首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1424篇
  免费   69篇
电工技术   13篇
综合类   1篇
化学工业   346篇
金属工艺   37篇
机械仪表   40篇
建筑科学   48篇
矿业工程   2篇
能源动力   67篇
轻工业   110篇
水利工程   6篇
石油天然气   6篇
无线电   122篇
一般工业技术   303篇
冶金工业   143篇
原子能技术   15篇
自动化技术   234篇
  2023年   10篇
  2022年   24篇
  2021年   35篇
  2020年   26篇
  2019年   22篇
  2018年   24篇
  2017年   40篇
  2016年   42篇
  2015年   33篇
  2014年   40篇
  2013年   89篇
  2012年   77篇
  2011年   85篇
  2010年   72篇
  2009年   85篇
  2008年   83篇
  2007年   62篇
  2006年   64篇
  2005年   55篇
  2004年   40篇
  2003年   40篇
  2002年   39篇
  2001年   26篇
  2000年   14篇
  1999年   28篇
  1998年   49篇
  1997年   32篇
  1996年   24篇
  1995年   22篇
  1994年   18篇
  1993年   17篇
  1992年   11篇
  1991年   14篇
  1990年   13篇
  1989年   10篇
  1988年   10篇
  1987年   13篇
  1986年   11篇
  1985年   14篇
  1984年   8篇
  1983年   5篇
  1982年   9篇
  1981年   10篇
  1980年   6篇
  1979年   8篇
  1978年   5篇
  1977年   5篇
  1976年   5篇
  1975年   4篇
  1974年   4篇
排序方式: 共有1493条查询结果,搜索用时 15 毫秒
81.
In this work, a nanohybrid material based on a freestanding polymeric liquid crystal network capable of postmodification via cation exchange to tune birefringence is proposed. The smectic liquid crystal films can be infiltrated with a variety of cations, thereby changing the refractive indices (ne and no) and the effective birefringence (Δn) of the nanohybrid material, with reversible cation infiltration occurring within minutes. Birefringence could be tuned between values of 0.06 and 0.19, depending on the cation infiltrated into the network. Upon infiltration, a decrease in the smectic layer spacing is found with layer contraction independent of the induced change in birefringence. Potential applications are in the field of specialty optical devices, such as flexible, retunable reflective filters.  相似文献   
82.
Group communications (real‐time and non‐real‐time) refer to one‐to‐many or many‐to‐many communications. On the one hand, multicast is considered as an appropriate solution for supporting group communication‐oriented applications (we distinguish IP network multicast from application layer multicast). On the other hand, peer‐to‐peer model tends to be a good candidate for supporting today Internet applications (e.g. P2P IPTV, P2P VoIP, etc.). In this context, P2P has attracted significant interest in the recent years. This is mainly due to its properties that also make P2P well adapted to today social networks. In this paper, we propose GPM (Generic P2P Multicast): a novel generic and scalable approach, that optimizes multicast tree depth in P2P networks (structured and unstructured), and contributes to control the network overlay latency. For multicast tree construction, the approach we propose is based on a distributed algorithm using a specific data structures (adjacency and forwarding matrixes). GPM model inherits from P2P attributes such as scalability, flexibility and fault tolerance, while taking into consideration the respective characteristics of one‐to‐many and many‐to‐many type of applications. We also give a performance evaluation for validation and comparison purposes while considering some main existing application layer multicast protocols. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
83.
We report results on audio copy detection for TRECVID 2009 copy detection task. This task involves searching for transformed audio queries in over 385?h of test audio. The queries were transformed in seven different ways, three of them involved mixing unrelated speech to the original query, making it a much more difficult task. We give results with two different audio fingerprints and show that mapping each test frame to the nearest query frame (nearest-neighbor fingerprint) results in robust audio copy detection. The most difficult task in TRECVID 2009 was to detect audio copies using predetermined thresholds computed from 2008 data. We show that the nearest-neighbor fingerprints were robust to even this task and gave actual minimal normalized detection cost rate (NDCR) of around 0.06 for all the transformations. These results are close to those obtained by using the optimal threshold for each transform. This result shows the robustness of the nearest-neighbor fingerprints. These nearest-neighbor fingerprints can be efficiently computed on a graphics processing unit, leading to a very fast search.  相似文献   
84.
This article gives new insight on the Nataf transformation, a widely used tool in reliability analysis. After recalling some basics concerning the copula theory, we explain this transformation in the light of the copula theory and we uncover all the hidden hypothesis made on the dependence structure of the probabilistic model when using this transformation.  相似文献   
85.
