首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1351篇
  免费   81篇
  国内免费   2篇
电工技术   19篇
综合类   7篇
化学工业   249篇
金属工艺   30篇
机械仪表   19篇
建筑科学   38篇
矿业工程   2篇
能源动力   30篇
轻工业   162篇
水利工程   4篇
石油天然气   7篇
无线电   170篇
一般工业技术   240篇
冶金工业   229篇
原子能技术   7篇
自动化技术   221篇
  2023年   16篇
  2022年   25篇
  2021年   57篇
  2020年   46篇
  2019年   57篇
  2018年   50篇
  2017年   40篇
  2016年   70篇
  2015年   39篇
  2014年   57篇
  2013年   97篇
  2012年   73篇
  2011年   68篇
  2010年   38篇
  2009年   45篇
  2008年   55篇
  2007年   35篇
  2006年   35篇
  2005年   40篇
  2004年   26篇
  2003年   27篇
  2002年   25篇
  2001年   19篇
  2000年   11篇
  1999年   22篇
  1998年   81篇
  1997年   46篇
  1996年   29篇
  1995年   22篇
  1994年   20篇
  1993年   16篇
  1992年   7篇
  1991年   8篇
  1990年   4篇
  1989年   9篇
  1988年   6篇
  1987年   6篇
  1986年   4篇
  1985年   11篇
  1984年   8篇
  1983年   7篇
  1981年   4篇
  1980年   5篇
  1979年   4篇
  1977年   11篇
  1976年   9篇
  1975年   3篇
  1974年   5篇
  1973年   6篇
  1968年   4篇
排序方式: 共有1434条查询结果,搜索用时 31 毫秒
21.
Phan  Alex  Truong  Phuong  Schade  Christoph  Vasan  Aditya  Friend  James  Talke  Frank E. 《Microsystem Technologies》2021,27(6):2473-2479
Microsystem Technologies - “Zero drift” behavior of an optical intraocular pressure sensor is studied using an analytical model based on the deflection of a circular membrane. Results...  相似文献   
22.
We consider the classic problem of pole placement by state feedback. We offer an eigenstructure assignment algorithm to obtain a novel parametric form for the pole-placing feedback matrix that can deliver any set of desired closed-loop eigenvalues, with any desired multiplicities. This parametric formula is then exploited to introduce an unconstrained nonlinear optimisation algorithm to obtain a feedback matrix that delivers the desired pole placement with optimal robustness and minimum gain. Lastly we compare the performance of our method against several others from the recent literature.  相似文献   
23.
Effects of hydrodynamic conditions, current density and solution temperature on the d.c. electrodeposition of Fe–Ni–Co alloys have been investigated with stationary planar and rotating cylindrical electrodes. The deposition rate of Fe showed mass transfer effects at cathodic potentials –1.35 V/sce. Deposition of Ni appeared to be kinetically controlled; deposition of Co appeared to be under kinetic control at potentials –1.35 V/sce but under mixed control at –1.65 V. Current efficiency of the codeposition process increased with increasing current density and decreased with increasing rotation rate. Higher solution temperatures and rotation rates extended the applied current density range where smooth, adherent, and metallic-looking deposits could be obtained. An increase in solution temperatures also decreased anomalous codeposition of Fe–Ni–Co. Calculations based on the Hessami-Tobias model provide qualitative agreement with dependence of experimental electrodeposition on applied current density, hydrodynamics and temperature.  相似文献   
24.
Tetraalkylammonium cellulosates were prepared by means of an exchange reaction between cellulose and tetraalkylammonium methoxides in anhydrous methanol and dimethylsulfoxide up to a degree of substitution of about 0,7 without chain degradation. The course of this reaction and the structure of the cellulosates in comparison to lithium and sodium cellulosate has been studied. The reaction rate and the equilibrium substitution decreased with increasing size of the cation in the methoxide. The distribution of the alcoholate groups in equilibrium at C-2, C-3 and C-6 of the glucopyranosyl unit in the cellulosates, which was investigated by methylation, hydrolysis of the methylcelluloses, and analysis of the methylglucoses by gas chromatography, was independent of the nature of the cation. Under the given reaction conditions the hydroxyl group at C-2 was more acidic than those at C-3 and C-6, while for the latter practically no difference was found. The tetraalkylammonium cellulosates are highly reactive intermediates for the preparation of cellulose derivatives. The reactivity of the cellulosates increased with increasing size of the cation, Li < Na < N(CH3)4 <[(CH3)3N? CH2? C6H5].  相似文献   
25.
