首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5265篇
  免费   123篇
  国内免费   5篇
电工技术   62篇
综合类   9篇
化学工业   948篇
金属工艺   58篇
机械仪表   84篇
建筑科学   264篇
矿业工程   18篇
能源动力   108篇
轻工业   529篇
水利工程   47篇
石油天然气   20篇
无线电   516篇
一般工业技术   932篇
冶金工业   1135篇
原子能技术   28篇
自动化技术   635篇
  2022年   27篇
  2021年   73篇
  2020年   45篇
  2019年   53篇
  2018年   69篇
  2017年   68篇
  2016年   58篇
  2015年   78篇
  2014年   103篇
  2013年   293篇
  2012年   146篇
  2011年   258篇
  2010年   171篇
  2009年   166篇
  2008年   197篇
  2007年   208篇
  2006年   178篇
  2005年   163篇
  2004年   138篇
  2003年   149篇
  2002年   131篇
  2001年   112篇
  2000年   123篇
  1999年   101篇
  1998年   283篇
  1997年   196篇
  1996年   163篇
  1995年   117篇
  1994年   114篇
  1993年   123篇
  1992年   72篇
  1991年   50篇
  1990年   68篇
  1989年   78篇
  1988年   85篇
  1987年   58篇
  1986年   59篇
  1985年   77篇
  1984年   50篇
  1983年   53篇
  1982年   56篇
  1981年   57篇
  1980年   48篇
  1979年   52篇
  1978年   40篇
  1977年   77篇
  1976年   85篇
  1975年   42篇
  1974年   28篇
  1972年   24篇
排序方式: 共有5393条查询结果,搜索用时 11 毫秒
61.
This paper investigates the fundamental difference between a simple e-tender box and a traditional physical tender box, and highlights a series of security traps created by the functional differences. Based on our findings, we have defined the security requirements for an e-tender submission protocol. We also discuss functional limitations of cryptographic technologies. As a result, two secure e-tender submission protocols are proposed which enable a secure e-tender submission. Protocols are assumed to run under the condition that all tendering parties (principal and tenderers) are dishonest players. Our informal and formal security analysis show that these protocols meet their security goals under well known collusion scenarios. Because security is a process not a product, our approach will have broad industry application for developing secure electronic business processes in areas other than e-tendering.
Colin BoydEmail:
  相似文献   
62.
Towards a continuous microfluidic rheometer   总被引:1,自引:1,他引:0  
In a previous paper we presented a way to measure the rheological properties of complex fluids on a microfluidic chip (Guillot et al., Langmuir 22:6438, 2006). The principle of our method is to use parallel flows between two immiscible fluids as a pressure sensor. In fact, in a such flow, both fluids flow side by side and the size occupied by each fluid stream depends only on both flow rates and on both viscosities. We use this property to measure the viscosity of one fluid knowing the viscosity of the other one, both flow rates and the relative size of both streams in a cross-section. We showed that using a less viscous fluid as a reference fluid allows to define a mean shear rate with a low standard deviation in the other fluid. This method allows us to measure the flow curve of a fluid with less than 250 μL of fluid. In this paper we implement this principle in a fully automated set up which controls the flow rate, analyzes the picture and calculates the mean shear rate and the viscosity of the studied fluid. We present results obtained for Newtonian fluids and complex fluids using this set up and we compare our data with cone and plate rheometer measurements. By adding a mixing stage in the fluidic network we show how this set up can be used to characterize in a continuous way the evolution of the rheological properties as a function of the formulation composition. We illustrate this by measuring the rheological curve of four formulations of polyethylene oxide solution with only 1.3 mL of concentrated polyethylene oxide solution. This method could be very useful in screening processes where the viscosity range and the behavior of the fluid to an applied stress must be evaluated.  相似文献   
63.
The paper addresses a notion of configuring systems, constructing them from specified component parts with specified sharing. This notion is independent of any underlying specification language and has been abstractly identified with the taking of colimits in category theory. Mathematically it is known that these can be expressed by presheaves and the present paper applies this idea to configuration. We interpret the category theory informally as follows. Suppose ? is a category whose objects are interpreted as specifications, and for which each morphism u : XY is interpreted as contravariant ‘instance reduction’, reducing instances of specification Y to instances of X. Then a presheaf P: Set ?op represents a collection of instances that is closed under reduction. We develop an algebraic account of presheaves in which we present configurations by generators (for components) and relations (for shared reducts), and we outline a proposed configuration language based on the techniques. Oriat uses diagrams to express colimits of specifications, and we show that Oriat's category Diag(?) of finite diagrams is equivalent to the category of finitely presented presheaves over ?. Received May 1998 / Accepted in revised form August 2000  相似文献   
64.
