首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7407篇
  免费   245篇
  国内免费   29篇
电工技术   108篇
综合类   4篇
化学工业   1523篇
金属工艺   296篇
机械仪表   202篇
建筑科学   115篇
矿业工程   9篇
能源动力   355篇
轻工业   292篇
水利工程   57篇
石油天然气   17篇
无线电   1065篇
一般工业技术   1604篇
冶金工业   879篇
原子能技术   74篇
自动化技术   1081篇
  2023年   85篇
  2022年   194篇
  2021年   212篇
  2020年   198篇
  2019年   174篇
  2018年   276篇
  2017年   233篇
  2016年   231篇
  2015年   128篇
  2014年   232篇
  2013年   442篇
  2012年   255篇
  2011年   326篇
  2010年   257篇
  2009年   290篇
  2008年   270篇
  2007年   212篇
  2006年   218篇
  2005年   160篇
  2004年   137篇
  2003年   129篇
  2002年   129篇
  2001年   127篇
  2000年   129篇
  1999年   112篇
  1998年   264篇
  1997年   182篇
  1996年   131篇
  1995年   130篇
  1994年   104篇
  1993年   133篇
  1992年   108篇
  1991年   97篇
  1990年   84篇
  1989年   75篇
  1988年   72篇
  1987年   75篇
  1986年   88篇
  1985年   106篇
  1984年   99篇
  1983年   95篇
  1982年   78篇
  1981年   63篇
  1980年   49篇
  1979年   46篇
  1978年   49篇
  1977年   62篇
  1976年   82篇
  1975年   43篇
  1973年   42篇
排序方式: 共有7681条查询结果,搜索用时 0 毫秒
101.
Correlation between a dithering signal and the prediction error has been used for detecting model mismatch in univariate model based control systems. This paper extends that approach to MIMO control systems. A closed-loop cross-correlation method is presented to detect which specific input-output pairings of a model-based controller are mismatched. This method may be used in screening the complete set of models and in selecting candidate models for re-identification. The method first finds the rows and columns of the transfer function matrix that contain mismatch, and then the candidates are found by the intersection of the said rows and columns. Placing the system under partial control, whereby one or more of the manipulated variables are held constant, can be used to further reduce the set of candidate models.  相似文献   
102.
Entrance pressure losses for the creeping flow of a power-law fluid are calculated for an abrupt contraction of ratio 2, 4, 8 and ∞ for both the axisymmetric and planar cases using P2P1 and PP1 finite elements. Contrary to some earlier findings in the literature, the entrance pressure loss obtained by using the two different types of finite elements, both of which satisfy the Babus?ka-Brezzi condition, are found to converge to the same results. The present results also confirm that the variational method of Duda and Vrentas gives excellent upper bounds for both the axisymmetric and planar cases with infinite contraction ratio.  相似文献   
103.
Ni T  Pinson JA  Gupta S  Santoro RJ 《Applied optics》1995,34(30):7083-7091
A recently developed laser-induced incandescence technique is used to make novel planar measurements of soot volume fraction within turbulent diffusion flames and droplet flames. The two-dimensional imaging technique is developed and assessed by systematic experiments in a coannular laminar diffusion flame, in which the soot characteristics have been well established. With a single point calibration procedure, agreement to within 10% was found between the values of soot volume fraction measured by this technique and those determined by conventional laser scattering-extinction methods in the flame. As a demonstration of the wide range of applicability of the technique, soot volume fraction images are also obtained from both turbulent ethene diffusion flames and from a freely falling droplet flame that burns the mixture of 75% benzene and 25% methanol. For the turbulent diffusion flames, approximately an 80% reduction in soot volume fraction was found when the Reynolds number of the fuel jet increased from 4000 to 8000. In the droplet flame case, the distribution of soot field was found to be similar to that observed in coannular laminar diffusion flames.  相似文献   
104.
When individuals encounter new information (data), that information is incorporated with their existing beliefs (prior) to form a new belief (posterior) in a process referred to as belief updating. While most studies on rational belief updating in visual data analysis elicit beliefs immediately after data is shown, we posit that there may be critical movement in an individual's beliefs when elicited immediately after data is shown v. after a temporal delay (e.g., due to forgetfulness or weak incorporation of the data). Our paper investigates the hypothesis that posterior beliefs elicited after a time interval will “decay” back towards the prior beliefs compared to the posterior beliefs elicited immediately after new data is presented. In this study, we recruit 101 participants to complete three tasks where beliefs are elicited immediately after seeing new data and again after a brief distractor task. We conduct (1) a quantitative analysis of the results to understand if there are any systematic differences in beliefs elicited immediately after seeing new data or after a distractor task and (2) a qualitative analysis of participants' reflections on the reasons for their belief update. While we find no statistically significant global trends across the participants beliefs elicited immediately v. after the delay, the qualitative analysis provides rich insight into the reasons for an individual's belief movement across 9 prototypical scenarios, which includes (i) decay of beliefs as a result of either forgetting the information shown or strongly held prior beliefs, (ii) strengthening of confidence in updated beliefs by positively integrating the new data and (iii) maintaining a consistently updated belief over time, among others. These results can guide subsequent experiments to disambiguate when and by what mechanism new data is truly incorporated into one's belief system.  相似文献   
105.
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.  相似文献   
106.
Wireless Personal Communications - Node localization is one of the essential services where sensor nodes in the wireless sensor network collaborate to provide location information of sensor nodes...  相似文献   
107.
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.  相似文献   
108.
This article deals with the propagation of SH-wave in a vertically heterogeneous viscoelastic layer lying over a micropolar elastic half-space. Dispersion and damping equations are obtained analytically in closed form. Phase and damped velocities are computed numerically and depicted by means of a graph to exhibit the substantial effect of heterogeneity, viscoelasticity (internal friction), and micropolar parameter. As a special case of the problem, it is found that deduced dispersion relation is well in agreement to the classical-Love wave equation and damping equation vanishes identically for the isotropic case. Influence of micropolarity present in the medium of half-space is highlighted through comparative study.  相似文献   
109.
This article delves to study the effect of corrugated boundary surfaces on the propagation of horizontally-polarized shear waves (SH-waves) in a magnetoelastic transversely isotropic layer under a hydrostatic state of stress lying over an elastic half-space under gravity. A dispersion equation has been derived in closed-form and is found to be in good agreement to the classical Love-wave equation. The effect of magnetoelasticity, hydrostatic state of stress, gravity, corrugation, position parameter, and undulation on the phase velocity of the SH-wave has been identified. Numerical computation along with graphical demonstration has been carried out for cadmium, magnesium, and zinc materials of hexagonal symmetry to highlight some significant facts.  相似文献   
110.
The present work is concerned with a detailed illustration on the study of horizontally polarized shear waves (SH-type) propagation in a prestressed fluid saturated anisotropic porous layer sandwiched by prestressed orthotropic medium and nonhomogeneous mantles. The frequency equation for the assumed model is derived and their medium characteristics, such as porosity, prestress, anisotropy, and nonhomogeneity, are discussed. Numerical treatment is given to analyze these effects on phase velocities of SH-type waves and is plotted in various graphs. The parametric study divulges that the magnitude of wave velocities increases with the increase of nonhomogeneity parameter and prestress parameter.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号