首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3000篇
  免费   75篇
  国内免费   1篇
电工技术   30篇
综合类   1篇
化学工业   387篇
金属工艺   42篇
机械仪表   49篇
建筑科学   158篇
矿业工程   114篇
能源动力   70篇
轻工业   240篇
水利工程   30篇
石油天然气   9篇
无线电   232篇
一般工业技术   456篇
冶金工业   929篇
原子能技术   27篇
自动化技术   302篇
  2022年   15篇
  2021年   41篇
  2020年   35篇
  2019年   48篇
  2018年   54篇
  2017年   44篇
  2016年   45篇
  2015年   41篇
  2014年   73篇
  2013年   182篇
  2012年   84篇
  2011年   141篇
  2010年   93篇
  2009年   100篇
  2008年   103篇
  2007年   102篇
  2006年   104篇
  2005年   90篇
  2004年   87篇
  2003年   65篇
  2002年   86篇
  2001年   59篇
  2000年   47篇
  1999年   58篇
  1998年   208篇
  1997年   140篇
  1996年   97篇
  1995年   70篇
  1994年   64篇
  1993年   64篇
  1992年   39篇
  1991年   30篇
  1990年   30篇
  1989年   31篇
  1988年   32篇
  1987年   34篇
  1986年   31篇
  1985年   34篇
  1984年   27篇
  1983年   19篇
  1982年   36篇
  1981年   31篇
  1980年   29篇
  1979年   20篇
  1978年   20篇
  1977年   30篇
  1976年   48篇
  1975年   9篇
  1974年   13篇
  1972年   15篇
排序方式: 共有3076条查询结果,搜索用时 15 毫秒
41.
Pick a binary string of length n and remove its first bit b. Now insert b after the first remaining 10, or insert $\overline{b}$ at the end if there is no remaining 10. Do it again. And again. Keep going! Eventually, you will cycle through all 2 n of the binary strings of length n. For example, are the binary strings of length n=4, where and . And if you only want strings with weight (number of 1s) between ? and u? Just insert b instead of $\overline{b}$ when the result would have too many 1s or too few 1s. For example, are the strings with n=4, ?=0 and u=2. This generalizes ‘cool-lex’ order by Ruskey and Williams (The coolest way to generate combinations, Discrete Mathematics) and we present two applications of our ‘cooler’ order. First, we give a loopless algorithm for generating binary strings with any weight range in which successive strings have Levenshtein distance two. Second, we construct de Bruijn sequences for (i) ?=0 and any u (maximum specified weight), (ii) any ? and u=n (minimum specified weight), and (iii) odd u?? (even size weight range). For example, all binary strings with n=6, ?=1, and u=4 appear once (cyclically) in . We also investigate the recursive structure of our order and show that it shares certain sublist properties with lexicographic order.  相似文献   
42.
Concerns regarding the possible environmental effects of organochlorine by‐products from bleaching of pulp with chlorine‐based compounds have led to the pulp and paper industry developing new bleaching sequences. Ozone, oxygen and hydrogen peroxide are the main reagents in these Totally Chlorine Free (TCF) bleaching processes.

In this study, eucalypt kraft pulps from a variety of Australian wood sources were subjected to bleaching sequences comprising oxygen, ozone and hydrogen peroxide/alkali extraction stages. The aqueous liquid effluents from each stage were analyzed by GC/MS for aldehydes, ketones, alcohols, carboxylic acids and other by‐products. Pentafluorobenzyl oxime derivatives of the aldehydes and ketones were analyzed by electron impact GC/MS. The major carbonyl compounds detected were formaldehyde, glyoxal, dimethylglyoxal and acetone. An homologous series of n‐aldehydes corresponding to cleavage of ω‐3, 6, 9 and 12 unsaturated fatty acids also was detected. Aromatic aldehydes were identified in the oxygen stage and high consistency ozone stages, but not in any medium consistency ozone or post‐ozone bleach stages. In all stages a series of saturated alkyl carboxylic acids from formic to octacosanoic acid was detected. Formic and acetic acids were present in the highest yield. Only trace quantities of unsaturated fatty acids were detected. Details of these and other compounds detected are discussed.  相似文献   

43.