This article is the third in a series dedicated to the mathematical study of isoprobabilistic transformations and their relationship with stochastic dependence modelling, see [R. Lebrun, A. Dutfoy, An innovating analysis of the Nataf transformation from the viewpoint of copula, Probabilistic Engineering Mechanics (2008). doi: 10.1016/j.probengmech.2008.08.001] for an interpretation of the Nataf transformation in term of normal copula and [R. Lebrun, A. Dutfoy, A generalization of the Nataf transformation to distributions with elliptical copula, Probabilistic Engineering Mechanics (24) (2009), 172–178. doi:10.1016/j.probengmech.2008.05.001] for a generalisation of the Nataf transformation to any elliptical copula.In this article, we explore the relationship between two isoprobabilistic transformations widely used in the community of reliability analysts, namely the Generalised Nataf transformation and Rosenblatt transformation.First, we recall the elementary results of the copula theory that are needed in the remaining of the article, as a preliminary section to the presentation of both the Generalized Nataf transformation and the Rosenblatt transformation in the light of the copula theory.Then, we show that the Rosenblatt transformation using the canonical order of conditioning is identical to the Generalised Nataf transformation in the normal copula case, which is the most usual case in reliability analysis since it corresponds to the classical Nataf transformation. At this step, we also show that it is not possible to extend the Rosenblatt transformation to distributions with general elliptical copula the way the Nataf transformation has been generalised.Furthermore, we explore the effect of the conditioning order of the Rosenblatt transformation on the usual reliability indicators obtained from a FORM or SORM method. We show that in the normal copula case, all these reliability indicators, excepted the importance factors, are unchanged whatever the conditioning order one chooses.In the last section, we conclude the article with two numerical applications that illustrate the previous results: the equivalence between both transformations in the normal copula case, and the effect of the conditioning order in the normal and non-normal copula case.  相似文献   
86.
In this paper we introduce a new security architecture and security mechanisms for vehicular networks providing a layer-2 multi-hop authentication and credential delivery scheme between vehicles and the network operator authentication server. We present a performance analysis of the proposed solution under various vehicles and Access Points (APs) densities, showing the potential of our scheme in providing a more efficient, robust and scalable authentication and credential delivery to vehicles when compared against the classical single-hop scheme.  相似文献   
87.
In the first article [Lebrun R, Dutfoy A. An innovating viewpoint of the isoprobabilistic Nataf transformation with the copula theory within exceedance threshold uncertainty analysis. Probabilistic Structure Engineering Structural Reliability. 2008 [in press]], we showed that the Nataf transformation is a way to model the dependence structure of a random vector by a normal copula, parameterized by its correlation matrix. Following this analysis, we propose an extension of this transformation to any elliptical copula, and give the equivalent of the First Order Reliability Method (FORM) and the Second Order Reliability Method (SORM) for this generalization. In particular, we derive the Breitung asymptotic approximation in this new context.  相似文献   
88.
Here we report on organic photovoltaic's (OPV) suitable for low light applications. In this paper, we illustrate the impact of Rs and Rp for indoor and outdoor applications. In addition, we propose a simple physics approach to predict the behavior of organic solar cells under various illumination intensities through electrical modeling. The combination of simulation and modeling allows to define a set of design rules for OPVs under low light illumination. The performance of various organic solar cells under low light intensity is compared with our predictions and excellent correlation is found. OPV shows high performance under low light conditions.  相似文献   
89.
This paper presents effective thermal conductivity measurements of alumina/water and copper oxide/water nanofluids. The effects of particle volume fraction, temperature and particle size were investigated. Readings at ambient temperature as well as over a relatively large temperature range were made for various particle volume fractions up to 9%. Results clearly show the predicted overall effect of an increase in the effective thermal conductivity with an increase in particle volume fraction and with a decrease in particle size. Furthermore, the relative increase in thermal conductivity was found to be more important at higher temperatures. Obtained results compare favorably with certain data sets and theoretical models found in current literature.  相似文献   
90.
Since industry is rapidly developing, either locally or globally, manufacturers witness harder challenges due to the growing competitivity. This urges them to better consider the four factors linked to production and output: quality, quantity, cost and price, quality being of course the most important factor which constitutes their main concern. Efforts will be concentrated??in this research??on improving the quality and securing more accuracy for a machined surface in ball-end milling. Quality and precision are two essential criteria in industrial milling. However, milling errors and imperfections, due mainly to the cutting tool deflection, hinder the full achieving of these targets. Our task, all along this paper, consists in studying and realizing the simulation of the deflected cutting tool trajectory, by using the methods which are available. In a future stage, and in the frame of a deeper research, the simulation process will help to carry out the correction and the compensation of the errors resulting from the tool deflection. The corrected trajectory which is obtained by the method mirror will be sent to the machine. To achieve this goal, the next process consists??as a first step??in selecting a model of cutting forces for a ball-end mill. This allows to define??later on??the behavior of this tool, and the emergence of three methods namely the analytical model, the finite elements method, and the experimental method. It is possible to tackle the cutting forces simulation, all along the tool trajectory, while this latter is carrying out the sweeping of the part to be machined in milling and taking into consideration the cutting conditions, as well as the geography of the workpiece. A simulation of the deflected cutting tool trajectory dependent on the cutting forces has been realized.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号