首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1705篇
  免费   73篇
  国内免费   4篇
电工技术   15篇
综合类   1篇
化学工业   406篇
金属工艺   34篇
机械仪表   20篇
建筑科学   56篇
矿业工程   13篇
能源动力   50篇
轻工业   79篇
水利工程   13篇
石油天然气   22篇
无线电   109篇
一般工业技术   472篇
冶金工业   211篇
原子能技术   31篇
自动化技术   250篇
  2023年   18篇
  2022年   38篇
  2021年   51篇
  2020年   34篇
  2019年   36篇
  2018年   36篇
  2017年   50篇
  2016年   41篇
  2015年   47篇
  2014年   63篇
  2013年   128篇
  2012年   92篇
  2011年   111篇
  2010年   74篇
  2009年   56篇
  2008年   94篇
  2007年   81篇
  2006年   63篇
  2005年   60篇
  2004年   44篇
  2003年   56篇
  2002年   49篇
  2001年   25篇
  2000年   13篇
  1999年   19篇
  1998年   33篇
  1997年   31篇
  1996年   24篇
  1995年   13篇
  1994年   20篇
  1993年   22篇
  1992年   14篇
  1991年   12篇
  1990年   16篇
  1989年   19篇
  1988年   11篇
  1987年   8篇
  1986年   9篇
  1985年   8篇
  1984年   10篇
  1983年   17篇
  1982年   15篇
  1980年   8篇
  1979年   9篇
  1978年   10篇
  1977年   11篇
  1975年   10篇
  1973年   9篇
  1971年   11篇
  1969年   7篇
排序方式: 共有1782条查询结果,搜索用时 15 毫秒
51.
A substantial portion of the database programming efforts are invested in integrity constraints enforcement. Traditionally, both the constraint semantics and their enforcement were embedded inside application programs. In recent years several studies have dealt with specifying integrity constraints as separate entities (e.g. rules), and relating the database consistency requirements to these rules. In this paper we deal with the complementary issue of stabilizing the database when update exceptions occur. While a simplistic approach is to abort any transaction that inflicts consistency violations, this is not always the desired action. We take advantage of the empirical observation that most of the exception-handling policies follow a small number of behavior patterns. Unlike some previous approaches that base their repair solution on syntactic analysis of the constraints and performance issues, we base our approach on the application semantics as reflected in these behavioral patterns. We describe a model that uses high-level abstractions called stabilizer types denoting these behavior patterns for consistency restorations, whose exact semantics is case dependent. It follows the fault tolerance's self-stabilization approach. An inference mechanism translates these abstractions into executable active rules. This approach provides high-level language to the exception handling portion of the application and substantially reduces the required programming.  相似文献   
52.
Ellipsoidal outer-bounding of the set of all feasible state vectors under model uncertainty is a natural extension of state estimation for deterministic models with unknown-but-bounded state perturbations and measurement noise. The technique described in this paper applies to linear discrete-time dynamic systems; it can also be applied to weakly non-linear systems if non-linearity is replaced by uncertainty. Many difficulties arise because of the non-convexity of feasible sets. Combined quadratic constraints on model uncertainty and additive disturbances are considered in order to simplify the analysis. Analytical optimal or suboptimal solutions of the basic problems involved in parameter or state estimation are presented, which are counterparts in this context of uncertain models to classical approximations of the sum and intersection of ellipsoids. The results obtained for combined quadratic constraints are extended to other types of model uncertainty.  相似文献   
53.
In large‐scale fires, the input of energy to burning materials occurs predominantly by radiative transfer. The in‐depth (rather than just surface) absorption of radiant energy by a polymer influences its ignition time and burning rate. The present investigation examines two methods for obtaining the absorption coefficient of polymers for infrared radiation from high‐temperature sources: a broadband method and a spectral method. Data on the total average broadband transmittance for 11 thermoplastics are presented (as are reflectance data), and the absorption coefficient is found to vary with thickness. Implications for modeling of mass loss experiments are discussed. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
54.
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. ?kori? and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.  相似文献   
55.
Kolmogorov complexity furnishes many useful tools for studying different natural processes that can be expressed using sequences of symbols from a finite alphabet (texts), such as genetic texts, literary and music texts, animal communications, etc. Although Kolmogorov complexity is not algorithmically computable, in a certain sense it can be estimated by means of data compressors. Here we suggest a method of analysis of sequences based on ideas of Kolmogorov complexity and mathematical statistics, and apply this method to biological (ethological) ??texts.?? A distinction of the suggested method from other approaches to the analysis of sequential data by means of Kolmogorov complexity is that it belongs to the framework of mathematical statistics, more specifically, that of hypothesis testing. This makes it a promising candidate for being included in the toolbox of standard biological methods of analysis of different natural texts, from DNA sequences to animal behavioural patterns (ethological ??texts??). Two examples of analysis of ethological texts are considered in this paper. Theses examples show that the proposed method is a useful tool for distinguishing between stereotyped and flexible behaviours, which is important for behavioural and evolutionary studies.  相似文献   
56.
Abstract

Both [60]- and [70]fullerene react with either the Scherer radical (perfluorodiisopropylethylmethyl, C9F19), a mixture of branched perfluorononenes (C9F18, the product of hexafluoropropene trimerization), or β-fluorosulphatotetrafluoroethyldiheptafluoroisopropylmethyl radical (C9F18OSO2F) in the ionization chamber of a mass spectrometer to give the positive parent ions of trifluoromethylation products, the reaction being accompanied by hydrogen addition. The reaction occurs at least partly on the walls of the ionization chamber, by a radical mechanism employing CF3 radicals formed from the radical reactants both thermally and under electron impact; only the latter route occurs with the perfluorononenes.  相似文献   
57.
BoltzWann is a code to evaluate thermoelectric and electronic transport properties of extended systems with a maximally-localized Wannier function basis set. The semiclassical Boltzmann transport equations for the homogeneous infinite system are solved in the constant relaxation-time approximation and band energies and band derivatives are obtained via Wannier interpolations. Thanks to the exponential localization of the Wannier functions obtained, very high accuracy in the Brillouin zone integrals can be achieved with very moderate computational costs. Moreover, the analytical expression for the band derivatives in the Wannier basis resolves any issues that may occur when evaluating derivatives near band crossings. We present here an updated version of the BoltzWann code, which is now fully integrated within Wannier90 version 2.0, with minor bug fixes and the possibility to study also two-dimensional systems.  相似文献   
58.
59.
60.
Abstract

We demonstrate results of studies of a silicon binary diffractive optical element (DOE) focusing a terahertz laser Gaussian beam into a paraxial segment. The characteristics of the DOE were examined on a Novosibirsk Free Electron Laser beam of 141-μm wavelength.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号