首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1433篇
  免费   46篇
电工技术   21篇
化学工业   145篇
金属工艺   29篇
机械仪表   17篇
建筑科学   60篇
矿业工程   27篇
能源动力   30篇
轻工业   125篇
水利工程   15篇
石油天然气   22篇
武器工业   1篇
无线电   205篇
一般工业技术   170篇
冶金工业   246篇
原子能技术   4篇
自动化技术   362篇
  2023年   9篇
  2022年   10篇
  2021年   23篇
  2020年   19篇
  2019年   28篇
  2018年   28篇
  2017年   42篇
  2016年   46篇
  2015年   35篇
  2014年   54篇
  2013年   77篇
  2012年   60篇
  2011年   104篇
  2010年   87篇
  2009年   72篇
  2008年   86篇
  2007年   84篇
  2006年   76篇
  2005年   63篇
  2004年   59篇
  2003年   54篇
  2002年   31篇
  2001年   29篇
  2000年   13篇
  1999年   22篇
  1998年   20篇
  1997年   21篇
  1996年   56篇
  1995年   26篇
  1994年   14篇
  1993年   16篇
  1992年   13篇
  1991年   4篇
  1990年   7篇
  1989年   6篇
  1988年   9篇
  1987年   10篇
  1986年   7篇
  1985年   11篇
  1984年   10篇
  1983年   5篇
  1982年   5篇
  1981年   5篇
  1980年   3篇
  1979年   3篇
  1978年   4篇
  1977年   5篇
  1976年   5篇
  1973年   1篇
  1958年   1篇
排序方式: 共有1479条查询结果,搜索用时 15 毫秒
21.
Interactive rigid body simulation is an important part of many modern computer tools, which no authoring tool nor game engine can do without. Such high‐performance computer tools open up new possibilities for changing how designers, engineers, modelers and animators work with their design problems. This paper is a self contained state‐of‐the‐art report on the physics, the models, the numerical methods and the algorithms used in interactive rigid body simulation all of which have evolved and matured over the past 20 years. Furthermore, the paper communicates the mathematical and theoretical details in a pedagogical manner. This paper is not only a stake in the sand on what has been done, it also seeks to give the reader deeper insights to help guide their future research.  相似文献   
22.
Amorphous silicate grain boundary phases of varying chemistry and amounts were added to 3Y-TZP in order to determine their influence on the superplastic behavior between 1200° and 1300°C and on the room-temperature mechanical properties. Strain rate enhancement at high temperatures was observed in 3Y-TZP containing a glassy grain boundary phase, even with as little as 0.1 wt% glass. Strain rate enhancement was greatest in 3Y-TZP with 5 wt% glass, but the room-temperature hardness, elastic modulus, and fracture toughness were degraded. The addition of glassy grain boundary phases did not significantly affect the stress exponent of 3Y-TZP, but did lower the activation energy for superplastic flow. Strain rate enhancement was highest in samples containing the grain boundary phase with the highest solubility for Y2O3 and ZrO2, but the strain rate did not scale inversely with the viscosity of the silicate phases. Grain boundary sliding accommodated by diffusional creep controlled by an interface reaction is proposed as the mechanism for superplastic deformation in 3Y-TZP with and without glassy grain boundary phases.  相似文献   
23.
This paper presents results from an industrial study that applied input space partitioning and semi-automated requirements modeling to large-scale industrial software, specifically financial calculation engines. Calculation engines are used in financial service applications such as banking, mortgage, insurance, and trading to compute complex, multi-conditional formulas to make high risk financial decisions. They form the heart of financial applications, and can cause severe economic harm if incorrect. Controllability and observability of these calculation engines are low, so robust and sophisticated test methods are needed to ensure the results are valid. However, the industry norm is to use pure human-based, requirements-driven test design, usually with very little automation. The Federal Home Loan Mortgage Corporation (FHLMC), commonly known as Freddie Mac, concerned that these test design techniques may lead to ineffective and inefficient testing, partnered with a university to use high quality, sophisticated test design on several ongoing projects. The goal was to determine if such test design can be cost-effective on this type of critical software. In this study, input space partitioning, along with automation, were applied with the help of several special-purpose tools to validate the effectiveness of input space partitioning. Results showed that these techniques were far more effective (finding more software faults) and more efficient (requiring fewer tests and less labor), and the managers reported that the testing cycle was reduced from five human days to 0.5. This study convinced upper management to begin infusing this approach into other software development projects.  相似文献   
24.
