首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69027篇
  免费   9136篇
  国内免费   6935篇
电工技术   6198篇
技术理论   9篇
综合类   7856篇
化学工业   1675篇
金属工艺   836篇
机械仪表   4265篇
建筑科学   2884篇
矿业工程   1752篇
能源动力   1089篇
轻工业   945篇
水利工程   1728篇
石油天然气   3069篇
武器工业   913篇
无线电   9807篇
一般工业技术   3485篇
冶金工业   1246篇
原子能技术   769篇
自动化技术   36572篇
  2024年   225篇
  2023年   895篇
  2022年   1800篇
  2021年   2314篇
  2020年   2500篇
  2019年   2016篇
  2018年   1819篇
  2017年   2241篇
  2016年   2584篇
  2015年   3005篇
  2014年   4708篇
  2013年   4309篇
  2012年   5160篇
  2011年   5600篇
  2010年   4382篇
  2009年   4346篇
  2008年   4925篇
  2007年   5461篇
  2006年   4636篇
  2005年   4127篇
  2004年   3499篇
  2003年   2972篇
  2002年   2253篇
  2001年   1740篇
  2000年   1494篇
  1999年   1091篇
  1998年   818篇
  1997年   708篇
  1996年   606篇
  1995年   549篇
  1994年   420篇
  1993年   297篇
  1992年   227篇
  1991年   225篇
  1990年   176篇
  1989年   144篇
  1988年   115篇
  1987年   84篇
  1986年   64篇
  1985年   94篇
  1984年   65篇
  1983年   82篇
  1982年   64篇
  1981年   40篇
  1980年   24篇
  1979年   37篇
  1978年   13篇
  1977年   23篇
  1976年   16篇
  1961年   10篇
排序方式: 共有10000条查询结果,搜索用时 125 毫秒
61.
随着测试技术的发展、测试质量及资料解释水平的提高,测试(试井)成果的可靠程度越来越受到重视。影响解释成果的环节和因素很多,从客观和主观两方面分析其主要因素,找出症结所在,从而完善现场环节,完善资料解释过程,提高测试技术及解释水平。  相似文献   
62.
压裂是低孔、低渗油层改造的主要增产措施。根据常规测井资料、岩石物理实验分析数据及试油成果。研究储层四性关系,确定区块的低孔、低渗储层评价标准。进一步对油层进行分类,有针对性地为油层压裂提供施工层位和准确的储层参数。通过商543区块实例,阐述了选择压裂层位的方法。  相似文献   
63.
入侵检测是保障网络安全的重要手段,针对现有入侵检测系统中告警数量多、协调性差等问题,论文提出了一种具有告警融合与关联功能的告警处理系统模型,该模型冗余告警量少、整体检测能力强,并能进行攻击企图的预测,能有效提高入侵检测的效率,有助于进一步增强网络的健壮性。  相似文献   
64.
实现嵌入式汇编技术就是直接把汇编语言的代码写到高级语言的代码中并一起进行编译,不需要独立的汇编系统和另外的连接步骤。嵌入式汇编技术在不同的高级语言中语法各不相同。文章主要给出了在Delphi环境中嵌入汇编的具体用法。采用嵌入式汇编技术对Intel8255和8254接口芯片的具体操作,以及介绍了数据采集软件的设计流程和程序的具体实现方法。  相似文献   
65.
GIS在深圳市三防指挥信息系统中的应用   总被引:1,自引:0,他引:1  
深圳市三防指挥信息系统利用GIS技术,结合水利(水务)、防汛、抗旱的具体业务,建立了水情遥测数据处 理分系统、工况监测数据处理分系统、水务行业三防信息管理分系统、决策支持分系统、水源优化调度分 系统,提高了现代化管理水平。  相似文献   
66.
