首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1002篇
  免费   81篇
电工技术   10篇
综合类   4篇
化学工业   336篇
金属工艺   30篇
机械仪表   11篇
建筑科学   33篇
能源动力   26篇
轻工业   169篇
水利工程   13篇
石油天然气   2篇
无线电   48篇
一般工业技术   139篇
冶金工业   56篇
原子能技术   8篇
自动化技术   198篇
  2024年   4篇
  2023年   16篇
  2022年   59篇
  2021年   52篇
  2020年   34篇
  2019年   34篇
  2018年   28篇
  2017年   44篇
  2016年   39篇
  2015年   44篇
  2014年   39篇
  2013年   66篇
  2012年   65篇
  2011年   82篇
  2010年   54篇
  2009年   63篇
  2008年   37篇
  2007年   38篇
  2006年   30篇
  2005年   29篇
  2004年   22篇
  2003年   14篇
  2002年   16篇
  2001年   14篇
  2000年   7篇
  1999年   6篇
  1998年   16篇
  1997年   10篇
  1996年   16篇
  1995年   10篇
  1994年   12篇
  1993年   11篇
  1992年   8篇
  1990年   8篇
  1989年   5篇
  1988年   8篇
  1987年   8篇
  1986年   3篇
  1985年   2篇
  1984年   4篇
  1983年   5篇
  1979年   3篇
  1978年   5篇
  1977年   1篇
  1976年   1篇
  1975年   3篇
  1974年   2篇
  1973年   1篇
  1972年   1篇
  1970年   1篇
排序方式: 共有1083条查询结果,搜索用时 15 毫秒
11.
12.
Annals of Mathematics and Artificial Intelligence - The exact relationship between formal argumentation and nonmonotonic logics is a research topic that keeps on eluding researchers despite recent...  相似文献   
13.
The probability of breakage in service lifetime of heat-tempered glass panes contaminated by nickel sulfide inclusions is estimated with a multiscale micromechanically motivated statistical theory, which considers the effects of the heat soak test (HST). Short and long HSTs differently affect the phase transformation of NiS of diverse chemical composition, whose increase in volume can break the glass. The main hypothesis, corroborated by experiments, is that there is a lower limit for the size of NiS stones below which no crack can be initiated from the volumetric expansion. The catastrophic propagation of nucleated fractures in the long term is modeled through a rescaled critical stress intensity factor, which accounts for the subcritical crack propagation and the slow phase transformation of NiS. A parametric analysis evidences how the failure probability is strongly affected by these parameters, depending on the holding time in the HST. Tailored experimental activity is suggested for the proper calibration of the model.  相似文献   
14.
Key experiments were carried out on the three Al–R–Mg (R=Gd,Dy,Ho) systems and the results obtained used for the thermodynamic optimisation reported in a separate paper in this issue [Caccasmani G, De Negri S, Saccone A, Ferro R. Intermetallics this issue.]. The samples were characterized by differential thermal analysis (DTA), X-ray powder diffraction (XRD), light optical microscopy (LOM), scanning electron microscopy (SEM) and quantitative electron probe microanalysis (EPMA). The isothermal sections at 400 °C are all characterized by extended homogeneity regions at a constant rare earth content. The extension of the (Mg,Al)R solid solution, cP2-CsCl type, varies with the R atomic number. Ternary compounds (τ) of Al2(R,Mg) stoichiometry (hexagonal Laves phases with MgNi2-type structure) have been found to exist at 400 °C in all the systems. Their temperatures of formation were detected by DTA measurements.  相似文献   
15.
An optimised set of thermodynamic parameters for the Ce–Ni system has been obtained using the CALPHAD approach. A thorough thermodynamic analysis of the system has been carried out using different calorimetric techniques and the data have been used in the assessment. The free energy of the liquid phase has been described as a function of temperature and composition using a Redlich–Kister polynomial. Solid compounds have been considered as stoichiometric with the exception of the Laves phases. The phase diagram and thermodynamic quantities calculated from assessed parameters agree well with experimental data.  相似文献   
16.
17.
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference.  相似文献   
18.

Optimization problems in software engineering typically deal with structures as they occur in the design and maintenance of software systems. In model-driven optimization (MDO), domain-specific models are used to represent these structures while evolutionary algorithms are often used to solve optimization problems. However, designing appropriate models and evolutionary algorithms to represent and evolve structures is not always straightforward. Domain experts often need deep knowledge of how to configure an evolutionary algorithm. This makes the use of model-driven meta-heuristic search difficult and expensive. We present a graph-based framework for MDO that identifies and clarifies core concepts and relies on mutation operators to specify evolutionary change. This framework is intended to help domain experts develop and study evolutionary algorithms based on domain-specific models and operators. In addition, it can help in clarifying the critical factors for conducting reproducible experiments in MDO. Based on the framework, we are able to take a first step toward identifying and studying important properties of evolutionary operators in the context of MDO. As a showcase, we investigate the impact of soundness and completeness at the level of mutation operator sets on the effectiveness and efficiency of evolutionary algorithms.

  相似文献   
19.
This paper responds to the recent call for understanding the nature and consequences of the digital mediation of everyday experiences. We do so in the context of online opinion sharing. We propose that the unique design features of mobile computing devices and the intention and purpose of their users, meld into a technology affordance we label: Triggered essential reviewing. We empirically investigate the effect of this technology affordance on opinion characteristics (i.e., timing and length), and outcomes (i.e., opinion valence and content). We find that triggered essential reviewing engenders opinions that cover a narrower range of aspects of the experience and that it produces a negative evaluative bias—a bias that mitigates over time. Our work makes two contributions to the application of affordance theory in Information Systems. First, it shows the importance of IT design in studying experiential computing. While not taking a deterministic view of technology, we validate the notion that different technology designs produce a variation of effects around a predictable central tendency. Second, it empirically demonstrates that the affordances of embodied digital experiences have an effect on actual behavior as well as on the outcome of the experience itself.  相似文献   
20.
This work describes a system for acoustic‐based navigation that relies on the addition of localization services to underwater networks. The localization capability has been added on top of an existing network, without imposing constraints on its structure/operation. The approach is based on the inclusion of timing information within acoustic messages through which it is possible to know the time of an acoustic transmission in relation to its reception. Exploiting such information at the network application level makes it possible to create an interrogation scheme similar to that of a long baseline. The advantage is that the nodes/autonomous underwater vehicles (AUVs) themselves become the transponders of a network baseline, and hence there is no need for dedicated instrumentation. The paper reports at sea results obtained from the COLLAB–NGAS14 experimental campaign. During the sea trial, the approach was implemented within an operational network in different configurations to support the navigation of the two Centre for Maritime Research and Experimentation Ocean Explorer (CMRE OEX) vehicles. The obtained results demonstrate that it is possible to support AUV navigation without constraining the network design and with a minimum communication overhead. Alternative solutions (e.g., synchronized clocks or two‐way‐travel‐time interrogations) might provide higher precision or accuracy, but they come at the cost of impacting on the network design and/or on the interrogation strategies. Results are discussed, and the performance achieved at sea demonstrates the viability to use the system in real, large‐scale operations involving multiple AUVs. These results represent a step toward location‐aware underwater networks that are able to provide node localization as a service.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号