首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1146篇
  免费   81篇
电工技术   21篇
化学工业   306篇
金属工艺   17篇
机械仪表   30篇
建筑科学   47篇
矿业工程   1篇
能源动力   30篇
轻工业   120篇
水利工程   5篇
石油天然气   2篇
武器工业   1篇
无线电   98篇
一般工业技术   189篇
冶金工业   71篇
原子能技术   6篇
自动化技术   283篇
  2023年   6篇
  2022年   50篇
  2021年   51篇
  2020年   35篇
  2019年   35篇
  2018年   38篇
  2017年   21篇
  2016年   49篇
  2015年   44篇
  2014年   37篇
  2013年   75篇
  2012年   59篇
  2011年   84篇
  2010年   61篇
  2009年   64篇
  2008年   52篇
  2007年   51篇
  2006年   44篇
  2005年   42篇
  2004年   30篇
  2003年   37篇
  2002年   28篇
  2001年   21篇
  2000年   12篇
  1999年   16篇
  1998年   17篇
  1997年   11篇
  1996年   13篇
  1995年   17篇
  1994年   20篇
  1993年   7篇
  1992年   8篇
  1991年   3篇
  1990年   3篇
  1989年   7篇
  1988年   5篇
  1987年   2篇
  1986年   7篇
  1985年   7篇
  1984年   9篇
  1983年   7篇
  1982年   7篇
  1981年   7篇
  1980年   4篇
  1979年   4篇
  1978年   4篇
  1977年   2篇
  1976年   7篇
  1975年   2篇
  1974年   2篇
排序方式: 共有1227条查询结果,搜索用时 10 毫秒
61.
Scanning electron microscope and differential scanning calorimetry studies were used to study the morphology and thermal properties of cured systems constituted of different unsaturated polyester formulations, two conventional low-shrink additives and one suitably synthetized additive. The aim was to clarify the influence of these low-profile agents on the resulting phase structure and on the thermal behaviour of the systems. Moreover, the influence was investigated of low-profile agents on the fibre/matrix adhesion in composite materials reinforced with glass fibres coated by silane coupling agents.  相似文献   
62.
The activity of gamma-aminobutyric acid (GABA) synthesizing enzyme glutamic acid decarboxylase (GAD, EC 4.1.1.15) was assayed in the rat substantia nigra (SN) and medial basal hypothalamus (MBH) following systemic injection of different doses of the dopamine receptor agonist apomorphine. In SN, the highest dose of apomorphine (1000 micrograms/kg) causes an increase of the GAD activity whilst an opposite effect is observed with the lowest dose (35 micrograms/kg). Results obtained in SN are in accordance with previous neurochemical and behavioural data suggesting an opposite action of high (500 micrograms/kg) and low doses (100 micrograms/kg) of apomorphine in nigro-striatal system, probably due to the existence of two classes of dopamine receptors, i.e. classical postsynaptic dopamine receptors and presynaptic inhibitory dopamine autoreceptors. In MBH, the evidence for similar effects of low and high doses of apomorphine (the decrease of GAD activity) may suggest that, as already reported, at this level only one class of dopamine receptors is present.  相似文献   
63.
Constraint-Based Verification of Parameterized Cache Coherence Protocols   总被引:1,自引:0,他引:1  
We propose a new method for the parameterized verification of formal specifications of cache coherence protocols. The goal of parameterized verification is to establish system properties for an arbitrary number of caches. In order to achieve this purpose we define abstractions that allow us to reduce the original parameterized verification problem to a control state reachability problem for a system with integer data variables. Specifically, the methodology we propose consists of the following steps. We first define an abstraction in which we only keep track of the number of caches in a given state during the execution of a protocol. Then, we use linear arithmetic constraints to symbolically represent infinite sets of global states of the resulting abstract protocol. For reasons of efficiency, we relax the constraint operations by interpreting constraints over real numbers. Finally, we check parameterized safety properties of abstract protocols using symbolic backward reachability, a strategy that allows us to obtain sufficient conditions for termination for an interesting class of protocols. The latter problem can be solved by using the infinite-state model checker HyTech: Henzinger, Ho, and Wong-Toi, A model checker for hybrid systems, Proc. of the 9th International Conference on Computer Aided Verification (CAV'97), Lecture Notes in Computer Science, Springer, Haifa, Israel, 1997, Vol. 1254, pp. 460–463. HyTech handles linear arithmetic constraints using the polyhedra library of Halbwachs and Proy, Verification of real-time systems using linear relation analysis, Formal Methods in System Design, Vol. 11, No. 2, pp. 157–185, 1997. By using this methodology, we have automatically validated parameterized versions of widely implemented write-invalidate and write-update cache coherence protocols like Synapse, MESI, MOESI, Berkeley, Illinois, Firefly and Dragon (Handy, The Cache Memory Book, Academic Press, 1993). With this application, we have shown that symbolic model checking tools like HyTech, originally designed for the verification of hybrid systems, can be applied successfully to new classes of infinite-state systems of practical interest.  相似文献   
64.
