首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1987篇
  免费   96篇
  国内免费   6篇
电工技术   23篇
综合类   5篇
化学工业   513篇
金属工艺   29篇
机械仪表   39篇
建筑科学   120篇
矿业工程   32篇
能源动力   37篇
轻工业   155篇
水利工程   29篇
石油天然气   4篇
无线电   135篇
一般工业技术   310篇
冶金工业   148篇
原子能技术   5篇
自动化技术   505篇
  2023年   23篇
  2022年   43篇
  2021年   60篇
  2020年   29篇
  2019年   26篇
  2018年   59篇
  2017年   51篇
  2016年   79篇
  2015年   69篇
  2014年   80篇
  2013年   94篇
  2012年   110篇
  2011年   134篇
  2010年   78篇
  2009年   116篇
  2008年   103篇
  2007年   89篇
  2006年   99篇
  2005年   69篇
  2004年   63篇
  2003年   46篇
  2002年   53篇
  2001年   31篇
  2000年   29篇
  1999年   35篇
  1998年   33篇
  1997年   36篇
  1996年   37篇
  1995年   38篇
  1994年   30篇
  1993年   20篇
  1992年   15篇
  1991年   17篇
  1990年   13篇
  1989年   6篇
  1988年   9篇
  1987年   14篇
  1985年   13篇
  1984年   12篇
  1983年   12篇
  1982年   5篇
  1981年   9篇
  1980年   9篇
  1979年   7篇
  1978年   11篇
  1977年   6篇
  1976年   13篇
  1975年   9篇
  1973年   4篇
  1971年   6篇
排序方式: 共有2089条查询结果,搜索用时 15 毫秒
71.
HybMig: A Hybrid Approach to Dynamic Plan Migration for Continuous Queries   总被引:1,自引:0,他引:1  
In data stream environments, the initial plan of a long-running query may gradually become inefficient due to changes of the data characteristics. In this case, the query optimizer generates a more efficient plan based on the current statistics. The online transition from the old to the new plan is called dynamic plan migration. In addition to correctness, an effective technique for dynamic plan migration should achieve the following objectives: 1) minimize the memory and CPU overhead of the migration, 2) reduce the duration of the transition, and 3) maintain a steady output rate. The only known solutions for this problem are the moving states (MS) and parallel track (PT) strategies, which have some serious shortcomings related to the above objectives. Motivated by these shortcomings, we first propose HybMig, which combines the merits of MS and PT and outperforms both in every aspect. As a second step, we extend PT, MS, and HybMig to the general problem of migration, where both the new and the old plans are treated as black boxes  相似文献   
72.
73.
    
Ohne ZusammenfassungVortrag, gehalten auf der Tagung der Gesselschaft Deutscher Chemiker, Fachgruppe Lebensmittelchemie, in München am 23. September 1949.  相似文献   
74.
The EU Water Framework Directive commits member states to achieve good ecological status in all waterbodies. Artificial or heavily modified waterbodies must reach at least its good ecological potential. In view of these requirements, simple and feasible methods are required in order to evaluate habitat suitability for relevant target species in larger river reaches. Well-developed models for determining the relationship between stream flows and habitat for target species mainly based on micro- and meso-scale already exist. However, the application of such models is complex and time-consuming and consequently limited to relatively short river segments. The objective of this study is to develop a simplified applicable assessment model to evaluate habitat conditions for selected target fish. This model uses hydro-morphological indicators for the habitat assessment and relies on correlative relations between habitat suitability and hydro-morphological features of river stretches (average Froude-number, relative flow width, mean bed slope, relative water depth and flow velocity). The indicators were determined as reach-related averages, derived from 2D model simulations (hydraulic and habitat-specific). Particular emphasis was laid on using a wide range of river stretches with different hydro-morphological characteristics (hydrology, bed substratum, bed structures, degree of braiding, sinuosity of the river course, mean bed width and bed slope). As a result, a set of model equations enables the evaluation of fish habitat conditions in river stretches as a function of flow and morphology. The habitat suitability assessment focuses on four preselected target species: brown trout, European grayling and for low slope rivers common nase and barbel.  相似文献   
75.
