首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   682篇
  免费   23篇
  国内免费   19篇
电工技术   31篇
综合类   47篇
化学工业   47篇
金属工艺   20篇
机械仪表   42篇
建筑科学   47篇
矿业工程   38篇
能源动力   21篇
轻工业   17篇
水利工程   2篇
石油天然气   38篇
武器工业   1篇
无线电   95篇
一般工业技术   60篇
冶金工业   4篇
原子能技术   12篇
自动化技术   202篇
  2024年   2篇
  2023年   6篇
  2022年   9篇
  2021年   19篇
  2020年   17篇
  2019年   11篇
  2018年   14篇
  2017年   17篇
  2016年   25篇
  2015年   31篇
  2014年   39篇
  2013年   35篇
  2012年   28篇
  2011年   43篇
  2010年   32篇
  2009年   33篇
  2008年   48篇
  2007年   49篇
  2006年   28篇
  2005年   27篇
  2004年   21篇
  2003年   23篇
  2002年   16篇
  2001年   18篇
  2000年   19篇
  1999年   18篇
  1998年   20篇
  1997年   20篇
  1996年   9篇
  1995年   8篇
  1994年   5篇
  1993年   5篇
  1992年   3篇
  1991年   7篇
  1990年   2篇
  1989年   3篇
  1988年   5篇
  1986年   3篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
排序方式: 共有724条查询结果,搜索用时 0 毫秒
1.
本文引进一个定义在L~∞(0,1)上格半范数ρp与一个熟知的格半范数ρ0关系,证明了在L~∞(0,1)中的序区间上,ρ0-拓扑与ρp-拓扑等价,从而证明了(L~∞(0,1),ρp)′的闭单位球是(L~∞(0,1),ρp)′的某个子集的弱-闭包,本文还证明了(L~∞(0,1),ρp)′可看作WeakLp(0,1)对偶空间的奇异部一个理想,而且这奇异部可由(L~∞(0,1),ρp)′与一算子族生成.(f)all(l.\n,oo(j.)=hillsill)t ̄.,iff ̄*(t)respectivelyall'l,L(q,1)isthepredlslaloftyreakLI',allllh,rlloll--at(,llli('llleasllrealga(l ̄s,arepresellta'tiolltlleorenlff,relelllelltsillSac,all(lS,,.isof)taille(l.However,ill[2],itisslldwnthattilerepreselltatiolltilesf)relllof)taille(lill[.5]isill(torre(?t.Inthisnote,wede  相似文献   
2.
This paper gives a review of the methodology used to tune the run-in process of a PC manufacturing line. It shows in some detail the analysis carried-out on the test data gathered on the manufacturing line and presents a clear picture of the run-in process in order to choose the best compromise between process efficiency and costs.  相似文献   
3.
Treated was an anti-plane crack perpendicular to the interface of an exponential-type FGM strip bonded to another linear-type FGM substrate with infinite thickness. Through Fourier integral transform, the problem was reduced as a Cauchy singular integral equation, which was further solved numerically by the Lobatto–Chebyshev collocation method. Based on the numerical solution, the effects of the geometrical and physical parameters on the stress intensity factor (SIF) were analyzed and the following conclusions were obtained: (a) A notable discrepancy between the interface-perpendicular crack and the interfacial one is that, to reduce the weak-discontinuity of interface or to make the interface micro-discontinuous will not necessarily decrease the SIF of the former, but will surely decrease that of the latter. (b) When a crack tip is situated very near to the interface (or free surface), its SIF will be high and totally dominated by the interface (or free surface). (c) To increase the stiffness of the FGM on one side of the interface is beneficial to preventing the crack on the other side from growing toward the interface. Besides, some practical suggestions were further given for material design in the field of composites.  相似文献   
4.
弱磁应力检测技术支持非接触在线应力损伤检测,在长输油气管道应力内检测技术领域具有巨大的应用潜力。但弱磁信号微弱,易受外界环境干扰,检测结果易出现偏差。为加强弱磁信号的检测能力,基于铁磁材料的微观特性,建立了外磁场弱磁应力检测模型,获得了弱磁信号强度随外磁场强度与施加应力的变化规律,描述了外磁场对弱磁应力检测信号的激励特性,并进行了系统的实验研究。结果表明,弱磁信号的切向峰值与法向零点均位于应力集中区的中心位置,且不随应力与外磁场的变化而发生波动;弱磁信号切向峰值与法向峰峰值随外磁场与应力的增加而增大;外磁场对弱磁应力检测信号的激励作用随外磁场的增加先增大后减小。  相似文献   
5.
