首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   602篇
  免费   14篇
电工技术   4篇
综合类   1篇
化学工业   103篇
金属工艺   3篇
机械仪表   7篇
建筑科学   32篇
矿业工程   2篇
能源动力   4篇
轻工业   150篇
水利工程   3篇
无线电   30篇
一般工业技术   100篇
冶金工业   118篇
原子能技术   2篇
自动化技术   57篇
  2023年   7篇
  2022年   13篇
  2021年   17篇
  2020年   10篇
  2019年   6篇
  2018年   8篇
  2017年   4篇
  2016年   7篇
  2015年   6篇
  2014年   20篇
  2013年   44篇
  2012年   28篇
  2011年   35篇
  2010年   18篇
  2009年   21篇
  2008年   65篇
  2007年   62篇
  2006年   41篇
  2005年   14篇
  2004年   14篇
  2003年   10篇
  2002年   9篇
  2001年   14篇
  2000年   9篇
  1999年   11篇
  1998年   15篇
  1997年   6篇
  1996年   6篇
  1995年   3篇
  1994年   4篇
  1993年   4篇
  1992年   8篇
  1991年   5篇
  1990年   4篇
  1989年   7篇
  1988年   5篇
  1987年   5篇
  1986年   8篇
  1985年   7篇
  1984年   5篇
  1983年   3篇
  1982年   4篇
  1981年   4篇
  1979年   3篇
  1978年   3篇
  1977年   2篇
  1976年   6篇
  1969年   1篇
  1965年   1篇
  1962年   1篇
排序方式: 共有616条查询结果,搜索用时 655 毫秒
1.
Users may now be more proficient in developing their own applications, but they aren't equally knowledgeable about the importance of using and following computer standards. Creating these standards is still the job of IS staff members, who should keep in mind that users are willing to use standards if they meet the particular needs of the various user departments.  相似文献   
2.
We propose an exact algorithm for counting the models of propositional formulas in conjunctive normal form. Our algorithm is based on the detection of strong backdoor sets of bounded size; each instantiation of the variables of a strong backdoor set puts the given formula into a class of formulas for which models can be counted in polynomial time. For the backdoor set detection we utilize an efficient vertex cover algorithm applied to a certain “obstruction graph” that we associate with the given formula. This approach gives rise to a new hardness index for formulas, the clustering-width. Our algorithm runs in uniform polynomial time on formulas with bounded clustering-width. It is known that the number of models of formulas with bounded clique-width, bounded treewidth, or bounded branchwidth can be computed in polynomial time; these graph parameters are applied to formulas via certain (hyper)graphs associated with formulas. We show that clustering-width and the other parameters mentioned are incomparable: there are formulas with bounded clustering-width and arbitrarily large clique-width, treewidth, and branchwidth. Conversely, there are formulas with arbitrarily large clustering-width and bounded clique-width, treewidth, and branchwidth.  相似文献   
3.
A 65-year-old man, who suffered from recurrent syncopal attacks after a minor stroke, was treated by percutaneous transluminal angioplasty using the kissing balloon technique (KBT) in which two angioplasty balloons were inflated simultaneously for the right carotid bifurcation stenoses. Because they involved the right internal carotid artery and the right external carotid artery coupled with the right proatlantal intersegmental artery, neither of them should close after the angioplasty. Bifurcation stenoses were sufficiently dilated with KBT and no syncopal attacks have recurred since the treatment.  相似文献   
4.
Abstract

In addition to software training, users need to learn systems analysis concepts and development techniques that will enable them to develop better and more reliable end-user applications. IS managers should realize that this type of IS-sponsored training not only improves the users’ productivity but the IS staffs as well.  相似文献   
5.
We provide a cooperative control algorithm to stabilize symmetric formations to motion around closed curves suitable for mobile sensor networks. This work extends previous results for stabilization of symmetric circular formations. We study a planar particle model with decentralized steering control subject to limited communication. Because of their unique spectral properties, the Laplacian matrices of circulant graphs play a key role. We illustrate the result for a skewed superellipse, which is a type of curve that includes circles, ellipses, and rounded parallelograms.  相似文献   
6.
