首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   365篇
  免费   9篇
  国内免费   11篇
电工技术   10篇
综合类   25篇
化学工业   78篇
金属工艺   23篇
机械仪表   33篇
建筑科学   50篇
矿业工程   4篇
能源动力   12篇
轻工业   21篇
石油天然气   10篇
无线电   31篇
一般工业技术   49篇
冶金工业   7篇
原子能技术   2篇
自动化技术   30篇
  2024年   1篇
  2023年   3篇
  2022年   3篇
  2021年   12篇
  2020年   4篇
  2019年   7篇
  2018年   6篇
  2017年   10篇
  2016年   9篇
  2015年   8篇
  2014年   15篇
  2013年   24篇
  2012年   18篇
  2011年   22篇
  2010年   21篇
  2009年   13篇
  2008年   22篇
  2007年   28篇
  2006年   25篇
  2005年   34篇
  2004年   15篇
  2003年   17篇
  2002年   12篇
  2001年   9篇
  2000年   3篇
  1999年   7篇
  1998年   6篇
  1997年   5篇
  1996年   6篇
  1995年   7篇
  1993年   3篇
  1992年   3篇
  1991年   3篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
排序方式: 共有385条查询结果,搜索用时 0 毫秒
1.
本文介绍了微机在工业配料过程中的应用情况,对上料-计量-下料的全过程即“动态运行-静态计量-动态运行”进行控制.  相似文献   
2.
利用变分方法和反证法研究了一类含有非线性项的Kirchhoff - Carrier方程,证明了当0<λ1时,该方程至少存在一对非平凡解,且当λ≥a λ1时该方程不存在同号解.  相似文献   
3.
论述了在直齿轮分度圆直径为定值时,变形程度与模数的关系。通过对三种不同模数的齿轮在特定的条件下温挤压成形数值模拟,结果及分析表明,随着齿轮模数的增大,变形程度也增大,金属向齿顶及周围流动就相对较多,齿形就容易充满,但齿轮头部内凹与头的齿部凸肚现象就越厉害。  相似文献   
4.
In recent years, numerous analytical and experimental researches have been performed on the prediction of thermal stresses in mass concrete structures. However, due to the difficulty of the problem, limitations still exist for both analytical and experimental methods of measuring thermal stresses in mass concrete. In this research, a new experimental device measuring thermal stresses directly in a laboratory setting is developed. The equipment is located in a temperature chamber that follows the temperature history, which has been previously obtained from temperature distribution analyses. Thermal forces are measured continuously by two load cells in the device. The results show that the thermal stresses estimated by the newly developed device agree well with general stress variations in actual structures.  相似文献   
5.
尖晶石粒度对高纯刚玉-尖晶石浇注料性能的影响   总被引:7,自引:1,他引:7  
研究了尖晶石粒度对高纯刚玉 -尖晶石浇注料的抗折强度、抗热震性、抗侵蚀性等性能的影响。实验表明 :(1)随着配料中尖晶石颗粒含量的增加 ,试样的烧后强度呈先升高后降低趋势 (烘后强度变化不明显 ) ,烧后收缩减少 ,然后变为膨胀 ;(2 )尖晶石细粉与颗粒为 1:3的试样抗热震性较好 ;(3)对于高碱度渣 ,尖晶石颗粒加入量较多的试样抗侵蚀性较好 ;(4)对于低碱度渣 ,尖晶石细粉加入量较多的试样抗侵蚀性和抗渗透性均较好。  相似文献   
6.
Polyarylates from substituted hydroquinones (HQs) and p-terphenyl-4,4″-dicarboxylic acid (TPDA) that were modified with 1,2-bis(phenoxy)ethane-4,4′-dicarboxylic acid (PEC), 1,2-bis(2-chlorophenoxy)ethane-4,4′-dicarboxylic acid (ClPEC), terephthalic acid (TA) and p-hydroxybenzoic acid (HBA) were prepared and their thermal and mechanical properties were investigated. These polyarylates exhibited liquid crystallinity at about the same temperatures as polyarylates derived from substituted HQs and 4,4′-diphenyldicarboxylic acid (BB). However, as-spun fibers and injection-molded specimens of these polyarylates exhibited lower moduli than those of substituted HQs and BB that were modified with PEC, Cl-PEC and TA.  相似文献   
7.
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack.  相似文献   
8.
The (t, n)-threshold has been extended to secret image sharing due to its practicability. In this article, we provide a novel version that employs the modulus operator to embed the secret share into a host image. The simulator shows that the modulus operator is useful for decreasing shadow image distortion. Using Rabin's signature cryptosystem, participants can detect if a cheater exists in the cooperation. In particular, the new mechanism permits involved members to restore a lossless secret image and to reconstruct a distortion-free host image.  相似文献   
9.
10.
Recently, many regression models have been presented for prediction of mechanical parameters of rocks regarding to rock index properties. Although statistical analysis is a common method for developing regression models, but still selection of suitable transformation of the independent variables in a regression model is difficult. In this paper, a genetic algorithm (GA) has been employed as a heuristic search method for selection of best transformation of the independent variables (some index properties of rocks) in regression models for prediction of uniaxial compressive strength (UCS) and modulus of elasticity (E). Firstly, multiple linear regression (MLR) analysis was performed on a data set to establish predictive models. Then, two GA models were developed in which root mean squared error (RMSE) was defined as fitness function. Results have shown that GA models are more precise than MLR models and are able to explain the relation between the intrinsic strength/elasticity properties and index properties of rocks by simple formulation and accepted accuracy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号