Users are inclined to share sensitive data in a remote server if no strong security mechanism is in place. Searchable encryption satisfies the need of users to execute a search encrypted data. Previous searchable encryption methods such as “public key encryption with keyword search (PEKS)” restricted the data access to certain users, because only the assigned users were able to search the encrypted data. In this paper we will discuss the relation between Attribute Based Encryption (ABE) and searchable encryption and define a weak anonymity of the ABE scheme, named “attribute privacy”. With this weak anonymity, we propose a general transformation from ABE to Attribute Based Encryption with Keyword Search (ABEKS) and a concrete attribute private key-policy ABE (KP-ABE) scheme. We present an ABEKS scheme based on this KP-ABE scheme and permit multi-users to execute a flexible search on the remote encrypted data.  相似文献   
6.
熊胤  张军  黄清明 《贵州化工》2006,31(5):61-62
介绍赤天化纸业公司涵洞工程软弱地基的处理,针对软弱地基的不同构成需采取不同的处理方法,结合工程实践,对特殊环境下采用松木桩处理软弱地基的问题作了一些探讨。  相似文献   
7.
采用流变、常规量筒法、扫描电镜及显微镜,研究了优选出的3种弱凝胶与SD发泡剂的复配体系的起泡性能、黏度、稳定性以及微观结构。结果表明,起泡剂与弱凝胶复配之后,体系的各项性能得到明显改善。复配体系半衰期增大,泡沫黏度增大,稳定性增强,明显优于单一体系。在弱凝胶与泡沫复合调驱体系中,凝胶易在气泡表面形成吸附膜,将泡沫包裹在内部,增强了气液界面的黏度,使得泡沫不容易发生聚并破裂,从而增强了泡沫的稳定性以及黏度,使得其半衰期也增大。  相似文献   
8.
The tele‐cocooning hypothesis posits that mobile communication increases interaction with communication rich ties, while simultaneously weakening interaction with communication weak ties. In this study, we demonstrate how smartphones can be used to mitigate tele‐cocooning behavior by stimulating interaction with communication weak ties. Using a smartphone application to collect non‐identifying mobile communication log data, we conducted a field experiment with 193 Japanese participants. The treatment consisted of onscreen reminders designed to stimulate interaction with communication weak ties. The results indicate that the treatment promoted the activation of communication weak ties and the acquisition of information through those ties, suggesting that smartphones can be utilized to promote access to social capital.  相似文献   
9.
本文先简要阐述无线网络的定义、安全隐患及一般安全技术。为了确保无线网络的安全,详细介绍了无线网络的802.11系列安全机制,并介绍了增强的安全机制802.1X。在对数据传输的研究中,对WEP加密解密算法进行深入研究,并在对RC4算法的分析中,发现弱密钥的安全隐患,同时提出了改进策略。  相似文献   
10.
Recently, Aceto, Fokkink and Ingólfsdóttir proposed an algorithm to turn any sound and ground-complete axiomatisation of any preorder listed in the linear time-branching time spectrum at least as coarse as the ready simulation preorder, into a sound and ground-complete axiomatisation of the corresponding equivalence—its kernel. Moreover, if the former axiomatisation is ω-complete, so is the latter. Subsequently, de Frutos Escrig, Gregorio Rodríguez and Palomino generalised this result, so that the algorithm is applicable to any preorder at least as coarse as the ready simulation preorder, provided it is initials preserving. The current paper shows that the same algorithm applies equally well to weak semantics: the proviso of initials preserving can be replaced by other conditions, such as weak initials preserving and satisfying the second τ-law. This makes it applicable to all 87 preorders surveyed in “the linear time-branching time spectrum II” that are at least as coarse as the ready simulation preorder. We also extend the scope of the algorithm to infinite processes, by adding recursion constants. As an application of both extensions, we provide a ground-complete axiomatisation of the CSP failures equivalence for BCCS processes with divergence.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号