首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   848篇
  免费   38篇
  国内免费   3篇
电工技术   12篇
综合类   2篇
化学工业   199篇
金属工艺   19篇
机械仪表   20篇
建筑科学   24篇
能源动力   35篇
轻工业   68篇
水利工程   3篇
石油天然气   4篇
无线电   74篇
一般工业技术   181篇
冶金工业   61篇
原子能技术   10篇
自动化技术   177篇
  2023年   14篇
  2022年   32篇
  2021年   39篇
  2020年   18篇
  2019年   25篇
  2018年   24篇
  2017年   27篇
  2016年   26篇
  2015年   19篇
  2014年   44篇
  2013年   66篇
  2012年   45篇
  2011年   57篇
  2010年   64篇
  2009年   65篇
  2008年   39篇
  2007年   54篇
  2006年   37篇
  2005年   25篇
  2004年   21篇
  2003年   19篇
  2002年   12篇
  2001年   8篇
  2000年   13篇
  1999年   8篇
  1998年   12篇
  1997年   10篇
  1996年   6篇
  1995年   10篇
  1994年   5篇
  1992年   3篇
  1991年   3篇
  1990年   3篇
  1989年   7篇
  1988年   3篇
  1986年   1篇
  1985年   3篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1978年   1篇
  1975年   2篇
  1973年   2篇
  1972年   1篇
  1971年   1篇
  1967年   1篇
  1966年   1篇
排序方式: 共有889条查询结果,搜索用时 15 毫秒
61.
This paper presents the temperature dependence of the mechanical properties of structural high-strength low-alloy (HSLA) ASTM A709 Gr50 steel (En10025: S355 JO; DIN: ST 52-3U). Engineering stress-strain diagrams at lowered and elevated temperatures are presented. Creep responses for selected constant stresses at selected temperatures are also presented and are fit with a rheological model. Additionally, a relation between impact toughness and fracture toughness is proposed and is validated using results from notch impact tests on a Charpy pendulum impact machine.  相似文献   
62.
The authors discuss a semantic-mediation architecture to advance traditional approaches for standards-based business-to-business (B2B) interoperability. The architecture is supported by the Athena Knowledge Representation and Semantics Mediation tool suite. Initial experimentations with the architecture and the toolset offer discussions of key architectural and functional aspects and suggest directions for future tools enhancements.  相似文献   
63.
Brain is one of the richest organs in lipid content. Phospholipids (glycerophospholipids and sphingolipids) are important building blocks of cell membranes, which provide an optimal environment for protein interactions, trafficking and function. Because of that, alterations in their cellular levels could lead to different pathogenic processes in the brain, such as in Alzheimer’s disease (AD), the most common type of dementia among older populations. There is increasing evidence that phospholipid changes occur during pathogenic processes in AD. It is known that lipids are tightly connected with metabolism of the Amyloid Precursor Protein (APP), which produces Amyloid-beta peptide (Aβ), the main component of senile plaques, which represent the main pathological hallmark of AD. However, the mechanism(s) of the lipid-effect on Aβ metabolism and AD pathogenesis is still not completely understood. This review summarizes the current knowledge on phospholipid changes occurring during normal aging and discusses phospholipid changes in the human brain associated with different stages of AD, as well changes in the cerebrospinal fluid and blood/plasma, which are interesting potential biomarkers for AD diagnosis and disease monitoring. At the end, we have discussed future perspectives of phospholipid changes as potential biomarkers and as targets for development of novel treatment strategies against AD.  相似文献   
64.
Automatization is supposed to improve working conditions and safety in the construction industry, as it already did in manufacturing industries. This paper presents the development of a robotic control system for a commercially available hydraulic telescopic handler. The target application for the telescopic handler is semi-automated assembly of facade panels. The base handler was upgraded with two additional hydraulic axes, position sensors and closed-loop control system, while the original handler safety assurance mechanisms were preserved. The control approach is based on a PI controller with velocity feedforward and valve overlap compensation. The direct and inverse kinematic models of handler mechanism were developed to enable control of end-effector motion along a straight line in the Cartesian coordinate system. The motion performances were evaluated following the ISO 9283 standard with payload of 2000 kg. Results show the repeatability of positioning bellow 7.0 mm and the straight line tracking error smaller than 63 mm.  相似文献   
65.
66.
