首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2692篇
  免费   109篇
  国内免费   7篇
电工技术   32篇
化学工业   629篇
金属工艺   43篇
机械仪表   67篇
建筑科学   35篇
矿业工程   5篇
能源动力   145篇
轻工业   255篇
水利工程   53篇
石油天然气   5篇
无线电   272篇
一般工业技术   584篇
冶金工业   255篇
原子能技术   24篇
自动化技术   404篇
  2024年   6篇
  2023年   42篇
  2022年   67篇
  2021年   81篇
  2020年   52篇
  2019年   64篇
  2018年   98篇
  2017年   80篇
  2016年   85篇
  2015年   66篇
  2014年   96篇
  2013年   191篇
  2012年   116篇
  2011年   149篇
  2010年   128篇
  2009年   135篇
  2008年   134篇
  2007年   129篇
  2006年   97篇
  2005年   79篇
  2004年   64篇
  2003年   73篇
  2002年   45篇
  2001年   39篇
  2000年   32篇
  1999年   41篇
  1998年   89篇
  1997年   76篇
  1996年   54篇
  1995年   42篇
  1994年   33篇
  1993年   22篇
  1992年   34篇
  1991年   23篇
  1990年   21篇
  1989年   18篇
  1988年   23篇
  1987年   19篇
  1986年   10篇
  1985年   17篇
  1984年   12篇
  1983年   12篇
  1982年   15篇
  1981年   9篇
  1980年   8篇
  1979年   7篇
  1978年   10篇
  1977年   14篇
  1976年   23篇
  1972年   6篇
排序方式: 共有2808条查询结果,搜索用时 15 毫秒
41.
Hydroxyl‐terminated polybutadiene (HTPB)‐based allophanate–urethane networks were prepared by reacting HTPB with di‐isocyanates, such as toluene–di‐isocyanate (TDI), isophorone–di‐isocyanate (IPDI), and 4,4′‐di(socyanatocyclohexyl)methane (H12MDI) at stoichiometric ratios (r‐values) ranging from 1.0 to 1.5. The networks were characterized for mechanical and swell properties. The network parameters, such as “X,” which is the fraction of urethane groups involved in the allophanate formation, and effective chain length (Lx) were calculated from experimental crosslink density values determined from swell data, using α‐model equations developed by Marsh. Excellent linear correlations were obtained between mechanical properties and the calculated network parameters. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 101: 2986–2994, 2006  相似文献   
42.
Multimedia Tools and Applications - A Correction to this paper has been published: https://doi.org/10.1007/s11042-021-10591-y  相似文献   
43.
Pattern Analysis and Applications - The performance of graph-based learning techniques largely relies on the edges defined between the vertices of the graph. These edges that represent the affinity...  相似文献   
44.
In pyritic environments, the bacteriaThiobacillus ferrooxidans catalyze acid formation by increasing the oxidation rate of pyrite by a factor of one million. This acid solubilizes metals and pollutes adjacent streams and lands. Bactericide sprays during mining and waste disposal operations attack the source of the problem by preventing acid formation and metals solubilization. Used in conjunction with current water treatment systems, bactericides can dramatically reduce operating costs. Controlled release bactericides contribute to successful reclamation by providing assurance against revegetation failure and post-reclamation water quality problems that can necessitate perpetual water treatment. While inhibitingT. ferrooxidans these organic compounds aid in the establishment of beneficial heterotrophic bacteria which support vegetation. These conditions continue to persist after the bactericide is depleted from the controlled release system. Case Studies I and II show that bactericides inhibit acid generation during hard rock and coal mining operations and they are cost effective. Case Studies III and IV illustrate the improvement in water quality and vegetation after reclamation when controlled release bactericides were used. Economic analyses show cost benefits are achieved when controlled-release bactericides are part of the reclamation plan.  相似文献   
45.
