首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1743篇
  免费   102篇
  国内免费   2篇
电工技术   15篇
综合类   1篇
化学工业   416篇
金属工艺   25篇
机械仪表   37篇
建筑科学   52篇
矿业工程   1篇
能源动力   63篇
轻工业   300篇
水利工程   14篇
石油天然气   8篇
无线电   167篇
一般工业技术   272篇
冶金工业   203篇
原子能技术   15篇
自动化技术   258篇
  2024年   5篇
  2023年   22篇
  2022年   98篇
  2021年   97篇
  2020年   52篇
  2019年   59篇
  2018年   54篇
  2017年   46篇
  2016年   63篇
  2015年   49篇
  2014年   77篇
  2013年   118篇
  2012年   105篇
  2011年   126篇
  2010年   82篇
  2009年   65篇
  2008年   84篇
  2007年   66篇
  2006年   42篇
  2005年   42篇
  2004年   40篇
  2003年   36篇
  2002年   30篇
  2001年   21篇
  2000年   22篇
  1999年   25篇
  1998年   78篇
  1997年   54篇
  1996年   43篇
  1995年   24篇
  1994年   17篇
  1993年   21篇
  1992年   8篇
  1991年   2篇
  1990年   7篇
  1989年   7篇
  1988年   8篇
  1987年   5篇
  1986年   7篇
  1985年   4篇
  1984年   3篇
  1982年   3篇
  1980年   2篇
  1979年   6篇
  1978年   5篇
  1977年   6篇
  1975年   3篇
  1971年   1篇
  1965年   2篇
  1964年   1篇
排序方式: 共有1847条查询结果,搜索用时 15 毫秒
101.
Widespread trends of abandonment have strongly affected Mediterranean mountains after the Second World War, triggering spontaneous recolonisation of forests. A diachronic analysis of the landscape in a Natura 2000 site (Tuscany, Italy) was carried out using digital aerial photographs (1954, 2013) and a GIS-based methodology, focusing on territories above 1300 m a.s.l. The detected variations of total areas, patch shape, patch dimensions and selected metrics showed a notable shift of the vegetation towards woody types and a drastic reduction of open grasslands, some with high conservation value, accompanied by a strong increase in patch number, surface and edge. A decrease of SDI and SEI diversity indices was also observed. Considering that fragmentation is one of the main causes threatening habitats and species, our results point out a clear necessity for a monitoring programme and suitable actions aimed at improving the status of biodiversity-rich montane grasslands.  相似文献   
102.
Design, development and scale-up of environmentally friendly coatings are very important in order to replace chromate based coatings for aluminium alloys. Barrier properties, paint adhesion and possibly self-healing ability are relevant aspects for replacement of chromate-based pre-treatments. Sol–gel materials are candidates for use in protective coating applications, as it is possible to form highly adherent and chemically inert oxide films on metal substrates.  相似文献   
103.
The corrosion of thermoelectric clathrates α- and β-Eu8Ga16−xGe30+x is studied under static air (DSC/TG) up to 650 °C. Oxidation product layers with thicknesses of 10.5 μm (α-Eu8Ga16−xGe30+x) and 4.5 μm (β-Eu8Ga16−xGe30+x) are formed. The oxidation begins at 360 and 380 °C, respectively. XRD pattern of the β-Eu8Ga16−xGe30+x oxidized layer shows Ge and four Eu2O3 reflections; while α-Eu8Ga16−xGe30+x data (sample crushed and grinded) shows α-Eu8Ga16−xGe30+x reflections (majority phase), two EuGaxGe4?x strongest reflections and Ge (minority phases). These results indicate the amount of oxides is very small or they are amorphous. High temperature powder XRD measurements on α-Eu8Ga16−xGe30+x under air confirm the oxidation onset temperature determined in DSC studies.  相似文献   
104.
International Journal of Control, Automation and Systems - In the framework of the Future Internet, the aim of the Quality of Experience (QoE) Control functionalities is to track the personalized...  相似文献   
105.
Through a comprehensive and aggressive research program, the Consolidated Edison Company of New York, Inc. (Con Edison) has designed, developed and installed several new products to address the environmental impact of leaked dielectric fluid from pipe-type cable systems. These include online leak detection, leak location, retractable flow direction indicator, full stop joints and transition joints. This paper describes the application of the aforementioned products on the Con Edison underground transmission system  相似文献   
106.
