首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6943篇
  免费   198篇
  国内免费   27篇
电工技术   107篇
综合类   2篇
化学工业   1410篇
金属工艺   287篇
机械仪表   187篇
建筑科学   104篇
矿业工程   8篇
能源动力   313篇
轻工业   269篇
水利工程   58篇
石油天然气   14篇
无线电   984篇
一般工业技术   1506篇
冶金工业   866篇
原子能技术   72篇
自动化技术   981篇
  2023年   69篇
  2022年   147篇
  2021年   182篇
  2020年   153篇
  2019年   147篇
  2018年   231篇
  2017年   191篇
  2016年   203篇
  2015年   110篇
  2014年   206篇
  2013年   406篇
  2012年   225篇
  2011年   303篇
  2010年   233篇
  2009年   278篇
  2008年   246篇
  2007年   199篇
  2006年   209篇
  2005年   153篇
  2004年   128篇
  2003年   129篇
  2002年   129篇
  2001年   126篇
  2000年   129篇
  1999年   112篇
  1998年   264篇
  1997年   182篇
  1996年   131篇
  1995年   131篇
  1994年   104篇
  1993年   133篇
  1992年   108篇
  1991年   97篇
  1990年   84篇
  1989年   75篇
  1988年   72篇
  1987年   75篇
  1986年   88篇
  1985年   106篇
  1984年   99篇
  1983年   95篇
  1982年   78篇
  1981年   63篇
  1980年   49篇
  1979年   46篇
  1978年   49篇
  1977年   62篇
  1976年   82篇
  1975年   43篇
  1973年   42篇
排序方式: 共有7168条查询结果,搜索用时 18 毫秒
81.
Entrance pressure losses for the creeping flow of a power-law fluid are calculated for an abrupt contraction of ratio 2, 4, 8 and ∞ for both the axisymmetric and planar cases using P2P1 and PP1 finite elements. Contrary to some earlier findings in the literature, the entrance pressure loss obtained by using the two different types of finite elements, both of which satisfy the Babus?ka-Brezzi condition, are found to converge to the same results. The present results also confirm that the variational method of Duda and Vrentas gives excellent upper bounds for both the axisymmetric and planar cases with infinite contraction ratio.  相似文献   
82.
Ni T  Pinson JA  Gupta S  Santoro RJ 《Applied optics》1995,34(30):7083-7091
A recently developed laser-induced incandescence technique is used to make novel planar measurements of soot volume fraction within turbulent diffusion flames and droplet flames. The two-dimensional imaging technique is developed and assessed by systematic experiments in a coannular laminar diffusion flame, in which the soot characteristics have been well established. With a single point calibration procedure, agreement to within 10% was found between the values of soot volume fraction measured by this technique and those determined by conventional laser scattering-extinction methods in the flame. As a demonstration of the wide range of applicability of the technique, soot volume fraction images are also obtained from both turbulent ethene diffusion flames and from a freely falling droplet flame that burns the mixture of 75% benzene and 25% methanol. For the turbulent diffusion flames, approximately an 80% reduction in soot volume fraction was found when the Reynolds number of the fuel jet increased from 4000 to 8000. In the droplet flame case, the distribution of soot field was found to be similar to that observed in coannular laminar diffusion flames.  相似文献   
83.
When individuals encounter new information (data), that information is incorporated with their existing beliefs (prior) to form a new belief (posterior) in a process referred to as belief updating. While most studies on rational belief updating in visual data analysis elicit beliefs immediately after data is shown, we posit that there may be critical movement in an individual's beliefs when elicited immediately after data is shown v. after a temporal delay (e.g., due to forgetfulness or weak incorporation of the data). Our paper investigates the hypothesis that posterior beliefs elicited after a time interval will “decay” back towards the prior beliefs compared to the posterior beliefs elicited immediately after new data is presented. In this study, we recruit 101 participants to complete three tasks where beliefs are elicited immediately after seeing new data and again after a brief distractor task. We conduct (1) a quantitative analysis of the results to understand if there are any systematic differences in beliefs elicited immediately after seeing new data or after a distractor task and (2) a qualitative analysis of participants' reflections on the reasons for their belief update. While we find no statistically significant global trends across the participants beliefs elicited immediately v. after the delay, the qualitative analysis provides rich insight into the reasons for an individual's belief movement across 9 prototypical scenarios, which includes (i) decay of beliefs as a result of either forgetting the information shown or strongly held prior beliefs, (ii) strengthening of confidence in updated beliefs by positively integrating the new data and (iii) maintaining a consistently updated belief over time, among others. These results can guide subsequent experiments to disambiguate when and by what mechanism new data is truly incorporated into one's belief system.  相似文献   
84.
