problem situations and desired outcomes, (2) reviewing extant theories, knowledge and data, (3) proposing/refining design theory and knowledge, and (4) testing design theory and knowledge. The applicability and usefulness of the proposed approach is shown by means of a design science research project concerning IS integration management in the context of mergers and acquisitions.  相似文献   
55.
Code injection attacks are one of the most powerful and important classes of attacks on software. In these attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also a valid representation of a machine code program that performs actions chosen by the attacker. The attacker then triggers a bug in the application to divert the control flow to this injected machine code. A typical action of the injected code is to launch a command interpreter shell, and hence the malicious input is often called shellcode. Attacks are usually performed against network facing applications, and such applications often perform validations or encodings on input. Hence, a typical hurdle for attackers, is that the shellcode has to pass one or more filtering methods before it is stored in the vulnerable application??s memory space. Clearly, for a code injection attack to succeed, the malicious input must survive such validations and transformations. Alphanumeric input (consisting only of letters and digits) is typically very robust for this purpose: it passes most filters and is untouched by most transformations. This paper studies the power of alphanumeric shellcode on the ARM architecture. It shows that the subset of ARM machine code programs that (when interpreted as data) consist only of alphanumerical characters is a Turing complete subset. This is a non-trivial result, as the number of instructions that consist only of alphanumeric characters is very limited. To craft useful exploit code (and to achieve Turing completeness), several tricks are needed, including the use of self-modifying code.  相似文献   
56.
57.
Feature-Oriented Software Development provides a multitude of formalisms, methods, languages, and tools for building variable, customizable, and extensible software. Along different lines of research, different notions of a feature have been developed. Although these notions have similar goals, no common basis for evaluation, comparison, and integration exists. We present a feature algebra that captures the key ideas of feature orientation and that provides a common ground for current and future research in this field, on which also alternative options can be explored. Furthermore, our algebraic framework is meant to serve as a basis for the development of the technology of automatic feature-based program synthesis and architectural metaprogramming.  相似文献   
58.
A large-scale, multi-year, randomized study compared learning activities and outcomes for hands-on, remotely-operated, and simulation-based educational laboratories in an undergraduate engineering course. Students (N = 458) worked in small-group lab teams to perform two experiments involving stress on a cantilever beam. Each team conducted the experiments in one of three lab formats (hands-on, remotely-operated, or simulation-based), collecting data either individually or as a team. Lab format and data-collection mode showed an interaction, such that for the hands-on lab format learning outcomes were higher when the lab team collected data sets working as a group rather than individually collecting data sets to be combined later, while for remotely-operated labs individual data collection was best. The pattern of time spent on various lab-related activities suggests that working with real instead of simulated data may induce higher levels of motivation. The results also suggest that learning with computer-mediated technologies can be improved by careful design and coordination of group and individual activities.  相似文献   
59.
We have to deal with different data formats whenever data formats evolve or data must be integrated from heterogeneous systems. These data when implemented in XML for data exchange cannot be shared freely among applications without data transformation. A common approach to solve this problem is to convert the entire XML data from their source format to the applications’ target formats using the transformations rules specified in XSLT stylesheets. However, in many cases, not all XML data are required to be transformed except for a smaller part described by a user’s query (application). In this paper, we present an approach that optimizes the execution time of an XSLT stylesheet for answering a given XPath query by modifying the XSLT stylesheet in such a way that it would (a) capture only the parts in the XML data that are relevant to the query and (b) process only those XSLT instructions that are relevant to the query. We prove the correctness of our optimization approach, analyze its complexity and present experimental results. The experimental results show that our approach performs the best in terms of execution time, especially when many cost-intensive XSLT instructions can be excluded in the XSLT stylesheet.  相似文献   
60.
Aspect-oriented programming (AOP) seeks to improve software modularity via the separation of cross-cutting concerns. AOP proponents often advocate a development strategy where programmers write the main application (base code), ignoring cross-cutting concerns, and then aspect programmers, domain experts in their specific concerns, weave in the logic for these more specialized cross-cutting concerns. This purely oblivious strategy, however, has empirically been shown to tightly couple aspects to base code in many cases, hindering aspect modularity and reuse. In essence, the more intricate the weaving between the cross-cutting concern and the base code (lexically and/or semantically), the harder it becomes to: (a) robustly specify how to weave the aspects in at the required points, (b) capture interactions between aspects and base code, and (c) preserve the correct weaving as the base code evolves.We propose an alternate methodology, termed cooperative aspect-oriented programming (Co-AOP), where complete lexical separation of concerns is not taken as an absolute requirement. Instead, cross-cutting concerns are explicitly modeled as abstract interfaces through explicit join points (EJPs). Programmers specify where these interfaces interact with base code either through explicit lexical references or via traditional oblivious aspects. This explicit awareness allows base code and aspects to cooperate in ways that were previously not possible: arbitrary blocks of code can be advised, advice can be explicitly parameterized, base code can guide aspects in where to apply advice, and aspects can statically enforce new constraints upon the base code that they advise. These new techniques allow aspect modularity and program safety to increase, and bring us towards a cooperative AOP paradigm.We illustrate our methodology via an example on transactions, and also give an initial evaluation of cooperative AOP through an empirical study on program extensibility comparing both the traditional and cooperative AOP methodologies. Initial results show that cooperative AOP techniques result in code that is less complex with lower overall coupling, facilitating extensibility.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号