首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5498篇
  免费   453篇
  国内免费   111篇
工业技术   6062篇
  2024年   10篇
  2023年   89篇
  2022年   142篇
  2021年   212篇
  2020年   174篇
  2019年   170篇
  2018年   213篇
  2017年   198篇
  2016年   235篇
  2015年   214篇
  2014年   233篇
  2013年   430篇
  2012年   330篇
  2011年   419篇
  2010年   341篇
  2009年   340篇
  2008年   281篇
  2007年   238篇
  2006年   236篇
  2005年   187篇
  2004年   128篇
  2003年   146篇
  2002年   193篇
  2001年   140篇
  2000年   107篇
  1999年   60篇
  1998年   88篇
  1997年   65篇
  1996年   55篇
  1995年   60篇
  1994年   51篇
  1993年   37篇
  1992年   22篇
  1991年   8篇
  1990年   16篇
  1989年   9篇
  1988年   14篇
  1987年   14篇
  1986年   12篇
  1985年   9篇
  1984年   22篇
  1983年   10篇
  1982年   13篇
  1981年   11篇
  1980年   6篇
  1979年   9篇
  1978年   10篇
  1977年   9篇
  1976年   13篇
  1975年   7篇
排序方式: 共有6062条查询结果,搜索用时 842 毫秒
41.
贲林 《吉林水利》2007,(9):38-41
本文结合工程实例,就大断面调压井开挖施工方法、施工参数及施工措施进行了阐述,对以后类似工程的施工提供了参考。  相似文献   
42.
Node cooperation in hybrid ad hoc networks   总被引:2,自引:0,他引:2  
A hybrid ad hoc network is a structure-based network that is extended using multihop communications. Indeed, in this kind of network, the existence of a communication link between the mobile station and the base station is not required: A mobile station that has no direct connection with a base station can use other mobile stations as relays. Compared with conventional (single-hop) structure-based networks, this new generation can lead to a better use of the available spectrum and to a reduction of infrastructure costs. However, these benefits would vanish if the mobile nodes did not properly cooperate and forward packets for other nodes. In this paper, we propose a charging and rewarding scheme to encourage the most fundamental operation, namely packet forwarding. We use "MAC layering" to reduce the space overhead in the packets and a stream cipher encryption mechanism to provide "implicit. authentication" of the nodes involved in the communication. We analyze the robustness of our protocols against rational and malicious attacks. We show that-using our solution-collaboration is rational for selfish nodes. We also show that our protocols thwart rational attacks and detect malicious attacks.  相似文献   
43.
本工作用2米401有机担体填充柱,在带四臂热导检测器的国产103型气相色谱仪上,仅8分钟将原料异丁醛、产物丙酮及水进行良好分离,并采用内标法定量,其最大平均偏差在±2%以内。方法简单、快速、准确  相似文献   
44.
Creep fracture by slow crack growth is studied in a medium density polyethylene at 60 °C and 80 °C. Whereas elastic-plastic fracture mechanics load parameters fail to provide a unique temperature-independent correlation, that of the fracture mechanics for creeping solids C is proved to be relevant since this parameter correlates very well with the time to failure. Correlation established on both full notched creep tensile and double edge notched tensile tests was validated on cracked gas-pipe samples tested under hydrostatic pressure, extending the use of time to failure versus C diagram to predict lifetime of engineering components.  相似文献   
45.
Natural convection in air-filled 2D square enclosure heated with a constant source from below and cooled from above is studied numerically for a variety of thermal boundary conditions at the top and sidewalls. Simulations are performed for two kinds of lengths of the heated source, i.e., a small and a large source corresponding to 20% and 80% of the total length of the bottom wall, respectively. The Rayleigh number varied from 103 to 107. Results are presented in the form of streamline and isotherm plots as well as the variation of the Nusselt number and maximum temperature at the heat source surface. Comparisons among the different thermal configurations considered are reported.  相似文献   
46.
Lung surfactant replacement has been tested clinically in recent years. In this study the outcome of 31 premature infants with moderate to severe neonatal respiratory distress syndrome (RDS) treated with surfactant was compared to that of 74 prematures with RDS treated conventionally by positive pressure ventilation and supportive care. The groups were well matched for gestational age, birthweight, sex, and Apgar scores at 1 and 5 min. Surfactant treatment resulted in a significant decrease in mortality--from 36.6% in the untreated group to 12.9% in the surfactant-treated group (P < 0.04). This improvement in survival was seen also in prematures with a birthweight < 1,000 g; in the untreated group mortality was 57.6% compared to 23.5% in the treated group (P < 0.05). The incidence of pneumothorax was lower in the treated group--42% vs. 13% (P < 0.01). Surfactant treatment resulted in a trend of more survivors without bronchopulmonary dysplasia or intraventricular hemorrhage, even though surfactant therapy did not change the incidence of either.  相似文献   
47.
云南绿水河二级电站高水头混流式水轮发电机组,由于受到当时的技术水平限制,自1969年设备投运后问题较多,电站进行了多次技术改造,但机组仍然存在机组效率低下、汽蚀和泥沙磨损问题,同时由于转轮的过流能力有限,远没有充分利用现有水力资源,本次电站改造的目标是提效增容,充分利用水力资源,改善汽蚀性能和解决泥沙磨损问题,保证机长期安全稳定运行,改造范围是对2号、3号和4号机组进行全面改造.电站改造采用基于CFD技术的水力优化设计方法的核心技术对电站存在的问题进行了针对性设计,给出了行之有效的全面解决方案,成功地完成了电站改造目标.  相似文献   
48.
Neural Computing and Applications - Feature selection is frequently used as a preprocessing step to data mining and is attracting growing attention due to the increasing amounts of data emerging...  相似文献   
49.
In this paper, we describe a pervasive game, Blowtooth, in which players use their mobile phones to hide virtual drugs on nearby airline passengers in real airport check-in queues. After passing through airport security, the player must find and recover their drugs from the innocent bystanders, without them ever realising they were involved in the game. The game explores the nature of pervasive game playing in environments that are not, generally, regarded as playful or “fun”. This paper describes the game’s design and implementation as well as an evaluation conducted with participants in real airports. It explores the players’ reactions to the game through questionnaire responses and in-game activity. The technologies used in Blowtooth are, intentionally, simple in order for the enjoyment of the game to be reliant more on the physical environment rather than the enabling technologies. We conclude that situating pervasive games in unexpected and challenging environments, such as international airports, may provide interesting and unique gaming experiences for players. In addition, we argue that pervasive games benefit most from using the specific features and nature of interesting real-world environments rather than focusing on the enabling technologies.  相似文献   
50.
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of data having generally some recurrent events. Patterns have received a considerable attention in recent years and were widely studied in the data mining field. Various pattern mining approaches have been proposed and used for different applications such as network monitoring, moving object tracking, financial or medical data analysis, scientific data processing, etc. In these different contexts, discovered patterns were useful to detect anomalies, to predict data behavior (or trend) or, more generally, to simplify data processing or to improve system performance. However, to the best of our knowledge, patterns have never been used in the context of Web archiving. Web archiving is the process of continuously collecting and preserving portions of the World Wide Web for future generations. In this paper, we show how patterns of page changes can be useful tools to efficiently archive Websites. We first define our pattern model that describes the importance of page changes. Then, we present the strategy used to (i) extract the temporal evolution of page changes, (ii) discover patterns, to (iii) exploit them to improve Web archives. The archive of French public TV channels France Télévisions is chosen as a case study to validate our approach. Our experimental evaluation based on real Web pages shows the utility of patterns to improve archive quality and to optimize indexing or storing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号