首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1246篇
  免费   71篇
  国内免费   2篇
电工技术   9篇
综合类   1篇
化学工业   292篇
金属工艺   33篇
机械仪表   18篇
建筑科学   60篇
矿业工程   2篇
能源动力   41篇
轻工业   75篇
水利工程   4篇
石油天然气   1篇
无线电   63篇
一般工业技术   291篇
冶金工业   222篇
原子能技术   5篇
自动化技术   202篇
  2024年   5篇
  2023年   34篇
  2022年   41篇
  2021年   58篇
  2020年   42篇
  2019年   46篇
  2018年   53篇
  2017年   49篇
  2016年   39篇
  2015年   33篇
  2014年   39篇
  2013年   84篇
  2012年   65篇
  2011年   57篇
  2010年   52篇
  2009年   58篇
  2008年   60篇
  2007年   40篇
  2006年   41篇
  2005年   24篇
  2004年   24篇
  2003年   25篇
  2002年   21篇
  2001年   12篇
  2000年   16篇
  1999年   8篇
  1998年   54篇
  1997年   32篇
  1996年   35篇
  1995年   15篇
  1994年   11篇
  1993年   16篇
  1992年   17篇
  1991年   5篇
  1990年   6篇
  1989年   7篇
  1988年   6篇
  1987年   5篇
  1985年   4篇
  1984年   5篇
  1983年   4篇
  1982年   5篇
  1981年   6篇
  1979年   6篇
  1978年   5篇
  1976年   12篇
  1969年   3篇
  1957年   3篇
  1954年   3篇
  1943年   4篇
排序方式: 共有1319条查询结果,搜索用时 0 毫秒
81.
The most fundamental results of information theory are Shannon’s theorems. These theorems express the bounds for (1) reliable data compression and (2) data transmission over a noisy channel. Their proofs are non-trivial but are rarely detailed, even in the introductory literature. This lack of formal foundations is all the more unfortunate that crucial results in computer security rely solely on information theory: this is the so-called “unconditional security”. In this article, we report on the formalization of a library for information theory in the SSReflect extension of the Coq proof-assistant. In particular, we produce the first formal proofs of the source coding theorem, that introduces the entropy as the bound for lossless compression, and of the channel coding theorem, that introduces the capacity as the bound for reliable communication over a noisy channel.  相似文献   
82.
The effect of molybdenum, niobium, and vanadium on the occurrence of static recovery and recrystallization after high temperature deformation was investigated in a series of microalloyed steels. The steels had a base composition of 0.05 pct C and 1.40 pct Mn. To this, single additions of 0.30 pct Mo, 0.035 pct Nb, and 0.115 pct V were made. Interrupted hot compression tests were performed at 900 and 1000 °C, and at a constant true strain rate of 2 s-1. The load-free time was decreased from 5000 s to 50 ms, and the degree of static softening during this period was determined. Both graphite and glass were used as lubricants. Percent softeningvs delay time curves are presented and the retarding effect of molybdenum, niobium, and vanadium addition on the rate of static recovery and recrystallization is discussed. The greatest solute retardation of static recovery and recrystallization is produced by niobium addition, followed by that of molybdenum, vanadium leading to the smallest delay. Although the rank order of this effect is the same as found under dynamic softening conditions, the relative contribution of niobium is more profound for the static condition. The solute strengthening attributable to each element was also assessed, and found to follow the same order as for the recovery and recrystallization results. At 900 °C, the onset of the static precipitation of Nb (CN) was detected at approximately 10 seconds, somewhat earlier than previously reported. Formerly Graduate Student at McGill University, Montreal, Quebec.  相似文献   
83.
This paper deals with nonoverlapping domain decomposition methods for two coupled Stokes flows, based on the duality theory. By introducing a fictitious variable in the transmission condition and using saddle-point equations, the problem is restated as a linearly constrained maximization problem. According to whether constraints are uncoupled Stokes problems or uncoupled Poisson problems, two Uzawa-type domain decomposition algorithms are proposed. The results of some numerical experiments on a model problem are given.  相似文献   
84.
The time dependent rupture of a fibre bundle under constant tensile load and with scatter in fibre stiffness and fibre strength is analysed using a general formulation of the creep law. The total rupture time is divided into an incubation time, with all fibres intact, and a failure propagation time where fibres fail progressively. Governing equations are given for both time intervals. It is shown that the failure propagation time interval is independent of the load if no spatial stress redistribution occurs and all fibres remain intact upon loading. For a bundle consisting of originally uniform fibres where a fraction is afflicted with a certain defect, the time intervals are calculated assuming Norton's non linear creep law.  相似文献   
85.