In this study, the depth-averaged flow and energy equations for plate heat exchangers are presented. The equations are derived by integrating the original 3D flow and energy equations over the height of the gap between the bottom and top plates. This approach reduces the equations from 3D to 2D but still takes into account the frictions on the surfaces and heat transfer through the plates. The depth-averaging reduces the elapsed time of CFD simulations from hours to minutes. Thus, it is very practicable modelling method in real time design work. 2D CFD simulations with depth-averaged equations are compared with full 3D models for five different corrugation angles and corrugation lengths. The simulation results show that the 2D model predicts with relatively good accuracy the profile of the pressure drop and the temperature change as a function of the corrugation angle and the function of the corrugation length. In order to get more extensive information about the significance of the different geometry parameters on the efficiency of the heat exchanger, we simulated 30 different geometries with the fast 2D model. The results suggest that the temperature change is not as sensitive for the geometrical modifications as the pressure drop.  相似文献   
67.
The paper presents a simple but efficient new numerical scheme for the integration of nonlinear constitutive equations. Although it can be used for the integration of a system of algebraic and differential equations in general, the scheme is primarily developed for use with the direct solution methods for solving boundary value problems, e.g. explicit dynamic analysis in ABAQUS/Explicit. In the developed explicit scheme, where no iteration is required, the implementation simplicity of the forward-Euler scheme and the accuracy of the backward-Euler scheme are successfully combined. The properties of the proposed NICE scheme, which was also implemented into ABAQUS/Explicit via User Material Subroutine (VUMAT) interface platform, are compared with the properties of the classical forward-Euler scheme and backward-Euler scheme. For this purpose two highly nonlinear examples, with the von Mises and GTN material model considered, have been studied. The accuracy of the new scheme is demonstrated to be at least of the same level as experienced by the backward-Euler scheme, if we compare them on the condition of the same CPU time consumption. Besides, the simplicity of the NICE scheme, which is due to implementation similarity with the classical forward-Euler scheme, is its great Advantage.  相似文献   
68.
Testing and maintenance activities of safety equipment in nuclear power plants are an important potential for risk and cost reduction. An optimization method is presented based on the simulated annealing algorithm. The method determines the optimal schedule of safety equipment outages due to testing and maintenance based on minimization of selected risk measure. The mean value of the selected time dependent risk measure represents the objective function of the optimization. The time dependent function of the selected risk measure is obtained from probabilistic safety assessment, i.e. the fault tree analysis at the system level and the fault tree/event tree analysis at the plant level, both extended with inclusion of time requirements. Results of several examples showed that it is possible to reduce risk by application of the proposed method. Because of large uncertainties in the probabilistic safety assessment, the most important result of the method may not be a selection of the most suitable schedule of safety equipment outages among those, which results in similarly low risk. But, it may be a prevention of such schedules of safety equipment outages, which result in high risk. Such finding increases the importance of evaluation speed versus the requirement of getting always the global optimum no matter if it is only slightly better that certain local one.  相似文献   
69.
We show that even in quantum-dot (QD) lasers with very low threshold current densities (J/sub th/=40--50 A/cm/sup 2/ at 300 K), the temperature sensitivity of the threshold current arises from nonradiative recombination that comprises /spl sim/60% to 70% of J/sub th/ at 300 K, whereas the radiative part of J/sub th/ is almost temperature insensitive. The influence of the nonradiative recombination mechanism decreases with increasing hydrostatic pressure and increasing band gap, which leads to a decrease of the threshold current. We also studied, for the first time, the band gap dependence of the radiative part of J/sub th/, which in contrast increases strongly with increasing band gap. These results suggest that Auger recombination is an important intrinsic recombination mechanism for 1.3-/spl mu/m lasers, even in a very low threshold QD device, and that it is responsible for the temperature sensitivity of the threshold current.  相似文献   
70.
About malicious software in smartphones   总被引:1,自引:0,他引:1  
Phones with some of the capabilities of modern computers also have the same kind of drawbacks. These phones are commonly referred to as smartphones. They have both phone and personal digital assistant (PDA) functionality. Typical to these devices is to have a wide selection of different connectivity options from general packet radio service (GPRS) data transfer to multi media messages (MMS) and wireless local area network (WLAN) capabilities. They also have standardized operating systems, which makes smartphones a viable platform for malware writers. Since the design of the operating systems is recent, many common security holes and vulnerabilities have been taken into account during the design. However, these precautions have not fully protected these devices. Even now, when smartphones are not that common, there is a handful of viruses for them. In this paper we will discuss some of the most typical viruses in the mobile environment and propose guidelines and predictions for the future.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号