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.  相似文献   
85.
Wireless Personal Communications - Node localization is one of the essential services where sensor nodes in the wireless sensor network collaborate to provide location information of sensor nodes...  相似文献   
86.
The present work is concerned with a detailed illustration on the study of horizontally polarized shear waves (SH-type) propagation in a prestressed fluid saturated anisotropic porous layer sandwiched by prestressed orthotropic medium and nonhomogeneous mantles. The frequency equation for the assumed model is derived and their medium characteristics, such as porosity, prestress, anisotropy, and nonhomogeneity, are discussed. Numerical treatment is given to analyze these effects on phase velocities of SH-type waves and is plotted in various graphs. The parametric study divulges that the magnitude of wave velocities increases with the increase of nonhomogeneity parameter and prestress parameter.  相似文献   
87.
88.
Both unit and integration testing are incredibly crucial for almost any software application because each of them operates a distinct process to examine the product. Due to resource constraints, when software is subjected to modifications, the drastic increase in the count of test cases forces the testers to opt for a test optimization strategy. One such strategy is test case prioritization (TCP). Existing works have propounded various methodologies that re-order the system-level test cases intending to boost either the fault detection capabilities or the coverage efficacy at the earliest. Nonetheless, singularity in objective functions and the lack of dissimilitude among the re-ordered test sequences have degraded the cogency of their approaches. Considering such gaps and scenarios when the meteoric and continuous updations in the software make the intensive unit and integration testing process more fragile, this study has introduced a memetics-inspired methodology for TCP. The proposed structure is first embedded with diverse parameters, and then traditional steps of the shuffled-frog-leaping approach (SFLA) are followed to prioritize the test cases at unit and integration levels. On 5 standard test functions, a comparative analysis is conducted between the established algorithms and the proposed approach, where the latter enhances the coverage rate and fault detection of re-ordered test sets. Investigation results related to the mean average percentage of fault detection (APFD) confirmed that the proposed approach exceeds the memetic, basic multi-walk, PSO, and optimized multi-walk by 21.7%, 13.99%, 12.24%, and 11.51%, respectively.  相似文献   
89.
PVC-Based 2,2,2-Cryptand Sensor for Zinc Ions   总被引:1,自引:0,他引:1  
A PVC-based membrane of 2,2,2-cryptand exhibits a very good response for Zn(2+) in a wide concentration range (from 2.06 ppm to 6.54 × 10(3) ppm) with a slope of 22.0 mV/decade of Zn(2+) concentration. The response time of the sensor is <10 s, and the membrane can be used for more than 3 months without any observed divergence in potentials. The proposed sensor exhibits very good selectivity for Zn(2+) over other cations and can be used in a wide pH range (2.8-7.0). It has also been possible to use this assembly as an indicator electrode in potentiometric titrations involving zinc ions.  相似文献   
90.
Paulet al. [12] proved that deterministic Turing machines can be speeded up by a factor of log*t (n) using four alternations; that is, DTIME(t(n) log*t(n)) σ4(t(n)). Balcázaret al. [1] noted that two alternations are sufficient to achieve this speed-up of deterministic Turing machines; that is, DTIME(t(n) log*t(n)) Σ2(t (n)). We supply a proof of this speed-up and using that show that for each time-constructible functiont(n), DTIME(t(n)) ⊂ Σ2(t(n)); that is, two alternations are strictly more powerful than deterministic time. An important corollary is that at least one (or both) of the immediate generalizations of the result DTIME(n) ⊂ NTIME(n) [12] must be true: NTIME(n) ≠ co-NTIME(n) or, for each time-constructible functiont(n), DTIME(t (n)) ⊂ NTIME(t (n)). This work was supported in part by NSF Grant CCR-8909071. The preliminary version of the work was done when the author was a graduate student at The Ohio State University.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号