首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3771篇
  免费   263篇
  国内免费   4篇
电工技术   76篇
综合类   19篇
化学工业   978篇
金属工艺   81篇
机械仪表   63篇
建筑科学   309篇
矿业工程   18篇
能源动力   102篇
轻工业   262篇
水利工程   27篇
石油天然气   2篇
无线电   318篇
一般工业技术   796篇
冶金工业   232篇
原子能技术   14篇
自动化技术   741篇
  2024年   6篇
  2023年   58篇
  2022年   133篇
  2021年   148篇
  2020年   117篇
  2019年   98篇
  2018年   126篇
  2017年   108篇
  2016年   159篇
  2015年   165篇
  2014年   188篇
  2013年   263篇
  2012年   255篇
  2011年   311篇
  2010年   260篇
  2009年   207篇
  2008年   208篇
  2007年   207篇
  2006年   158篇
  2005年   149篇
  2004年   99篇
  2003年   86篇
  2002年   79篇
  2001年   50篇
  2000年   44篇
  1999年   52篇
  1998年   47篇
  1997年   33篇
  1996年   46篇
  1995年   30篇
  1994年   17篇
  1993年   18篇
  1992年   11篇
  1991年   10篇
  1990年   10篇
  1989年   13篇
  1988年   5篇
  1986年   7篇
  1985年   7篇
  1984年   3篇
  1982年   4篇
  1981年   3篇
  1979年   8篇
  1977年   3篇
  1976年   5篇
  1975年   3篇
  1974年   3篇
  1973年   5篇
  1970年   3篇
  1969年   2篇
排序方式: 共有4038条查询结果,搜索用时 15 毫秒
11.
We propose to use Implicit Incompressible Smoothed Particle Hydrodynamics (IISPH) for pressure projection and boundary handling in Fluid‐Implicit‐Particle (FLIP) solvers for the simulation of incompressible fluids. This novel combination addresses two issues of existing SPH and FLIP solvers, namely mass preservation in FLIP and efficiency and memory consumption in SPH. First, the SPH component enables the simulation of incompressible fluids with perfect mass preservation. Second, the FLIP component efficiently enriches the SPH component with detail that is comparable to a standard SPH simulation with the same number of particles, while improving the performance by a factor of 7 and significantly reducing the memory consumption. We demonstrate that the proposed IISPH‐FLIP solver can simulate incompressible fluids with a quantifiable, imperceptible density deviation below 0.1%. We show large‐scale scenarios with up to 160 million particles that have been processed on a single desktop PC using only 15GB of memory. One‐ and two‐way coupled solids are illustrated.  相似文献   
12.
The ACM Code of Ethics asserts that computing professionals have an ethical responsibility to minimize the negative consequences of information and communication technologies (ICT). Negative consequences are rarely intended, but they can often be foreseen with careful sociotechnical analysis in advance of system building. Motivated by an interest in extremely complex sociotechnical contexts (e.g., mortgage lending and automated trading) where ICT appears to be having negative consequences in addition to many benefits, this paper identifies and evaluates future-oriented problem analysis and solution design tools in three potentially relevant literatures: 1) ICT ethics, 2) environmental sustainability, and 3) technology hazards. Several promising future-oriented technology analysis techniques (e.g., anticipatory technology ethics, technology roadmapping, morphological analysis, and control structure analysis) were found and are discussed in this paper, but much work remains to be done to customize them, integrate them, and codify them for use in education and high-quality IS research on very complex sociotechnical contexts like the global financial network.  相似文献   
13.