Der ?elektronische Brief“ bzw. die elektronische Mail (E-Mail) ist seit über 30 Jahren im privaten wie beruflichen Umfeld im Einsatz. Behörden, Steuerbüros, Krankenhäuser, Finanzinstitute und viele weitere Gruppen versenden und empfangen E-Mails, um Informationen auszutauschen. Innerhalb kurzer Zeit findet eine E-Mail ihren Weg vom Sender in Deutschland zum Empfänger in beispielsweise den USA. Wie funktioniert das? Und was hat es mit E-Mail-Verschlüsselung auf sich? Dieser Artikel betrachtet die grundlegende technische Funktionsweise der E-Mail sowie Hintergründe und Funktionsweise der Verschlüsselung mit S/MIME und PGP.  相似文献   
76.
This article reports the design concept of a novel acoustic beam aperture modifier using butt-jointed gradient-index phononic crystals (GRIN PCs) consisting of steel cylinders embedded in a homogeneous epoxy background. By gradually tuning the period of a GRIN PC, the propagating direction of acoustic waves can be continuously bent to follow a sinusoidal trajectory in the structure. The aperture of an acoustic beam can therefore be shrunk or expanded through change of the gradient refractive index profiles of the butt-jointed GRIN PCs. Our computational results elucidate the effectiveness of the proposed acoustic beam aperture modifier. Such an acoustic device can be fabricated through a simple process and will be valuable in applications, such as biomedical imaging and surgery, nondestructive evaluation, communication, and acoustic absorbers.  相似文献   
77.
78.
This article deals with the differences in the long-term durability and thermal stability under load of terrace deckings from various materials. The tested materials were deckings made of wood, thermally modified timber (TMT), and wood–polymer–composites (WPC). For the determination of the test temperatures for component testing according to EN 310, the surface temperatures of the decks during a normal hot summer day were measured. A cyclic test according to EN 321 was applied to all decking materials. Afterwards the component testing was repeated. All wooden samples reveal considerable cracks, some were twisted, and few were even broken. In particular regarding the optical appearance, wood decks show advantages against the TMT decks. Some WPC decks show very fine cracks on the face, which were additionally analyzed by means of X-ray computed tomography (CT). Except for the WPC deck with higher wood content, no WPC deck revealed significant changes after the cyclic test. The CT analysis was also suitable to find cracks inside the materials and illustrate them. Thus, the whole damage inside a sample could be characterized by calculating a kind of error pattern. No considerable cracks or failures could be observed on the WPC decks.  相似文献   
79.
Squalene–hopene cyclases (SHCs) catalyze the polycyclization of squalene into a mixture of hopene and hopanol. Recently, amino-acid residues lining the catalytic cavity of the SHC from Alicyclobacillus acidocaldarius were replaced by small and large hydrophobic amino acids. The alteration of leucine 607 to phenylalanine resulted in increased enzymatic activity towards the formation of an intermolecular farnesyl–farnesyl ether product from farnesol. Furthermore, the addition of small-chain alcohols acting as nucleophiles led to the formation of non-natural ether-linked terpenoids and, thus, to significant alteration of the product pattern relative to that obtained with the wild type. It is proposed that the mutation of leucine at position 607 may facilitate premature quenching of the intermediate by small alcohol nucleophiles. This mutagenesis-based study opens the field for further intermolecular bond-forming reactions and the generation of non-natural products.  相似文献   
80.
This paper is motivated by the observation that existing security models for direct anonymous attestation (DAA) have problems to the extent that insecure protocols may be deemed secure when analysed under these models. This is particularly disturbing as DAA is one of the few complex cryptographic protocols resulting from recent theoretical advances actually deployed in real life. Moreover, standardization bodies are currently looking into designing the next generation of such protocols. Our first contribution is to identify issues in existing models for DAA and explain how these errors allow for proving security of insecure protocols. These issues are exhibited in all deployed and proposed DAA protocols (although they can often be easily fixed). Our second contribution is a new security model for a class of “pre-DAA scheme”, that is, DAA schemes where the computation on the user side takes place entirely on the trusted platform. Our model captures more accurately than any previous model the security properties demanded from DAA by the trusted computing group (TCG), the group that maintains the DAA standard. Extending the model from pre-DAA to full DAA is only a matter of refining the trust models on the parties involved. Finally, we present a generic construction of a DAA protocol from new building blocks tailored for anonymous attestation. Some of them are new variations on established ideas and may be of independent interest. We give instantiations for these building blocks that yield a DAA scheme more efficient than the one currently deployed, and as efficient as the one about to be standardized by the TCG which has no valid security proof.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号