Whereas there is a number of methods and algorithms to learn regular languages, moving up the Chomsky hierarchy is proving to be a challenging task. Indeed, several theoretical barriers make the class of context-free languages hard to learn. To tackle these barriers, we choose to change the way we represent these languages. Among the formalisms that allow the definition of classes of languages, the one of string-rewriting systems (SRS) has outstanding properties. We introduce a new type of SRS’s, called Delimited SRS (DSRS), that are expressive enough to define, in a uniform way, a noteworthy and non trivial class of languages that contains all the regular languages, , , the parenthesis languages of Dyck, the language of Lukasiewicz, and many others. Moreover, DSRS’s constitute an efficient (often linear) parsing device for strings, and are thus promising candidates in forthcoming applications of grammatical inference. In this paper, we pioneer the problem of their learnability. We propose a novel and sound algorithm (called LARS) which identifies a large subclass of them in polynomial time (but not data). We illustrate the execution of our algorithm through several examples, discuss the position of the class in the Chomsky hierarchy and finally raise some open questions and research directions. This work was supported in part by the IST Program of the European Community, under the PASCAL Network of Excellence, IST-2002-506778. This publication only reflects the authors’ views. Editor: Georgios Paliouras and Yasubumi Sakakibara  相似文献   
65.
This letter aims at studying the impact of iterative Hebbian learning algorithms on the recurrent neural network's underlying dynamics. First, an iterative supervised learning algorithm is discussed. An essential improvement of this algorithm consists of indexing the attractor information items by means of external stimuli rather than by using only initial conditions, as Hopfield originally proposed. Modifying the stimuli mainly results in a change of the entire internal dynamics, leading to an enlargement of the set of attractors and potential memory bags. The impact of the learning on the network's dynamics is the following: the more information to be stored as limit cycle attractors of the neural network, the more chaos prevails as the background dynamical regime of the network. In fact, the background chaos spreads widely and adopts a very unstructured shape similar to white noise. Next, we introduce a new form of supervised learning that is more plausible from a biological point of view: the network has to learn to react to an external stimulus by cycling through a sequence that is no longer specified a priori. Based on its spontaneous dynamics, the network decides "on its own" the dynamical patterns to be associated with the stimuli. Compared with classical supervised learning, huge enhancements in storing capacity and computational cost have been observed. Moreover, this new form of supervised learning, by being more "respectful" of the network intrinsic dynamics, maintains much more structure in the obtained chaos. It is still possible to observe the traces of the learned attractors in the chaotic regime. This complex but still very informative regime is referred to as "frustrated chaos."  相似文献   
66.
In this article, we present research in the making of a collective work environment within the framework of a distance education course. We base our theoretical and methodological standpoints on examples of dialogical discourses recorded within the framework of this CSCL system called Symba. In fact, the results of previous research lead us to rethink our vision of the study of collaborative moments between participants in a computer-supported human learning environment that proposes several communication tools. Redefining the methodological process aiming at finding and understanding these rich learning moments is also necessary. We intend to describe “socio-technical” instances during which these collaboration phases appear. More generally speaking, our aim is to draw up both new theoretical and methodological perspectives that would be reusable in CSCL environments; in view of the nature of these two perspectives, and the diversity of the domain knowledge (sociology, cognitivism, linguistics, philosophy, statistics, etc.) brought to bear in the study of the environment in question, our approach constitutes a trans-disciplinary reassessment of the uses of the communication tools—and the study thereof—proposed.
Marie-Laure BetbederEmail:
  相似文献   
67.
Photolithography to produce TiO2 patterns from amorphous films of (5-C5H5)2Ti(N3)2 has been demonstrated. The efficiency of the reaction has been measured yielding a quantum yield of 0.025. The mechanism of the photoreactions of (5-C5H5)2Ti(N3)2 has been studied using Fourier transform-infrared spectroscopy in both a low-temperature 1,2-epoxyethylbenzene glass and as surface films. In each case the primary photochemical process was found to be loss of a single azido group. The result of subsequent photolysis was found to be dependent upon medium and temperature. In the low-temperature glass no further photochemistry was observed. The exhaustive photolysis of films at 20 K, or room temperature, under a vacuum or in air led to loss of all ligands and the formation of TiO2.  相似文献   
68.
An algorithm for determining the size of dielectric spheres and cylinders by aligning measured and computed resonance locations is presented. The orders of the resonance locations need not be known a priori. The algorithm is applicable to several types of scattering and emission spectra of spheres and cylinders if the index of refraction including dispersion is known and uniform, or nearly uniform, throughout the sphere or cylinder. The algorithm performs well when tested with groups of computed resonance locations of spheres (synthetic data) and with measured fluorescence emission spectra of spheres exhibiting as many as 5 orders of resonance.  相似文献   
69.
The dielectric response of a commercial polyvinylchloride is examined in terms of the cluster model of dielectric relaxation, and compared with a sample from which the plasticizer had been extracted. An interpretation of the approach to the glass transition in terms of scaling concepts is outlined and related to the hierarchical dynamics of the cluster model. In this picture the dynamics goes over naturally to the dynamics on small size scales. The plasticizer is shown to contribute a quasi-d.c. electrical transport above the glass transition, which at higher temperatures causes the formation of an electrode barrier layer.  相似文献   
70.
The problem of allowing a dynamically changing set of processes fair access to a shared resource is considered, in the context of communication-stream based systems. It is argued that fair binary merge operators alone cannot solve this problem satisfactorily. Two solutions are proposed. One employs binary merge operators with a programmable bias; the other binary and ternary fair merge operators capable of self-balancing, using the concept of 2–3 trees. A Concurrent Prolog implementation of these operators is described. The implementation of the self-balancing merge operators illustrates the expressive power of incomplete messages, a programming technique that supports messages that contain communication channels as arguments. In the course of implementing the self-balancing merge operator, it was necessary to develop a distributed variant of the 2–3 tree deletion algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号