首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1400篇
  免费   78篇
  国内免费   2篇
电工技术   9篇
综合类   3篇
化学工业   304篇
金属工艺   24篇
机械仪表   53篇
建筑科学   69篇
矿业工程   3篇
能源动力   94篇
轻工业   135篇
水利工程   17篇
石油天然气   5篇
无线电   126篇
一般工业技术   242篇
冶金工业   75篇
原子能技术   18篇
自动化技术   303篇
  2024年   5篇
  2023年   16篇
  2022年   33篇
  2021年   51篇
  2020年   39篇
  2019年   37篇
  2018年   66篇
  2017年   40篇
  2016年   71篇
  2015年   42篇
  2014年   69篇
  2013年   138篇
  2012年   84篇
  2011年   115篇
  2010年   74篇
  2009年   151篇
  2008年   82篇
  2007年   65篇
  2006年   58篇
  2005年   33篇
  2004年   31篇
  2003年   26篇
  2002年   22篇
  2001年   12篇
  2000年   15篇
  1999年   10篇
  1998年   15篇
  1997年   9篇
  1996年   5篇
  1995年   8篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   4篇
  1990年   5篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   3篇
  1985年   1篇
  1984年   3篇
  1983年   5篇
  1982年   5篇
  1980年   2篇
  1979年   7篇
  1978年   3篇
  1977年   1篇
  1975年   1篇
  1974年   3篇
  1973年   3篇
排序方式: 共有1480条查询结果,搜索用时 15 毫秒
31.
32.
In this paper, the maximum length limits for integral bridges built on clay are determined as a function of the ability of steel H-piles supporting the abutments to sustain thermal-induced cyclic displacements and the flexural capacity of the abutment. First, H-pile sections that can accommodate large plastic deformations are determined considering their local buckling instability. Then, a low-cycle fatigue damage model is used to determine the maximum cyclic deformations that such piles can sustain. Next, nonlinear static pushover analyses of two typical integral bridges are conducted to study the effect of various geometric, structural, and geotechnical parameters on the performance of integral bridges subjected to uniform temperature variations. Using the pushover analyses results, design guidelines are developed to enhance and determine the maximum length limits for integral bridges built on clay. It is recommended that the maximum length of concrete integral bridges be limited to 210 m (689 ft) in cold climates and 260 m (853 ft) in moderate climates and that of steel integral bridges be limited to 120 m (394 ft) in cold climates and 180 m (590 ft) in moderate climates.  相似文献   
33.
Inserting estimates for the missing observations from split‐plot designs restores their balanced or orthogonal structure and alleviates the difficulties in the statistical analysis. In this article, we extend a method due to Draper and Stoneman to estimate the missing observations from unreplicated two‐level factorial and fractional factorial split‐plot (FSP and FFSP) designs. The missing observations, which can either be from the same whole plot, from different whole plots, or comprise entire whole plots, are estimated by equating to zero a number of specific contrast columns equal to the number of the missing observations. These estimates are inserted into the design table and the estimates for the remaining effects (or alias chains of effects as the case with FFSP designs) are plotted on two half‐normal plots: one for the whole‐plot effects and the other for the subplot effects. If the smaller effects do not point at the origin, then different contrast columns to some or all of the initial ones should be discarded and the plots re‐examined for bias. Using examples, we show how the method provides estimates for the missing observations that are very close to their actual values. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
34.
35.
