首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2645篇
  免费   154篇
  国内免费   2篇
电工技术   50篇
综合类   7篇
化学工业   722篇
金属工艺   67篇
机械仪表   67篇
建筑科学   171篇
矿业工程   2篇
能源动力   57篇
轻工业   215篇
水利工程   6篇
石油天然气   2篇
无线电   238篇
一般工业技术   532篇
冶金工业   223篇
原子能技术   14篇
自动化技术   428篇
  2022年   23篇
  2021年   55篇
  2020年   37篇
  2019年   50篇
  2018年   51篇
  2017年   70篇
  2016年   72篇
  2015年   81篇
  2014年   96篇
  2013年   139篇
  2012年   118篇
  2011年   175篇
  2010年   115篇
  2009年   119篇
  2008年   132篇
  2007年   121篇
  2006年   106篇
  2005年   85篇
  2004年   69篇
  2003年   72篇
  2002年   51篇
  2001年   51篇
  2000年   54篇
  1999年   44篇
  1998年   80篇
  1997年   59篇
  1996年   51篇
  1995年   37篇
  1994年   30篇
  1993年   32篇
  1992年   25篇
  1991年   24篇
  1990年   19篇
  1989年   27篇
  1988年   20篇
  1987年   14篇
  1986年   27篇
  1985年   23篇
  1984年   24篇
  1983年   19篇
  1982年   16篇
  1981年   22篇
  1980年   18篇
  1979年   20篇
  1978年   22篇
  1977年   26篇
  1976年   21篇
  1975年   14篇
  1974年   15篇
  1973年   14篇
排序方式: 共有2801条查询结果,搜索用时 15 毫秒
51.
52.
The ability to produce metallic membrane materials with porosity on the nanoscale from Ni‐based superalloys, hitherto used exclusively for high temperature applications, has been discovered 15 years ago. The basic principle is to first convert the initial γ/γ′ microstructure, containing isolated γ′‐precipitates, into a bi‐continuous network where both phases are in themselves continuous and interpenetrate each other. Then, one of the two phases is selectively removed, so that a rigid structure consisting of the remaining phase with pores on the location of the removed phase results. This article reviews the progress made so far. In that time period, a number of ways to fabricate these unique materials have emerged, utilizing 1) single crystals and polycrystals as precursor materials as well as 2) coarsening of coherent and incoherent γ′‐precipitates to realize bi‐continuity of the microstructure. Consequently, a family of superalloy membranes has emerged with specific microstructures, properties, advantages, and limitations. It is the intention of this article to give an overview on these various manufacturing routes, as well as on resulting microstructures and properties. Finally, possible fields of applications are outlined. It is demonstrated that the particular manufacturing process from a solid to the porous material leads to certain advantages, such as the ability to structure the material in porous and solid areas as required by the application.
  相似文献   
53.
Orphan detection in distributed systems is a well-researched field for which many solutions exist. These solutions exploit well defined parent-child relationships given in distributed systems. But they are not applicable in mobile agent systems, since no similar natural relationship between agents exist. Thus new protocols have to be developed. In this paper one such protocol for controlling mobile mobile agents and for orphan detection is presented. The shadow approach presented in this paper uses the idea of a placeholder (shadow) which is assigned by the agent system to each new agent. This defines an artificial relationship between agents and shadow. The shadow records the location of all dependent agents. Removing the root shadow implies that all dependent agents are declared orphan and are eventually be terminated. We introduce agent proxies that create a path from shadow to every agent. In an extension of the basic protocol we additionally allow the shadow to be mobile.The shadow approach can be used for termination of groups of agents even if the exact location of each single agent is not known.  相似文献   
54.
    
Adulteration of expensive edible oils, such as olive oil, often involves desterolized oils in order to render the adulteration undetectable. Sunflower oil contains characteristic 7-sterols, which are readily removed upon strong bleaching. It is shown that these 7-sterols do not primarily dehydrate (as do 5-sterols), but isomerize to 8(14)- and 14-sterols. These compounds can be analysed by LC on silica gel or GC on capillary columns with stationary phases of intermediate to high polarity.  相似文献   
55.
56.
In this article we show how temporal backdrops that alternately change their color rapidly at recording rate can aid chroma keying by transforming color spill into a neutral background illumination. Since the chosen colors sum up to white, the chromatic (color) spill component is neutralized when integrating over both backdrop states. The ability to separate both states additionally allows to compute high-quality alpha mattes. Besides the neutralization of color spill, our method is invariant to foreground colors and supports applications with real-time demands. In this article, we explain different realizations of temporal backdrops and describe how keying and color spill neutralization are carried out, how artifacts resulting from rapid motion can be reduced, and how our approach can be implemented to be compatible with common real-time post-production pipelines.  相似文献   
57.
We present a deterministic kinetic data structure for the facility location problem that maintains a subset of the moving points as facilities such that, at any point of time, the accumulated cost for the whole point set is at most a constant factor larger than the optimal cost. In our scenario, each point can change its status between client and facility and moves continuously along a known trajectory in a d-dimensional Euclidean space, where d is a constant.  相似文献   
58.
The use of RFID middleware to support application development for and integration of RFID hardware into information systems has become quite common in RFID applications where reader devices remain stationary, which currently represents the largest part of all RFID applications in use. Another field for applying RFID technology which is offering a huge set of novel possibilities and applications are mobile applications, where readers are no longer fixed. In order to address the specific issues of mobile RFID-enabled applications and to support developers in rapid application development, we present ID-Services, an architecture for an RFID middleware that is designed to support mobile applications. The ID-Services approach has been used to implement MoVIS (Mobile Visitor Information System), a mobile application which allows museum visitors to request individually adapted multimedia information about exhibits in an intuitive way.  相似文献   
59.
The performance of the DNDC and Daisy model to simulate the water dynamics in a floodplain soil of the North China Plain was tested and compared. While the DNDC model uses a simple cascade approach, the Daisy model applies the physically based Richard's equation for simulating water movement in soil. For model testing a three years record of the soil water content from the Dong Bei Wang experimental station near Beijing was used. There, the effect of nitrogen fertilization, irrigation and straw removal on soil water and nitrogen dynamics was investigated in a three factorial field experiment applying a split-split-plot design with 4 replications. The dataset of one treatment was used for model testing and calibration. Two other independent datasets from further treatments were employed for validating the models. For both models, the simulation results were not satisfying using default parameters. After parameter optimisation and the use of site-specific van Genuchten parameters, however, the Daisy model performed well. But, for the DNDC model, parameter optimisation failed to improve the simulation result. Owing to the fact that many biological processes such as plant growth, nitrification or denitrification depend strongly on the soil water content, our findings bring us to the conclusion that the site-specific suitability of the DNDC model for simulating the soil water dynamics should be tested before further simulation of other processes.  相似文献   
60.
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications not only are Semantic Wikis, Semantic Desktops, but also advanced Web Services and agents. The application of rules increases the expressiveness of the underlying knowledge in many ways. Likewise, the integration not only creates new challenges for the design process of such ontologies, but also existing evaluation methods have to cope with the extension of ontologies by rules.Since the verification of Owl ontologies with rule extensions is not tractable in general, we propose to verify ontologies at the symbolic level by using a declarative approach: With the new language Datalog?, known anomalies can be easily specified and tested in a compact manner. We introduce supplements to existing verification techniques to support the design of ontologies with rule enhancements, and we focus on the detection of anomalies that especially occur due to the combined use of rules and ontological definitions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号