首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1111篇
  免费   99篇
  国内免费   3篇
电工技术   13篇
综合类   1篇
化学工业   364篇
金属工艺   33篇
机械仪表   23篇
建筑科学   16篇
矿业工程   11篇
能源动力   31篇
轻工业   24篇
水利工程   1篇
石油天然气   8篇
武器工业   1篇
无线电   92篇
一般工业技术   356篇
冶金工业   69篇
原子能技术   9篇
自动化技术   161篇
  2024年   2篇
  2023年   18篇
  2022年   72篇
  2021年   93篇
  2020年   47篇
  2019年   52篇
  2018年   53篇
  2017年   45篇
  2016年   52篇
  2015年   43篇
  2014年   52篇
  2013年   85篇
  2012年   73篇
  2011年   98篇
  2010年   45篇
  2009年   49篇
  2008年   42篇
  2007年   45篇
  2006年   28篇
  2005年   43篇
  2004年   23篇
  2003年   18篇
  2002年   19篇
  2001年   16篇
  2000年   13篇
  1999年   10篇
  1998年   12篇
  1997年   14篇
  1996年   10篇
  1995年   4篇
  1994年   6篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1987年   4篇
  1986年   1篇
  1985年   3篇
  1984年   1篇
  1983年   2篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
排序方式: 共有1213条查询结果,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - The paper addresses the problem of human activity recognition based on the data from wearable sensors. Human activity recognition depends on a wide context of...  相似文献   
2.
3.
Graphene has been predicted to develop a magnetic moment by proximity effect when placed on a ferromagnetic film, a promise that could open exciting possibilities in the fields of spintronics and magnetic data recording. In this work, the interplay between the magnetoresistance of graphene and the magnetization of an underlying ferromagnetic insulating film is studied in detail. A clear correlation between both magnitudes is observed but through a careful modeling of the magnetization and the weak localization measurements, that such correspondence can be explained by the effects of the magnetic stray fields arising from the ferromagnetic insulator is found. The results emphasize the complexity arising at the interface between magnetic and 2D materials.  相似文献   
4.
5.
The certainty equivalence approach to adaptive control is commonly used with two types of identifiers: passivity-based identifiers and swapping identifiers. The “passive” (also known as “observer-based”) approach is the prevalent identification technique in existing results on adaptive control for PDEs but has so far not been used in boundary control problems. The swapping approach, prevalent in finite-dimensional adaptive control is employed here for the first time in adaptive control of PDEs. For a class of unstable parabolic PDEs we prove a separation principle result for both the passive and swapping identifiers combined with the backstepping boundary controllers. The result is applicable in any dimension. For physical reasons we restrict our attention to dimensions no higher than three. The results of the paper are illustrated by simulations.  相似文献   
6.
This paper deals with qualitative analysis of the so-called switched fluid networks. Such networks are used to model communication, computer, and flexible manufacturing systems. We prove that for any deterministic network from a specific class, there exists a finite number of limit cycles attracting all the trajectories of the system. Furthermore, we determine this number. Date received: March 11, 2000. Date revised: January 19, 2001.  相似文献   
7.
Modern liver surgery is based upon deep knowledge of the surgical anatomy of the liver and improvements with ultrasounds imaging techniques have provided multidimensional interpretations of the liver anatomy intraoperatively. The technical advances with real-time scanning combined with the pioneering efforts of the Japanese liver surgeons have permitted the dynamic adaptation of the functional liver anatomy to the real anatomy, thus intimately aiding in segment oriented anatomical resection. Intraoperative ultrasound afford several advantages such as viewing the internal anatomy in direct relationship to the surface landmarks under the probe, enabling higher frequencies resulting in greater image resolution. The utilization of intraoperative ultrasound can modify the tactics involved with resection of both primary and metastatic liver tumours. The routine use of intraoperative ultrasound is strongly advocated since more complex procedures can be performed safely since the surgeon proceeds with complete knowledge of the real liver anatomy when deciding the feasibility and extent of liver resection.  相似文献   
8.
Six adult patients with cleft palate, ranging in age from 47 to 78 years, were treated with self-tapping titanium implants. Twenty-three implants, 7 to 15 mm in length, were placed. Of these, one (4%) was 7 mm, eight (35%) were 10 mm, nine (39%) were 13 mm, and five (22%) were 15 mm. Time between stage I and stage II implant surgeries was 5 to 14 months, averaging 8.3 months. Time from stage II surgery to the present is 1.5 to 5 years, averaging 3 years. Of the 23 implants placed, 21 (91%) achieved osseointegration. One (4%) implant was not used prosthetically. Two (9%) 10 mm implants failed to integrate in one patient. All patients were treated with a maxillary complete denture or overdenture. Five (83%) required the addition of a pharyngeal section for speech enhancement.  相似文献   
9.
This paper presents a historical background of ground source heat pump technology, followed by a review of its current shortcomings. Based on these observations the author assesses the R&D needs and recommendations for future research.  相似文献   
10.
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions for the second round candidates and review arguments and bounds against classes of differential attacks. We discuss all the SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential attacks. Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates with a suffix-free padding are covered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号