首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1209篇
  免费   36篇
  国内免费   4篇
电工技术   10篇
综合类   2篇
化学工业   191篇
金属工艺   20篇
机械仪表   22篇
建筑科学   45篇
矿业工程   2篇
能源动力   43篇
轻工业   115篇
水利工程   6篇
石油天然气   3篇
无线电   88篇
一般工业技术   142篇
冶金工业   434篇
原子能技术   9篇
自动化技术   117篇
  2023年   8篇
  2022年   19篇
  2021年   22篇
  2020年   21篇
  2019年   23篇
  2018年   34篇
  2017年   24篇
  2016年   25篇
  2015年   12篇
  2014年   28篇
  2013年   74篇
  2012年   51篇
  2011年   27篇
  2010年   33篇
  2009年   26篇
  2008年   32篇
  2007年   32篇
  2006年   35篇
  2005年   30篇
  2004年   24篇
  2003年   25篇
  2002年   29篇
  2001年   16篇
  2000年   23篇
  1999年   26篇
  1998年   84篇
  1997年   51篇
  1996年   36篇
  1995年   21篇
  1994年   26篇
  1993年   26篇
  1992年   12篇
  1991年   9篇
  1990年   15篇
  1989年   8篇
  1988年   18篇
  1987年   15篇
  1986年   10篇
  1985年   20篇
  1984年   14篇
  1983年   9篇
  1982年   16篇
  1981年   12篇
  1980年   15篇
  1979年   17篇
  1978年   9篇
  1977年   18篇
  1976年   26篇
  1975年   10篇
  1969年   6篇
排序方式: 共有1249条查询结果,搜索用时 31 毫秒
21.
Cloud computing poses many challenges on integrity and privacy of users’ data though it brings an easy, cost-effective and reliable way of data management. Hence, secure and efficient methods are needed to ensure integrity and privacy of data stored at the cloud. Wang et al. proposed a privacy-preserving public auditing protocol in 2010 but it is seriously insecure. Their scheme is vulnerable to attacks from malicious cloud server and outside attackers regarding to storage correctness. So they proposed a scheme in 2011 with an improved security guarantee but it is not efficient. Thus, in this paper, we proposed a scheme which is secure and with better efficiency. It is a public auditing scheme with third party auditor (TPA), who performs data auditing on behalf of user(s). With detail security analysis, our scheme is proved secure in the random oracle model and our performance analysis shows the scheme is efficient.  相似文献   
22.
The tert‐butoxy radical‐facilitated grafting of methyl methacrylate (MMA) onto commercial polypropylene (PP) pellets and fiber was investigated in heterogeneous conditions similar to practical systems. Free‐radical grafting of several other monomers onto PP fiber was also investigated. Also, preliminary data from the grafting of MMA onto poly(ethylene terephthalate) pellets is presented. The PP‐graft‐PMMA residues were detected by solid‐state 13C‐NMR and photoacoustic IR spectroscopy. There was a good correlation between the degree of grafting (DG) determined from these spectroscopic techniques and the results from gravimetric methods. A maximum grafting efficiency of over 50% was found, whereas DG (20%) remained constant at various PP pellet, initiator, and monomer concentrations. However, at relatively low PP fiber concentrations, the DG was 27%; the increase was most likely due to the greater surface area of the fiber. There was also a reduction in DG (14%) at relatively low initiator concentrations. The reaction conditions were altered to favor grafting by the addition of more polymer substrate. When the ratio of tert‐butoxy radicals to PP was decreased, more of the substrate remained unmodified, and empirical calculations showed the formation of grafts with up to 40 monomer units. At high initiator concentrations, calculations showed that the graft residues were 1–2 units long. Therefore, variation of the polymer, initiator, and monomer concentrations was shown to have a significant effect on grafting. © 2002 Wiley Periodicals, Inc. J Appl Polym Sci 83: 898–915, 2002  相似文献   
23.
The impact echo technique is based on the use of transient stress waves for non-destructive detection of flaws in concrete structures. Impact-echo testing has been carried out for assessment of the structural integrity of the ring beam of a pressurised heavy water nuclear reactor. In order to develop the test procedure for carrying out impact echo testing, mock up calibration blocks were made. The detectability of the impact echo system has also been established in terms of the depth and the lateral dimension of the detectable flaw for the ring beam under consideration. Based on the optimised test parameters identified with the help of the studies carried out on the mock up blocks, impact echo testing was carried out on the ring beam of the reactor containment structure, for assessing its structural integrity.  相似文献   
24.
