首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   680篇
  免费   34篇
  国内免费   22篇
电工技术   18篇
综合类   27篇
化学工业   72篇
金属工艺   29篇
机械仪表   73篇
建筑科学   107篇
矿业工程   13篇
能源动力   31篇
轻工业   42篇
水利工程   6篇
石油天然气   14篇
武器工业   13篇
无线电   43篇
一般工业技术   89篇
冶金工业   35篇
原子能技术   1篇
自动化技术   123篇
  2024年   2篇
  2023年   6篇
  2022年   7篇
  2021年   15篇
  2020年   11篇
  2019年   25篇
  2018年   25篇
  2017年   27篇
  2016年   19篇
  2015年   13篇
  2014年   36篇
  2013年   38篇
  2012年   43篇
  2011年   46篇
  2010年   36篇
  2009年   40篇
  2008年   17篇
  2007年   26篇
  2006年   23篇
  2005年   41篇
  2004年   35篇
  2003年   34篇
  2002年   21篇
  2001年   12篇
  2000年   20篇
  1999年   9篇
  1998年   10篇
  1997年   12篇
  1996年   6篇
  1995年   12篇
  1994年   8篇
  1992年   2篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1986年   2篇
  1985年   12篇
  1984年   7篇
  1983年   6篇
  1982年   6篇
  1981年   8篇
  1980年   6篇
  1979年   3篇
  1978年   2篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
排序方式: 共有736条查询结果,搜索用时 15 毫秒
61.
Comparing the usefulness of methodologies for software development can be especially difficult when the services offered are based on different philosophies. Two systems, Affirm and HDM, were compared for their application to operation system security analysis. The assessment technique was to specify and analyze for security flaws on both systems a miniature example of a security kernel. The specification languages are at the opposite poles of the range from algebraic axioms to transition specifications. The types of security properties that could be verified with the tools available were access policy invariants and information flows. One theorem prover was highly interactive and the other nearly automatic. We found that the example could be specified satisfactorily and recognizably on both systems with a comparable amount of effort. The security analyses, on the other hand, led to very different verification tasks and different results. The two results were complementary rather than contradictory, and some additional experimentation, guided by theoretical suspicions, showed the exact relationship between them.  相似文献   
62.
Abstract. Conditions under which sums, products and time-aggregation of ARMA processes follow ARMA models are derived from a single theorem. This characterizes these processes in terms of difference equations satisfied by their autocovariance function. From this we obtain necessary and sufficient conditions for a function of a Gaussian ARMA process and the product of two possibly dependent Gaussian ARMA processes to be ARMA. We show that the sum and product of two ARMA processes related by a Box and Jenkins transfer function model belong to the ARMA family.  相似文献   
63.
64.
This paper describes a project to write a simulator for the native mode text editor of one computer, which could be run on a different computer. This was done to give a user of both computers a common editing language. The method of design and construction is presented together with brief details of the syntax and semantics of the editing language.  相似文献   
65.
Studies have been made of the activation of platinum-rhodium gauze catalysts for the oxidation of ammonia, using optical microscopy, electron probe microanalysis (EPMA), and electron spectroscopy to characterize the surfaces. The initial washing procedure is found to remove calcium and to reduce carbon residues on the surface, as a result of which the catalyst is active at lower temperatures. Subsequent activation in a hydrogen flame or in oxygen causes surface rearrangements and results in rhodium enrichment at the surface: this latter trend is partially reversed in the early stages of the oxidation of ammonia. Water vapor is found to deactivate the activated gauze.  相似文献   
66.
67.
Analysis of the experimental rate data [13] for SO2 oxidation on a commercial V2O5 catalyst has yielded a model that describes the experimental data well while the rate constant follows the Arrhenius law. This model was subsequently used to adequately predict experimentally determined effectiveness factors using the dusty-gas model flux relations and a single value for the tortuosity factor. The latter analysis validates the excellent properties of the dusty-gas model to properly describe transport in complex systems.  相似文献   
68.
A general computational strategy for the use of the formal solutions obtained in Part I of this paper is presented, and the numerical implementation of this strategy is described in detail for the right circular cylinder. Certain subtleties of the computational procedure are emphasized in order to facilitate similar numerical work for other geometries. Detailed numerical results are presented for a range of physically interesting but previously inaccessible parameter values. Limiting cases of our solution are shown to be in good agreement with the results of simpler analyses.The numerical solutions demonstrate that our techniques combine the classical advantages of eigenfunction expansions with good convergence properties at zero time and minimal computational overhead. In addition, our method is seen to be most efficient in those regimes where other theoretical treatments are unavailable. They thus provide computational and conceptual advantages over competing methods.  相似文献   
69.
陈位洪  廖旭钊 《特种结构》2009,26(3):111-114
本文介绍了西江引水工程穿越北江大堤工程的结构设计和确保北江大堤安全的工程措施。该设计可供实际工程应用参考。  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号