The performance of several noise reduction algorithms intended for wideband telephony was evaluated both subjectively and objectively. The chosen algorithms were based on statistical modeling, spectral subtraction, Wiener filtering, or subspace modelling principles. A customized wideband noise reduction database containing speech samples corrupted by three types of background noises at three SNR levels, along with their enhanced versions was created. The overall quality of the speech samples in the database was subsequently rated by a group of listeners with normal hearing capabilities. Comprehensive statistical analyses were performed to assess the reliability of the subjective data, and to assess the performance of noise reduction algorithms across varied noisy conditions. The subjective quality ratings were then used to investigate the performance of several auditory model-based objective quality metrics. Key results from these investigations include: (a) there was a high degree of inter- and intra-subject reliability in the subjective ratings, (b) noise reduction algorithms enhance speech quality for only a subset of the noise conditions, and (c) auditory model-based metrics perform similarly in predicting speech quality ratings, when speech quality scores pertaining to a particular noise condition were averaged.  相似文献   
46.
A novel wire antenna for future dedicated short range communications vehicle‐to‐vehicle communications is introduced. The proposed antenna carries low‐profile and low‐cost features, and possesses an improved gain performance. This article also includes a specific feed network design for the proposed antenna to meet the mechanical and manufacturing requirements. Two different numerical techniques using CST Microwave Studio and HFSS have been applied for evaluating the performance of the proposed antenna. The whole system including the feed network and the antenna elements is integrated, and its performance is also assessed. © 2012 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2013.  相似文献   
47.
In this paper, we apply evolutionary games to non-cooperative forwarding control in Delay Tolerant Networks (DTNs). The main focus is on mechanisms to rule the participation of the relays to the delivery of messages in DTNs. Thus, we express the success probability as a function of the competition that takes place within a large population of mobiles, and we characterize the effect of reward-based mechanisms on the performance of such systems. Devices acting as active relays, in fact, sacrifice part of their batteries in order to support message replication and thus increase the probability to reach the destination. In our scheme, a relay can choose the strategy by which they participate to the message relaying. A mobile that participates receives a unit of reward based on the reward mechanism selected by the network. A utility function is introduced as the difference between the expected reward and the energy cost, i.e., the cost spent by the relay to sustain forwarding operations. We show how the evolution dynamics and the equilibrium behavior (called Evolutionary Stable Strategy – ESS) are influenced by the characteristics of inter contact time, energy expenditure and pricing characteristics.We extend our analysis to mechanisms that the system can introduce in order to have the message delivered to the destination with high probability within a given deadline and under energy constraints which bound the number of released copies per message. Finally, we apply our findings in order to devise decentralized forwarding algorithms that are rooted in the theory of stochastic approximations. Thus, we demonstrate that the ESS can be attained without complete knowledge of the system state and letting the source monitor number of released copies per message only. We provide extensive numerical results to validate the proposed scheme.  相似文献   
48.
Given a graph with edges colored Red and Blue, we study the problem of sampling and approximately counting the number of matchings with exactly k Red edges. We solve the problem of estimating the number of perfect matchings with exactly k Red edges for dense graphs. We study a Markov chain on the space of all matchings of a graph that favors matchings with k Red edges. We show that it is rapidly mixing using non-traditional canonical paths that can backtrack. We show that this chain can be used to sample matchings in the 2-dimensional toroidal lattice of any fixed size with k Red edges, where the horizontal edges are Red and the vertical edges are Blue. An extended abstract appeared in J.R. Correa, A. Hevia and M.A. Kiwi (eds.) Proceedings of the 7th Latin American Theoretical Informatics Symposium, LNCS 3887, pp. 190–201, Springer, 2006. N. Bhatnagar’s and D. Randall’s research was supported in part by NSF grants CCR-0515105 and DMS-0505505. V.V. Vazirani’s research was supported in part by NSF grants 0311541, 0220343 and CCR-0515186. N. Bhatnagar’s and E. Vigoda’s research was supported in part by NSF grant CCR-0455666.  相似文献   
49.
50.
In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions. From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality provided by service clients. In this paper, we first present a trust management framework that is event-driven and rule-based. In this framework, trust computation is based on formulae. But rules are defined to determine which formula to use and what arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process. Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed framework is adaptable for different domains and complex trust evaluation systems.
Vijay VaradharajanEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号