首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4473篇
  免费   2篇
电工技术   8篇
综合类   2篇
化学工业   98篇
金属工艺   6篇
机械仪表   21篇
建筑科学   45篇
矿业工程   5篇
能源动力   29篇
轻工业   90篇
水利工程   9篇
石油天然气   4篇
无线电   156篇
一般工业技术   162篇
冶金工业   3725篇
原子能技术   8篇
自动化技术   107篇
  2021年   8篇
  2020年   7篇
  2019年   12篇
  2018年   9篇
  2017年   12篇
  2016年   11篇
  2015年   12篇
  2014年   13篇
  2013年   64篇
  2012年   23篇
  2011年   30篇
  2010年   20篇
  2009年   24篇
  2008年   30篇
  2007年   33篇
  2006年   35篇
  2005年   33篇
  2004年   30篇
  2003年   26篇
  2002年   17篇
  2001年   19篇
  2000年   24篇
  1999年   125篇
  1998年   1019篇
  1997年   615篇
  1996年   388篇
  1995年   225篇
  1994年   217篇
  1993年   232篇
  1992年   54篇
  1991年   65篇
  1990年   66篇
  1989年   75篇
  1988年   73篇
  1987年   75篇
  1986年   68篇
  1985年   66篇
  1984年   15篇
  1983年   21篇
  1982年   33篇
  1981年   31篇
  1980年   45篇
  1979年   9篇
  1978年   23篇
  1977年   111篇
  1976年   248篇
  1975年   14篇
  1973年   8篇
  1972年   10篇
  1971年   7篇
排序方式: 共有4475条查询结果,搜索用时 0 毫秒
101.
102.
This study documents the characteristics of bainite transformations in deformed austenite during continuous cooling of a low-carbon microalloyed steel. In particular, it describes the distinguishing features of the two types of bainite observed: conventional bainite (CB) and acicular ferrite (AF). CB nucleates at prior austenite grain boundaries and grows as packets of parallel ferrite laths. Growth of CB packets is limited by either the deformation substructure (“mechanical stabilization”) or austenite grain boundaries. AF nucleates at intragranular sites and grows as individual ferrite laths or groups of parallel laths. In an AF group of parallel laths, some neighboring laths have the same orientation, but a significant number have dissimilar orientations. Neighboring laths having dissimilar orientation are two variants of either Kurdjumov–Sachs (KS) or Nishiyama–Wasserman (NW). It is proposed that the AF nucleation sites are dislocation boundaries having a relatively high misorientation (i.e., microbands (MBs) and minimized by the variant selection mechanism).  相似文献   
103.
A bistable electromagnetically actuated microvalve was designed, processed, and tested. The valve was designed to control a water flow of 0.05-0.5 μs from a reservoir at a pressure of 1-2000 Pa. The two valve components were fabricated in silicon, the upper piece comprises an electroplated gold coil, and the lower piece is an Ni/Fe alloy beam. The bistable capability was achieved by balancing the elastic forces on the beam with the magnetic forces due to a 46-μm-thick rolled magnetic foil. The design includes the flow through the orifice, squeeze film damping due to beam motion, beam elasticity, and electromagnetics. The microvalve was tested for power consumption, flow rate, time response, Ni/Fe alloy composition, and magnetic foil properties. The valve operates at 1-2 V in both air and water  相似文献   
104.
A microfabricated electrochemical actuator for large displacements   总被引:1,自引:0,他引:1  
A large-displacement electrochemical actuator was designed, fabricated, and tested. The large displacement is obtained by using a corrugated membrane made by physical vapor deposition of Parylene sandwiched with an intermediate layer of sputtered platinum. The layered structure is approximately 8-μm thick, with 26 grooves approximately 120-μm deep, and with a radial period of 350 μm. The electrochemical cell consists of platinum electrodes with a 1 M H2 SO4 solution. Hydrogen and oxygen gas is generated to displace the membrane. Although the actuator can operate at a voltage as low as 1.23 V, the experimentally determined efficiency of converting electrical energy to mechanical work is only 0.37%. The governing equations for the conservation of mass, momentum (equilibrium), energy, and the entropy generation rate were formulated assuming that the gas bubbles either nucleate without growth or grow without nucleation. For the nucleation case, simulations were performed for constant pressure isothermal actuation, and the average experimental efficiency was bounded by simulations with gas bubble radii between 1×10-6 m and 1×10-6 m. The predicted ratio of the power dissipated to the electrical power supplied is 1.37 for isothermal actuation  相似文献   
105.