We discuss how vocal disorders can be post-corrected via a simple nonlinear noise reduction scheme. This work is motivated by the need of a better understanding of voice dysfunctions. This would entail a 2-fold advantage for affected patients: Physicians can perform better surgical interventions and on the other hand researchers can try to build up devices that can help to improve voice quality, i.e. in a phone conversation, avoiding any surgical treatment. As a first step, a proper signal classification is performed, through the idea of geometric signal separation in a feature space. Then through the analysis of the different regions populated by the samples coming from healthy people and from patients affected by T1A glottis cancer, one is able to understand which kind of interventions are necessary in order to correct the illness, i.e. to move the corresponding feature vector from the sick region to the healthy one. We discuss such a filter and show its performance.  相似文献   
107.
Double dispatch is the ability to dynamically select a method not only according to the run‐time type of the receiver (single dispatch), but also according to the run‐time type of the argument. This mechanism unleashes the power of dynamic binding in object‐oriented languages, so enhancing re‐usability and separation of responsibilities. However, many mainstream languages, such as, e.g., C++ and Java, do not provide it, resorting only to single dispatch. In this paper we propose an extension of C++ (also applicable to other object‐oriented languages) that enables double dispatch as a language feature. This yields dynamic overloading and covariant specialization of methods. We define a translation from the new constructs to standard C++ and we present the preprocessor implementing this translation, called doublecpp . The translated code enjoys static type safety and implements the semantics of double dispatch by using only standard mechanisms of static overloading and dynamic binding, with minimal impact on the performance of the program. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
108.
Traditional support tools for software engineers, normally based on a client-server architecture, are unsuitable to deal with the new issues emerging from the current (and future) cooperative work scenarios (where connectivity is intrinsically transient, the number of interacting partners dynamically changes, etc.). This paper presents a quantitative assessment of a fully decentralized, peer-to-peer, cooperative infrastructure. Stochastic Well-Formed Nets (SWNs) modelling the new peer-to-peer architecture, and a traditional (client-server) one, are developed and analysed: we used SWNs for their ability to directly exploit the symmetries intrinsically present in the modelled systems, thus greatly reducing the complexity of the analysis. The main goal is to compare the impact of the two alternative protocols on the collaborative work. Together with the performance figures of interest, methodological issues concerning the choice of the most appropriate model abstraction level, the adoption of a compositional modelling approach, and the management of the model complexity are also discussed.  相似文献   
109.
We propose a light-weight fingerprint matching algorithm that can be executed inside the devices with a limited computational power. The algorithm is based on the minutiae local structures (the “neighborhoods”), that are invariant with respect to global transformations like translation and rotation. The match algorithm has been implemented inside a smartcard over the Java CardTM platform, meeting the individual’s need for information privacy and overall authentication procedure security. The main characteristic of the algorithm is to have an asymmetric behavior, in respect to the execution time, between correct positive and negative matches. The performances in terms of authentication reliability and speed were tested on some databases from the Fingerprint Verification Competition 2002 and 2004 editions (FVC2002 and FVC2004). Moreover, our procedure showed better reliability when compared with a related algorithm on the same database. We can achieve a false acceptance rate (FAR) of 0.1%, a false rejection rate of about 6%, and from 0.3 to 8 s to match most of the finger pairs during the FAR tests.  相似文献   
110.
Casual message-logging protocols have several attractive properties: they introduce no blocking, send no additional messages over those sent by the application, and never create orphans. Causal message logging, however, does require the casual effects of the deliveries of messages to be tracked. The information concerning causality tracking is piggybacked on application messages, and the amount of such information can become large. In this paper we study the cost of tracking causality in causal message-logging protocols. One can track causality as accurately as possible, but to do so requires piggybacking a considerable amount of additional information. One can reduce the amount of piggybacked information on each message by reducing the accuracy of causality tracking. But then, causal message logging may piggyback the reduced amount of information on more messages. We specify six different methods of tracking causality, each representing a natural choice based on the specification of causal message logging. We describe how these six methods can be implemented and compare them in terms of how large of a piggyback load they impose. This load depends on the application that is using causal message logging. We characterize some applications for which a given method has the smallest piggyback load, and study using simulation the size of the piggyback load for two different models of applications. Received: July 1999 / Accepted: July 2001  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号