首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2727篇
  免费   84篇
  国内免费   3篇
电工技术   33篇
综合类   5篇
化学工业   596篇
金属工艺   75篇
机械仪表   41篇
建筑科学   137篇
矿业工程   31篇
能源动力   63篇
轻工业   240篇
水利工程   21篇
石油天然气   17篇
无线电   233篇
一般工业技术   409篇
冶金工业   535篇
原子能技术   26篇
自动化技术   352篇
  2022年   15篇
  2021年   42篇
  2020年   31篇
  2019年   35篇
  2018年   47篇
  2017年   47篇
  2016年   56篇
  2015年   44篇
  2014年   70篇
  2013年   168篇
  2012年   117篇
  2011年   131篇
  2010年   119篇
  2009年   106篇
  2008年   109篇
  2007年   91篇
  2006年   91篇
  2005年   82篇
  2004年   58篇
  2003年   70篇
  2002年   66篇
  2001年   42篇
  2000年   33篇
  1999年   46篇
  1998年   124篇
  1997年   70篇
  1996年   72篇
  1995年   57篇
  1994年   47篇
  1993年   61篇
  1992年   36篇
  1991年   24篇
  1990年   21篇
  1989年   30篇
  1988年   27篇
  1987年   34篇
  1986年   27篇
  1985年   26篇
  1984年   33篇
  1983年   24篇
  1982年   24篇
  1981年   40篇
  1980年   35篇
  1979年   24篇
  1978年   25篇
  1977年   30篇
  1976年   31篇
  1975年   26篇
  1973年   16篇
  1972年   14篇
排序方式: 共有2814条查询结果,搜索用时 265 毫秒
61.
In the frequency allocation problem, we are given a mobile telephone network, whose geographical coverage area is divided into cells, wherein phone calls are serviced by assigning frequencies to them so that no two calls emanating from the same or neighboring cells are assigned the same frequency. The problem is to use the frequencies efficiently, i.e., minimize the span of frequencies used. The frequency allocation problem can be regarded as a multicoloring problem on a weighted hexagonal graph. In this paper, we give a 1-local asymptotic 4/3-competitive distributed algorithm for multicoloring a triangle-free hexagonal graph, which is a special case of hexagonal graph. Based on this result, we then propose a 1-local asymptotic13/9-competitive algorithm for multicoloring the (general-case) hexagonal graph, thereby improving the previous 1-local 3/2-competitive algorithm. A preliminary version of this paper appeared in the Proceedings of the 13th Annual International Computing and Combinatorics Conference (COCOON 2007), LNCS 4598, pp. 526–536. Y. Zhang research was supported by European Regional Development Fund (ERDF). F.Y.L. Chin research was supported by Hong Kong RGC Grant HKU-7113/07E. H. Zhu research was supported by National Natural Science Fund (grant #60496321).  相似文献   
62.
We propose a visualization based approach for digital signature authentication. Using our method, the speed and pressure aspects of a digital signature process can be clearly and intuitively conveyed to the user for digital signature authentication. Our design takes into account both the expressiveness and aesthetics of the derived visual patterns. With the visual aid provided by our method, digital signatures can be authenticated with better accuracy than using existing methods—even novices can examine the authenticity of a digital signature in most situations using our method. To validate the effectiveness of our method, we conducted a comprehensive user study which confirms positively the advantages of our approach. Our method can be employed as a new security enhancement measure for a range of business and legal applications in reality which involve digital signature authorization and authentication.  相似文献   
63.
This article deals with a local improvement of domain decomposition methods for 2-dimensional elliptic problems for which either the geometry or the domain decomposition presents conical singularities. After explaining the main results of the theoretical analysis carried out in Chniti et al. (Calcolo 45, 2008), the numerical experiments presented in this article confirm the optimality properties of the new interface conditions.  相似文献   
64.
A two level control strategy that stabilizes and optimizes the production of an industrial copper solvent extraction process is presented. The stabilizing layer consists of a multi-input–multi-output controller or two single-input–single-output controllers with additional four feedforward compensators that regulate the flow rates in the copper solvent extraction process. The optimization layer consists of an optimizer that maximizes the production of the copper solvent extraction process and gives setpoints to the controllers at the stabilizing level. The mechanistic plant models, verified with industrial data, are linearized by identifying first and higher order transfer function models from simulated PRBS data. On the basis of the linear models, the interactions of the controlled variables, and the pairing of the controlled and manipulated variables are studied and the optimizer and the controllers designed. The control strategy employing two PI-control loops or a model predictive controller and additionally four feedforward control loops is successfully tested against simulated disturbances and setpoint changes. The control strategy is also compared to the data collected from the industrial plant under manual control. With this two level control strategy the production of the copper solvent extraction process is increased by 3–5% and the process variation is decreased by 70–90% compared to the manual operation of the case industrial plant. The results gained in simulation environment are successful and encouraging for further testing in an industrial plant.  相似文献   
65.
