首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   679篇
  免费   49篇
  国内免费   4篇
工业技术   732篇
  2024年   1篇
  2023年   3篇
  2022年   25篇
  2021年   28篇
  2020年   31篇
  2019年   45篇
  2018年   46篇
  2017年   53篇
  2016年   50篇
  2015年   26篇
  2014年   46篇
  2013年   72篇
  2012年   37篇
  2011年   40篇
  2010年   28篇
  2009年   22篇
  2008年   26篇
  2007年   19篇
  2006年   9篇
  2005年   7篇
  2004年   3篇
  2003年   3篇
  2002年   5篇
  2001年   6篇
  2000年   11篇
  1999年   3篇
  1998年   13篇
  1997年   10篇
  1996年   7篇
  1995年   3篇
  1994年   10篇
  1993年   11篇
  1992年   5篇
  1991年   3篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1984年   3篇
  1983年   2篇
  1978年   1篇
排序方式: 共有732条查询结果,搜索用时 0 毫秒
1.
Essential work of fracture methodology was used to determine plane-stress ductile fracture toughness of high impact polystyrene film of thickness 0.26 mm. Results obtained indicated that specific essential work of fracture, w e, is independent of loading rate, and for certain specimen sizes, independent of both gauge length and width of the specimen. On the other hand, w e was found to be affected by the temperature, molecular anisotropy and the geometry of the test specimens. Reasonable estimate of w e was obtained via crack opening displacement value.  相似文献   
2.
For characterization of the fracture resistance of materials used in the upper shelf toughness regime,J-R curves are widely considered the most promising candidates. However, there still remain problems concerning both the generation and measurement ofJ-R curves as material characterizing parameters and their application in ductile fracture analyses for failure prediction in polymeric materials. This paper reports the results of investigations conducted on two rubbertoughened nylons at room temperature. Two different methods ofJ-R curve determination are covered, namely multi-specimen and single specimen test methods. The resultingJ-R curves have also been evaluated to obtain values of the initiation toughness,J IC, following the extrapolation and interpolation schemes prescribed by ASTM E813-81 and ASTM E813-87 test procedures, respectively. The results show that the multiple specimen unloading method and the single specimen partial unloading compliance method can be used to generate comparable crack growth resistanceJ-R curves of the toughened nylons. The value ofJ IC for the crystalline rubber-toughened nylon was approximately twice the value obtained for the amorphous rubber-toughened nylon. The former material also exhibited a greater resistance to ductile crack growth.  相似文献   
3.
A technology for increasing both the two-terminal gate-drain breakdown and subsequently the three-terminal-off-state breakdown of AlInAs/GaInAs high-electron-mobility transistors (HEMTs) to record values without substantial impact on other parameters is presented. The breakdown in these structures is dependent on the multiplication of electrons injected from the source (channel current) and the gate (gate leakage) into the channel. In addition, holes are generated by high fields at the drain and are injected back into the gate and source electrodes. These phenomena can be suppressed by increasing the gate barrier height and alleviating the fields at the drain. Both have been achieved by incorporating a p+-2DEG junction as the gate that modulates the 2DEG gas and by utilizing selective regrowth of the source and drain regions by MOCVD. The 1-μm-gate-length devices fabricated have two-terminal gate-drain and three-terminal-off-state breakdown voltages of 31 V and 28 V, respectively  相似文献   
4.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
5.