In the present study, we introduce a novel approach to control and modulate fluid transport inside microfluidic papers using lab-engineered paper sheets. Lab-sheets consisting of different fiber sources (eucalyptus sulfate and cotton linters pulp) and varying porosities were designed and further modified with small millimeter-scaled channels using hydrophobic barriers consisting of fiber-attached, hydrophobic polymers. The capillary-driven transport of an aqueous solution was monitored visually, and the influence of parameters such as fiber source, paper grammage, and channel width on the flow rates through the channel was investigated. The experimental results were compared with those obtained with commercially available filter papers. Our findings suggest that accurate control of fluid transport processes with standard filter papers is complex. Additionally, if the channel width is smaller than the mean fiber length, flow rates become dependent on the geometric parameters of the channel because of the formation of dead-end pores at the hydrophobic barriers. Finally, control of the paper sheets porosity, by varying the fiber density of the lab-made paper, affords the fabrication of chemically identical sheets whereby capillary flow is largely influenced and can be modulated accordingly by simple papermaking processes.  相似文献   
14.
In the design phase of business and IT system development, it is desirable to predict the properties of the system-to-be. A number of formalisms to assess qualities such as performance, reliability and security have therefore previously been proposed. However, existing prediction systems do not allow the modeler to express uncertainty with respect to the design of the considered system. Yet, in contemporary business, the high rate of change in the environment leads to uncertainties about present and future characteristics of the system, so significant that ignoring them becomes problematic. In this paper, we propose a formalism, the Predictive, Probabilistic Architecture Modeling Framework (P2AMF), capable of advanced and probabilistically sound reasoning about business and IT architecture models, given in the form of Unified Modeling Language class and object diagrams. The proposed formalism is based on the Object Constraint Language (OCL). To OCL, P2AMF adds a probabilistic inference mechanism. The paper introduces P2AMF, describes its use for system property prediction and assessment and proposes an algorithm for probabilistic inference.  相似文献   
15.
Enterprise architecture is a model-based IT and business management discipline. Enterprise architecture analysis concerns using enterprise architecture models for analysis of selected properties to provide decision support. This paper presents a framework based on the ArchiMate metamodel for the assessment of four properties, viz., application usage, system availability, service response time and data accuracy. The framework integrates four existing metamodels into one and implements these in a tool for enterprise architecture analysis. The paper presents the overall metamodel and four viewpoints, one for each property. The underlying theory and formalization of the four viewpoints is presented. In addition to the tool implementation, a running example as well as guidelines for usage makes the viewpoints easily applicable.  相似文献   
16.
17.
18.
MALDI-TOF MS profiling for microorganism detection has already been demonstrated in the 1990s, but has evolved to the first-line identification method in many laboratories just during the past five years. While this application of MALDI-TOF MS has proven its broad applicability, accuracy, robustness, and cost-effectiveness it is of particular interest to expand the capabilities of the mass spectrometric platform. Resistance detection is the most desirable further application of MALDI-TOF MS in microbiology, but maybe also the most challenging. Different approaches have been published regarding diverse antibiotic drugs and distinct microorganism classes. The current review shall give an overview about the developments of the recent years and their potential to get transformed in clinical useful assays in the future.  相似文献   
19.
Meta-heuristics are frequently used to tackle NP-hard combinatorial optimization problems. With this paper we contribute to the understanding of the success of 2-opt based local search algorithms for solving the traveling salesperson problem (TSP). Although 2-opt is widely used in practice, it is hard to understand its success from a theoretical perspective. We take a statistical approach and examine the features of TSP instances that make the problem either hard or easy to solve. As a measure of problem difficulty for 2-opt we use the approximation ratio that it achieves on a given instance. Our investigations point out important features that make TSP instances hard or easy to be approximated by 2-opt.  相似文献   
20.
Information-centric networking (ICN) raises data objects to first class routable entities in the network and changes the Internet paradigm from host-centric connectivity to data-oriented delivery. However, current approaches to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, threats to the stability and security of the content distribution system are analyzed in theory, simulations, and practical experiments. We derive relations between state resources and the performance of routers, and demonstrate how this coupling can be misused in practice. We further show how state-based forwarding tends to degrade by decorrelating resources. We identify intrinsic attack vectors present in current content-centric routing, as well as possibilities and limitations to mitigate them. Our overall findings suggest that major architectural refinements are required prior to global ICN deployment in the real world.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号