首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2988篇
  免费   134篇
  国内免费   5篇
电工技术   30篇
综合类   21篇
化学工业   850篇
金属工艺   60篇
机械仪表   40篇
建筑科学   157篇
矿业工程   3篇
能源动力   35篇
轻工业   283篇
水利工程   18篇
石油天然气   3篇
无线电   217篇
一般工业技术   547篇
冶金工业   411篇
原子能技术   25篇
自动化技术   427篇
  2023年   33篇
  2022年   58篇
  2021年   83篇
  2020年   55篇
  2019年   58篇
  2018年   59篇
  2017年   55篇
  2016年   69篇
  2015年   68篇
  2014年   92篇
  2013年   130篇
  2012年   122篇
  2011年   206篇
  2010年   138篇
  2009年   150篇
  2008年   135篇
  2007年   121篇
  2006年   125篇
  2005年   95篇
  2004年   92篇
  2003年   85篇
  2002年   85篇
  2001年   77篇
  2000年   73篇
  1999年   73篇
  1998年   123篇
  1997年   91篇
  1996年   66篇
  1995年   57篇
  1994年   47篇
  1993年   45篇
  1992年   23篇
  1991年   35篇
  1990年   33篇
  1989年   29篇
  1988年   18篇
  1987年   13篇
  1986年   9篇
  1985年   15篇
  1984年   16篇
  1983年   14篇
  1982年   10篇
  1981年   8篇
  1980年   9篇
  1979年   9篇
  1978年   11篇
  1977年   20篇
  1976年   19篇
  1967年   6篇
  1966年   8篇
排序方式: 共有3127条查询结果,搜索用时 31 毫秒
71.
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments.  相似文献   
72.
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev?CYao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols. However, dealing with the algebraic properties of operators, such as the exclusive OR (XOR), which are frequently used in cryptographic protocols has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis using tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free case. We implemented our reduction and, in combination with ProVerif, used it for the fully automatic analysis of several protocols that employ the XOR operator. Among others, our analysis revealed a new attack on an IBM security module.  相似文献   
73.
We describe a Prolog-based approach to the development of language processors (such as preprocessors, frontends, evaluators, tools for software modification and analysis). The design of the corresponding environment Laptob for prological language processing is outlined. Language processor definitions in Laptob are basically Prolog programs. The programs might contain grammars, that is, we consider logic grammars. The programs can be typed, and they can be higher-order. The adaptation and composition of the logic programs themselves is supported by meta-programming. The environment offers tool support for efficient scanning, testing, and application development based on a make-system. We report on recent and ongoing applications of the Prolog-based approach.  相似文献   
74.
75.
We construct and analyze multigrid methods for discretized self-adjoint elliptic problems on triangular surfaces in ${\mathbb{R}^3}$ . The methods involve the same weights for restriction and prolongation as in the case of planar triangulations and therefore are easy to implement. We prove logarithmic bounds of the convergence rates with constants solely depending on the ellipticity, the smoothers and on the regularity of the triangles forming the triangular surface. Our theoretical results are illustrated by numerical computations.  相似文献   
76.
77.
Electrokinetic effects play an important role in microfluidics and nanofluidics. Although the related phenomena are often utilized to control fluid flow and sample transport in lab-on-a-chip devices, their dependency on the surface charges on the channel walls often remain enigmatic. This is mainly due to the lack of adequate experimental methods to analyse the electrical charging of solid/liquid interfaces of interest. To address this need, an experimental set-up—designated as microslit electrokinetic set-up (MES)—has been recently developed and applied for the investigation of charge formation processes at planar solid/liquid interfaces. The device permits to perform streaming potential and streaming current measurements across a rectangular streaming channel formed by two parallel sample carriers (20×10×3 mm3) at variable distance allowing for the determination of the surface conductivity. Utilizing the MES, charge characteristics can be determined for a wide variety of materials prepared as thin films on top of planar glass substrates. Streaming potential and streaming current data permit to investigate the mechanisms of charge formation while surface conductivity data provide information about mobile charge carriers located in different zones at the interface. The applicability of this advanced experimental approach is demonstrated with examples obtained for surfaces with different levels of complexity:
  1. Preferential ion adsorption onto unpolar fluoropolymer (Teflon® AF) films was characterized in simple electrolyte solutions; the results were quantitatively evaluated with respect to interfacial ion concentrations.
  2. Interrelation of charge density and conformation of grafted poly(L-glutamic acid layers) were unravelled from the determination of pH-depended variations of surface conductivity and layer thickness.
  3. The impact of spatial confinements of surface functional groups on their acid–base behaviour was studied with self-assembled monomolecular films of alkanethiols chemisorbed on gold.
  4. Charging of and ion mobility within poly(acrylic acid) (PAA) brushes prepared by a Langmuir–Blodgett technique were analysed at varied pH and ionic strength.
  5. Interfacial modes of adsorbed proteins were distinguished at two polymer surfaces with varied hydrophobicity/charge density.
  相似文献   
78.
Video visualization is a computation process that extracts meaningful information from original video data sets and conveys the extracted information to users in appropriate visual representations. This paper presents a broad treatment of the subject, following a typical research pipeline involving concept formulation, system development, a path-finding user study, and a field trial with real application data. In particular, we have conducted a fundamental study on the visualization of motion events in videos. We have, for the first time, deployed flow visualization techniques in video visualization. We have compared the effectiveness of different abstract visual representations of videos. We have conducted a user study to examine whether users are able to learn to recognize visual signatures of motions, and to assist in the evaluation of different visualization techniques. We have applied our understanding and the developed techniques to a set of application video clips. Our study has demonstrated that video visualization is both technically feasible and cost-effective. It has provided the first set of evidence confirming that ordinary users can be accustomed to the visual features depicted in video visualizations, and can learn to recognize visual signatures of a variety of motion events.  相似文献   
79.
The use of information technology to enhance teaching and learning processes has been practiced for a number of years now. However, the rapid growth in the use of the Internet has led to a new dimension in interactive and collaborative learning anytime and anyplace dynamically. With the explosion of “virtual education initiatives”, the question of the feasibility and success criteria for such projects quickly arises. To address the question in an organized way, we propose a project assessment based on critical success factors. Hence, in this article, we draw on a widely recognized critical success factor framework. We (slightly) adjust the framework to fit the special characteristics of virtual education initiatives, and apply to one case study, namely the virtual education initiative at the Faculty of Business at the City University of Hong Kong. The results suggest that the past success of the case is due to the adherence to the large majority of critical success factors. However, it also outlines some areas of concern. The paper concludes with a discussion on the strength and limitations of virtual learning environment as well as future directions. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   
80.
The electrical conductivity in graphite measured normal to the crystallographic c-axis is observed to increase after intercalation with acid molecules which act as acceptors. This behaviour is regarded as the result of ionization of the acid molecule which, in turn, increases the positive current carriers in the host graphite. Since the carrier density depends on the degree of ionization of the acid, it follows that the stronger the acid the greater the increase in carrier concentration, and assuming no adverse mobility effects, the greater the electrical conductivity. The hydrogen fluoride-antimony pentafluoride system produces some of the strongest acid substances known. The experiments described here represent the initial examination of the electrical conductivity resulting from intercalation of this material into graphite. The experiments consisted of intercalating graphite powder with antimony pentafluoride in a copper tube and swaging the sheathed compound into wire. The measured conductivity of the graphite intercalation compound, when the copper conductivity is subtracted out and allowance is made for departure from ideal density, is about 1×106 –1 cm–1. This is approximately 40 times the conductivity of pristine graphite and more than one and a half times the conductivity of pure copper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号