首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5903篇
  免费   362篇
  国内免费   5篇
电工技术   76篇
综合类   14篇
化学工业   1496篇
金属工艺   142篇
机械仪表   115篇
建筑科学   405篇
矿业工程   29篇
能源动力   146篇
轻工业   464篇
水利工程   50篇
石油天然气   7篇
武器工业   1篇
无线电   454篇
一般工业技术   1271篇
冶金工业   299篇
原子能技术   37篇
自动化技术   1264篇
  2024年   7篇
  2023年   97篇
  2022年   112篇
  2021年   234篇
  2020年   151篇
  2019年   130篇
  2018年   191篇
  2017年   167篇
  2016年   252篇
  2015年   244篇
  2014年   313篇
  2013年   413篇
  2012年   387篇
  2011年   477篇
  2010年   359篇
  2009年   346篇
  2008年   345篇
  2007年   322篇
  2006年   242篇
  2005年   217篇
  2004年   162篇
  2003年   153篇
  2002年   127篇
  2001年   83篇
  2000年   79篇
  1999年   69篇
  1998年   88篇
  1997年   55篇
  1996年   50篇
  1995年   63篇
  1994年   39篇
  1993年   35篇
  1992年   29篇
  1991年   21篇
  1990年   21篇
  1989年   19篇
  1988年   16篇
  1987年   14篇
  1986年   8篇
  1984年   23篇
  1983年   10篇
  1982年   11篇
  1981年   7篇
  1980年   8篇
  1979年   7篇
  1978年   6篇
  1977年   7篇
  1976年   11篇
  1975年   7篇
  1974年   6篇
排序方式: 共有6270条查询结果,搜索用时 46 毫秒
121.
A nanofabrication method for the production of ultra-dense planar metallic nanowire arrays scalable to wafer-size is presented. The method is based on an efficient template deposition process to grow diverse metallic nanowire arrays with extreme regularity in only two steps. First, III–V semiconductor substrates are irradiated by a low-energy ion beam at an elevated temperature, forming a highly ordered nanogroove pattern by a “reverse epitaxy” process due to self-assembly of surface vacancies. Second, diverse metallic nanowire arrays (Au, Fe, Ni, Co, FeAl alloy) are fabricated on these III–V templates by deposition at a glancing incidence angle. This method allows for the fabrication of metallic nanowire arrays with periodicities down to 45 nm scaled up to wafer-size fabrication. As typical noble and magnetic metals, the Au and Fe nanowire arrays produced here exhibited large anisotropic optical and magnetic properties, respectively. The excitation of localized surface plasmon resonances (LSPRs) of the Au nanowire arrays resulted in a high electric field enhancement, which was used to detect phthalocyanine (CoPc) in surface-enhanced Raman scattering (SERS). Furthermore, the Fe nanowire arrays showed a very high in-plane magnetic anisotropy of approximately 412 mT, which may be the largest in-plane magnetic anisotropy field yet reported that is solely induced via shape anisotropy within the plane of a thin film.
  相似文献   
122.
Profiling of the electrical properties of nanowires (NWs) and NW heterocontacts with high spatial resolution is a challenge for any application and advanced NW device development. For appropriate NW analysis, we have established a four-point prober, which is combined in vacuo with a state-of-the-art vapor-liquid-solid preparation, enabling contamination-free NW characterization with high spatial resolution. With this ultrahigh-vacuum-based multi-tip scanning tunneling microscopy (MT-STM), we obtained the resistance and doping profiles of freestanding NWs, along with surface-sensitive information. Our in-system 4-probe STM approach decreased the detection limit for low dopant concentrations to the depleted case in upright standing NWs, while increasing the spatial resolution and considering radial depletion regions, which may originate from surface changes. Accordingly, the surface potential of oxide-free GaAs NW {112} facets has been estimated to be lower than 20 mV, indicating a NW surface with very low surface state density.
  相似文献   
123.
Design science research is an essential part of IS research since the field should not only try to understand how the world is, but also how to change it. We argue that the aim of IS design science research should be to develop practical knowledge not only for the design of novel information technology (IT), but also for IS governance and management. Whereas at least some methodological support exists for researchers engaged in IT-centric design science research, limited support is available for researchers who want to develop design knowledge and theory for IS governance and management. To overcome this shortcoming, we suggest a socio-technical IS design science research approach. The approach has four main activities: (1) identifying problem situations and desired outcomes, (2) reviewing extant theories, knowledge and data, (3) proposing/refining design theory and knowledge, and (4) testing design theory and knowledge. The applicability and usefulness of the proposed approach is shown by means of a design science research project concerning IS integration management in the context of mergers and acquisitions.  相似文献   
124.
This paper reports the results of an exploratory, theory-building study on the impact of creativity on business processes, their management, and the use of information technology (IT) in particular. The empirical evidence was derived from organizations within the creative industries, specifically film and visual effects (VFX) production. An adapted grounded theory approach was employed in order to analyze the data. The study identifies the dynamics of business processes that can be described as highly dependent on creativity, intensively involving the client, complex, and interdependent. It explains the processes’ organizational context as well as strategies and IT systems that organizations use in order to manage these processes. The study suggests that creativity-intensive processes are characterized by high levels of uncertainty with regard to outcome, process structure, and required resources. Creative organizations pursue both creative and operational process performance while simultaneously mitigating creative and operational risk.  相似文献   
125.