The present study investigated fracture and various mechanical properties of polyoxymethylene (POM) hybrids in tension and in flexure. The hybrids examined consisted of short glass fibers (GF) and spherical glass beads (GB). Comparisons are made between experimentally observed values and predictions based on the rule-of-hybrid mixtures for hybrid strength, modulus, impact strength, fracture toughness, and strain energy release rates. Results indicated that tensile strength, flexural modulus, and fracture toughness of POM/GB/GF hybrid composites can be estimated from the following rule-of-hybrid mixtures where PPOM/GB and PPOM/GF are the measured properties of the POM/GB and POM/GF composites, and χPOM/GB and χPOM/GF are the hybrid ratio (by volume) of the glass bead and that of glass fiber, respectively. In view of this, none of the aforementioned properties show any signs of a hybrid effect. Flexural strengths, impact strengths, and strain energy release rate all showed the existence of a negative hybrid effect where negative deviation from the rule-of-mixtures behavior was observed. The latter was closer to the estimation based on the inverse rule-of mixtures.  相似文献   
6.
The widespread availability of broadband internet access and the growth in server-based processing have provided an opportunity to run games away from the player into the cloud and offer a new promising service known as cloud gaming. The concept of cloud gaming is to render a game in the cloud and stream the resulting game scenes to the player as a video sequence over a broadband connection. To meet the stringent network bandwidth requirements of cloud gaming and support more players, efficient bit rate reduction techniques are needed. In this paper, we introduce the concept of game attention model (GAM), which is basically a game context-based visual attention model, as a means for reducing the bit rate of the streaming video more efficiently. GAM estimates the importance of each macro-block in a game frame from the player’s perspective and allows encoding the less important macro-blocks with lower bit rate. We have evaluated nine game video sequences, covering a wide range of game genre and a spectrum of scene content in terms of details, motion and brightness. Our subjective assessment shows that by integrating this model into the cloud gaming framework, it is possible to decrease the required bit rate by nearly 25 % on average, while maintaining a relatively high user quality of experience. This clearly enables players with limited communication resources to benefit from cloud gaming with acceptable quality.  相似文献   
7.
The architecture of the pre-modern Islamic world broadly identifies itself with geometric design. In erecting buildings, architects-engineers of the Islamic world utilized distinct modes of geometric projections vital to the spatial conception of the building. These representations identify three modes of design drawings: plans, revetments/vertical surfaces, and reflected ceiling plans. This paper will discuss these modes of drawings and their unique role in relation to the architectural “design thinking” traditions. Much has been examined regarding two-dimensional Islamic geometric patterns (girih), but little exists in terms of a comprehensive framework investigating various modes of geometric drawings in relation to formal, spatial, and tectonic conceptions of the architectural space. This paper fills a critical gap in the literature about Islamic architecture and examines this topic through primary resources and original pamphlets.  相似文献   
8.
Light scattering was used to measure the time-dependent loss of air entrapped within a submerged microporous hydrophobic surface subjected to different environmental conditions. The loss of trapped air resulted in a measurable decrease in surface reflectivity and the kinetics of the process was determined in real time and compared to surface properties, such as porosity and morphology. The light-scattering results were compared with measurements of skin-friction drag, static contact angle, and contact-angle hysteresis. The in situ, noninvasive optical technique was shown to correlate well with the more conventional methods for quantifying surface hydrophobicity, such as flow slip and contact angle.  相似文献   
9.
Duality properties have been investigated by many researchers in the recent literature. They are introduced in this paper for a fully fuzzified version of the minimal cost flow problem, which is a basic model in network flow theory. This model illustrates the least cost of the shipment of a commodity through a capacitated network in terms of the imprecisely known available supplies at certain nodes which should be transmitted to fulfil uncertain demands at other nodes. First, we review on the most valuable results on fuzzy duality concepts to facilitate the discussion of this paper. By applying Hukuhara’s difference, approximated and exact multiplication and Wu’s scalar production, we exhibit the flow in network models. Then, we use combinatorial algorithms on a reduced problem which is derived from fully fuzzified MCFP to acquire fuzzy optimal flows. To give duality theorems, we utilize a total order on fuzzy numbers due to the level of risk and realize optimality conditions for providing some efficient combinatorial algorithms. Finally, we compare our results with the previous worthwhile works to demonstrate the efficiency and power of our scheme and the reasonability of our solutions in actual decision-making problems.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号