首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   657篇
  免费   14篇
  国内免费   5篇
电工技术   15篇
综合类   1篇
化学工业   128篇
金属工艺   8篇
机械仪表   14篇
建筑科学   10篇
能源动力   54篇
轻工业   52篇
水利工程   5篇
石油天然气   4篇
无线电   76篇
一般工业技术   134篇
冶金工业   69篇
原子能技术   6篇
自动化技术   100篇
  2023年   6篇
  2022年   13篇
  2021年   30篇
  2020年   25篇
  2019年   27篇
  2018年   18篇
  2017年   20篇
  2016年   29篇
  2015年   19篇
  2014年   34篇
  2013年   55篇
  2012年   35篇
  2011年   40篇
  2010年   20篇
  2009年   31篇
  2008年   21篇
  2007年   21篇
  2006年   13篇
  2005年   12篇
  2004年   17篇
  2003年   8篇
  2002年   9篇
  2001年   6篇
  2000年   11篇
  1999年   7篇
  1998年   9篇
  1997年   16篇
  1996年   11篇
  1995年   12篇
  1994年   4篇
  1993年   9篇
  1992年   6篇
  1991年   9篇
  1990年   4篇
  1988年   9篇
  1987年   4篇
  1986年   5篇
  1985年   4篇
  1984年   8篇
  1983年   5篇
  1981年   2篇
  1980年   2篇
  1979年   5篇
  1978年   3篇
  1976年   5篇
  1975年   2篇
  1974年   5篇
  1969年   2篇
  1967年   1篇
  1959年   1篇
排序方式: 共有676条查询结果,搜索用时 15 毫秒
101.
102.
The number of security failure discovered and disclosed publicly are increasing at a pace like never before. Wherein, a small fraction of vulnerabilities encountered in the operational phase are exploited in the wild. It is difficult to find vulnerabilities during the early stages of software development cycle, as security aspects are often not known adequately. To counter these security implications, firms usually provide patches such that these security flaws are not exploited. It is a daunting task for a security manager to prioritize patches for vulnerabilities that are likely to be exploitable. This paper fills this gap by applying different machine learning techniques to classify the vulnerabilities based on previous exploit-history. Our work indicates that various vulnerability characteristics such as severity, type of vulnerabilities, different software configurations, and vulnerability scoring parameters are important features to be considered in judging an exploit. Using such methods, it is possible to predict exploit-prone vulnerabilities with an accuracy >85%. Finally, with this experiment, we conclude that supervised machine learning approach can be a useful technique in predicting exploit-prone vulnerabilities.  相似文献   
103.
The purpose of this research is to aid manufacturers operating in multiple market segments (characterised by a number of product variants) to formulate and synchronise their product commercialisation strategy. Product commercialisation is primarily characterised by upgrading/launching product features aimed at meeting customer’s preferences, while at the same time, enabling the enterprise to achieve its major commercial objectives. Firstly, by employing the semi-automated crowd sourcing-based approach and considering qualitative customer evaluations, customer-preferred product features have been identified and their relative weights determined. Thereafter, a detailed mixed integer quadratic programming formulation has been evolved taking into account pertinent commercial objectives of the enterprise and engineering-level constraints of the product. The developed formulation has been solved using the Branch and Cut method of commercial solver, LINGO. Detailed sensitivity analysis has been carried out, followed by populating key managerial insights. The proposed framework has been illustrated using a real-life case example of operator cabin used in heavy construction equipment industry. Our focus has been on development and illustration of devised framework; hence, the superiority of results has not been claimed. Better results may be obtained using other heuristics/algorithms.  相似文献   
104.
Among the various possible ways of dealing with notch and crack situations, the scaled boundary finite element method [SBFEM, (Wolf and Song in Finite element modelling of unbounded structures. Wiley, Chichester, 1996; Wolf in The scaled boundary finite element method. Wiley, Chichester, 2003)] has been adopted in this work. This method has been proved to be versatile, much less time consuming than the finite element method and generates highly accurate numerical predictions in cases of structures with notches and cracks. The SBFEM gives the advantage of boundary element method by reducing one dimension in modelling the structures but the mathematical formulations are more related to conventional displacement based finite element method. This method requires a certain scalability of the given structure with respect to a point called similarity center. Like in the case of the boundary element method, the structure needs to be discretized only at the surface where standard displacement based isoparametric finite element formulations are adequate. Unlike in the boundary element method, however, no fundamental solution is required by the scaled boundary finite element method. The similarity or scalability of the method requires separation of coordinates such that in the radial direction (i.e. scaling direction) it yields simple differential equations that can be solved analytically. So this approach can be considered as a semi-analytical method. Several two-dimensional examples have been analysed for crack and notch situations that are well known cases in fracture mechanics. A number of three-dimensional cases have been considered for different crack configurations that yield high order of singularity. The results, according to the authors’ knowledge are up to now unpublished in the open literature. Parametric studies are conducted for structures with bi-material interfaces.  相似文献   
105.
