首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2702篇
  免费   139篇
  国内免费   5篇
电工技术   62篇
综合类   2篇
化学工业   524篇
金属工艺   66篇
机械仪表   45篇
建筑科学   79篇
矿业工程   17篇
能源动力   63篇
轻工业   251篇
水利工程   18篇
石油天然气   14篇
无线电   291篇
一般工业技术   380篇
冶金工业   684篇
原子能技术   33篇
自动化技术   317篇
  2023年   16篇
  2022年   31篇
  2021年   39篇
  2020年   43篇
  2019年   60篇
  2018年   61篇
  2017年   69篇
  2016年   64篇
  2015年   58篇
  2014年   104篇
  2013年   156篇
  2012年   107篇
  2011年   130篇
  2010年   86篇
  2009年   97篇
  2008年   92篇
  2007年   120篇
  2006年   83篇
  2005年   81篇
  2004年   60篇
  2003年   47篇
  2002年   52篇
  2001年   45篇
  2000年   43篇
  1999年   64篇
  1998年   154篇
  1997年   110篇
  1996年   71篇
  1995年   54篇
  1994年   49篇
  1993年   53篇
  1992年   30篇
  1991年   30篇
  1990年   27篇
  1989年   23篇
  1988年   24篇
  1987年   33篇
  1986年   23篇
  1985年   20篇
  1984年   20篇
  1983年   18篇
  1982年   17篇
  1981年   25篇
  1980年   31篇
  1979年   22篇
  1978年   14篇
  1977年   17篇
  1976年   22篇
  1975年   16篇
  1974年   16篇
排序方式: 共有2846条查询结果,搜索用时 15 毫秒
41.
A kinetic study of the anionic polymerization of ethylene oxide has been made in tetrahydrofuran at 20°C, with the cryptate Cs+ + [TC] as counterion, [TC] being a spheroidal macrotricyclic ligand. Conductance measurements have been made on THF solutions of ?4BCs + [TC]. Ionic associations higher than cryptated ion pairs are negligible for living end concentrations lower than 3 × 10?4 moll?1. k± and the alkoxide ion pair dissociation constant KD were determined from both sets of kinetic data obtained with and without added salt knowing the value of k? from kinetic data performed with K+ + [222] as counterion. Free alkoxide ions are about twenty times more reactive than cryptated caesium ion pairs.  相似文献   
42.
This paper introduces a novel solution for the multi‐input multi‐output (MIMO) quantitative feedback theory control design problem with tracking error specifications. Looking for a minimum controller overdesign, the technique finds new controller quantitative feedback theory bounds based on necessary and sufficient conditions for the existence of suitable associated prefilter matrix elements. It improves previous approaches to the subject and includes (i) the possibility of a free selection of the nominal plant, (ii) a less conservative application of the Schwartz inequality to decisively reduce the potential controller overdesign, (iii) a methodology to design independently the elements of the prefilter matrix, and (iv) a scope of application to both sequential and nonsequential MIMO controller design methods. The benefits of the new control design technique are illustrated by means of two examples. The first one, a standard 2 × 2 MIMO problem, is provided for comparison purposes with previous approaches. The second example, included as a major control challenge, deals with a well‐known demanding distillation column benchmark problem. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
43.
Water-ground Phlogopite mica (Kemira Siilinjarvi phlogopite) has been evaluated as a reinforcing filler in polypropylene. The major factors which influence the composite strength and modulus include the size, aspect ratio, and uniformity of the mica flakes. Aqueous delamination permits the production of very small flakes (less than 44 microns diameter) with aspect ratios near 50. Such small flakes impart greater tensile and modulus values to polypropylene than larger flakes and the former can also be reprocessed many times without any deterioration of properties. Surface treatment is necessary for adequate dispersion and coupling, particularly with the finely divided mica fillers. Other properties such as the heat-distortion temperature, fracture toughness, and gas permeability are also influenced by the mean size and aspect ratio of the mica filler. Guidelines are presented to indicate the preferred characteristics of mica fillers for optimum performance.  相似文献   
44.