The performance of segmented and continuous penetrators impacting semi-infinite and spaced armor is studied using both the EPIC-2 and HULL hydrocodes. First the performance of a segmented rod is studied, striking semi-infinite armor, for various parameters such as striking velocity, segment spacing and number of segments. Then an actual penetrator configuration proposed by A. Charters is analyzed and the use of normalized penetration is discussed. Finally three-dimensional simulations are presented for segmented and continuous penetrators impacting oblique spaced armor varying such parameters as striking velocity, segment spacing, number of segments, and target thickness.  相似文献   
86.
In computer graphics we use techniques from different areas of mathematics. Mathematical models are used to simulate real-world objects, as well as natural phenomena. In order to understand these models and pose relevant problems in each particular field of this area, it is important to create levels of abstraction. These levels encapsulate common properties of the different models and allow us to have a global, conceptual view of the methods and techniques in each field. In this paper we study a paradigm for creating abstraction levels that can also be used to characterize more general problems in computational applied mathematics. We apply this paradigm to different areas of computer graphics: modeling, animation, illumination, color theory, image processing and human-computer interface.  相似文献   
87.
Nonlinear black-box modeling in system identification: a unified overview   总被引:7,自引:0,他引:7  
A nonlinear black-box structure for a dynamical system is a model structure that is prepared to describe virtually any nonlinear dynamics. There has been considerable recent interest in this area, with structures based on neural networks, radial basis networks, wavelet networks and hinging hyperplanes, as well as wavelet-transform-based methods and models based on fuzzy sets and fuzzy rules. This paper describes all these approaches in a common framework, from a user's perspective. It focuses on what are the common features in the different approaches, the choices that have to be made and what considerations are relevant for a successful system-identification application of these techniques. It is pointed out that the nonlinear structures can be seen as a concatenation of a mapping form observed data to a regression vector and a nonlinear mapping from the regressor space to the output space. These mappings are discussed separately. The latter mapping is usually formed as a basis function expansion. The basis functions are typically formed from one simple scalar function, which is modified in terms of scale and location. The expansion from the scalar argument to the regressor space is achieved by a radial- or a ridge-type approach. Basic techniques for estimating the parameters in the structures are criterion minimization, as well as two-step procedures, where first the relevant basis functions are determined, using data, and then a linear least-squares step to determine the coordinates of the function approximation. A particular problem is to deal with the large number of potentially necessary parameters. This is handled by making the number of ‘used’ parameters considerably less than the number of ‘offered’ parameters, by regularization, shrinking, pruning or regressor selection.  相似文献   
88.
Cognition, Technology & Work - Lack of support for handling a reduction of autonomy in a highly autonomous automation may lead to a stressful situation for a human when forced to take over. We...  相似文献   
89.
The business model concept is becoming increasingly popular within IS, management and strategy literature. It is used within many fields of research, including both traditional strategy theory and in the emergent body of literature on e-business. However, the concept is often used independently from theory, meaning model components and their interrelations are relatively obscure. Nonetheless, we believe that the business model concept is useful in explaining the relation between IS and strategy. This paper offers an outline for a conceptual business model, and proposes that it should include customers and competitors, the offering, activities and organisation, resources and factor market interactions. The causal inter-relations and the longitudinal processes by which business models evolve should also be included. The model criticises yet draws on traditional strategy theory and on the literature that addresses business models directly. The business model is illustrated by an ERP implementation in a European multi-national company.  相似文献   
90.
This article presents a novel framework for modeling the troubleshooting process for automotive systems such as trucks and buses. We describe how a diagnostic model of the troubleshooting process can be created using event-driven, nonstationary, dynamic Bayesian networks. Exact inference in such a model is in general not practically possible. Therefore, we evaluate different approximate methods for inference based on the Boyen–Koller algorithm. We identify relevant model classes that have particular structure such that inference can be made with linear time complexity. We also show how models created using expert knowledge can be tuned using statistical data. The proposed learning mechanism can use data that is collected from a heterogeneous fleet of modular vehicles that can consist of different components. The proposed framework is evaluated both theoretically and experimentally on an application example of a fuel injection system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号