首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1549篇
  免费   72篇
  国内免费   3篇
电工技术   18篇
综合类   2篇
化学工业   540篇
金属工艺   46篇
机械仪表   56篇
建筑科学   30篇
矿业工程   4篇
能源动力   60篇
轻工业   132篇
水利工程   2篇
石油天然气   3篇
无线电   104篇
一般工业技术   219篇
冶金工业   107篇
原子能技术   6篇
自动化技术   295篇
  2023年   12篇
  2022年   87篇
  2021年   92篇
  2020年   35篇
  2019年   41篇
  2018年   37篇
  2017年   54篇
  2016年   60篇
  2015年   49篇
  2014年   85篇
  2013年   119篇
  2012年   76篇
  2011年   83篇
  2010年   71篇
  2009年   71篇
  2008年   78篇
  2007年   49篇
  2006年   56篇
  2005年   32篇
  2004年   37篇
  2003年   42篇
  2002年   21篇
  2001年   14篇
  2000年   18篇
  1999年   13篇
  1998年   20篇
  1997年   24篇
  1996年   22篇
  1995年   19篇
  1994年   18篇
  1993年   17篇
  1992年   13篇
  1991年   14篇
  1990年   7篇
  1989年   6篇
  1988年   14篇
  1987年   7篇
  1986年   4篇
  1985年   7篇
  1984年   9篇
  1983年   18篇
  1982年   6篇
  1981年   8篇
  1980年   10篇
  1979年   5篇
  1978年   7篇
  1977年   7篇
  1973年   4篇
  1971年   6篇
  1965年   3篇
排序方式: 共有1624条查询结果,搜索用时 15 毫秒
101.
Full limit analysis is preseted of a thin plate under plane stress, perforated with circular holes arranged in a regular penetration pattern. The material is assumed to be elastic–perfectly plastic and to obey the Huber–Mises yield condition together with its associated flow law. The finite element tangential stiffness method is employed. Triangular constant-strain elements are used, the load being generated by means of constant edge displacements at the periphery of a suitably selected subregion. Load-displacement diagrams are obtained for various edge displacement programs and then an interaction curve is constructed for the perforated plate considered. Each computational step is associated with a certain plastic zone which develops until the limit state configuration is reached. The plate is provided with equilateral triangular configuration of holes with arbitrary cutout coefficients. The interaction curves are plotted against the Huber–Mises yield condition for the plate without openings.  相似文献   
102.
103.
The possibility of the occurrence of critical point in /Agl-xKx/NbO3 solid solutions is discussed.  相似文献   
104.
In this paper, a model-based approach to medical image analysis is presented. It is aimed at understanding the influence of the physiological (related to tissue) and physical (related to image modality) processes underlying the image content. This methodology is exemplified by modeling first, the liver and its vascular network, and second, the standard computed tomography (CT) scan acquisition. After a brief survey on vascular modeling literature, a new method, aimed at the generation of growing three-dimensional vascular structures perfusing the tissue, is described. A solution is proposed in order to avoid intersections among vessels belonging to arterial and/or venous trees, which are physiologically connected. Then it is shown how the propagation of contrast material leads to simulate time-dependent sequences of enhanced liver CT slices.  相似文献   
105.
In the paper the optimization of geometrical and operating parameters for evaporative fluid coolers has been presented. The algorithm of optimizational calculations contains:
• the mathematical model of heat and mass transfer in evaporative fluid coolers;
• model of operating costs based, among others, on the Zalewski–Gryglaszewski relations developed by the authors for evaluation of air pressure drops in the heat exchanger;
• model of evaporative heat exchangers production costs.
Optimization problem formulated for non-linear objective functions with inequality and equality constraints has been solved using Schittkowski's method based on quadratic programming. Two optimization problems have been considered. A solution to the first problem consists in the design of a heat exchanger with such geometrical parameters which ensure its maximum heat capacity at minimal total costs. A result to the second optimization problem are such thermal and flow parameters which will ensure minimum operating costs.The results of optimization calculations presented in the paper are accompanied by their experimental verification.  相似文献   
106.
The complexity of mean flow time scheduling problems with release times   总被引:1,自引:0,他引:1  
We study the problem of preemptive scheduling of n} jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. In this paper, show that when all jobs have equal processing times then the problem can be solved in polynomial time using linear programming. Our algorithm can also be applied to the open-shop problem with release times and unit processing times. For the general case (when processing times are arbitrary), we show that the problem is unary NP-hard. P. Baptiste and C. Dürr: Supported by the NSF/CNRS grant 17171 and ANR/Alpage. P. Brucker: Supported by INTAS Project 00-217 and by DAAD PROCOPE Project D/0427360. M. Chrobak: Supported by NSF grants CCR-0208856 and INT-0340752. S. A. Kravchenko: Supported by the Alexander von Humboldt Foundation.  相似文献   
107.
In a mobile ad hoc network (MANET), the nodes act both as traffic sources and as relays that forward packets from other nodes along multi-hop routes to the destination. Such networks are suited to situations in which a wireless infrastructure is unavailable, infeasible, or prohibitively expensive. However, the lack of a secure, trusted infrastructure in such networks make secure and reliable packet delivery very challenging. A given node acting as a relay may exhibit Byzantine behavior with respect to packet forwarding, i.e., arbitrary, deviant behavior, which disrupts packet transmission in the network. For example, a Byzantine node may arbitrarily choose to drop or misroute a certain percentage of the packets that are passed to it for forwarding to the next hop. In earlier work, we proposed a trust establishment framework, called Hermes, which enables a given node to determine the “trustworthiness” of other nodes with respect to reliable packet delivery by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. A deficiency of the Hermes scheme is that a node can fail to detect certain types of Byzantine behavior, such as packet misforwarding directed at a particular source node. In this paper, we propose new mechanisms to make Hermes robust to Byzantine behavior and introduce a punishment policy that discourages selfish node behavior. We present simulation results that demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving Byzantine nodes that are malicious both with respect to packet forwarding and trust propagation.  相似文献   
108.
Understanding how forces propagate in granular assemblages is important for equipment design and process control in many technologies. Yet, it remains poorly understood. In this study, a cuboidal assembly comprising cylinders of various lengths (aspect ratios AR ranging from 0.9 to 3.6) were subjected to uniaxial confined compression tests. Samples were vertically compressed until the top platen exerted a pressure of 50 kPa on the uppermost particles. This maximum pressure corresponds to the hydrostatic pressure of an approximately 15 m high column of chopped wood that may be encountered in real storage structures. The nonlinear loading curves were obtained depended on the aspect ratios of the cylinders. The modulus of elasticity, calculated from the linear elastic part of the stress–strain curve, monotonically decreased from 10.2 to 8.6 MPa as the aspect ratio increased from 1.2 to 3.6. The elastic modulus and volume fraction exhibited similar trends as functions of the aspect ratio. The horizontal-to-vertical pressure ratio was calculated as the horizontal pressure exerted on the wider walls to the vertical pressure exerted on the top lid during loading–unloading cycles. For ARs up to 3.6, the pressure ratio was approximately 0.31; for the longest cylinders (AR = 3.6), it decreased to approximately 0.27, probably because the assumption of the representative chamber volume was invalidated at this AR.  相似文献   
109.
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号