The construction of dams significantly alters flow and sediment regimes with subsequent deleterious effects on the morphological and ecological character of rivers. Effective experimental floods can ameliorate the downstream geomorphic impacts of dams. The traditional view is that large floods are required to perform effective geomorphic work, and the geomorphic outcomes of small floods are often overlooked. Many river restoration frameworks do not consider small floods. Yet, there is evidence that the hydrological characteristics that ameliorate specific geomorphic impacts in a river are unique to each river, and a customised approach to setting the right mix of floods (including small experimental floods) is needed. In this study, we modify an existing flood effectiveness model developed for large floods, for determining the geomorphic effectiveness of small floods in a highly regulated Australian river. Two flood classes were added to the model (medium peak stream power and moderate total energy expenditure), and the flood power characteristics were rescaled to reflect the relative difference in the magnitude of the small floods and the magnitude of the geomorphic work performed. Using a step‐wise approach, this customised model determined the geomorphic effectiveness of small floods. The best flood for ameliorating the geomorphic impacts of flow regulation had medium to long duration (10 to 51 days), high peak unit stream power (77 to 123 Wm?2) and moderate to large total energy expenditure (78,600 to 342,320 × 103 J). This approach to determining flood effectiveness for small floods is applicable to other geomorphically impacted river channels downstream of dams and can be used to inform experimental flood releases for geomorphic outcomes.  相似文献   
44.
Slow cooling of Sn-Ag-Cu and Sn-Ag-Cu-X (X = Fe, Co) solder-joint specimens made by hand soldering simulated reflow in surface-mount assembly to achieve similar as-solidified joint microstructures for realistic shearstrength testing, using Sn-3.5Ag (wt.%) as a baseline. Minor substitutions of either cobalt or iron for copper in Sn-3.7Ag-0.9Cu refined the joint matrix microstructure, modified the Cu6Sn5 intermetallic phase at the copper substrate/solder interface, and increased the shear strength. At elevated (150°C) temperature, no significant difference in shear strength was found in all of the alloys studied. Ambient temperature shear strength was reduced by largescale tin dendrites in the joint microstructure, especially by the coarse dendrites in solute poor Sn-Ag-Cu.  相似文献   
45.
This paper reports on the use of qualitative analysis to inform a risk analysis framework for decentralised water systems. To realise the benefits from these technologies, a methodology is applied to learn from previous difficulties in implementing and managing them. A workshop process was used to capture stories from industry professionals on difficulties they have encountered in planning and implementation. Qualitative analysis of story narratives revealed stages where there was some type of development process failure; as well as failure modes and factors influencing the difficulties encountered. The analysis also generated insights: difficulties in one part of the development process tends to propagate to subsequent stages; system difficulties most often occurred in the policy stage of development due to institutional inertia and lack of adaptive governance; and the best indicator of problems with a decentralised system was complaints of poor water quality. Furthermore, this paper also provides a method to learn from past difficulties by identifying what data needs to be collected in order to populate a risk model which can be used for improving risk assessment of the development process for decentralised systems. This can provide a basis for better decision making, policy and guidelines; an important factor in mainstream acceptance.  相似文献   
46.
