首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2833篇
  免费   91篇
  国内免费   9篇
电工技术   44篇
综合类   1篇
化学工业   697篇
金属工艺   58篇
机械仪表   59篇
建筑科学   49篇
矿业工程   3篇
能源动力   91篇
轻工业   201篇
水利工程   12篇
石油天然气   7篇
无线电   299篇
一般工业技术   523篇
冶金工业   566篇
原子能技术   27篇
自动化技术   296篇
  2023年   26篇
  2022年   53篇
  2021年   75篇
  2020年   70篇
  2019年   65篇
  2018年   85篇
  2017年   60篇
  2016年   62篇
  2015年   57篇
  2014年   78篇
  2013年   174篇
  2012年   105篇
  2011年   107篇
  2010年   75篇
  2009年   87篇
  2008年   84篇
  2007年   74篇
  2006年   83篇
  2005年   58篇
  2004年   43篇
  2003年   44篇
  2002年   45篇
  2001年   22篇
  2000年   41篇
  1999年   64篇
  1998年   200篇
  1997年   135篇
  1996年   101篇
  1995年   60篇
  1994年   63篇
  1993年   58篇
  1992年   38篇
  1991年   31篇
  1990年   22篇
  1989年   42篇
  1988年   33篇
  1987年   30篇
  1986年   26篇
  1985年   22篇
  1984年   20篇
  1983年   18篇
  1982年   30篇
  1981年   31篇
  1980年   26篇
  1979年   21篇
  1978年   17篇
  1977年   29篇
  1976年   41篇
  1974年   15篇
  1973年   24篇
排序方式: 共有2933条查询结果,搜索用时 562 毫秒
141.
Particulate metal matrix composites (PMMCs) have attracted interest for application in numerous fields. The current processing methods often produce agglomerated particles in the ductile matrix and as a result these composites exhibit extremely low ductility. The key idea to solve the current problem is to adopt a novel Rheo-process allowing the application of sufficient shear stress (τ) on particulate clusters embedded in liquid metal to overcome the average cohesive force or the tensile strength of the cluster. In this study, cast A356/SiCp composites were produced using a conventional stir casting technique and a novel Rheo-process. The microstructure and properties were evaluated. The adopted Rheo-process significantly improved the distribution of the reinforcement in the matrix. A good combination of improved ultimate tensile strength (UTS) and tensile elongation (ε) is obtained.  相似文献   
142.
This study made an attempt to develop ethnographic decision models to understand and improve iron-folic acid supplement procurement and compliance-related behaviors of poor urban pregnant women in Vadodara, India, based on data obtained through the use of qualitative research tools. Open-ended, in-depth interviews were conducted with 36 pregnant women (17-32 weeks of gestation) purposively selected from four urban slums. Fortnightly home visits were made to the houses of 20 pregnant women-family member pairs to elicit behaviors related to iron-folic acid supplement procurement and compliance at the household level, from which the ethnographic decision models were developed. The hemoglobin levels of these women were also assessed. Regular counseling until delivery, based on the ethnographic data, helped to improve compliance, which resulted in 95% of the women consuming over 90% of the required dose. The mean hemoglobin level also improved from 9.6 to 11.08 g/dl until the end of the last trimester. This study highlighted the need for qualitative ethnographic data to develop such models that would help in the understanding of specific behaviors that influence program acceptance. Such data would have policy-level implications, for example, developing appropriate information-education-communication material and counseling strategies.  相似文献   
143.
The Internet is evolving from best-effort service toward an integrated or differentiated service framework with quality-of-service (QoS) assurances that are required for new multimedia service applications. Given this increasing demand for high bandwidth Internet with QoS assurances in the coming years, an IP/MPLS-based control plane combined with a wavelength-routed dense wavelength division multiplexing (DWDM) optical network is seen as a very promising approach for the realization of future re-configurable transport networks. Fault and attack survivability issues concerning physical security in a DWDM all-optical transport network (AOTN) require a new approach taking into consideration AOTN physical characteristics. Furthermore, unlike in electronic networks that regenerate signals at every node, attack detection and isolation schemes may not have access to the overhead bits used to transport supervisory information between regenerators or switching sites to perform their functions. This paper presents an analysis of attack and protection problems in an AOTN. Considering this, we propose a framework for QoS guarantees based on the differentiated MPLS service (DMS) model and QoS recovery schemes against QoS degradation caused by devices failures or attack-induced faults in an AOTN. We also suggest how to integrate our attack management model into the NISTs simulator—modeling, evaluation and research of lightwave networks (MERLiN).  相似文献   
144.
In this paper, various deterministic models for determining optimal pickup times for air cargo from an airport and delivering it to a local distribution center for a global manufacturer are presented. The arrival times of the flights that can potentially bring air cargo are assumed to be deterministic and known. In addition, the custom clearance time for the air cargo and the traveling time from the airport to the local distribution center are assumed to be deterministic and known. These models are formulated mathematically as linear binary integer programming models without air cargo weight considerations. Deterministic formulations without air cargo weight information are shown to be related to the p-Median problem. The deterministic formulation of air cargo pickup times with air cargo weight consideration is shown to be a nonlinear binary integer programming model. The solutions of these models serve as an initial starting point to solve the stochastic problem with random arrival times of the flights and random custom clearance times and travel times.  相似文献   
145.