Castor oil (CO) is an environmentally friendly renewable green resource and ideal alternative to petroleum resources. The preparation of high strength and high toughness castor oil-based polyurethane prepolymer (COPU) composites has significant applications such as supporting material and engineering plastic sheet. In this study, unmodified clam shell powder (CSP) with a unique CaCO3-proteoglycan structure was used as a filler to prepare compatible reinforced COPU composite materials. Investigation of the mechanical properties revealed that the elastic modulus of the composite COPU reinforced with 50 wt% of CSP had increased to 5859.0 ± 8.4 MPa representing 187.77% to obtain stiffer and stronger material over pure COPU (2036.6 ± 196.9 MPa). Moreover, the scanning electron microscopy, thermogravimetric analysis and contact angle results demonstrated that the reinforced COPU composites have better compatibility, thermal stability, and water resistance than pure COPU. This work will promote the application prospects of CO-based polyurethane.  相似文献   
45.
AC and DC electrochemical experiments were performed as a function of humidity and contaminant concentration in an effort to identify the range of atmospheric environments where corrosion processes could be detected and possibly quantified. AC measurements exhibited two time constants at 25% relative humidity (RH), possibly indicating the ability to resolve both electrolyte resistance and interfacial impedance. Galvanic current measurements were sensitive to the presence of Cl2(g) at 30% RH and electrochemical transients were detected at both 30% and 50% RH levels, also indicating sensitivity to interfacial processes. Higher humidity levels allowed better quantification due to decreasing electrolyte and interfacial impedances.  相似文献   
46.
47.
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.  相似文献   
48.
49.
The recently introduced Datalog+?/?? family of ontology languages is especially useful for representing and reasoning over lightweight ontologies, and is set to play a central role in the context of query answering and information extraction for the Semantic Web. Recently, it has become apparent that it is necessary to develop a principled way to handle uncertainty in this domain. In addition to uncertainty as an inherent aspect of the Web, one must also deal with forms of uncertainty due to inconsistency and incompleteness, uncertainty resulting from automatically processing Web data, as well as uncertainty stemming from the integration of multiple heterogeneous data sources. In this paper, we take an important step in this direction by developing a probabilistic extension of Datalog+?/??. This extension uses Markov logic networks as the underlying probabilistic semantics. Here, we focus especially on scalable algorithms for answering threshold queries, which correspond to the question “what is the set of all ground atoms that are inferred from a given probabilistic ontology with a probability of at least p?”. These queries are especially relevant to Web information extraction, since uncertain rules lead to uncertain facts, and only information with a certain minimum confidence is desired. We present several algorithms, namely a basic approach, an anytime one, and one based on heuristics, which is guaranteed to return sound results. Furthermore, we also study inconsistency in probabilistic Datalog+?/?? ontologies. We propose two approaches for computing preferred repairs based on two different notions of distance between repairs, namely symmetric and score-based distance. We also study the complexity of the decision problems corresponding to computing such repairs, which turn out to be polynomial and NP-complete in the data complexity, respectively.  相似文献   
50.
Fractal dimension applied to plant identification   总被引:2,自引:0,他引:2  
This article discusses methods to identify plants by analysing leaf complexity based on estimating their fractal dimension. Leaves were analyzed according to the complexity of their internal and external shapes. A computational program was developed to process, analyze and extract the features of leaf images, thereby allowing for automatic plant identification. Results are presented from two experiments, the first to identify plant species from the Brazilian Atlantic forest and Brazilian Cerrado scrublands, using fifty leaf samples from ten different species, and the second to identify four different species from genus Passiflora, using twenty leaf samples for each class. A comparison is made of two methods to estimate fractal dimension (box-counting and multiscale Minkowski). The results are discussed to determine the best approach to analyze shape complexity based on the performance of the technique, when estimating fractal dimension and identifying plants.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号