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users: (i) hiding locations inside cloaking regions (CRs) and (ii) encrypting location data using private information retrieval (PIR) protocols. Previous work focused on finding good trade-offs between privacy and performance of user protection techniques, but disregarded the important issue of protecting the POI dataset D. For instance, location cloaking requires large-sized CRs, leading to excessive disclosure of POIs (O(|D|) in the worst case). PIR, on the other hand, reduces this bound to \(O(\sqrt{|D|})\), but at the expense of high processing and communication overhead. We propose hybrid, two-step approaches for private location-based queries which provide protection for both the users and the database. In the first step, user locations are generalized to coarse-grained CRs which provide strong privacy. Next, a PIR protocol is applied with respect to the obtained query CR. To protect against excessive disclosure of POI locations, we devise two cryptographic protocols that privately evaluate whether a point is enclosed inside a rectangular region or a convex polygon. We also introduce algorithms to efficiently support PIR on dynamic POI sub-sets. We provide solutions for both approximate and exact NN queries. In the approximate case, our method discloses O(1) POI, orders of magnitude fewer than CR- or PIR-based techniques. For the exact case, we obtain optimal disclosure of a single POI, although with slightly higher computational overhead. Experimental results show that the hybrid approaches are scalable in practice, and outperform the pure-PIR approach in terms of computational and communication overhead.  相似文献   
36.
Symbolic dynamic filtering (SDF) has been recently reported in literature as a pattern recognition tool for early detection of anomalies (i.e., deviations from the nominal behavior) in complex dynamical systems. This paper presents a review of SDF and its performance evaluation relative to other classes of pattern recognition tools, such as Bayesian Filters and Artificial Neural Networks, from the perspectives of: (i) anomaly detection capability, (ii) decision making for failure mitigation and (iii) computational efficiency. The evaluation is based on analysis of time series data generated from a nonlinear active electronic system. This work has been supported in part by the U.S. Army Research Laboratory and the U.S. Army Research Office under Grant No. W911NF-07-1-0376, by the U.S. Office of Naval Research under Grant No. N00014-08-1-380, and by NASA under Cooperative Agreement No. NNX07AK49A.  相似文献   
37.
We develop analytical and numerical conditions to determine whether limit cycle oscillations synchronize in diffusively coupled systems. We examine two classes of systems: reaction–diffusion PDEs with Neumann boundary conditions, and compartmental ODEs, where compartments are interconnected through diffusion terms with adjacent compartments. In both cases the uncoupled dynamics are governed by a nonlinear system that admits an asymptotically stable limit cycle. We provide two-time scale averaging methods for certifying stability of spatially homogeneous time-periodic trajectories in the presence of sufficiently small or large diffusion and develop methods using the structured singular value for the case of intermediate diffusion. We highlight cases where diffusion stabilizes or destabilizes such trajectories.  相似文献   
38.
HIV-1 protease has been the subject of intense research for deciphering HIV-1 virus replication process for decades. Knowledge of the substrate specificity of HIV-1 protease will enlighten the way of development of HIV-1 protease inhibitors. In the prediction of HIV-1 protease cleavage site techniques, various feature encoding techniques and machine learning algorithms have been used frequently. In this paper, a new feature amino acid encoding scheme is proposed to predict HIV-1 protease cleavage sites. In the proposed method, we combined orthonormal encoding and Taylor’s venn-diagram. We used linear support vector machines as the classifier in the tests. We also analyzed our technique by comparing some feature encoding techniques. The tests are carried out on PR-1625 and PR-3261 datasets. Experimental results show that our amino acid encoding technique leads to better classification performance than other encoding techniques on a standalone classifier.  相似文献   
39.
Swage casting is a new casting technique which combines the advantages of squeeze, centrifugal and semi-solid casting methods. In this new casting method, components with one rotating axis can be produced on a swage casting machine from molten metal in a one-step operation. A shape like a “bomb-body” is chosen to demonstrate the advantages of this new method by using A380 Al–Si–Cu alloy. The same alloy is also cast with centrifugal and squeeze casting methods. In this study, the swage casting method and its features are briefly described. The final microstructures, mechanical properties and amount of porosity of the cast pieces produced by squeeze, centrifugal and swage casting methods are compared. Swage cast pieces showed a different composition of microstructure that consists of fine dendritic particles at the chill ends and a mixture of spherical and rosette shaped particles at the core. The swage cast pieces also have a slightly higher mechanical strength as indicated by tensile strength and Brinell hardness values.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号