O.S. Fleming  E. Bach 《Polymer》2005,46(9):2943-2949
Confocal Raman microscopy (CRM) has been used to extract dye diffusion data from poly(ethylene terephthalate) (PET) fibres dyed with Disperse Yellow 23 under supercritical CO2 conditions. Spectral information as a function of depth was measured in a non-destructive manner using dry and oil objectives in confocal Raman mode. Mapping along the radius of the fibre cross-section was performed and compared to the data from the confocal measurements. A significant dye concentration gradient has been observed along the line normal to the fibre surface which the data from the oil confocal measurements accurately describes to a depth of 45 μm. The effect of the supercritical CO2 dyeing process on the fibre morphology has also been evaluated using CRM.  相似文献   
26.
Conclusions Among the three non-self-similar methods studied in this paper, namely, the perturbation methods in and y and the density-profile method, the latter method gives the best estimates of blast parameters in a wide range of shock-wave intensities. This work was performed with support from the Council on Natural Sciences and Technical Research.Ottawa, Canada. Translated from Fizika Goreniya i Vzryva, Vol. 27, No. 3, pp. 83–91, May–June, 1991.  相似文献   
27.

This paper first presents a novel approach for modelling facial features, Local Directional Texture (LDT), which exploits the unique directional information in image textures for the problem of face recognition. A variant of LDT with privacy-preserving temporal strips (TS) is then considered to achieve faceless recognition with a higher degree of privacy while maintaining high accuracy. The TS uses two strips of pixel blocks from the temporal planes, XT and YT, for face recognition. By removing the reliance on spatial context (i.e., XY plane) for this task, the proposed method withholds facial appearance information from public view, where only one-dimensional temporal information that varies across time are extracted for recognition. Thus, privacy is assured, yet without impeding the facial recognition task which is vital for many security applications such as street surveillance and perimeter access control. To validate the reliability of the proposed method, experiments were carried out using the Honda/UCSD, CK+, CAS(ME)2 and CASME II databases. The proposed method achieved a recognition rate of 98.26% in the standard video-based face recognition database, Honda/UCSD. It also offers a 81.92% reduction in the dimension length required for storing the extracted features, in contrast to the conventional LBP-TOP.

  相似文献   
28.
A Nom historical document recognition system is being developed for digital archiving that uses image binarization, character segmentation, and character recognition. It incorporates two versions of off-line character recognition: one for automatic recognition of scanned and segmented character patterns (7660 categories) and the other for user handwritten input (32,695 categories). This separation is used since including less frequently appearing categories in automatic recognition increases the misrecognition rate without reliable statistics on the Nom language. Moreover, a user must be able to check the results and identify the correct categories from an extended set of categories, and a user can input characters by hand. Both versions use the same recognition method, but they are trained using different sets of training patterns. Recursive XY cut and Voronoi diagrams are used for segmentation; kd tree and generalized learning vector quantization are used for coarse classification; and the modified quadratic discriminant function is used for fine classification. The system provides an interface through which a user can check the results, change binarization methods, rectify segmentation, and input correct character categories by hand. Evaluation done using a limited number of Nom historical documents after providing ground truths for them showed that the two stages of recognition along with user checking and correction improved the recognition results significantly.  相似文献   
29.
30.
Password-authenticated key exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Lu and Cao proposed a three-party password-authenticated key exchange protocol, so called S-3PAKE, based on ideas of the Abdalla and Pointcheval two-party SPAKE extended to three parties. S-3PAKE can be seen to have a structure alternative to that of another three-party PAKE protocol (3PAKE) by Abdalla and Pointcheval. Furthermore, a simple improvement to S-3PAKE was proposed very recently by Chung and Ku to resist the kind of attacks that applied to earlier versions of 3PAKE. In this paper, we show that S-3PAKE falls to unknown key-share attacks by any other client, and undetectable online dictionary attacks by any adversary. The latter attack equally applies to the recently improved S-3PAKE. Indeed, the provable security approach should be taken when designing PAKEs; and furthermore our results highlight that extra cautions still be exercised when defining models and constructing proofs in this direction.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号