Cognitive deficits and behavioral changes that result from chronic alcohol abuse are a consequence of neuropathological changes that alter signal transmission through the neural network. To focus on the changes that occur at the point of connection between the neural network cells, synaptosomal preparations from post‐mortem human brain of six chronic alcoholics and six non‐alcoholic controls were compared using 2‐D differential in‐gel electrophoresis (DIGE). Functionally affected and spared regions (superior frontal gyrus, SFG, and occipital cortex, OC, respectively) were analyzed from both groups to further investigate the specific pathological response that alcoholism has on the brain. Forty‐nine proteins were differentially regulated between the SFG of alcoholics and the SFG of controls and 94 proteins were regulated in the OC with an overlap of 23 proteins. Additionally, the SFG was compared to the OC within each group (alcoholics or controls) to identify region‐specific differences. A selection was identified by MALDI‐TOF mass spectrometry revealing proteins involved in vesicle transport, metabolism, folding and trafficking, and signal transduction, all of which have the potential to influence synaptic activity. A number of proteins identified in this study have been previously related to alcoholism; however, the focus on synaptic proteins has also uncovered novel alcoholism‐affected proteins. Further exploration of these proteins will illuminate the mechanisms altering synaptic plasticity, and thus neuronal signaling and response, in the alcoholic brain.  相似文献   
7.
Pradeep  Naomi Ehrich   《Automatica》2008,44(5):1240-1250
This paper presents Lyapunov functions for proving the stability of steady gliding motions for vehicles with hydrodynamic or aerodynamic forces and moments. Because of lifting forces and moments, system energy cannot be used as a Lyapunov function candidate. A Lyapunov function is constructed using a conservation law discovered by Lanchester in his classical work on phugoid-mode dynamics of an airplane. The phugoid-mode dynamics, which are cast here as Hamiltonian dynamics, correspond to the slow dynamics in a multi-time-scale model of a hydro/aerodynamically-forced vehicle in the longitudinal plane. Singular perturbation theory is used in the proof of stability of gliding motions. As an intermediate step, the simplifying assumptions of Lanchester are made rigorous. It is further shown how to design stabilizing control laws for gliding motions using the derived function as a control Lyapunov function and how to compute the corresponding regions of attraction.  相似文献   
8.
The McAuley Creek Landslide is a 6?million m3 gneissic rock slope failure that occurred in British Columbia (Canada) in late May–early June 2002. The geological strength index was used to characterize the quality of the overall rock mass and its reduced (damaged) quality near tectonic structures and alteration zones. Potential slope failure mechanisms were investigated using four analysis techniques including: kinematic analysis, surface wedge limit equilibrium (combination) analysis, block theory and three-dimensional distinct element models. Results from all four analyses suggested that the dominant slope failure mechanism was wedge sliding along the intersection of the gneissic foliation and a steeply dipping discontinuity set striking perpendicular to the slope. Of the 6?million m3 of material involved in the landslide, an estimated 5 million?m3 was deposited immediately below the source area against the opposite valley wall, with the remaining 1 million m3 travelling an additional 1.6?km downstream. The runout behaviour was investigated using a three-dimensional dynamic analysis code.  相似文献   
9.
In civil and mining operations that involve ground excavation and support, the loads are distributed between the ground and support depending on their relative stiffness. This paper presents the development of conceptual single-degree-of-freedom models, which are used to derive equations for estimating displacements and stresses for ground-support interaction problems encountered in pillars in room-andpillar mining(natural support system), and liners for circular vertical shafts(artificial support systems).For pillar assessment, mine-pillar interaction curves can be constructed using a double spring analogy.Additionally, the effectiveness of different support systems can be evaluated depending on their effect upon the mine-pillar system. For shaft design, an initial estimation of the required lining strength and thickness can be readily made based on a double ring analogue. For both problems, the results from the proposed approach compare well with those obtained by finite element numerical simulations.  相似文献   
10.
While the concept of policy integration is not a new idea within spatial planning discourse, it is becoming increasingly prevalent. Frequently, however, the term is used without any clear definition of what it means, or how it might be achieved. The aim of this paper is to provide more clarity about the concept and to identify the types of actions in the field of planning where integration with policy can be improved. In so doing, the paper assembles a range of material from different disciplines, and identifies some of the key inhibitors and facilitators of policy integration.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号