首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3270篇
  免费   99篇
  国内免费   4篇
电工技术   21篇
综合类   8篇
化学工业   595篇
金属工艺   43篇
机械仪表   58篇
建筑科学   213篇
矿业工程   21篇
能源动力   89篇
轻工业   317篇
水利工程   35篇
石油天然气   13篇
无线电   229篇
一般工业技术   523篇
冶金工业   673篇
原子能技术   32篇
自动化技术   503篇
  2022年   14篇
  2021年   46篇
  2020年   35篇
  2019年   33篇
  2018年   50篇
  2017年   41篇
  2016年   52篇
  2015年   56篇
  2014年   76篇
  2013年   193篇
  2012年   103篇
  2011年   181篇
  2010年   116篇
  2009年   118篇
  2008年   148篇
  2007年   135篇
  2006年   117篇
  2005年   98篇
  2004年   76篇
  2003年   87篇
  2002年   74篇
  2001年   63篇
  2000年   56篇
  1999年   55篇
  1998年   165篇
  1997年   113篇
  1996年   92篇
  1995年   71篇
  1994年   79篇
  1993年   65篇
  1992年   63篇
  1991年   41篇
  1990年   41篇
  1989年   38篇
  1988年   33篇
  1987年   35篇
  1986年   26篇
  1985年   57篇
  1984年   41篇
  1983年   32篇
  1982年   39篇
  1981年   34篇
  1980年   25篇
  1979年   32篇
  1978年   24篇
  1977年   30篇
  1976年   50篇
  1975年   29篇
  1974年   14篇
  1972年   14篇
排序方式: 共有3373条查询结果,搜索用时 546 毫秒
71.
Level Set Equations on Surfaces via the Closest Point Method   总被引:1,自引:0,他引:1  
Level set methods have been used in a great number of applications in ?2 and ?3 and it is natural to consider extending some of these methods to problems defined on surfaces embedded in ?3 or higher dimensions. In this paper we consider the treatment of level set equations on surfaces via a recent technique for solving partial differential equations (PDEs) on surfaces, the Closest Point Method (Ruuth and Merriman, J. Comput. Phys. 227(3):1943–1961, [2008]). Our main modification is to introduce a Weighted Essentially Non-Oscillatory (WENO) interpolation step into the Closest Point Method. This, in combination with standard WENO for Hamilton–Jacobi equations, gives high-order results (up to fifth-order) on a variety of smooth test problems including passive transport, normal flow and redistancing. The algorithms we propose are straightforward modifications of standard codes, are carried out in the embedding space in a well-defined band around the surface and retain the robustness of the level set method with respect to the self-intersection of interfaces. Numerous examples are provided to illustrate the flexibility of the method with respect to geometry.  相似文献   
72.
Cylindrical fibre actuators have been constructed by a coextrusion method using a thermoplastic polyurethane wall and a conductive grease filler. These actuators may be operated as single fibres or bundled together as actuating ropes. Key results include the validation of Carpi’s wall pressure model [F. Carpi, D.D. Rossi, Dielectric elastomer cylindrical actuators: electromechanical modelling and experimental evaluation, Mater. Sci. Eng. C-Biomimetic Supramol. Syst. 24 (2004) 555–562] and the proof-of-concept demonstration of a technique that can be used for producing inexpensive dielectric elastomer actuators on an industrial scale.  相似文献   
73.
74.
75.
76.
Developing an environment that enables optimal and flexible design of robot manipulators using reconfigurable links, joints, actuators, and sensors is an essential step for efficient robot design and prototyping. Such an environment should have the right mix of software and hardware components for designing the physical parts and the controllers, and for the algorithmic control of the robot modules (kinematics, inverse kinematics, dynamics, trajectory planning, analog control and digital computer control). Specifying object-based communications and catalog mechanisms between the software modules, controllers, physical parts, CAD designs, and actuator and sensor components is a necessary step in the prototyping activities.In this paper, we propose a flexible prototyping environment for robot manipulators with the required subsystems and interfaces between the different components of this environment. This environment provides a close tie between the design parameters of the robot manipulator by the different subsystems involved in the design process. The design and implementation of this environment along with the implementation of some of the subsystems are presented, and some examples that demonstrate the functionality of the environment are discussed. This work was supported in part by DARPA grant N00014-91-J-4123, NSF grant CDA 9024721, and a University of Utah Research Committee grant. All opinions, findings, conclusions or recommendations expressed in this document are those of the author and do not necessarily reflect the views of the sponsoring agencies.  相似文献   
77.
We introduce eSeeTrack, an eye-tracking visualization prototype that facilitates exploration and comparison of sequential gaze orderings in a static or a dynamic scene. It extends current eye-tracking data visualizations by extracting patterns of sequential gaze orderings, displaying these patterns in a way that does not depend on the number of fixations on a scene, and enabling users to compare patterns from two or more sets of eye-gaze data. Extracting such patterns was very difficult with previous visualization techniques. eSeeTrack combines a timeline and a tree-structured visual representation to embody three aspects of eye-tracking data that users are interested in: duration, frequency and orderings of fixations. We demonstrate the usefulness of eSeeTrack via two case studies on surgical simulation and retail store chain data. We found that eSeeTrack allows ordering of fixations to be rapidly queried, explored and compared. Furthermore, our tool provides an effective and efficient mechanism to determine pattern outliers. This approach can be effective for behavior analysis in a variety of domains that are described at the end of this paper.  相似文献   
78.
Strategic alignment between an organization's business strategy/capabilities and those of its information technology (IT) unit is an extensively researched subject that addresses the issue of fit between business and technology strategies. A key gap in the literature is lack of recognition that underlying this macro level of alignment are other, more granular levels of alignment involving the interdependent subunits within the corporate IT unit. Given the critical interdependencies between development and testing subunits in software engineering, this paper focuses on an alignment model for ensuring that these two functions work together effectively. A development-testing alignment (DTA) model is described, and a case study investigating its value and application is presented. This DTA is decomposed into distinct components for the purposes of theoretical clarity and pragmatic application. The case study analysis uses the model to understand and interpret development-testing alignment in a Fortune 500 company. We found that the development and testing functions were significantly misaligned, and our model identified close to twenty specific aspects that needed to be considered to enhance alignment. These included changes in specificity of scope, governance, resource availability, competencies, and processes. Our analysis shows that the DTA model can be usefully applied for the purpose of understanding tactical alignment between subunits within a corporate IT unit. It also demonstrates that there is value in considering alignment as a dynamic, context-driven, social phenomenon as well as a useful interpretative lens for exploring organizational interactions and interdependencies.  相似文献   
79.
80.
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号