首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2966篇
  免费   134篇
  国内免费   3篇
电工技术   40篇
综合类   8篇
化学工业   721篇
金属工艺   57篇
机械仪表   28篇
建筑科学   182篇
矿业工程   6篇
能源动力   74篇
轻工业   272篇
水利工程   24篇
石油天然气   6篇
无线电   271篇
一般工业技术   582篇
冶金工业   349篇
原子能技术   20篇
自动化技术   463篇
  2023年   41篇
  2022年   51篇
  2021年   108篇
  2020年   58篇
  2019年   60篇
  2018年   61篇
  2017年   61篇
  2016年   96篇
  2015年   75篇
  2014年   125篇
  2013年   148篇
  2012年   167篇
  2011年   204篇
  2010年   126篇
  2009年   129篇
  2008年   146篇
  2007年   135篇
  2006年   142篇
  2005年   114篇
  2004年   97篇
  2003年   62篇
  2002年   63篇
  2001年   39篇
  2000年   56篇
  1999年   45篇
  1998年   103篇
  1997年   66篇
  1996年   69篇
  1995年   59篇
  1994年   44篇
  1993年   32篇
  1992年   18篇
  1991年   22篇
  1990年   18篇
  1989年   27篇
  1988年   13篇
  1987年   22篇
  1986年   13篇
  1985年   13篇
  1984年   10篇
  1983年   15篇
  1982年   14篇
  1981年   13篇
  1980年   12篇
  1979年   15篇
  1978年   15篇
  1977年   7篇
  1976年   19篇
  1975年   6篇
  1973年   6篇
排序方式: 共有3103条查询结果,搜索用时 31 毫秒
1.
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented.  相似文献   
2.
Eich (1985) recently presented a distributed memory model in which the pattern of results used to support the levels-of-processing view of Craik and Lockhart (1972) was modeled by different degrees of similarity between the encoding context and the to-be-recalled item. We report two experiments in which both phonemic and semantic similarity were varied between pairs of words and incidental acquisition (rhyme vs. category judgments) was varied across the same pairs of items. In both experiments the manipulation of the acquisition task produced a difference in cued-recall performance for positive and negative rhyme and category judgments. Recall was better following a category encoding decision than following a rhyme decision. This difference was independent of the effects of similarity, which demonstrated that Eich's (1985) assumptions regarding the effects of similarity are not sufficient to account for the differences resulting from the manner in which subjects encode information. An alternative method of modeling the levels-of-processing effect within the framework of distributed memory models is proposed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
According to the knowledge partitioning framework, people sometimes master complex tasks by creating multiple independent parcels of partial knowledge. Research has shown that knowledge parcels may contain mutually contradictory information, and that each parcel may be used without regard to knowledge that is demonstrably present in other parcels. This article reports 4 experiments that investigated knowledge partitioning in categorization. When component boundaries of a complex categorization were identified by a context cue, a significant proportion of participants learned partial and independent categorization strategies that were chosen on the basis of context. For those participants, a strategy used in one context was unaffected by knowledge demonstrably present in other contexts, suggesting that knowledge partitioning in categorization can be complete. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
Tracked vehicles capable of locomotion in the deep sea are used for manganese nodule mining. This requires specific technical solutions in various respects. Locomotion in the soft sea bed is one of them. For the Crawler to safely maneuver, an automatic drive mode with slip control of the driving tracks is essential. Based on experimental studies at IKS, University of Siegen, slip control for the NIOT-IKS mining machine has been developed and implemented. The experimental setup for the development of the slip control along with the logic of the automatic driving mode is described. The system is critically discussed and the test results and future work are briefly outlined. Note to Practitioners-The work is carried out as part of the polymetallic nodule mining program of the Government of India. The technique of slip control is a specific requirement for a tracked vehicle used in the deep sea. Slip is common in many vehicles-tracked and otherwise. Examples are steam engines in the early days and ordinary cars while negotiating slush or snow/ice and dozers working in soft soil. While these are manually controlled by drivers who have firsthand knowledge of the environmental conditions, in the case of a mining machine in deep sea, it has to be completely automatic and, hence, is challenging. The knowledge generated in this work could be effectively used by practitioners in other related areas of automobile engineering for updating their expertise. Also, similar techniques may be used for maneuvering vehicles sent to other planets  相似文献   
5.
