首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   291篇
  免费   29篇
  国内免费   4篇
电工技术   3篇
综合类   2篇
化学工业   75篇
金属工艺   8篇
机械仪表   15篇
建筑科学   8篇
能源动力   11篇
轻工业   39篇
水利工程   2篇
石油天然气   2篇
无线电   19篇
一般工业技术   45篇
冶金工业   16篇
原子能技术   8篇
自动化技术   71篇
  2024年   1篇
  2023年   4篇
  2022年   6篇
  2021年   19篇
  2020年   21篇
  2019年   13篇
  2018年   16篇
  2017年   25篇
  2016年   15篇
  2015年   24篇
  2014年   22篇
  2013年   33篇
  2012年   25篇
  2011年   22篇
  2010年   18篇
  2009年   11篇
  2008年   5篇
  2007年   7篇
  2006年   3篇
  2005年   6篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   4篇
  1994年   1篇
  1993年   4篇
  1992年   3篇
  1991年   1篇
  1985年   1篇
排序方式: 共有324条查询结果,搜索用时 31 毫秒
1.
A variety of heteropolyanions including: Keggin, Dawson, Preyssler, mixed addenda and sandwich types, catalyzed the formation of 4-methylnaphtho-(1,2-b)-pyran-2-one (coumarin) from the condensation of α-naphthol and ethylacetoacetate in a solvent free system and under heating conditions. Our data vividly indicate that sodium30–tungsto pentaphosphate, [NaP5W30O110]14−, which so-called Preyssler’s anion, with high hydrolytic (pH 0–12) and thermal stability is the catalyst of choice. This catalyst catalyzed the synthesis of other coumarin derivatives in high yields and good selectivity.  相似文献   
2.
Anatomic snapshot memory object in shared memory systems enables a set of processes, calledscanners, to obtain a consistent picture of the shared memory while other processes, calledupdaters, keep updating memory locations concurrently. In this paper we present two conversion methods of snapshot implementations. Using the first conversion method we obtain a new snapshot implementation in which the scan operation has linear time complexity and the time complexity of the update operation becomes the sum of the time complexities of the original implementation. Applying the second conversion method yields similar results, where in this case the time complexity of the update protocol becomes linear. Although our conversion methods use unbounded space, their space complexity can be bounded using known techniques. One of the most intriguing open problems in distributed wait-free computing is the existence of a linear-time implementation of this object. Using our conversion methods and known constructions we obtain the following results:
  • ?Consider a system ofn processes, each an updater and a scanner. We present an implementation in which the time complexity of either the update or the scan operation is linear, while the time complexity of the second operation isO(n logn).
  • ?We present an implementation with linear time complexity when the number of either updaters or scanners isO(n/logn), wheren is the total number of processes.
  • ?We present an implementation with amortized linear time complexity when one of the protocols (either upate or scan) is executed significantly more often than the other protocol.
  •   相似文献   
    3.
    The main purpose of this paper is to provide a methodology for discussing the fuzzy. Bayesian system reliability from the fuzzy component reliabilities, actually we discuss on the Fuzzy Bayesian system reliability assessment based on Pascal distribution, because the data sometimes cannot be measured and recorded precisely. In order to apply the Bayesian approach, the fuzzy parameters are assumed as fuzzy random variables with fuzzy prior distributions. The (conventional) Bayes estimation method will be used to create the fuzzy Bayes point estimator of system reliability by invoking the well-known theorem called ‘Resolution Identity’ in fuzzy sets theory. On the other hand, we also provide the computational procedures to evaluate the membership degree of any given Bayes point estimate of system reliability. In order to achieve this purpose, we transform the original problem into a nonlinear programming problem. This nonlinear programming problem is then divided into four sub-problems for the purpose of simplifying computation. Finally, the sub problems can be solved by using any commercial optimizers, e.g. GAMS or LINGO.  相似文献   
    4.
    Bridges are the most useful part in the transportation network. Any disruption of the bridge structures may hamper the whole transportation system. In the last recent tsunamis, numerous number of bridges were structurally damaged by the tsunami waves. Lack of proper provisions of tsunami forces in the design guidelines also contributes to the augmentations of the damage level. Therefore, proper evaluation of the tsunami forces on the bridge girder should be introduced in the design promptly. In this study, laboratory experiments were carried out to reveal the damage mechanism of the bridge girder by assessing the exerted tsunami forces. Both broken and unbroken waves were considered for the analysis. The results showed that measured forces were larger for broken waves than those of unbroken waves. Maximum force of the broken waves was 4.59 times as large as the hydrostatic pressure. Also, waves reached the peak value more rapidly for larger wave heights than those of smaller ones. Additionally, a girder that is placed at a higher position is much vulnerable to tsunami hazard.  相似文献   
    5.
    A flat rigid elliptical anchorage located in a damage‐susceptible fluid‐saturated poroelastic medium is subjected to an in‐plane load, which induces a pure translation in the plane of the anchor. This paper develops computational estimates for the time‐dependent displacement of the disc anchor for the classical problem that involves Biot consolidation and compares the results with situations where the porous skeleton can experience micro‐mechanical damage that leads to an alteration in both its elasticity and fluid transport characteristics. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
    6.
    7.
    8.
    In this article, an internal-reforming solid oxide fuel cell–gas turbine (IRSOFC–GT) hybrid system is modeled and analyzed from thermal (energy and exergy), economic, and environmental points of view. The model is validated using available data in the literature. Utilizing the genetic algorithm optimization technique, multi-objective optimization of modeled system is carried out and the optimal values of system design parameters are obtained. In the multi-objective optimization procedure, the exergy efficiency and the total cost rate of the system (including the capital and maintenance costs, operational cost (fuel cost), and social cost of air pollution for CO, NOx, and CO2) are considered as objective functions. A sensitivity analysis is also performed in order to study the effect of variations of the fuel unit cost on the Pareto optimal solutions and their corresponding design parameters. The optimization results indicate that the final optimum design chosen from the Pareto front results in exergy efficiency of 65.60% while it leads to total cost of 3.28 million US$ year−1. It is also demonstrated that the payback time of the chosen design is 6.14 years.  相似文献   
    9.

    A novel method for grain refinement of martensite structures was proposed, in which transformation strain is accumulated by cyclic displacive forward and reverse transformations. This method can refine martensite structures in an Fe-18Ni alloy because a high density of austenite dislocations is introduced by a displacive reverse transformation in addition to an inheritance of dislocations in body-centered cubic martensite into austenite during cyclic transformation. The addition of a small amount of carbon accelerates structure refinement significantly, which results in the formation of ultra-fine-grained structures after ten cycles.

      相似文献   
    10.
    Neural Computing and Applications - Nowadays, one of the problems in current authentication, authorization and accounting (AAA) model is lack of accurate roadmap of access management in integrated...  相似文献   
    设为首页 | 免责声明 | 关于勤云 | 加入收藏

    Copyright©北京勤云科技发展有限公司  京ICP备09084417号