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.  相似文献   
106.
This paper investigates the fundamental difference between a simple e-tender box and a traditional physical tender box, and highlights a series of security traps created by the functional differences. Based on our findings, we have defined the security requirements for an e-tender submission protocol. We also discuss functional limitations of cryptographic technologies. As a result, two secure e-tender submission protocols are proposed which enable a secure e-tender submission. Protocols are assumed to run under the condition that all tendering parties (principal and tenderers) are dishonest players. Our informal and formal security analysis show that these protocols meet their security goals under well known collusion scenarios. Because security is a process not a product, our approach will have broad industry application for developing secure electronic business processes in areas other than e-tendering.
Colin BoydEmail:
  相似文献   
107.
The use of middle infrared (MIR) radiation (3.0-5.0 mu m) at the regional scale may be unreliable for biophysical estimation, should be corrected for thermal emission and MIR reflectance used in its place. This study considered the potential use of MIR reflectance for studying tropical forests, with the relationship between MIR reflectance and estimated total biomass of the tropical forests of Cameroon derived. Comparisons were drawn with relationships between estimated total biomass and visible reflectance, near infrared reflectance, MIR radiation and surface temperature. Relationships between two vegetation indices, the NDVI and VI3, and estimated total biomass were also explored. It was found that correcting MIR radiation for thermal emission increased the strength of the relationship between radiation acquired in MIR wavelengths and estimated total biomass. The use of MIR reflectance, either alone or within the vegetation index VI3, provided the strongest relationship with estimated total biomass. This suggests that MIR reflectance may be more sensitive to changes in forest properties than the reflectance in visible and NIR wavelengths. It is recommended that MIR reflectance should be adopted more widely for the remote sensing of tropical forests.  相似文献   
108.

The ever-wet tropics are under threat from ENSO events and there is a need for a monitoring system to analyse and describe their responses to such events. This letter explores the relative value of using NOAA AVHRR middle infrared (MIR) reflectance data and NDVI data for the monitoring of ENSO-related drought stress of a tropical forest ecosystem in Sabah, Malaysia. Relationships between rainfall and MIR reflectance were examined. Correlation coefficients are generally large and significant (at 0.1 level) while those between rainfall and NDVI were small and insignificant. This letter concludes that there is potential in using MIR reflectance for monitoring the effects of ENSO-induced drought stress on these forests and this has a bearing on how NOAA AVHRR data may be used to further our knowledge on the impacts of ENSO events on tropical forest environments.  相似文献   
109.
Control applications of nonlinear convex programming   总被引:2,自引:0,他引:2  
Since 1984 there has been a concentrated effort to develop efficient interior-point methods for linear programming (LP). In the last few years researchers have begun to appreciate a very important property of these interior-point methods (beyond their efficiency for LP): they extend gracefully to nonlinear convex optimization problems. New interior-point algorithms for problem classes such as semidefinite programming (SDP) or second-order cone programming (SOCP) are now approaching the extreme efficiency of modern linear programming codes. In this paper we discuss three examples of areas of control where our ability to efficiently solve nonlinear convex optimization problems opens up new applications. In the first example we show how SOCP can be used to solve robust open-loop optimal control problems. In the second example, we show how SOCP can be used to simultaneously design the set-point and feedback gains for a controller, and compare this method with the more standard approach. Our final application concerns analysis and synthesis via linear matrix inequalities and SDP.  相似文献   
110.
We consider a linear control system in which several signals are transmitted over communication channels with bit rate limitations. With the coding and medium access schemes of the communication system fixed, the achievable bit rates are determined by the allocation of communications resources such as transmit powers and bandwidths, to different communication channels. We model the effect of bit rate limited communication channels by uniform quantization and the quantization errors are modeled by additive white noises whose variances depend on the achievable bit rates. We optimize the stationary performance of the linear system by jointly allocating resources in the communication system and tuning parameters of the controller.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号