A Lattice Approach to Image Segmentation   总被引:1,自引:0,他引:1  
After a formal definition of segmentation as the largest partition of the space according to a criterion σ and a function f, the notion of a morphological connection is reminded. It is used as an input to a central theorem of the paper (Theorem 8), that identifies segmentation with the connections that are based on connective criteria. Just as connections, the segmentations can then be regrouped by suprema and infima. The generality of the theorem makes it valid for functions from any space to any other one. Two propositions make precise the AND and OR combinations of connective criteria. The soundness of the approach is demonstrated by listing a series of segmentation techniques. One considers first the cases when the segmentation under study does not involve initial seeds. Various modes of regularity are discussed, which all derive from Lipschitz functions. A second category of examples involves the presence of seeds around which the partition of the space is organized. An overall proposition shows that these examples are a matter for the central theorem. Watershed and jump connection based segmentations illustrate this type of situation. The third and last category of examples deals with cases when the segmentation occurs in an indirect space, such as an histogram, and is then projected back on the actual space under study. The relationships between filtering and segmentation are then investigated. A theoretical chapter introduces and studies the two notions of a pulse opening and of a connected operator. The conditions under which a family of pulse openings can yield a connected filter are clarified. The ability of segmentations to generate pyramids, or hierarchies, is analyzed. A distinction is made between weak hierarchies where the partitions increase when going up in the pyramid, and the strong hierarchies where the various levels are structured as semi-groups, and particularly as granulometric semi-groups. The last section is based on one example, and goes back over the controversy about “lattice” versus “functional” optimization. The problem is now tackled via a case of colour segmentation, where the saturation serves as a cursor between luminance and hue. The emphasis is put on the difficulty of grouping the various necessary optimizations into a single one.  相似文献   
67.
泥页岩井壁稳定研究及在临盘地区的应用   总被引:2,自引:0,他引:2  
从岩石力学和物理化学两个主要因素简要分析了井壁失稳的机理,指出泥页岩井壁失稳是由力学与化学两方面因素共同作用的结果。钻井液与泥页岩存在化学势差,并改变了井壁附近的孔隙压力,降低岩石强度。借助于井壁处有效应力的变化,将泥页岩与钻井液相互作用时页岩水化所产生的力学效应与纯力学效应结合起来,计算出任意井斜方位井眼围岩应力状态,利用测井资料求出有关岩石力学参数和Mohr Couloumb准则,计算得出防塌的临界钻井液密度。  相似文献   
68.
根据某面板堆石坝施工期、蓄水初期以及几年来的沉降观测资料,对坝体填筑材料计算参数进行反馈分析,得出了能够反映坝体实际变形的弹塑性应力变形计算参数,有利于今后建立大坝变形预报模型,更准确地把握大坝实时运行状态。  相似文献   
69.
宣丹 《中国有线电视》2006,(16):1626-1628
在目前数据爆炸、信息匮乏的情况下,需要利用数据仓库系统集成1个或多个独立传统数据库数据,通过分析海量数据发现市场潜在规律,获取商业信息以支持商业决策,这将是广电未来的制胜武器。  相似文献   
70.
With the proliferation of mobile computing technologies, location based services have been identified as one of the most promising target application. We classify mobile information service domains based on feature characteristics of the information sources and different patterns of mobile information access. By carefully examining the service requirements, we identify the dynamic data management problem that must be addressed for effective location based services in mobile environments. We then devise a general architecture and cost model for servicing both location independent and location dependent data. Based on the architecture and cost model, we propose a set of dynamic data management strategies that employs judicious caching, proactive server pushing and neighborhood replication to reduce service cost and improve response time under changing user mobility and access patterns. Detail behavior analysis helps us in precisely capturing when and how to apply these strategies. Simulation results suggest that different strategies are effective for different types of data in response to different patterns of movement and information access. Shiow-yang Wu is an associate professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan, R.O.C. He received the BS and MS degrees in computer engineering from National Chiao Tung University, Hsinchu, Taiwan, ROC, and the PhD degree in computer science from the University of Texas at Austin in 1984, 1986, and 1995, respectively. His research interests include data/knowledge bases, mobile computing, distributed processing, intelligence information systems, and electronic commerce. Kun-Ta Wu was born in Taipei, Taiwan, R.O.C., in 1976. He received the B.S. degree in computer science from Soochow University, Taipei, Taiwan, R.O.C., in 1999 and the M.S. degree in computer science and information engineering from National Dong Hwa University, Hualien, Taiwan, R.O.C., in 2001. Currently, he is an Assistant Researcher in the Domestic Division at Science and Technology Information Center, National Science Council, R.O.C., as a member of Information Gathering and Analysis Group of National Information and Communication Security Taskforce. His research interests include mobile computing, wireless network and information security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号