Conducting user-centered design is a primary challenge in ubiquitous computing. Two kinds of prototyping techniques can be particularly effective for developing mobile and ubiquitous computing applications: compound prototypes and situated experience prototypes. Compound prototypes combine the final product's user interface (UI) with a computational implementation that runs on a separate system without the resource constraints of the target device. This model lets researchers and designers evaluate a new application's physicality and aesthetics as well as its functionality. Situated experience prototypes, or paratypes, include experimental protocols that attempt to reproduce user interaction with the system in real situations, and can optionally use common prototyping instruments such as paper mock-ups or physical props. Using our Personal Audio Loop (PAL) project as a case study, we discuss how you can fruitfully employ compound prototypes and paratypes when designing and developing mobile and ubiquitous computing applications.  相似文献   
146.
Balance of power: dynamic thermal management for Internet data centers   总被引:1,自引:0,他引:1  
Internet-based applications and their resulting multitier distributed architectures have changed the focus of design for large-scale Internet computing. Internet server applications execute in a horizontally scalable topology across hundreds or thousands of commodity servers in Internet data centers. Increasing scale and power density significantly impacts the data center's thermal properties. Effective thermal management is essential to the robustness of mission-critical applications. Internet service architectures can address multisystem resource management as well as thermal management within data centers.  相似文献   
147.
Practical methods for constructing suffix trees   总被引:7,自引:0,他引:7  
Sequence datasets are ubiquitous in modern life-science applications, and querying sequences is a common and critical operation in many of these applications. The suffix tree is a versatile data structure that can be used to evaluate a wide variety of queries on sequence datasets, including evaluating exact and approximate string matches, and finding repeat patterns. However, methods for constructing suffix trees are often very time-consuming, especially for suffix trees that are large and do not fit in the available main memory. Even when the suffix tree fits in memory, it turns out that the processor cache behavior of theoretically optimal suffix tree construction methods is poor, resulting in poor performance. Currently, there are a large number of algorithms for constructing suffix trees, but the practical tradeoffs in using these algorithms for different scenarios are not well characterized. In this paper, we explore suffix tree construction algorithms over a wide spectrum of data sources and sizes. First, we show that on modern processors, a cache-efficient algorithm with O(n2) worst-case complexity outperforms popular linear time algorithms like Ukkonen and McCreight, even for in-memory construction. For larger datasets, the disk I/O requirement quickly becomes the bottleneck in each algorithm's performance. To address this problem, we describe two approaches. First, we present a buffer management strategy for the O(n2) algorithm. The resulting new algorithm, which we call “Top Down Disk-based” (TDD), scales to sizes much larger than have been previously described in literature. This approach far outperforms the best known disk-based construction methods. Second, we present a new disk-based suffix tree construction algorithm that is based on a sort-merge paradigm, and show that for constructing very large suffix trees with very little resources, this algorithm is more efficient than TDD.  相似文献   
148.
This article describes RISCBOT (RISCBOT name has been derived from RISC lab and ‘bot’ of robot, a modular 802.11 b-enabled mobile autonomous robot built at the RISC lab of the University of Bridgeport. RISCBOT localizes itself and successfully fulfills www – enabled online user requests and navigates to various rooms, employing a visual recognition algorithm. This article describes the mechanical design, hardware and software algorithms of the robot, and the web-based interface for communicating with the robot. RISC lab: Interdisciplinary Robotics, Intelligent Sensing and Control laboratory at the University of Bridgeport.  相似文献   
149.
In many dynamic open systems, agents have to interact with one another to achieve their goals. Here, agents may be self-interested, and when trusted to perform an action for another, may betray that trust by not performing the action as required. In addition, due to the size of such systems, agents will often interact with other agents with which they have little or no past experience. There is therefore a need to develop a model of trust and reputation that will ensure good interactions among software agents in large scale open systems. Against this background, we have developed TRAVOS (Trust and Reputation model for Agent-based Virtual OrganisationS) which models an agent’s trust in an interaction partner. Specifically, trust is calculated using probability theory taking account of past interactions between agents, and when there is a lack of personal experience between agents, the model draws upon reputation information gathered from third parties. In this latter case, we pay particular attention to handling the possibility that reputation information may be inaccurate.  相似文献   
150.
This paper deals with the problem of H control of linear two-time scale systems. The authors’ attention is focused on the robust regulation of the system based on a new modeling approach under the assumption of norm-boundedness of the fast dynamics. In the proposed approach, the fast dynamics are treated as a norm-bounded disturbance (dynamic uncertainty). In this view, the synthesis is performed only for the certain dynamics of the two-time scale system, whose order is less than that of the original system. It should be noted, however, that this scheme is significantly different from the conventional approaches of order reduction for linear two-time scale systems. Specifically, in the present work, explicitly or implicitly, all the dynamics of the system are taken into consideration. In other words, the portion that is treated as a perturbation is incorporated in the design by its maximum possible gain – in the L 2 sense – over different values of the inputs. One of the advantagesof this approach is that – unlike in the conventional approaches of the order reduction the reduced-order system still keeps some information of the ‘deleted’ subsystem. Also, we consider the robust stability analysis and stability bound improvement of perturbed parameter (ɛ) in the two-time scale systems by using linear fractional transformations and structured singular values (μ) approach. In this direction, by introducing the parametric uncertainty and dynamic uncertainty in the two-time scale systems, we represent the system as a standard μ-interconnection framework by using linear fractional transformations, and derive a set of new stability conditions for the system in the frequency domain. The exact solution of ɛ-bound is characterized. It is shown that, in spite of the coupling between the dynamic uncertainties and certain dynamics, the designed H controller stabilizes the overall closed-loop system, in the presence of norm-bounded disturbances. To show the effectiveness of the approach, the modeling of the single-link flexible manipulator and control of the Tip-position of the manipulator by utilizing the mentioned method are presented in the case study.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号