OBJECTIVES: We sought to form a consensus recommendation for management of prosthetic valve thrombosis (PVT) from previous case and uncontrolled reports from a consensus of international specialists. BACKGROUND: PVT and thromboembolism relate to inadequate anticoagulation and valve type and location. PVT is suspected by history (dyspnea) and auscultation (muffled valve sounds or new murmurs) and confirmed by Doppler echocardiography showing a marked valve gradient. METHODS: A consensus conference was held to recommend management of left-sided PVT. RESULTS: Transesophageal Doppler echocardiography is used to visualize abnormal leaflet motion and the size, location and mobility of thrombus. Thrombolysis is used for high risk surgical candidates with left-sided PVT (New York Heart Association functional class III or IV) because cerebral thromboembolism may occur in 12% of patients. Duration of thrombolysis depends on resolution of pressure gradients and valve areas to near normal by Doppler echocardiography performed every few hours. Lysis is stopped after 72 or 24 h if there is no hemodynamic improvement (operation indicated). Heparin infusion with frequent measurement of activated partial thromboplastin time (aPTT) begins when aPTT is more than twice control levels and can be converted to warfarin (international normalized ratio [INR] 2.5 to 3.5) plus aspirin (81 to 100 mg/day). Patients in functional class I or II have lower surgical mortality, and those with large immobile thrombi on the prosthetic valve or left atrium have responded to endogenous lysis with combined subcutaneous heparin every 12 h (aPTT 55 to 80 s) plus warfarin (INR 2.5 to 3.5) for 1 to 6 months. Operation is advised for nonresponders or patients with mobile thrombi. CONCLUSIONS: Thrombolysis, followed by heparin, warfarin and aspirin, is advised for high risk surgical candidates with left-sided PVT.  相似文献   
6.
We study experimentally and theoretically two polarization effects in a vertical cavity surface emitting laser submitted to optical feedback. In a first experiment, we obtain flips between two linearly polarized laser modes up to a frequency of 50 MHz using an external cavity with a polarizer. In a second experiment, polarization self modulation is demonstrated up to a frequency of 2.6 GHz, using a quarter wave plate instead. Numerical calculations, based on a four levels model for the active medium, show a good agreement with the experiments.  相似文献   
7.
8.
9.
As developed by Wallace and Dadda, a method for high-speed, parallel multiplication is to generate a matrix of partial products and then reduce the partial products to two numbers whose sum is equal to the final product. The resulting two numbers are then summed using a fast carry-propagate adder. This paper presents Reduced Area multipliers, which employ a modified reduction scheme that results in fewer components and less interconnect overhead than either Wallace or Dadda multipliers. This reduction scheme is especially useful for pipelined multipliers, because it minimizes the number of latches required in the reduction of the partial products. The reduction scheme can be applied to either unsigned (sign-magnitude) or two's complement numbers. Equations are given for determining the number of components and a method is presented for estimating the interconnect overhead for Wallace, Dadda, and Reduced Area multipliers. Area estimates indicate that for non-pipelined multipliers, the reduction in area achieved with Reduced Area multipliers ranges from 3.7 to 6.6 percent relative to Dadda multipliers, and from 3.8 to 8.4 percent relative to Wallace multipliers. For fully pipelined multipliers, the reduction in area ranges from 15.1 to 33.6 percent relative to Dadda multipliers, and from 2.9 to 9.0 percent relative to Wallace multipliers.  相似文献   
10.
Transport properties of 1,1-difluoroethane (R152a)   总被引:2,自引:0,他引:2  
Based on reliable. carefully selected data sets. equations for the thermal conductivity and the viscosity of the refrigerant R 112a are presented. They are valid at temperatures from 240 to 440 K, pressures up to 20 MPa. and densities up to 1050 kg · m–3. including the critical region.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号