首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1404篇
  免费   103篇
  国内免费   2篇
电工技术   33篇
化学工业   420篇
金属工艺   21篇
机械仪表   35篇
建筑科学   56篇
矿业工程   1篇
能源动力   34篇
轻工业   137篇
水利工程   7篇
石油天然气   4篇
武器工业   1篇
无线电   127篇
一般工业技术   209篇
冶金工业   120篇
原子能技术   7篇
自动化技术   297篇
  2023年   12篇
  2022年   54篇
  2021年   58篇
  2020年   43篇
  2019年   40篇
  2018年   47篇
  2017年   25篇
  2016年   56篇
  2015年   46篇
  2014年   46篇
  2013年   86篇
  2012年   71篇
  2011年   98篇
  2010年   67篇
  2009年   70篇
  2008年   62篇
  2007年   60篇
  2006年   52篇
  2005年   43篇
  2004年   35篇
  2003年   41篇
  2002年   35篇
  2001年   21篇
  2000年   14篇
  1999年   17篇
  1998年   31篇
  1997年   20篇
  1996年   18篇
  1995年   25篇
  1994年   22篇
  1993年   11篇
  1992年   9篇
  1989年   7篇
  1988年   7篇
  1986年   6篇
  1985年   8篇
  1984年   10篇
  1983年   7篇
  1982年   7篇
  1981年   8篇
  1980年   6篇
  1979年   6篇
  1977年   10篇
  1976年   14篇
  1974年   8篇
  1973年   10篇
  1971年   6篇
  1969年   8篇
  1968年   8篇
  1967年   6篇
排序方式: 共有1509条查询结果,搜索用时 15 毫秒
101.
Integrated methodology for forensic oil spill identification   总被引:3,自引:0,他引:3  
A new integrated methodology for forensic oil spill identification is presented. It consists of GC-MS analysis, chromatographic data processing, variable-outlier detection, multivariate data analysis, estimation of uncertainties, and statistical evaluation. The methodology was tested on four groups of diagnostic ratios composed of petroleum biomarkers and ratios within homologous PAH categories. Principal component analysis (PCA) was employed and enabled the simultaneous analysis of many diagnostic ratios. Weathering was taken into account by considering the sampling uncertainties estimated from replicate spill samples. Statistical evaluation ensured an objective matching of oil spill samples with suspected source oils as well as classification into positive match, probable match, and nonmatch. The data analysis is further refined if two or more source oils are classified as probable match by using weighted least squares fitting of the principal components, local PCA models, and additional information relevant to the spill case. The methodology correctly identified the source of two spill samples (i.e., crude oils from Oseberg East and Oseberg Field Centre) and distinguished them from closely related source oils.  相似文献   
102.
103.
Constraint-Based Verification of Parameterized Cache Coherence Protocols   总被引:1,自引:0,他引:1  
We propose a new method for the parameterized verification of formal specifications of cache coherence protocols. The goal of parameterized verification is to establish system properties for an arbitrary number of caches. In order to achieve this purpose we define abstractions that allow us to reduce the original parameterized verification problem to a control state reachability problem for a system with integer data variables. Specifically, the methodology we propose consists of the following steps. We first define an abstraction in which we only keep track of the number of caches in a given state during the execution of a protocol. Then, we use linear arithmetic constraints to symbolically represent infinite sets of global states of the resulting abstract protocol. For reasons of efficiency, we relax the constraint operations by interpreting constraints over real numbers. Finally, we check parameterized safety properties of abstract protocols using symbolic backward reachability, a strategy that allows us to obtain sufficient conditions for termination for an interesting class of protocols. The latter problem can be solved by using the infinite-state model checker HyTech: Henzinger, Ho, and Wong-Toi, A model checker for hybrid systems, Proc. of the 9th International Conference on Computer Aided Verification (CAV'97), Lecture Notes in Computer Science, Springer, Haifa, Israel, 1997, Vol. 1254, pp. 460–463. HyTech handles linear arithmetic constraints using the polyhedra library of Halbwachs and Proy, Verification of real-time systems using linear relation analysis, Formal Methods in System Design, Vol. 11, No. 2, pp. 157–185, 1997. By using this methodology, we have automatically validated parameterized versions of widely implemented write-invalidate and write-update cache coherence protocols like Synapse, MESI, MOESI, Berkeley, Illinois, Firefly and Dragon (Handy, The Cache Memory Book, Academic Press, 1993). With this application, we have shown that symbolic model checking tools like HyTech, originally designed for the verification of hybrid systems, can be applied successfully to new classes of infinite-state systems of practical interest.  相似文献   
104.
