首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2336篇
  免费   143篇
  国内免费   25篇
工业技术   2504篇
  2024年   4篇
  2023年   30篇
  2022年   67篇
  2021年   117篇
  2020年   128篇
  2019年   133篇
  2018年   171篇
  2017年   137篇
  2016年   139篇
  2015年   82篇
  2014年   178篇
  2013年   241篇
  2012年   149篇
  2011年   174篇
  2010年   110篇
  2009年   95篇
  2008年   85篇
  2007年   53篇
  2006年   48篇
  2005年   39篇
  2004年   23篇
  2003年   21篇
  2002年   7篇
  2001年   17篇
  2000年   12篇
  1999年   10篇
  1998年   28篇
  1997年   23篇
  1996年   25篇
  1995年   20篇
  1994年   12篇
  1993年   13篇
  1992年   8篇
  1991年   12篇
  1990年   7篇
  1989年   4篇
  1988年   7篇
  1987年   9篇
  1986年   10篇
  1985年   6篇
  1984年   5篇
  1982年   3篇
  1980年   3篇
  1979年   3篇
  1975年   3篇
  1973年   5篇
  1972年   2篇
  1971年   6篇
  1970年   8篇
  1969年   4篇
排序方式: 共有2504条查询结果,搜索用时 0 毫秒
41.
Time delays are encountered in many physical systems, and they usually threaten the stability and performance of closed-loop systems. The problem of determining all stabilising proportional-integral-derivative (PID) controllers for systems with perturbed delays is less investigated in the literature. In this study, the Rekasius substitution is employed to transform the system parameters to a new space. Then, the singular frequency (SF) method is revised for the Rekasius transformed system. A novel technique is presented to compute the ranges of time delay for which stable PID controller exists. This stability range cannot be readily computed from the previous methods. Finally, it is shown that similar to the original SF method, finite numbers of singular frequencies are sufficient to compute the stable regions in the space of time delay and controller coefficients.  相似文献   
42.
The Cu2Zn1?xCdxSnS4 quinternary alloy nanostructures with different Cd contents were grown using spin coating technique on porous silicon (63.93 %) substrate. The structural properties of Cu2Zn1?xCdxSnS4/PS were investigated by X-ray diffraction and field emission-scanning electron microscope (FE-SEM). The optical properties studied through photoluminescence technique, indicated that the band gap is shifted as Cd content increases from 1.84 eV at x = 0 to 1.76 eV at x = 1. The electrical characterization of the Ag/n-PS/Cu2Zn1?xCdxSnS4/Ag diode through current to voltage (I–V) characterization shows the highest photo-response of (value if any) at Cu2Zn0.4Cd0.6SnS4 composition.  相似文献   
43.
Bone-implant integration is measured in several ways. Traditionally and routinely, 2D histological sections of samples, containing bone and the biomaterial, are stained and analyzed using a light microscope. Such histological section provides detailed cellular information about the bone regeneration in the proximity of the implant. However, this information reflects the integration in only a very small fraction, a 10 μm thick slice, of the sample. In this study, we show that feature values quantified on 2D sections are highly dependent on the orientation and the placement of the section, suggesting that a 3D analysis of the whole sample is of importance for a more complete judgment of the bone structure in the proximity of the implant. We propose features describing the 3D data by extending the features traditionally used for 2D-analysis. We present a method for extracting these features from 3D image data and we measure them on five 3D SRμCT image volumes.We also simulate cuts through the image volume positioned at all possible section positions. These simulations show that the measurement variations due to the orientation of the section around the center line of the implant are about 30%.  相似文献   
44.
In this paper, we aim to provide adaptive multimedia services especially video ones to end-users in an efficient and secure manner. Users moving outside the office should be able to maintain an office-like environment at their current locations. First, the agents within our proposed architecture negotiate the different communication and interaction factors autonomously and dynamically. Moreover, we needed to develop a user agent in addition to service and system agents that could negotiate the requirements and capabilities at run time to furnish best possible service results. Thus we designed and integrated a video indexing and key framing service within our overall agent-based architecture. We integrated this video indexing and content-based analysis service to adapt the video content according to run time conditions. We designed a video XML schema to validate the media content out of this multimedia service according to specific requirements and features, as we will describe later.