The sensing context plays an important role in many pervasive and mobile computing applications. Continuing from previous work [D. Phung, B. Adams, S. Venkatesh, Computable social patterns from sparse sensor data, in: Proceedings of First International Workshop on Location Web, World Wide Web Conference (WWW), New York, NY, USA, 2008, ACM 69–72.], we present an unsupervised framework for extracting user context in indoor environments with existing wireless infrastructures. Our novel approach casts context detection into an incremental, unsupervised clustering setting. Using WiFi observations consisting of access point identification and signal strengths freely available in office or public spaces, we adapt a density-based clustering technique to recover basic forms of user contexts that include user motion state and significant places the user visits from time to time. High-level user context, termed rhythms, comprising sequences of significant places are derived from the above low-level context by employing probabilistic clustering techniques, latent Dirichlet allocation and its n-gram temporal extension. These user contexts can enable a wide range of context-ware application services. Experimental results with real data in comparison with existing methods are presented to validate the proposed approach. Our motion classification algorithm operates in real-time, and achieves a 10% improvement over an existing method; significant locations are detected with over 90% accuracy and near perfect cluster purity. Richer indoor context and meaningful rhythms, such as typical daily routines or meeting patterns, are also inferred automatically from collected raw WiFi signals.  相似文献   
47.
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size. Our method uses the round function of an existing block cipher as a black box and inserts it into a substitution- permutation network. Our method is designed to enable us to form a reduction between the elastic and the original versions of the cipher. Using this reduction, we prove that the elastic version of a cipher is secure against key-recovery attacks if the original cipher is secure against such attacks. We note that while reduction-based proofs of security are a cornerstone of cryptographic analysis, they are typical when complete components are used as sub-components in a larger design. We are not aware of the use of such techniques in the case of concrete block cipher designs. We demonstrate the general applicability of the elastic block cipher method by constructing examples from existing block ciphers: AES, Camellia, MISTY1, and RC6. We compare the performance of the elastic versions to that of the original versions and evaluate the elastic versions using statistical tests measuring the randomness of the ciphertext. We also use our examples to demonstrate the concept of a generic key schedule for block ciphers.
Angelos D. KeromytisEmail:
  相似文献   
48.
The paper discusses a series of driving trials that were conducted to investigate postural stability of disabled drivers and to assess the effectiveness of a representative sample of support aids. Twenty-three disabled drivers with varying levels of physical disability and seven non disabled drivers participated in the study. The test car was equipped with transducers to measure vehicle velocity and acceleration (longitudinal and lateral), steering wheel movement and torque, and the bracing forces exerted by the driver on the steering wheel. Video cameras were installed to record postural support strategies and displacement of the driver and to record deviation of the car from the specified path. Subjective data regarding driver attitudes and acceptance were also collected through the administration of questionnaires. Findings from the study showed that support aids significantly improved driving performance and reduced physical exertion to maintain an upright driving position for disabled drivers. However, ergonomics design aspects regarding the ease of use and acceptance of the support aids by the end users were identified as obstacles to their sustained use in everyday driving.  相似文献   
49.
Effective electrical head-only stunning produces a seizure-like state followed by a period of analgesia seen in animals allowed to recover. Passing of a 1·0 A current (50 Hz, 500 V) for less than 0·2 s, through the head of a sheep does not produce a seizure-like state as evidenced by recorded electroencephalogram. Corresponding to this lack of seizure-like state, the release of the neurotransmitters glutamate and aspartate, in the brain, occurs to levels associated with arousal rather than seizure. At a duration of 0·2 s, the same stun parameters as above produce a seizure-like state and the release of glutamate and aspartate rises dramatically. The length of the seizure-like state, and the levels of release of glutamate, aspartate and a third neurotransmitter gamma amino-4-butyric acid (GABA), increased with stun duration until 4·0 s duration, where a peak in these parameters was seen. Stun durations of 2·0, 4·0, 8·0 and 12·0 s all produce similar effects. At a duration of 20 s, however, the length of the seizure-like state and the release of neurotransmitters is less than at shorter stun durations. For welfare purposes a head-only electrical stun, of 1·0 A, at a duration as low as 0·2 s produces unconsciousness and analgesia to subsequent slaughter procedures. However, maximum welfare benefits appear attainable at durations between 2·0 and 20·0 s.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号