首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   734篇
  免费   55篇
  国内免费   6篇
电工技术   13篇
综合类   7篇
化学工业   188篇
金属工艺   39篇
机械仪表   38篇
建筑科学   28篇
矿业工程   1篇
能源动力   57篇
轻工业   103篇
水利工程   4篇
石油天然气   4篇
无线电   47篇
一般工业技术   129篇
冶金工业   19篇
原子能技术   12篇
自动化技术   106篇
  2024年   1篇
  2023年   14篇
  2022年   25篇
  2021年   61篇
  2020年   51篇
  2019年   47篇
  2018年   63篇
  2017年   56篇
  2016年   52篇
  2015年   36篇
  2014年   53篇
  2013年   91篇
  2012年   39篇
  2011年   36篇
  2010年   28篇
  2009年   31篇
  2008年   21篇
  2007年   21篇
  2006年   9篇
  2005年   5篇
  2004年   6篇
  2003年   2篇
  2002年   10篇
  2001年   6篇
  2000年   1篇
  1999年   3篇
  1998年   4篇
  1997年   5篇
  1996年   1篇
  1995年   3篇
  1993年   3篇
  1992年   5篇
  1991年   2篇
  1985年   2篇
  1981年   1篇
  1976年   1篇
排序方式: 共有795条查询结果,搜索用时 0 毫秒
1.
2.
3.
A special boundary integral method developed for two-dimensional regions containing circular holes is used to calculate temperature and heat transfer on the boundaries of several selected regions. The geometrical configuration of the region is arbitrary and convective boundary conditions are assumed. An important feature of the method is analytic representation of temperature and its normal derivative on the interior circular holes in the form of a harmonic series. This makes the application of the boundary integral method convenient and free from conditioning problems associated with small interior boundaries. Heat transfer from circular isothermal interior holes are calculated for several illustrative examples using three terms of the harmonic series representation for heat transfer at each of the circular boundaries. The results are presented and discussed.  相似文献   
4.
Finite-time stability in dynamical systems theory involves systems whose trajectories converge to an equilibrium state in finite time. In this paper, we use the notion of finite-time stability to apply it to the problem of coordinated motion in multiagent systems. Specifically, we consider a group of agents described by fully actuated Euler–Lagrange dynamics along with a leader agent with an objective to reach and maintain a desired formation characterized by steady-state distances between the neighboring agents in finite time. We use graph theoretic notions to characterize communication topology in the network determined by the information flow directions and captured by the graph Laplacian matrix. Furthermore, using sliding mode control approach, we design decentralized control inputs for individual agents that use only data from the neighboring agents which directly communicate their state information to the current agent in order to drive the current agent to the desired steady state. Sliding mode control is known to drive the system states to the sliding surface in finite time. The key feature of our approach is in the design of non-smooth sliding surfaces such that, while on the sliding surface, the error states converge to the origin in finite time, thus ensuring finite-time coordination among the agents in the network. In addition, we discuss the case of switching communication topologies in multiagent systems. Finally, we show the efficacy of our theoretical results using an example of a multiagent system involving planar double integrator agents.  相似文献   
5.
In this paper, we present a family of optimal, in the sense of Kung–Traub’s conjecture, iterative methods for solving nonlinear equations with eighth-order convergence. Our methods are based on Chun’s fourth-order method. We use the Ostrowski’s efficiency index and several numerical tests in order to compare the new methods with other known eighth-order ones. We also extend this comparison to the dynamical study of the different methods.  相似文献   
6.
In this paper, we propose an album-oriented face-recognition model that exploits the album structure for face recognition in online social networks. Albums, usually associated with pictures of a small group of people at a certain event or occasion, provide vital information that can be used to effectively reduce the possible list of candidate labels. We show how this intuition can be formalized into a model that expresses a prior on how albums tend to have many pictures of a small number of people. We also show how it can be extended to include other information available in a social network. Using two real-world datasets independently drawn from Facebook, we show that this model is broadly applicable and can significantly improve recognition rates.  相似文献   
7.
Hydrophilic coatings based on 3‐glicidoxy propyl trimethoxy silane (GPTMS) and polyethylene glycol (PEG) were prepared with the incorporation of tetramethoxysilane (TMOS) and silica nanoparticle colloidal suspension by a sol–gel process. Characterization of the coatings has been performed by Fourier Transform Infrared (FTIR) and Attenuated Total Reflectance Infrared (ATR‐IR) techniques. Morphological properties were characterized by Scanning Electron Microscopy (SEM). The distribution of Si atoms in the hybrid system was obtained by Si mapping. The particle size in sol solution of the coating was measured by light scattering analyzer. Optical properties were characterized by using UV–vis spectrophotometer. The hydrophilicity of the coating was determined by contact angle measurements, and also the results have been confirmed by surface energy and water uptake investigations. The obtained results indicate that the surfactants affected the contact angles remarkably but did not change the transparency. It has been found that applying silica nano particles leads to coatings with different properties than those using TMOS, while siloxane contents were the same in these two set of coatings. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 102: 5322–5329, 2006  相似文献   
8.
He’s homotopy perturbation method is applied to obtain exact analytical solutions for the motion of a spherical particle in a plane couette flow. It is demonstrated that the applied analytical method is very straightforward in comparison with existing techniques. Furthermore, it is decidedly effectual in terms of accuracy and rapid convergence. The formulation of the problem is presented in the text as well as the analytical and numerical procedures. The current results can be used in different areas of particulate flows.  相似文献   
9.

In the present study, Multi-objective optimization of composite cylindrical shell under external hydrostatic pressure was investigated. Parameters of mass, cost and buckling pressure as fitness functions and failure criteria as optimization criterion were considered. The objective function of buckling has been used by performing the analytical energy equations and Tsai-Wu and Hashin failure criteria have been considered. Multi-objective optimization was performed by improving the evolutionary algorithm of NSGA-II. Also the kind of material, quantity of layers and fiber orientations have been considered as design variables. After optimizing, Pareto front and corresponding points to Pareto front are presented. Trade of points which have optimized mass and cost were selected by determining the specified pressure as design criteria. Finally, an optimized model of composite cylindrical shell with the optimum pattern of fiber orientations having appropriate cost and mass is presented which can tolerate the maximum external hydrostatic pressure.

  相似文献   
10.
This paper addresses the issue of data governance in a cloud-based storage system. To achieve fine-grained access control over the outsourced data, we propose Self-Healing Attribute-based Privacy Aware Data Sharing in Cloud (SAPDS). The proposed system delegates the key distribution and management process to a cloud server without seeping out any confidential information. It facilitates data owner to restrain access of the user with whom data has been shared. User revocation is achieved by merely changing one attribute associated with the decryption policy, instead of modifying the entire access control policy. It enables authorized users to update their decryption keys followed by each user revocation, making it self-healing, without ever interacting with the data owner. Computation analysis of the proposed system shows that data owner can revoke n′ users with the complexity of O(n′). Besides this, legitimate users can update their decryption keys with the complexity of O(1).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号