Ahmed KarmouchEmail:
  相似文献   
45.
An experimental investigation was conducted to study the in-plane behavior of face shell mortar bedded unreinforced masonry (URM) wall assemblages retrofitted with fiber-reinforced polymer (FRP) laminates. Forty-two URM assemblages were tested under different stress conditions present in masonry shear and infill walls. Tests included prisms loaded in compression with different bed joint orientation (on/off-axis compression), diagonal tension specimens, and specimens loaded under joint shear. The behavior of each specimen type is discussed with emphasis on modes of failure, strength and deformation characteristics. Results showed that the application of FRP laminates on URM has a great influence on strength, postpeak behavior, as well as altering failure modes and maintaining the specimen integrity. The retrofitted specimens reached compressive strength of 1.62–5.64 times that of their unretrofitted counterparts, depending on the bed joint orientation, and joint shear strength increased by eightfold.  相似文献   
46.
Most of the literature on scheduling assumes that machines are always available. However, in real life industry, machines may be subject to some unavailability periods due to maintenance activities such as breakdowns (stochastic case) and preventive maintenance (deterministic case). In this paper we investigate the two-stage hybrid flow shop scheduling problem with only one machine on the first stage and m machines on the second stage to minimize the makespan. We consider that each machine is subject to at most one unavailability period. The start time and the end time of each period are known in advance (deterministic case) and only the non-resumable case is studied. First we discuss the complexity of the problem. Afterwards, we give the Branch and Bound model for this problem. Last, we calculate the worst-case performances of three heuristics: LIST algorithm, LPT algorithm and H-heuristic.  相似文献   
47.
This paper introduces a new mechanism which is designed for the transmission of power between two intersecting shafts. The mechanism consists of one drive shaft and one driven shaft, six guide arms, and three connecting arms. The intersecting angle between the input shaft and the output shaft can be varied up to 135° while the velocity ratio between the two shafts remains constant. The research also includes a kinematic analysis and a simulation using Visual NASTRAN, Autodesk Inventor Dynamic and COSMOS Motion. The softwares showed that this mechanism can transmit constant velocity ratios at all angles between two shafts. By comparing the graphs of analytical analysis and simulation analysis, validity of equations was proved. Finally, by fabrication and evaluation of the mechanism it was shown that this mechanism can transmit constant velocity practically.  相似文献   
48.
在赛车运动开始后不久,工程人员就意识到提高汽车转弯速度的方法之一是使汽车与路面产生更大的摩擦力.在早期进行的获取汽车与路面之间更大摩擦力的众多尝试中,较有趣的一种是采用双后轮行驶.然而,最有代表性的解决办法是采用胎面更宽,即断面宽度更大的轮胎.  相似文献   
49.
Enhanced oil recovery(EOR)processes are applied to recover trapped or residual oil in the reservoir rocks after primary and secondary recovery methods.Changing ...  相似文献   
50.

H.264/Advanced Video Coding (H.264/AVC) is one of the video compression standards that is 50% more efficient than previously introduced standards. Given that the H.264/AVC standard is considered and used in a variety of video applications, it is essential to provide a suitable solution for video encryption with good security, high encryption speed, and to prevent bitrate increases. In this paper, we propose a method selective encryption of H.264/AVC for the digital rights management (DRM) applications. In this method, discrete cosine transform (DCT) coefficients, which affect the texture and content of the H.264/AVC video during compression, are encrypted after the zigzag scanning and based on Context-Adaptive Binary Arithmetic Coding (CABAC). The experimental results and encryption efficiency analysis demonstrate that the proposed method with the format compliance has good security and high encryption speed and it can prevent the bitrate from rising and is thus usable in industrial and the DRM applications.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号