首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12531篇
  免费   1639篇
  国内免费   646篇
电工技术   179篇
技术理论   1篇
综合类   258篇
化学工业   4936篇
金属工艺   616篇
机械仪表   551篇
建筑科学   238篇
矿业工程   152篇
能源动力   1107篇
轻工业   678篇
水利工程   49篇
石油天然气   681篇
武器工业   14篇
无线电   759篇
一般工业技术   1854篇
冶金工业   188篇
原子能技术   118篇
自动化技术   2437篇
  2024年   34篇
  2023年   470篇
  2022年   426篇
  2021年   583篇
  2020年   686篇
  2019年   594篇
  2018年   436篇
  2017年   577篇
  2016年   697篇
  2015年   747篇
  2014年   843篇
  2013年   1079篇
  2012年   1018篇
  2011年   1046篇
  2010年   775篇
  2009年   919篇
  2008年   384篇
  2007年   819篇
  2006年   705篇
  2005年   317篇
  2004年   165篇
  2003年   154篇
  2002年   206篇
  2001年   178篇
  2000年   150篇
  1999年   143篇
  1998年   84篇
  1997年   58篇
  1996年   105篇
  1995年   84篇
  1994年   81篇
  1993年   41篇
  1992年   25篇
  1991年   41篇
  1990年   33篇
  1989年   33篇
  1988年   57篇
  1987年   2篇
  1986年   2篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1976年   1篇
  1959年   1篇
  1951年   14篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
3.
周忠强  惠虎  张亚林 《压力容器》2020,(2):37-40,70
铁素体钢在低温条件下存在明显的韧脆转变现象。为防止脆断事故的发生,需要确定铁素体钢制压力容器的最低使用温度。针对ASME中的A^D四条冲击豁免曲线,对应地选取了4种材料,基于材料实际的屈服强度和参考温度,按照ASME中豁免曲线的计算方法,计算得到4种材料的最低设计金属温度曲线,并与对应的A^D曲线对比,定量地分析ASME中豁免曲线的保守性。结果表明,ASME中的豁免曲线相对于材料自身的最低设计金属温度曲线保守性较大;韧性相近的材料被划分到不同的豁免曲线,使得韧性富裕量差异较大,对于某些材料,其断裂韧性被低估。  相似文献   
4.
5.
An ultrasonic tomographic velocimeter to provide quantitative images of axial flow fields in pipes is developed and presented in this work. To detect the flow in various directions and positions, a novel transducer configuration strategy is proposed. All-in-one transducers are mounted in two sectional planes of the pipe. In each plane, N transducers are equally spaced along the circumference. Overlapped propagation paths are introduced by the configuration strategy, and the influence of the vortex flow can be eliminated theoretically by averaging the line velocities of the overlapped paths. To achieve a fast detection speed, the projection data is collected via an electrical scan in a fan-beam mode. After rearrangement and interpolation of the projection data, the parallel beam filtered back projection (FBP) algorithm is implemented to reconstruct the axial flow field. Numerical simulations with the theoretical velocity profiles were performed. The compensation method for the vortex flow is proved to be effective and necessary, and the number of transducers required for reconstruction of common flow profiles was estimated. Accordingly, an ultrasonic tomographic velocimeter consisting of 2×12 transducers was fabricated. Experiments were conducted in the straight pipe and downstream of a single bend pipe and compared with the computational fluid dynamics (CFD) simulation results. As demonstrated, the ultrasonic tomographic velocimeter was capable of visualizing both symmetric and asymmetric axial flow fields with high reliability.  相似文献   
6.
7.
In this research, we propose a novel framework referred to as collective game behavior decomposition where complex collective behavior is assumed to be generated by aggregation of several groups of agents following different strategies and complexity emerges from collaboration and competition of individuals. The strategy of an agent is modeled by certain simple game theory models with limited information. Genetic algorithms are used to obtain the optimal collective behavior decomposition based on history data. The trained model can be used for collective behavior prediction. For modeling individual behavior, two simple games, the minority game and mixed game are investigated in experiments on the real-world stock prices and foreign-exchange rate. Experimental results are presented to show the effectiveness of the new proposed model.  相似文献   
8.
Though modeling and verifying Multi-Agent Systems (MASs) have long been under study, there are still challenges when many different aspects need to be considered simultaneously. In fact, various frameworks have been carried out for modeling and verifying MASs with respect to knowledge and social commitments independently. However, considering them under the same framework still needs further investigation, particularly from the verification perspective. In this article, we present a new technique for model checking the logic of knowledge and commitments (CTLKC+). The proposed technique is fully-automatic and reduction-based in which we transform the problem of model checking CTLKC+ into the problem of model checking an existing logic of action called ARCTL. Concretely, we construct a set of transformation rules to formally reduce the CTLKC+ model into an ARCTL model and CTLKC+ formulae into ARCTL formulae to get benefit from the extended version of NuSMV symbolic model checker of ARCTL. Compared to a recent approach that reduces the problem of model checking CTLKC+ to another logic of action called GCTL1, our technique has better scalability and efficiency. We also analyze the complexity of the proposed model checking technique. The results of this analysis reveal that the complexity of our reduction-based procedure is PSPACE-complete for local concurrent programs with respect to the size of these programs and the length of the formula being checked. From the time perspective, we prove that the complexity of the proposed approach is P-complete with regard to the size of the model and length of the formula, which makes it efficient. Finally, we implement our model checking approach on top of extended NuSMV and report verification results for the verification of the NetBill protocol, taken from business domain, against some desirable properties. The obtained results show the effectiveness of our model checking approach when the system scales up.  相似文献   
9.
We investigate the problem of efficient wireless power transfer in wireless sensor networks. In our approach, special mobile entities (called the Mobile Chargers) traverse the network and wirelessly replenish the energy of sensor nodes. In contrast to most current approaches, we envision methods that are distributed and use limited network information. We propose four new protocols for efficient charging, addressing key issues which we identify, most notably (i) what are good coordination procedures for the Mobile Chargers and (ii) what are good trajectories for the Mobile Chargers. Two of our protocols (DC, DCLK) perform distributed, limited network knowledge coordination and charging, while two others (CC, CCGK) perform centralized, global network knowledge coordination and charging. As detailed simulations demonstrate, one of our distributed protocols outperforms a known state of the art method, while its performance gets quite close to the performance of the powerful centralized global knowledge method.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号