Associating visual textures with human perceptions using genetic algorithms   总被引:1,自引:0,他引:1  
This paper deals with an approach allowing to associate visual textures with given human perceptions. Hereby, based on a forward model associating human perceptions for given visual textures, the deduction of an reverse process is presented which is able to associate and characterize visual textures for given human perceptions. For doing so, we propose a constraint-based genetic algorithm approach, which is able to minimize a specific optimization problem containing constraints in form of band-widths for valid individuals (low level features extracted from textures) in a population. The constraints are determined by relationships between (low level) features characterizing textures in form of high-dimensional approximation models. Additionally, in each iteration step checking for valid individuals is carried out with a texture/non-texture classifier or by using a convex hull over a set of valid textures. The whole approach is evaluated based on a real-world texture set used as a start population in the genetic algorithm and by defining various kinds of human perceptions (for which textures are sought) represented by adjective vectors in the aesthetic space. The generated individuals (low level feature vectors) have a high level of fitness (they are quite close to the pre-defined adjective vectors) and a small distance to the initial population. The textures synthesized based on the generated individuals are visualized and compared with textures synthesized by a time-intensive direct texture mixing and re-combination method based on a real-world texture data base.  相似文献   
126.
We present a nested multigrid method to optimize time-periodic, parabolic, partial differential equations (PDE). We consider a quadratic tracking objective with a linear parabolic PDE constraint. The first order optimality conditions, given by a coupled system of boundary value problems can be rewritten as an Fredholm integral equation of the second kind, which is solved by a multigrid of the second kind. The evaluation of the integral operator consists of solving sequentially a boundary value problem for respectively the state and the adjoints. Both problems are solved efficiently by a time-periodic space-time multigrid method.  相似文献   
127.
Numerous numerical methods have been developed in an effort to accurately predict stresses in bones. The largest group are variants of the h-version of the finite element method (h-FEM), where low order Ansatz functions are used. By contrast, we3 investigate a combination of high order FEM and a fictitious domain approach, the finite cell method (FCM). While the FCM has been verified and validated in previous publications, this article proposes methods on how the FCM can be made computationally efficient to the extent that it can be used for patient specific, interactive bone simulations. This approach is called computational steering and allows to change input parameters like the position of an implant, material or loads and leads to an almost instantaneous change in the output (stress lines, deformations). This direct feedback gives the user an immediate impression of the impact of his actions to an extent which, otherwise, is hard to obtain by the use of classical non interactive computations. Specifically, we investigate an application to pre-surgical planning of a total hip replacement where it is desirable to select an optimal implant for a specific patient. Herein, optimal is meant in the sense that the expected post-operative stress distribution in the bone closely resembles that before the operation.  相似文献   
128.
We discuss the calculus of variations in tensor representations with a special focus on tensor networks and apply it to functionals of practical interest. The survey provides all necessary ingredients for applying minimization methods in a general setting. The important cases of target functionals which are linear and quadratic with respect to the tensor product are discussed, and combinations of these functionals are presented in detail. As an example, we consider the representation rank compression in tensor networks. For the numerical treatment, we use the nonlinear block Gauss?CSeidel method. We demonstrate the rate of convergence in numerical tests.  相似文献   
129.
In this paper, we present a novel technique which simulates directional light scattering for more realistic interactive visualization of volume data. Our method extends the recent directional occlusion shading model by enabling light source positioning with practically no performance penalty. Light transport is approximated using a tilted cone‐shaped function which leaves elliptic footprints in the opacity buffer during slice‐based volume rendering. We perform an incremental blurring operation on the opacity buffer for each slice in front‐to‐back order. This buffer is then used to define the degree of occlusion for the subsequent slice. Our method is capable of generating high‐quality soft shadowing effects, allows interactive modification of all illumination and rendering parameters, and requires no pre‐computation.  相似文献   
130.
Consider a rooted tree T of arbitrary maximum degree d representing a collection of n web pages connected via a set of links, all reachable from a source home page represented by the root of T. Each web page i carries a probability p i representative of the frequency with which it is visited. By adding hotlinks—shortcuts from a node to one of its descendents—we wish to minimize the expected number of steps l needed to visit pages from the home page, expressed as a function of the entropy H(p) of the access probabilities p. This paper introduces several new strategies for effectively assigning hotlinks in a tree. For assigning exactly one hotlink per node, our method guarantees an upper bound on l of 1.141H(p)+1 if d>2 and 1.08H(p)+2/3 if d=2. We also present the first efficient general methods for assigning at most k hotlinks per node in trees of arbitrary maximum degree, achieving bounds on l of at most \frac2H(p)log(k+1)+1\frac{2H(p)}{\log(k+1)}+1 and \fracH(p)log(k+d)-logd+1\frac{H(p)}{\log(k+d)-\log d}+1 , respectively. All our methods are strong, i.e., they provide the same guarantees on all subtrees after the assignment. We also present an algorithm implementing these methods in O(nlog n) time, an improvement over the previous O(n 2) time algorithms. Finally we prove a Ω(nlog n) lower bound on the running time of any strong method that guarantee an average access time strictly better than 2H(p).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号