A new, simple device generates accurate nano- and microflow rate gradients from any conventional HPLC system. The core of the new device is represented by an electric-actuated, computer-controlled, multiposition HPLC valve. The valve hosts six reservoirs for as many different mobile-phase compositions of increasing strength. A low flow rate stream pushes the weakest solvent through the column as long as required and at the desired flow rate, until the chromatographic run is started. From this time on, the electric actuation allows one to select which reservoir will be on-line with the column and for how long, thus generating a specific solvent gradient, through a sequence of controlled segments of precise mobile-phase composition. This permits one not only to exactly reproduce the programmed slope but also to achieve different gradient shapes (i.e., linear, convex, concave) for different separation needs. The new device has proven to be reliable and reproducible even at the lowest flow rate tested (250 nL x min(-1)) and in different chromatographic conditions.  相似文献   
105.
106.
In this paper we propose a semi-automatic technique for deriving the similarity degree between two portions of heterogeneous information sources (hereafter, sub-sources). The proposed technique consists in two phases: the first one selects the most promising pairs of sub-sources, whereas the second one computes the similarity degree relative to each promising pair. We show that the detection of sub-source similarities is a special case (and a very interesting one, for semi-structured information sources) of the more general problem of Scheme Match. In addition, we present a real example case to clarify the proposed technique, a set of experiments we have conducted to verify the quality of its results, a discussion about its computational complexity and its classification in the context of related literature. Finally, we discuss some possible applications which can benefit by derived similarities.  相似文献   
107.
108.
The paper deals with the optimisation of a tapered tubular steel component to be used as an energy-absorbing device in the front structure of a vehicle body. Aim of the optimisation problem is the minimisation of a load uniformity parameter evaluated as the ratio between the maximum and the average crushing loads. The optimisation problem takes into account two design variables describing a tapered geometrical configuration, the diameter of the component at one of its bounds and the tapering length. Two improved geometrical configurations have been found and have been experimentally tested to verify the numerical results with impact velocities up to 10 m/s.  相似文献   
109.
A decision support system for the optimal deployment of drifting acoustic sensor networks for cooperative track detection in underwater surveillance applications is proposed and tested on a simulated scenario. The system integrates sea water current forecasts, sensor range models and simple drifting buoy kinematic models to predict sensor positions and temporal network performance. A multi-objective genetic optimization algorithm is used for searching a set of Pareto optimal deployment solutions (i.e. the initial position of drifting sonobuoys of the network) by simultaneously optimizing two quality of service metrics: the temporal mean of the network area coverage and the tracking coverage. The solutions found after optimization, which represent different efficient tradeoffs between the two metrics, can be conveniently evaluated by the mission planner in order to choose the solution with the desired compromise between the two conflicting objectives. Sensitivity analysis through the Unscented Transform is also performed in order to test the robustness of the solutions with respect to network parameters and environmental uncertainty. Results on a simulated scenario making use of real probabilistic sea water current forecasts are provided showing the effectiveness of the proposed approach. Future work is envisioned to make the tool fully operational and ready to use in real scenarios.  相似文献   
110.
In this paper, we provide a proof of almost sure exponential convergence to consensus for a general class of ergodic edge selection processes. The proof is based on the multiplicative ergodic theorem of Oseledec and also applies to continuous time gossip algorithms. An example of exponential convergence in a non ergodic case is also discussed. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号