TiB/Ti-6Al-4V metal-matrix composite (MMC) layers were produced on Ti-6Al-4V substrates by laser cladding. A TiB2/Ti powder mixture was used as a precursor to obtain a dispersion of TiB needles in the Ti alloy matrix, with the aid of an exothermic reaction between TiB2 and Ti. A eutectic microstructure was obtained that consisted of an extremely homogeneous dispersion of TiB eutectic needles in the Ti alloy matrix, having a volume fraction as high as 0.33. Also, an equilibrium-like microstructure was found, consisting of a dispersion of both primary and eutectic TiB needles inside the Ti alloy matrix. An analysis of the geometry of the layers was performed and proved successful in determining the percentage of B. Further, it correctly predicted the variation of atomic B content as a function of laser power. The relative wear resistance coefficient, defined as the wear coefficient of the uncoated matrix divided by that of coating, shows an improvement by a factor as high as 1500 for the eutectic microstructure. This paper was presented at the 2nd International Surface Engineering Congress sponsored by ASM International, on September 15–17, 2003, in Indianapolis, Indiana, and appeared on pp. 411–18 of the Proceedings.  相似文献   
25.
Dimensional scaling approaches are widely used to develop multi-body human models in injury biomechanics research. Given the limited experimental data for any particular anthropometry, a validated model can be scaled to different sizes to reflect the biological variance of population and used to characterize the human response. This paper compares two scaling approaches at the whole-body level: one is the conventional mass-based scaling approach which assumes geometric similarity; the other is the structure-based approach which assumes additional structural similarity by using idealized mechanical models to account for the specific anatomy and expected loading conditions. Given the use of exterior body dimensions and a uniform Young’s modulus, the two approaches showed close values of the scaling factors for most body regions, with 1.5 % difference on force scaling factors and 13.5 % difference on moment scaling factors, on average. One exception was on the thoracic modeling, with 19.3 % difference on the scaling factor of the deflection. Two 6-year-old child models were generated from a baseline adult model as application example and were evaluated using recent biomechanical data from cadaveric pediatric experiments. The scaled models predicted similar impact responses of the thorax and lower extremity, which were within the experimental corridors; and suggested further consideration of age-specific structural change of the pelvis. Towards improved scaling methods to develop biofidelic human models, this comparative analysis suggests further investigation on interior anatomical geometry and detailed biological material properties associated with the demographic range of the population.  相似文献   
26.
Abstract

There is a level of sensitivity to almost all data, but what is most important — keeping sensitive data sensitive or guaranteeing the integrity of the data? When it comes to sensitivity or integrity, access control models have provided several options. Yet, wouldn't a combination of access control models provide a more desirable result than just settling for one? Is it possible to have a slice of data sensitivity with a dollop of data integrity? In finding the answer to this question it must be understood exactly what an access control model is and, in terms of sensitivity and integrity, which models provide the best security.  相似文献   
27.
Given a set of points with uncertain locations, we consider the problem of computing the probability of each point lying on the skyline, that is, the probability that it is not dominated by any other input point. If each point’s uncertainty is described as a probability distribution over a discrete set of locations, we improve the best known exact solution. We also suggest why we believe our solution might be optimal. Next, we describe simple, near-linear time approximation algorithms for computing the probability of each point lying on the skyline. In addition, some of our methods can be adapted to construct data structures that can efficiently determine the probability of a query point lying on the skyline.  相似文献   
28.
29.
The engineering of distributed adaptive software is a complex task which requires a rigorous approach. Software architectural (structural) concepts and principles are highly beneficial in specifying, designing, analysing, constructing and evolving distributed software. A rigorous architectural approach dictates formalisms and techniques that are compositional, components that are context independent and systems that can be constructed and evolved incrementally. This paper overviews some of the underlying reasons for adopting an architectural approach, including a brief “rational history” of our research work, and indicates how an architectural model can potentially facilitate the provision of self-managed adaptive software system. Much of the research has been supported by the Engineering and Physical Sciences Research Council and is currently partly supported by EPSRC Platform grant AEDUS 2 and a DTC grant.  相似文献   
30.
Cheating is rampant in current gameplay on the Internet. However, it isn't as well understood as we might expect. The authors summarize the various known methods of cheating and define a taxonomy of online game cheating with respect to the underlying vulnerability, consequence, and cheating principal. This taxonomy provides a systematic introduction to the characteristics of cheats in online games and how they can arise. Although cheating in online games is largely due to various security failures, the four traditional aspects of security—confidentiality, integrity, availability, and authenticity—are insufficient to explain it. Instead, fairness becomes a vital additional aspect, and its enforcement provides a convincing perspective for understanding security techniques' role in developing and operating online games.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号