首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3608篇
  免费   184篇
  国内免费   16篇
电工技术   51篇
综合类   13篇
化学工业   631篇
金属工艺   62篇
机械仪表   94篇
建筑科学   163篇
矿业工程   9篇
能源动力   103篇
轻工业   269篇
水利工程   36篇
石油天然气   7篇
无线电   574篇
一般工业技术   613篇
冶金工业   624篇
原子能技术   13篇
自动化技术   546篇
  2024年   7篇
  2023年   26篇
  2022年   50篇
  2021年   100篇
  2020年   63篇
  2019年   79篇
  2018年   87篇
  2017年   87篇
  2016年   74篇
  2015年   75篇
  2014年   119篇
  2013年   229篇
  2012年   155篇
  2011年   195篇
  2010年   163篇
  2009年   178篇
  2008年   197篇
  2007年   199篇
  2006年   164篇
  2005年   129篇
  2004年   129篇
  2003年   115篇
  2002年   106篇
  2001年   74篇
  2000年   75篇
  1999年   74篇
  1998年   164篇
  1997年   123篇
  1996年   86篇
  1995年   54篇
  1994年   60篇
  1993年   48篇
  1992年   23篇
  1991年   17篇
  1990年   24篇
  1989年   38篇
  1988年   26篇
  1987年   23篇
  1986年   34篇
  1985年   25篇
  1984年   22篇
  1983年   10篇
  1982年   8篇
  1981年   11篇
  1980年   9篇
  1979年   4篇
  1978年   8篇
  1977年   11篇
  1976年   11篇
  1973年   5篇
排序方式: 共有3808条查询结果,搜索用时 31 毫秒
71.
Multiple functional and hard-to-quantify sensorial product attributes that can be satisfied by a large number of cosmetic ingredients are required in the design of cosmetics. To overcome this problem, a new optimization-based approach for expediting cosmetic formulation is presented. It exploits the use of a hierarchy of models in an iterative manner to refine the search for creating the highest-quality cosmetic product. First, a systematic procedure is proposed for optimization problem formulation, where the cosmetic formulation problem is defined, design variables are specified, and a set of models for sensorial perception and desired product properties are identified. Then, a solution strategy that involves iterative model adoption and two numerical techniques (i.e., generalized disjunctive programming reformulation and model substitution) is applied to improve the efficiency of solving the optimization problem and to find better solutions. The applicability of the proposed procedure and solution strategy is illustrated with a perfume formulation example.  相似文献   
72.
Liu  Xinke  Kao  Evan  Haraldsson  Henrik  Ballweber  Megan  Martin  Alastair  Li  Youxiang  Wang  Yuting  Saloner  David 《Magma (New York, N.Y.)》2021,34(5):659-666
Magnetic Resonance Materials in Physics, Biology and Medicine - To determine the intra-individual flow variation in serially acquired studies, and the influence of this variation on subsequent...  相似文献   
73.
This paper presents an investigation of the influence of plasma spray process conditions on the in-flight particle behavior and their cumulative deposition to form a coating on the substrate. Three-dimensional computational fluid dynamics (CFD) analyses were performed to model the in-flight particle behavior in the plasma-spray process and their deposition on the substrate. The plasma spray was modeled as a jet issuing from the torch nozzle through the electrical heating of the arc gas. In the model, particles were injected into the plasma jet where they acquired heat and momentum from the plasma, some got melted and droplets were formed. By means of a droplet splatting model, the particle in-flight data generated by the CFD analyses were further processed to build up an imaginary three-dimensional deposition profile on a flat stationary substrate. It is found that the powder carrier gas flow rate influences the particle distribution on the substrate by imparting an injection momentum to the particles that were directed radially into the plasma jet in a direction perpendicular to the plasma jet. The larger sized particles will acquire higher injection momentum compared with the smaller sized particles. This causes particle distribution at the substrate surface that is elliptical in shape with the major axis of ellipse parallel to the particle injection port axis as illustrated in Fig. 1. Larger particles tend to congregate at the lower part of the ellipse, due to their greater momentum. The distribution of particle size, temperature, velocity, and count distribution at the substrate was analyzed. Further, based on the size and the computed particle temperature, velocity histories, and the impact sites on the substrate, the data were processed to build up a deposition profile with the Pasandideh-Fard model. The shapes of deposition profiles were found to be strongly driven by the segregation effect.  相似文献   
74.
