首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   439篇
  免费   19篇
  国内免费   5篇
电工技术   12篇
化学工业   109篇
金属工艺   16篇
机械仪表   19篇
建筑科学   8篇
能源动力   22篇
轻工业   32篇
水利工程   2篇
石油天然气   2篇
无线电   56篇
一般工业技术   60篇
冶金工业   53篇
原子能技术   5篇
自动化技术   67篇
  2024年   5篇
  2023年   5篇
  2022年   29篇
  2021年   21篇
  2020年   19篇
  2019年   16篇
  2018年   23篇
  2017年   33篇
  2016年   21篇
  2015年   20篇
  2014年   20篇
  2013年   38篇
  2012年   31篇
  2011年   25篇
  2010年   14篇
  2009年   16篇
  2008年   17篇
  2007年   18篇
  2006年   3篇
  2005年   6篇
  2004年   7篇
  2003年   3篇
  2002年   8篇
  2001年   3篇
  2000年   2篇
  1999年   5篇
  1998年   6篇
  1997年   5篇
  1996年   3篇
  1995年   2篇
  1993年   1篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1984年   3篇
  1983年   3篇
  1982年   7篇
  1981年   6篇
  1980年   1篇
  1979年   1篇
  1976年   2篇
  1972年   1篇
  1971年   1篇
  1968年   1篇
  1966年   2篇
  1965年   1篇
排序方式: 共有463条查询结果,搜索用时 3 毫秒
1.
2.5-kV thyristor devices have been fabricated with integrated MOS controlled n+-emitter shorts and a bipolar turn-on gate using a p-channel DMOS technology. Square-cell geometries with pitch variations ranging from 15 to 30 μm were implemented in one- and two-dimensional arrays with up to 20000 units. The impact of the cell pitch on the turn-off performance and the on-state voltage was studied for arrays with constant cathode area as well as for single-cell structures. By realizing MOS components with submicrometer channel lengths, scaled single cells are shown to turn off with current densities of several kiloamperes per square centimeter at a gate bias of 5 V. In the case of multi-cell ensembles, turn-off performance is limited due to inhomogeneous current distribution. Critical process parameters as well as the device behavior were optimized through multidimensional numerical simulation  相似文献   
2.
Many problems in geophysics, acoustics, elasticity theory, cancer treatment, food process control and electrodynamics involve study of wave field synthesis (WFS) in some form or another. In the present work, modelling of wave propagation phenomena is studied as a static problem, using finite element method and treating time as an additional spatial dimension. In particular, WFS problems are analysed using discrete methods. It is shown that a fully finite element-based scheme is very natural and effective method for the solution of such problems. Distributed WFS in the context of two-dimensional problems is outlined and incorporation of any geometric or material non-linearities is shown to be straightforward. This has significant implications for problems in geophysics or biological media, where material inhomogeneities are quite prevalent. Numerical results are presented for several problems referring to media with material inhomogeneities and predefined absorption profiles. The method can be extended to three-dimensional problems involving anisotropic media properties in a relatively straightforward manner. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
3.
The fracture strength of HF-etched samples was measured as a function of field-assisted K-Na ion exchange depth, as well as the severity of abrasion. As expected, the more severe the abrasion, the greater the depth required to make the strength insensitive to abrasion. An abrasion-independent weakening mechanism that increased with exchange depth was also found to be operative.  相似文献   
4.
Spherical electrode carbon particles prepared from carbon rods of dry cell batteries have been used to study the attrition behaviour in a bubbling fluidized bed combustor. Experiments have been conducted in a 40 mm I.D. and 1 m high fluidized bed combustor operated at 1 m/s superficial velocity. The bed was operated with nitrogen and with two different oxygen concentrations at 850°C to study the effect of combustion on attrition of these particles. The experimental technique used allowed the time resolution of attrited fines generation, providing detailed curves of attrition rates as a function of time. Attrition rate constants have been evaluated. Results show an enhancement of attrition due to combustion even for spherical, homogeneous and smooth particles.  相似文献   
5.
Discriminative models are used to analyze the differences between two classes and to identify class-specific patterns. Most of the existing discriminative models depend on using the entire feature space to compute the discriminative patterns for each class. Co-clustering has been proposed to capture the patterns that are correlated in a subset of features, but it cannot handle discriminative patterns in labeled datasets. In certain biological applications such as gene expression analysis, it is critical to consider the discriminative patterns that are correlated only in a subset of the feature space. The objective of this paper is twofold: first, it presents an algorithm to efficiently find arbitrarily positioned co-clusters from complex data. Second, it extends this co-clustering algorithm to discover discriminative co-clusters by incorporating the class information into the co-cluster search process. In addition, we also characterize the discriminative co-clusters and propose three novel measures that can be used to evaluate the performance of any discriminative subspace pattern-mining algorithm. We evaluated the proposed algorithms on several synthetic and real gene expression datasets, and our experimental results showed that the proposed algorithms outperformed several existing algorithms available in the literature.  相似文献   
6.
A study was done of jute composite using a polymer matrix of epoxidized Novolac resin (ENR), diglycidyl ether of bisphenol A (DGEBA)–based epoxy, and their blends with different weight percentages of the resins. It was found that on blending ENR with DGEBA, the storage modulii at room temperature are enhanced by about 100% or more in the case of 30 and 40% ENR‐containing matrices, whereas the enhancement in the case of 20 and 12% ENR‐containing matrices is only 50% that of the pure matrix. It was also observed that the tan δ peak heights of the composites containing 30 and 40% ENR are closer to that of 20% ENR‐containing composite. The probable explanation drawn on the basis of experimental findings of DMA and mechanical analysis is that by blending ENR with DGEBA epoxy it is possible to manufacture jute composites with increased stiffness without sacrificing their ductility. © 2002 Wiley Periodicals, Inc. J Appl Polym Sci 85: 2800–2807, 2002  相似文献   
7.
A commercially available, densely sintered alpha silicon carbide was tested in air from room temperature to 1700°C using a modified instrumented pendulum unit and standard Charpy size test specimens. The resistance heated silicon carbide specimens exhibited only elastic behavior, even at 1700°C. A compliance analysis of the test revealed a linear elastic decrease of the absorbed impact energy and also a decrease of the fracture stress of the silicon carbide with increasing temperature.  相似文献   
8.
The combustion of single bituminous char particles (4-12 mm diameter) was studied in a turbulent fluidized bed operated at 1098 K using air as the fluidising medium. Results indicated that particles burn with constant density following a shrinking sphere model. Burning rates are much higher than those observed in a bubbling fluidized bed. The rate of transfer of oxygen to the particle surface is also higher than that observed in bubbling beds. A model is proposed to calculate the Sherwood numbers of the burning carbon particles. Experimental values of the Sherwood numbers agree well with those predicted from the model.  相似文献   
9.
10.
From information security point of view, an enterprise is considered as a collection of assets and their interrelationships. These interrelationships may be built into the enterprise information infrastructure, as in the case of connection of hardware elements in network architecture, or in the installation of software or in the information assets. As a result, access to one element may enable access to another if they are connected. An enterprise may specify conditions on the access of certain assets in certain mode (read, write etc.) as policies. The interconnection of assets, along with specified policies, may lead to managerial vulnerabilities in the enterprise information system. These vulnerabilities, if exploited by threats, may cause disruption to the normal functioning of information systems. This paper presents a formal methodology for detection of managerial vulnerabilities of, and threats to, enterprise information systems in linear time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号