首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1175篇
  免费   77篇
  国内免费   10篇
电工技术   15篇
综合类   5篇
化学工业   235篇
金属工艺   19篇
机械仪表   34篇
建筑科学   27篇
矿业工程   1篇
能源动力   95篇
轻工业   85篇
水利工程   7篇
石油天然气   10篇
无线电   152篇
一般工业技术   249篇
冶金工业   78篇
原子能技术   17篇
自动化技术   233篇
  2023年   20篇
  2022年   43篇
  2021年   83篇
  2020年   53篇
  2019年   66篇
  2018年   56篇
  2017年   63篇
  2016年   75篇
  2015年   51篇
  2014年   63篇
  2013年   97篇
  2012年   66篇
  2011年   75篇
  2010年   52篇
  2009年   45篇
  2008年   22篇
  2007年   36篇
  2006年   26篇
  2005年   23篇
  2004年   11篇
  2003年   18篇
  2002年   10篇
  2001年   6篇
  2000年   8篇
  1999年   10篇
  1998年   27篇
  1997年   12篇
  1996年   16篇
  1995年   20篇
  1994年   17篇
  1993年   14篇
  1992年   9篇
  1991年   9篇
  1990年   7篇
  1989年   11篇
  1988年   5篇
  1987年   2篇
  1986年   3篇
  1985年   3篇
  1983年   2篇
  1982年   5篇
  1981年   3篇
  1980年   5篇
  1979年   2篇
  1977年   3篇
  1976年   3篇
  1975年   1篇
  1974年   1篇
  1971年   1篇
  1970年   1篇
排序方式: 共有1262条查询结果,搜索用时 696 毫秒
1.
2.
Multimedia Tools and Applications - The world is facing many problems including that of traffic congestion. To highlight the issue of traffic congestion worldwide specially in urban areas and to...  相似文献   
3.
4.
Algebraic properties of cryptosystem PGM   总被引:2,自引:0,他引:2  
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ G is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest security conditions that can be offered by a private-key encryption system. S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center for Communication and Information Science of the University of Nebraska.  相似文献   
5.
Laparoscopic surgery has gained much interest since its advent the late eighties. A 36-year-old patient underwent laparoscopic appendicectomy via the transumbilical route. She was rehospitalized three times thereafter for subumblical pain. At day +48, an abscess was evacuated at the point of the umbilical trocar insertion. This hour-glass shaped abscess had a preperitoneal and subcutaneous localization, blocked by the epiploic reaction. The infection this patient developed is an unusual clinical finding as pain was localized at a distance. The umbilical site and the preperitoneal subcutaneous nature of the abscess are also unusual. This case emphasizes the gravity of post-operative abscess of the abdominal wall and the necessity for adequate prophylaxy.  相似文献   
6.
We have previously shown that the tumor suppressor gene for hepatocellular carcinoma (HCC) without cirrhosis may be located on chromosome 5q35-qter. In this study, we analyzed nine cases of primary HCC without cirrhosis using probes from the MCC and APC genes, which are in the region 5q21-22. None of the informative cases had allele loss detected by these probes, whereas the probe lambda MS8 for the region 5q35-qter showed allele loss in six out of six informative cases. The results confirm that the putative tumor suppressor gene for HCC without cirrhosis on chromosome 5q is distinct from the MCC and APC genes.  相似文献   
7.
For environmental considerations, the substitution of the conventionally used oil-based grinding fluids has nowadays become strongly recommended. Although several alternatives have been proposed, cryogenic cooling by liquid nitrogen is the non-polluting coolant that has been given relatively more attention because of its very low temperature. In this investigation, in order to contribute to developing this promising cooling mode, its beneficial effects on the ground surface integrity of the AISI 304 stainless steel and their consequences on the fatigue lifetime are explored. Results of this investigation show that grinding under cryogenic cooling mode generates surfaces with lower roughness, less defects, higher work hardening and less tensile residual stresses than those obtained on surfaces ground under oil-based grinding fluid. These surface enhancements result into substantial improvements in the fatigue behaviour of components ground under this cooling mode. An increasing rate of almost 15% of the endurance limit at 2 × 106 cycles could be realized. SEM analyses of the fatigue fracture surfaces have shown that the fatigue cracks observed on the specimens ground under cryogenic cooling are shorter (i.e., 30-50 μm) than those generated under oil-based cooling mode (i.e., 150-200 μm). The realized improvements in the surface integrity and in the fatigue behaviour are thought to be related to the reduction of the grinding zone temperature observed under cryogenic cooling, as no significant differences between the grinding force components for both cooling modes have been observed.  相似文献   
8.
Erosion is one of the most serious problems in various gas and liquid flow passages such as flow in pipes, pumps, turbines, compressors and many other devices. Sand presence causes loss of pipe wall thickness that can lead to pipe erosion, frequent failures and loss of expensive production time. The importance of this problem is mainly due to many related engineering applications, viz. heat exchangers. In order to reduce the frequency of such pipe erosions, caps in the form of replaceable pipes are protruded in the sudden contraction regions which are exposed to most of the serious erosion rates. In the present work, numerical investigation of the erosion of a pipe protruded in a sudden contraction is presented. The turbulent, steady, 2-D axi-symmetric flow inside an axi-symmetric abrupt contraction pipe with a pipe protrusion embedded in it was solved by steady-state time averaged conservation equations of mass and momentum along with two equation model for turbulence. Particles are tracked using Lagrangian particle tracking. An erosion model was employed to investigate the erosion phenomena for the given geometry. The influence of the different parameters such as the inlet flow velocity (3–10 m/s), the particle diameter (10–400 μm), the protruded pipe geometry (thickness T=1–5 mm and depth H=2–5 mm) and the pipe contraction ratio (Cr=0.25–0.5) on the erosion of pipe protrusion was investigated. Correlations for the influence of inlet flow velocity, depth and thickness of the protruded pipe on the erosion rate are presented.  相似文献   
9.
The wood carbonization in Tunisia consists essentially of traditional activity using charcoaling stacks and pits characterized by high atmospheric pollution and poor energy conversion. Indeed, 70% of the initial mass of anhydrous wood are found in the vapor as aerosols, polluting and toxic gases and complex condensable organic compounds that can cause a substantial pollution of air, ground and water. Several processes of treatment and energy valorization of such effluents were proposed, but the incineration remains at present the most promising technique of depollution. The results show that the incineration, at about 1000°C, of wood carbonization smokes allows the destruction of 99% of the mass of pollutants except CO2 and the reduction of polluting gas emission. The possible valorization of the smoke’s energy in the exit of the incinerator enhances the thermal efficiency of the process.  相似文献   
10.
Neural Computing and Applications - Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号