形变诱发马氏体对1Cr18Ni9Ti不锈钢应力腐蚀破裂的影响   总被引:2,自引:0,他引:2  
通过低温(-70℃)拉伸方法,制备出具有不同马氏体(铁磁相)含量的1Cr18Ni9Ti(AISI321)奥氏体不锈钢试件。采用恒载荷法对双边缺口试样进行应力腐蚀试验,测定了不同马氏体含量的试样在氯化物介质中应力腐蚀破裂(SCC)的归一化门槛值。用SEM观察断口形貌。结果表明:当铁磁相含量小于5%时,材料的SCC敏感性随含量增加而减小;在5~15%范围内,SCC敏感性不断增加;在15~24%区域中,材料的SCC敏感性迅速下降;超过24%,SCC敏感性又有所上升。  相似文献   
75.
76.
77.
78.
Underwater communication primarily utilizes propagation of acoustic waves in water. Its unique characteristics, including slow propagation speed and low data rates, pose many challenges to Media Access Control (MAC) protocol design. In most existing handshaking-based underwater MAC protocols, only an initiating sender can transmit data packets to its intended receiver after a channel reservation through a Request-to-Send (RTS)/Clear-to-Send (CTS) handshake. This conventional single-node transmission approach is particularly inefficient in underwater environments, as it does not account for long propagation delays. To improve channel utilization in high latency environments, we propose a novel approach that exploits the idle waiting time during a 2-way handshake to set up concurrent transmissions from multiple nodes. The sender can coordinate multiple first-hop neighbors (appenders) to use the current handshake opportunity to transmit (append) their data packets with partially overlapping transmission times. After the sender finishes transmitting its packets to its own receiver, it starts to receive incoming appended packets that arrive in a collision-free packet train. This not only reduces the amount of time spent on control signaling, but it also greatly improves packet exchange efficiency. Based on this idea, we propose an asynchronous, single-channel handshaking-based MAC protocol based on reverse opportunistic packet appending (ROPA). From extensive simulations (single- and multi-hop networks) and comparisons with several existing MAC protocols, including MACA-U, MACA-UPT, BiC-MAC, Slotted-FAMA, DACAP, unslotted Aloha, we show that ROPA significantly increases channel utilization and offers performance gains in throughput and delay while attaining a stable saturation throughput.  相似文献   
79.
Abstract

In this article, we report on two lessons aimed at introducing junior high school students to the idea of shearing in a touchscreen dynamic geometry environment. By using shearing, we hoped to shift students’ attention away from a formula-driven, computational conception of area toward a more geometric one. We found that the students were able to solve several problems involving the comparison of polygons based on verbal and diagrammatic explanations. We describe the features of the touchscreen dynamic geometry technology that supported their learning, as well as the specific role that the teacher played in modeling students’ reasoning about area.  相似文献   
80.
A survey on algorithms for mining frequent itemsets over data streams   总被引:9,自引:8,他引:1  
The increasing prominence of data streams arising in a wide range of advanced applications such as fraud detection and trend learning has led to the study of online mining of frequent itemsets (FIs). Unlike mining static databases, mining data streams poses many new challenges. In addition to the one-scan nature, the unbounded memory requirement and the high data arrival rate of data streams, the combinatorial explosion of itemsets exacerbates the mining task. The high complexity of the FI mining problem hinders the application of the stream mining techniques. We recognize that a critical review of existing techniques is needed in order to design and develop efficient mining algorithms and data structures that are able to match the processing rate of the mining with the high arrival rate of data streams. Within a unifying set of notations and terminologies, we describe in this paper the efforts and main techniques for mining data streams and present a comprehensive survey of a number of the state-of-the-art algorithms on mining frequent itemsets over data streams. We classify the stream-mining techniques into two categories based on the window model that they adopt in order to provide insights into how and why the techniques are useful. Then, we further analyze the algorithms according to whether they are exact or approximate and, for approximate approaches, whether they are false-positive or false-negative. We also discuss various interesting issues, including the merits and limitations in existing research and substantive areas for future research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号