To date, information systems (IS) research mainly has provided a monolithic view of information technology (IT) use, considering it to be a desired behaviour with positive outcomes. However, given the dramatic increase in the use of technology during the last few years, susceptibility to IT addiction is increasingly becoming an important issue for technology users and IS researchers. In this paper, we report the results of a study that focuses on identifying variations in user liability to IT addiction, which reflects the susceptibility of individual users to develop IT addiction. First, a review of the literature in different disciplines (e.g. health, psychology and IS) allows us to better understand the concepts of IT addiction and liability to addiction. The literature review also provides an overview of the antecedents and consequences associated with IT addiction. Then, building on the analysis of 15 in‐depth interviews and 182 exploratory open‐ended surveys collected from smartphone users, we apply the concept of liability to addiction in the IT use context and propose a typological theory of user liability to IT addiction. Our typology reveals five ideal types; each can be associated to a user profile (addict, fanatic, highly engaged, regular and thoughtful ). Building upon both the extant literature and our results, we put forth propositions to extend the theoretical contributions of the study. We finally discuss the contributions and implications of our paper for research and practice.  相似文献   
66.
This paper addresses the one-machine scheduling problem with earliness-tardiness penalties. We propose a new branch-and-bound algorithm that can solve instances with up to 50 jobs and that can solve problems with even more general non-convex cost functions. The algorithm is based on the combination of a Lagrangean relaxation of resource constraints and new dominance rules.  相似文献   
67.
The volatiles released from several aphid and host plant species, alone or associated, were studied for their infochemical role in prey location. Using a four-arm olfactometer, the attraction of several combinations of three aphid (Myzus persicae, Acyrthosiphon pisum, and Brevicoryne brassicae) and three plant (Vicia faba, Brassica napus, and Sinapis alba) species toward Adalia bipunctata larvae and adults was observed. Both predatory larvae and adults were attracted only by A. pisum and M. persicae when they were crushed, whatever the host plant. (E)-beta-farnesene, the aphid alarm pheromone, was the effective kairomone for the ladybird. Plant leaves alone (V. faba, B. napus, and S. alba) or in association with nonstressed whole aphids (the three species) did not have any attraction for the predator. The B. brassicae specialist aphid is the only prey that was not attracted to A. bipunctata larvae and adults, even if they were crushed. Release of B. brassicae molecules similar to the host plant allelochemicals was demonstrated by GC-MS analysis. The lack of behavioral response of the ladybird at short distance toward the cruciferous specialist aphid was related only to the absence of (E)-beta-farnesene in the aphid prey volatile pattern.  相似文献   
68.
The field of systems biology has attracted the attention of biologists, engineers, mathematicians, physicists, chemists and others in an endeavour to create systems-level understanding of complex biological networks. In particular, systems engineering methods are finding unique opportunities in characterizing the rich behaviour exhibited by biological systems. In the same manner, these new classes of biological problems are motivating novel developments in theoretical systems approaches. Hence, the interface between systems and biology is of mutual benefit to both disciplines.  相似文献   
69.
This study examined whether mothers' preoccupation with their own weight and eating was linked to daughters' restrained eating behavior. Participants included 173 non-Hispanic, White mother-daughter dyads, measured longitudinally when daughters were ages 5, 7, 9, and 11. Mothers who were preoccupied with their own weight and eating reported higher levels of restricting daughters' intake and encouraging daughters to lose weight over time. Mothers' encouragement of daughters' weight loss was linked to daughters' restrained eating behavior; this relationship was partially mediated by daughters' perception of maternal pressure to lose weight. These findings suggest that mothers' preoccupation with weight and eating, via attempts to influence daughters' weight and eating, may place daughters at risk for developing problematic eating behaviors. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
70.
For nearly 10 years now, the Internet Architecture Board (IAB) and Internet Engineering Task Force (IETF) have been telling us that the pool of available IP addresses will soon be exhausted, and that Internet growth will come to a grinding halt. They have heavily promoted their solution, IPv6, which the commercial world has all but ignored. It is now becoming clear that IP address exhaustion is years off, at best. The primary reason for this is network address translation (NAT), the rogue technology that allows almost unlimited address reuse. Despite NAT's nagging technical problems that limit IP connectivity and make peer-to-peer (P2P) applications difficult to deploy, the commercial world has universally embraced the technology even as the IAB and IETF actively discourage its use.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号