首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3556篇
  免费   213篇
  国内免费   4篇
电工技术   25篇
综合类   4篇
化学工业   829篇
金属工艺   321篇
机械仪表   89篇
建筑科学   106篇
矿业工程   18篇
能源动力   96篇
轻工业   506篇
水利工程   24篇
石油天然气   12篇
无线电   203篇
一般工业技术   491篇
冶金工业   203篇
原子能技术   25篇
自动化技术   821篇
  2024年   6篇
  2023年   38篇
  2022年   78篇
  2021年   141篇
  2020年   86篇
  2019年   103篇
  2018年   180篇
  2017年   164篇
  2016年   203篇
  2015年   165篇
  2014年   162篇
  2013年   252篇
  2012年   220篇
  2011年   776篇
  2010年   171篇
  2009年   158篇
  2008年   140篇
  2007年   121篇
  2006年   76篇
  2005年   63篇
  2004年   73篇
  2003年   46篇
  2002年   56篇
  2001年   32篇
  2000年   26篇
  1999年   20篇
  1998年   28篇
  1997年   27篇
  1996年   16篇
  1995年   23篇
  1994年   16篇
  1993年   11篇
  1992年   9篇
  1991年   9篇
  1990年   10篇
  1989年   11篇
  1988年   9篇
  1987年   8篇
  1986年   7篇
  1985年   8篇
  1984年   4篇
  1983年   3篇
  1982年   3篇
  1981年   4篇
  1979年   2篇
  1976年   2篇
  1975年   1篇
  1972年   1篇
  1971年   1篇
  1969年   1篇
排序方式: 共有3773条查询结果,搜索用时 31 毫秒
61.
The warehouse order-picking operation is one of the most labour-intense activities that has an important impact on responsiveness and efficiency of the supply chain. An understanding of the impact of the simultaneous effects of customer demand patterns and order clustering, considering physical restrictions in product storage, is critical for improving operational performance. Storage restrictions may include storing non-uniform density stock keeping units (SKUs) whose dimensions and weight constrain the order-picking operation given that a priority must be followed. In this paper, a heuristic optimisation based on a quadratic integer programming is employed to generate a layout solution that considers customer demand patterns and order clustering. A simulation model is used to investigate the effects of creating and implementing these layout solutions in conjunction with density zones to account for restrictions in non-uniform density SKUs. Results from combining layout optimisation heuristics and density zoning indicate statistical significant differences between assignments that ignore the aforementioned factors and those that recognise it.  相似文献   
62.
63.
64.
Magnetic particles diluted in liquid agglomerate in rod-like particle arrays if an external homogeneous magnetic field is applied. This work introduces a method to specifically exploit particle–particle interaction to obtain flow control of magnetic particles without changing the motion state of the carrier liquid. Experiments show the possibility to uncouple the particle flux from the motion state of liquid. We show how this method may be applied to design a microfluidic geometry in which the particle flow in a specific direction is either enabled or suppressed by the relative orientation of the fluid velocity and the external field.  相似文献   
65.
We demonstrate controlled transport of superparamagnetic beads in the opposite direction of a laminar flow. A permanent magnet assembles 200 nm magnetic particles into about 200 μm long bead chains that are aligned in parallel to the magnetic field lines. Due to a magnetic field gradient, the bead chains are attracted towards the wall of a microfluidic channel. A rotation of the permanent magnet results in a rotation of the bead chains in the opposite direction to the magnet. Due to friction on the surface, the bead chains roll along the channel wall, even in counter-flow direction, up to at a maximum counter-flow velocity of 8 mm s−1. Based on this approach, magnetic beads can be accurately manoeuvred within microfluidic channels. This counter-flow motion can be efficiently be used in Lab-on-a-Chip systems, e.g. for implementing washing steps in DNA purification.  相似文献   
66.
Infrastructure federation is becoming an increasingly important issue for modern Distributed Computing Infrastructures (DCIs): Dynamic elasticity of quasi-static Grid environments, incorporation of special-purpose resources into commoditized Cloud infrastructures, cross-community collaboration for increasingly diverging areas of modern e-Science, and Cloud Bursting pose major challenges on the technical level for many resource and middleware providers. Especially with respect to increasing costs of operating data centers, the intelligent yet automated and secure sharing of resources is a key factor for success. With the D-Grid Scheduler Interoperability (DGSI) project within the German D-Grid Initiative, we provide a strategic technology for the automatically negotiated, SLA-secured, dynamically provisioned federation of resources and services for Grid-and Cloud-type infrastructures. This goal is achieved by complementing current DCI schedulers with the ability to federate infrastructure for the temporary leasing of resources and rechanneling of workloads. In this work, we describe the overall architecture and SLA-secured negotiation protocols within DGSI and depict an advanced mechanism for resource delegation through means of dynamically provisioned, virtualized middleware. Through this methodology, we provide the technological foundation for intelligent capacity planning and workload management in a cross-infrastructure fashion.  相似文献   
67.
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two generic entities that can solve the problem of delegated access to the telematic services provided by public authorities. The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation. Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token has been revoked. Implications for theory and practice and suggestions for future research are discussed.  相似文献   
68.
Systems based on the service-oriented architecture (SOA) principles have become an important cornerstone of the development of enterprise-scale software applications. They are characterized by separating functions into distinct software units, called services, which can be published, requested and dynamically combined in the production of business applications. Service-oriented systems (SOSs) promise high flexibility, improved maintainability, and simple re-use of functionality. Achieving these properties requires an understanding not only of the individual artifacts of the system but also their integration. In this context, non-functional aspects play an important role and should be analyzed and modeled as early as possible in the development cycle. In this paper, we discuss modeling of non-functional aspects of service-oriented systems, and the use of these models for analysis and deployment. Our contribution in this paper is threefold. First, we show how services and service compositions may be modeled in UML by using a profile for SOA (UML4SOA) and how non-functional properties of service-oriented systems can be represented using the non-functional extension of UML4SOA (UML4SOA-NFP) and the MARTE profile. This enables modeling of performance, security and reliable messaging. Second, we discuss formal analysis of models which respect this design, in particular we consider performance estimates and reliability analysis using the stochastically timed process algebra PEPA as the underlying analytical engine. Last but not least, our models are the source for the application of deployment mechanisms which comprise model-to-model and model-to-text transformations implemented in the framework VIATRA. All techniques presented in this work are illustrated by a running example from an eUniversity case study.  相似文献   
69.
Scenario languages are widely used in software development. Typical usage scenarios, forbidden behaviors, test cases, and many more aspects can be depicted with graphical scenarios. Scenario languages were introduced into the Unified Modeling Language (UML) under the name of Sequence Diagrams. The 2.0 version of UML changed Sequence Diagrams significantly and the expressiveness of the language was highly increased. However, the complexity of the language (and the diversity of the goals Sequence Diagrams are used for) yields several possible choices in its semantics. This paper collects and categorizes the semantic choices in the language, surveys the formal semantics proposed for Sequence Diagrams, and presents how these approaches handle the various semantic choices.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号