首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5892篇
  免费   315篇
  国内免费   23篇
电工技术   91篇
综合类   10篇
化学工业   1233篇
金属工艺   126篇
机械仪表   143篇
建筑科学   224篇
矿业工程   8篇
能源动力   212篇
轻工业   385篇
水利工程   38篇
石油天然气   23篇
无线电   1073篇
一般工业技术   1102篇
冶金工业   480篇
原子能技术   31篇
自动化技术   1051篇
  2024年   50篇
  2023年   131篇
  2022年   199篇
  2021年   345篇
  2020年   250篇
  2019年   199篇
  2018年   253篇
  2017年   207篇
  2016年   305篇
  2015年   192篇
  2014年   261篇
  2013年   403篇
  2012年   297篇
  2011年   351篇
  2010年   256篇
  2009年   242篇
  2008年   242篇
  2007年   207篇
  2006年   165篇
  2005年   137篇
  2004年   109篇
  2003年   101篇
  2002年   85篇
  2001年   86篇
  2000年   58篇
  1999年   65篇
  1998年   222篇
  1997年   108篇
  1996年   86篇
  1995年   79篇
  1994年   53篇
  1993年   73篇
  1992年   41篇
  1991年   39篇
  1990年   27篇
  1989年   36篇
  1988年   24篇
  1987年   23篇
  1986年   23篇
  1985年   23篇
  1984年   26篇
  1983年   19篇
  1982年   20篇
  1981年   16篇
  1980年   11篇
  1979年   14篇
  1978年   13篇
  1977年   15篇
  1975年   8篇
  1973年   8篇
排序方式: 共有6230条查询结果,搜索用时 0 毫秒
11.
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed.  相似文献   
12.
In automated container terminals, containers are transported from the marshalling yard to a ship and vice versa by automated vehicles. The automated vehicle type studied in this paper is an automated lifting vehicle (ALV) that is capable of lifting a container from the ground by itself. This study discusses how to dispatch ALVs by utilizing information about pickup and delivery locations and time in future delivery tasks. A mixed-integer programming model is provided for assigning optimal delivery tasks to ALVs. A procedure for converting buffer constraints into time window constraints and a heuristic algorithm for overcoming the excessive computational time required for solving the mathematical model are suggested. Numerical experiments are reported to compare the objective values and computational times by a heuristic algorithm with those by an optimizing method and to analyze the effects of dual cycle operation, number of ALVs, and buffer capacity on the performance of ALVs.  相似文献   
13.
This paper reports the dynamic behaviour of a magnetically actuated floating liquid marble by analysing the oscillation of the marble. A liquid marble is a liquid droplet coated with hydrophobic powder. Magnetite particles inside the marble make it magnetic. The marble floats on a carrier liquid that contains aqueous glycerol of various concentrations. A permanent magnet located under the carrier liquid drives the floating marble with the initial velocity. Stopping the magnet abruptly causes the marble to oscillate around its final position for a few seconds. The oscillation was recorded and analysed using customised image processing and evaluation software. The damped harmonic motion model was then applied to the data and tested. Subsequently, critical parameters of the system such as the initial displacement, friction correction factor, the apparent frequency and the spring constant were determined and discussed. The simple experimental set-up and convenient theoretical approach allow us to characterise the marble motion under the influence of a magnet with good accuracy.  相似文献   
14.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results.  相似文献   
15.
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy with relatively small computational complexity compared with other conventional detection methods.  相似文献   
16.
The International Society of Automation recently released ISA100.11a as an open standard for reliable wireless networks for industrial automation. ISA100.11a uses the TDMA scheme in the medium access layer to provide deterministic services. However, ISA100.11a adopts the CSMA-CA mechanism with priorities for retransmission from failure on dedicated links, sporadic data, and network configuration.This paper evaluates ISA100.11a CSMA-CA by simulation, considering the effects of backoff procedures and priority settings to probability of collision and successful use of slots. It's demonstrated that a high number of priority classes enable better network utilization resulting in less number of packets exceeding their lifetime.  相似文献   
17.
Résumé Les résultats expérimentaux présentés dans cette étude et ceux publiés précédemment montrent que l'électroréduction de l'oxygène se fait dans les sites actifs formés par des ions Mn4+, et que ceux de Mn3+ assurent le transport des électrons au sein du solide.
From the results obtained in this study and those presented in previous publications, it can be deduced that the electroreduction of oxygen occurs via electron transfers at active sites created by Mn4+ ions and that Mn3+ ions contribute to the transport of the electrons through the bulk of the electrocatalysts.


Certains de ces résultats ont fait l'object d'une communication enPoster à la réunion I.S.E. à Varna, Septembre 1977.

A=Zn, Cr, Al;B = Ni, Cu; et 0 x,y 1.  相似文献   
18.
For original paper by Zorzi and Rao, see IEEE J. Sel. Areas Commun., vol.12, no.8, p.1289-98 (1994 October)  相似文献   
19.
We have studied heterogeneous nucleation of liquid 4He on cesiated surfaces using calorimetric techniques. Nucleation kinetics are strongly influenced by wetting properties. Since liquid 4He does not wet cesium below 2K, substantial supercooling of the vapor is expected on theoretical grounds. Experimentally, however, we have been unable to detect any supercooling in our cells. This may be due to microscopic defects in the Cs coating, which in turn may be related to the fact that we have been unable to find a cell construction material which is wetted by Cs. Somewhat paradoxically, it is possible to supercool helium vapor even in a container made of conventional wetted materials by imposing a large heat and mass flux from the liquid to the vapor across the bulk liquid-vapor interface. When evaporation is sufficiently strong, the vapor above the liquid becomes unstable, and forms a dense fog. Videos of this process show that the fog front propagates rapidly from very near the liquid-vapor interface upward into the vapor. Fog formation near the liquid interface implies that the vapor is in a supercooled metastable state. Qualitative ideas from non-equilibrium thermodynamics and kinetic theory are used to explain this phenomenon.  相似文献   
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号