65.
In this paper we propose a semi-automatic technique for deriving the similarity degree between two portions of heterogeneous information sources (hereafter, sub-sources). The proposed technique consists in two phases: the first one selects the most promising pairs of sub-sources, whereas the second one computes the similarity degree relative to each promising pair. We show that the detection of sub-source similarities is a special case (and a very interesting one, for semi-structured information sources) of the more general problem of Scheme Match. In addition, we present a real example case to clarify the proposed technique, a set of experiments we have conducted to verify the quality of its results, a discussion about its computational complexity and its classification in the context of related literature. Finally, we discuss some possible applications which can benefit by derived similarities.  相似文献   
66.
The paper deals with the optimisation of a tapered tubular steel component to be used as an energy-absorbing device in the front structure of a vehicle body. Aim of the optimisation problem is the minimisation of a load uniformity parameter evaluated as the ratio between the maximum and the average crushing loads. The optimisation problem takes into account two design variables describing a tapered geometrical configuration, the diameter of the component at one of its bounds and the tapering length. Two improved geometrical configurations have been found and have been experimentally tested to verify the numerical results with impact velocities up to 10 m/s.  相似文献   
67.
Integrated methodology for forensic oil spill identification   总被引:3,自引:0,他引:3  
A new integrated methodology for forensic oil spill identification is presented. It consists of GC-MS analysis, chromatographic data processing, variable-outlier detection, multivariate data analysis, estimation of uncertainties, and statistical evaluation. The methodology was tested on four groups of diagnostic ratios composed of petroleum biomarkers and ratios within homologous PAH categories. Principal component analysis (PCA) was employed and enabled the simultaneous analysis of many diagnostic ratios. Weathering was taken into account by considering the sampling uncertainties estimated from replicate spill samples. Statistical evaluation ensured an objective matching of oil spill samples with suspected source oils as well as classification into positive match, probable match, and nonmatch. The data analysis is further refined if two or more source oils are classified as probable match by using weighted least squares fitting of the principal components, local PCA models, and additional information relevant to the spill case. The methodology correctly identified the source of two spill samples (i.e., crude oils from Oseberg East and Oseberg Field Centre) and distinguished them from closely related source oils.  相似文献   
68.
A new approach for the estimation and the validation of a structural equation model with a formative-reflective scheme is presented. The basis of the paper is a proposal for overcoming a potential deficiency of PLS path modeling. In the PLS approach the reflective scheme assumed for the endogenous latent variables (LVs) is inverted; moreover, the model errors are not explicitly taken into account for the estimation of the endogenous LVs. The proposed approach utilizes all the relevant information in the formative manifest variables (MVs) providing solutions which respect the causal structure of the model. The estimation procedure is based on the optimization of the redundancy criterion. The new approach, entitled redundancy analysis approach to path modeling (RA-PM) is compared with both traditional PLS Path Modeling and LISREL methodology, on the basis of real and simulated data.  相似文献   
69.
The Internet is currently experiencing one of the most important challenges in terms of content distribution since its first uses as a medium for content delivery: users from passive downloaders and browsers are moving towards content producers and publishers. They often distribute and retrieve multimedia contents establishing network communities. This is the case of peer-to-peer IPTV communities.In this work we present a detailed study of P2P IPTV traffic, providing useful insights on both transport- and packet-level properties as well as on the behavior of the peers inside the network. In particular, we provide novel results on the (i) ports and protocols used; (ii) differences between signaling and video traffic; (iii) behavior of the traffic at different time scales; (iv) differences between TCP and UDP traffic; (v) traffic generated and received by peers; (vi) peers neighborhood and session duration. The knowledge gained thanks to this analysis is useful for several tasks, e.g. traffic identification, understanding the performance of different P2P IPTV technologies and the impact of such traffic on network nodes and links, and building more realistic models for simulations.1  相似文献   
70.
Minority Games, Local Interactions, and Endogenous Networks   总被引:4,自引:0,他引:4  
We study a local version of the Minority Game, where agents are placed on the nodes of a directed graph. Agents care about being in the minority of the group of agents they are currently linked to and employ myopic best-reply rules to choose their next-period state. We show that, in this benchmark case, the smaller the size of local networks, the larger long-run population-average payoffs. We then explore the collective behavior of the system when agents can: (i) assign weights to each link they hold and modify them over time in response to payoff signals; (ii) delete badly performing links (i.e., opponents) and replace them with randomly chosen ones. Simulations suggest that, when agents are allowed to weigh links but cannot delete/replace them, the system self-organizes into networked clusters that attain very high payoff values. These clustered configurations are not stable and can easily be disrupted, generating huge subsequent payoff drops. If, however, agents can (and are sufficiently willing to) discard badly performing connections, the system quickly converges to stable states where all agents get the highest payoff, independently of the size of the networks initially in place.JEL Classification:s C72, C73.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号