This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others.  相似文献   
25.
Up to now, the quality of life of children and adolescents with psychiatric disorders has rarely been investigated. Not many suitable instruments are available. A new one is the "Inventory for the Assessment of the Quality of Live in Children and Adolescents" presented here. Objectives and underlying conceptual assumptions are discussed, followed by an explanation of the instrument itself (questionnaires, rating scales, etc.). Finally, experiences with the application of the instrument are reported together with initial empirical results from a clinical sample and a sample of high school students. These indicate that the instrument usefully assesses clinically relevant information about the quality of life of the patients. A broader empirical analysis of this method is being prepared.  相似文献   
26.
27.
A new axiomatic system OST of operational set theory is introduced in which the usual language of set theory is expanded to allow us to talk about (possibly partial) operations applicable both to sets and to operations. OST is equivalent in strength to admissible set theory, and a natural extension of OST is equivalent in strength to ZFC. The language of OST provides a framework in which to express “small” large cardinal notions—such as those of being an inaccessible cardinal, a Mahlo cardinal, and a weakly compact cardinal—in terms of operational closure conditions that specialize to the analogue notions on admissible sets. This illustrates a wider program whose aim is to provide a common framework for analogues of large cardinal notions that have appeared in admissible set theory, admissible recursion theory, constructive set theory, constructive type theory, explicit mathematics, and systems of recursive ordinal notations that have been used in proof theory.  相似文献   
28.
The discovery of meaningful parts of a shape is required for many geometry processing applications, such as parameterization, shape correspondence, and animation. It is natural to consider primitives such as spheres, cylinders and cones as the building blocks of shapes, and thus to discover parts by fitting such primitives to a given surface. This approach, however, will break down if primitive parts have undergone almost‐isometric deformations, as is the case, for example, for articulated human models. We suggest that parts can be discovered instead by finding intrinsic primitives, which we define as parts that posses an approximate intrinsic symmetry. We employ the recently‐developed method of computing discrete approximate Killing vector fields (AKVFs) to discover intrinsic primitives by investigating the relationship between the AKVFs of a composite object and the AKVFs of its parts. We show how to leverage this relationship with a standard clustering method to extract k intrinsic primitives and remaining asymmetric parts of a shape for a given k. We demonstrate the value of this approach for identifying the prominent symmetry generators of the parts of a given shape. Additionally, we show how our method can be modified slightly to segment an entire surface without marking asymmetric connecting regions and compare this approach to state‐of‐the‐art methods using the Princeton Segmentation Benchmark.  相似文献   
29.
Cartoon animation, image warping, and several other tasks in two‐dimensional computer graphics reduce to the formulation of a reasonable model for planar deformation. A deformation is a map from a given shape to a new one, and its quality is determined by the type of distortion it introduces. In many applications, a desirable map is as isometric as possible. Finding such deformations, however, is a nonlinear problem, and most of the existing solutions approach it by minimizing a nonlinear energy. Such methods are not guaranteed to converge to a global optimum and often suffer from robustness issues. We propose a new approach based on approximate Killing vector fields (AKVFs), first introduced in shape processing. AKVFs generate near‐isometric deformations, which can be motivated as direction fields minimizing an “as‐rigid‐as‐possible” (ARAP) energy to first order. We first solve for an AKVF on the domain given user constraints via a linear optimization problem and then use this AKVF as the initial velocity field of the deformation. In this way, we transfer the inherent nonlinearity of the deformation problem to finding trajectories for each point of the domain having the given initial velocities. We show that a specific class of trajectories — the set of logarithmic spirals — is especially suited for this task both in practice and through its relationship to linear holomorphic vector fields. We demonstrate the effectiveness of our method for planar deformation by comparing it with existing state‐of‐the‐art deformation methods.  相似文献   
30.
Lennart Åqvist (1992) proposed a logical theory of legal evidence, based on the Bolding-Ekelöf of degrees of evidential strength. This paper reformulates Åqvist's model in terms of the probabilistic version of the kappa calculus. Proving its acceptability in the legal context is beyond the present scope, but the epistemological debate about Bayesian Law isclearly relevant. While the present model is a possible link to that lineof inquiry, we offer some considerations about the broader picture of thepotential of AI & Law in the evidentiary context. Whereas probabilisticreasoning is well-researched in AI, calculations about the threshold ofpersuasion in litigation, whatever their value, are just the tip of theiceberg. The bulk of the modeling desiderata is arguably elsewhere, if one isto ideally make the most of AI's distinctive contribution as envisaged forlegal evidence research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号