The present investigation aims to represent three-dimensional motion and breakage phenomena of black pepper seeds in the cryogenic mill (hammer mill) using discrete element method (DEM). In DEM modeling, bonded particle model was coupled with Hertz-Mindlin contact model. Calibration method was used to select appropriate model (bond) parameters. The calibrated set of bond parameters includes 3.12?×?1011?Pa?m?1 normal stiffness; 1.56?×?1011?Pa?m?1 shear stiffness; 3.88?×?108?Pa critical normal stiffness; 1.94?×?108?Pa critical shear stiffness. Besides, the validity of calibrated parameters was tested in the hammer mill. The observed qualitative and quantitative results (breakage and flow pattern) of numerical and experimental approaches were in good agreement. Based on these results, a few prefatory suggestions were provided to improve the design aspects of the mill. Overall, DEM modeling offered a better understanding of particle breakage and flow pattern in the mill.  相似文献   
106.
Chitosan is synthesized by deacetylating chitin with NaOH solution under microwave irradiation. The process describes a rapid synthesis procedure in comparison to conventional methods. The microwave-synthesized chitosan was characterized by Ninhydrin test, Fourier transform-infrared spectroscopy and X-ray diffraction measurements. The experimental results show that the degree of deacetylation increased with increasing irradiation time. A degree of deacetylation of 85.3% was achieved after irradiating chitin with 45% NaOH solution in a microwave for 5.5 min at 900-watt power. This method can be very useful for synthesizing low molecular weight chitosan with rapid and clean chemistry.  相似文献   
107.
The immense surface-to-volume (S/V) ratio in nanoparticles leads to large surface energy density. These high densities play the role of sites for activities that are not triggered in bulk materials. Here we present some examples of such distinctive activities taking place at nanoparticle surfaces. Our first example involves the morphological changes in silkworm (Bombyx mori L.) nuclear polyhedrosis virus (BmNPV) brought about by lipophilic amorphous silica nanoparticles (LASN). Microscopy studies show that nanoparticles severely alter the structure of the virus envelope by a 'deflation' of the viral polyhedron and formation of elongated structures. The second example shows the spatial variation in aggregation potential with temperature, for dodecanethiol-capped Au nanoparticles on an amorphous polystyrene film surface. We find that on increasing the temperature from 32 degrees C to 50 degrees C the aggregating potential becomes almost completely confined to the film surface, whereas going over to 100 degrees C the confining potential is overcome and out-of-plane growth takes place. A tentative and qualitative explanation has been attempted.  相似文献   
108.
By tuning a control parameter, a chaotic system can either display two or more attractors (generalized multistability) or exhibit an interior crisis, whereby a chaotic attractor suddenly expands to include the region of an unstable orbit (bursting regime).Recently, control of multistability and bursting have been experimentally proved in a modulated class B laser by means of a feedback method. In a bistable regime, the method relies on the knowledge of the frequency components of the two attractors. Near an interior crisis, the method requires retrieval of the unstable orbit colliding with the chaotic attractor.We also show that a suitable parameter modulation is able to control bistability in the Lorenz system. We observe that, for every given modulation frequency, the chaotic attractor is destroyed under a boundary crisis. The threshold control amplitude depends on the control frequency and the location of the operating point in the bistable regime. Beyond the boundary crisis, the system remains in the steady state even if the control is switched off, demonstrating control of bistability.  相似文献   
109.
Due to variety of materials available to any designer for a particular application, there is a need for a proper technique to select. This paper focuses on the optimum selection of materials for electrostatic microactuators using Ashby approach. In this work, performance indices and material indices have been developed for electrostatic actuators and thereafter material selection chart is plotted. The selection chart shows that for high actuation voltage and high actuation force, diamond is the best possible candidate followed by silicon carbide and silicon nitride. On the other hand, if high speed electrostatic actuator is desired, then aluminum is the best possible candidate followed by nickel and copper.  相似文献   
110.
The title compound, C14H14O4, a linear dihydrofuranocoumarin, was isolated from the bark ofAegle marmelos, a plant widely used in Ayurvedic system of medicine for the treatment of various ailments. The crystal structure was determined from X-ray diffraction data using direct methods. The compound crystallizes into monoclinic space group P21 with unit cell parameters:a] = 5.721(1) Å, b= 13.810(1) Å, c= 7.864(2) Å, β = 100.39(1)°, Z = 2. The structure was refined by full-matrix least-squares to a finalR value of 0.0523 for 1184 observed reflections. The benzopyran moiety is perfectly planar. The dihedral angle between the pyrone and benzene rings is 0.3(1)°. The furan ring has a 2α-envelope conformation. The molecules are linked by O-H…O hydrogen bonds into chains and these chains are linked into sheets by C-H…O hydrogen bonds. Further, the π-π stacking and C-H…π (arene) interactions link all of the sheets into a supramolecular structure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号