首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   143725篇
  免费   18895篇
  国内免费   13692篇
电工技术   18953篇
技术理论   21篇
综合类   17999篇
化学工业   4171篇
金属工艺   2515篇
机械仪表   7342篇
建筑科学   7299篇
矿业工程   3672篇
能源动力   2448篇
轻工业   1970篇
水利工程   3237篇
石油天然气   2438篇
武器工业   1884篇
无线电   27974篇
一般工业技术   6627篇
冶金工业   3332篇
原子能技术   342篇
自动化技术   64088篇
  2024年   646篇
  2023年   2537篇
  2022年   4845篇
  2021年   5495篇
  2020年   5763篇
  2019年   4071篇
  2018年   3569篇
  2017年   4276篇
  2016年   4711篇
  2015年   5552篇
  2014年   9787篇
  2013年   8852篇
  2012年   11215篇
  2011年   11533篇
  2010年   8970篇
  2009年   9591篇
  2008年   10142篇
  2007年   11211篇
  2006年   9599篇
  2005年   8606篇
  2004年   7217篇
  2003年   6305篇
  2002年   4714篇
  2001年   3962篇
  2000年   3160篇
  1999年   2406篇
  1998年   1692篇
  1997年   1366篇
  1996年   1103篇
  1995年   847篇
  1994年   676篇
  1993年   461篇
  1992年   293篇
  1991年   207篇
  1990年   152篇
  1989年   150篇
  1988年   103篇
  1987年   56篇
  1986年   54篇
  1985年   63篇
  1984年   58篇
  1983年   49篇
  1982年   47篇
  1981年   26篇
  1980年   24篇
  1979年   25篇
  1977年   9篇
  1965年   10篇
  1964年   12篇
  1961年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
在钻井过程中,常常钻遇不同宽度的井下地层裂缝。钻遇裂缝时容易发生钻井液漏失现象,甚至发生钻井液失返现象,严重影响了安全、高效钻井。目前裂缝封堵的方法常存在封堵成功率不高、堵漏承压能力低的问题,其中一个重要的原因是对井下地层的裂缝宽度等特征认识不清。基于地层裂缝产生的岩石力学机理,确定影响裂缝宽度关键的6个力学和工程因素,并利用神经网络计算的非线性、大数据特点建立了井下地层裂缝宽度的分析模型,模型包含输入层、输出层和3个隐藏层。通过该模型诊断井下裂缝宽度,提高了计算精度,平均误差仅为2.09%,最大误差为5.88%,解决钻井现场仅凭经验判断裂缝误差较大和依靠成像测井成本较高的问题。同时根据神经网络模型诊断得到的裂缝宽度优化堵漏材料的粒径配比,提高了裂缝内的架桥封堵强度和架桥的稳定性,封堵层的承压能力达到12.8 MPa,反向承压能力达到4.5 MPa。现场堵漏试验最高憋压10 MPa,经过封堵作业后大排量循环不漏,达到了裂缝性地层高效堵漏的目的,堵漏一次成功。   相似文献   
62.
This work intends to develop an online experimental system for screening of deoxynivalenol (DON) contamination in whole wheat meals by visible/near-infrared (Vis/NIR) spectroscopy and computer vision coupling technology. Spectral and image information of samples with various DON levels was collected at speed of 0.15 m s−1 on a conveyor belt. The two-type data were then integrated and subjected to chemometric analysis. Discriminant analysis showed that samples could be classified by setting 1000 μg kg−1 as the cut-off value. The best correct classified rate obtained in prediction was 93.55% based on fusion of spectral and image features, with reduced prediction uncertainty as compared to single feature. However, quantification of DON by quantitative analysis was not successful due to poor model performance. These results indicate that, although not accurate enough to provide conclusive result, this coupling technology could be adopted for rapid screening of DON contamination in cereals and feeds during processing.  相似文献   
63.
Previous experimental results indicate that the humidification conditions at the anode have an impact on the liquid water distribution in the cathode gas diffusion layer. Numerical simulations are developed to reproduce and analyze this effect. Results consistent with the experimental results are first obtained by playing with the partition coefficients of an advanced pore network model computing the liquid water formation and transfer in the cathode gas diffusion layer (GDL) for a large range of operating conditions. Then, a model for the full anode – cathode assembly is developed by combining the pore network model of the cathode GDL and a 1D model describing the heat and water transfer in the various components of the anode-cathode assembly. This enables one to generalize the dry – wet regime diagram introduced in a previous work by incorporating the effect of the humidity condition at the anode.  相似文献   
64.
Current grain growth models have evolved to account for the relationship between grain boundary energy/mobility anisotropy and the five degrees of grain boundary character. However, the role of grain boundary networks on overall growth kinetics remains poorly understood. To experimentally investigate this problem, a highly textured Al2O3 was fabricated by colloidal casting in a strong magnetic field to engineer a unique spatial distribution of grain boundary character. Microstructural evolution was quantified and compared to an untextured sample. From this comparison, a prevalence of (0001)/(0001) terminated grain boundaries with anisotropic networks were identified in the textured sample. These boundaries and their networks were found to be driving grain growth at a faster rate than predicted by models. These findings will allow better modelling of grain growth in real systems by experimentally exploring the impact thereon of grain boundary plane anisotropy and relative energy/mobility differences between neighboring boundaries.  相似文献   
65.
66.
The rate of penetration (ROP) model is of great importance in achieving a high efficiency in the complex geological drilling process. In this paper, a novel two-level intelligent modeling method is proposed for the ROP considering the drilling characteristics of data incompleteness, couplings, and strong nonlinearities. Firstly, a piecewise cubic Hermite interpolation method is introduced to complete the lost drilling data. Then, a formation drillability (FD) fusion submodel is established by using Nadaboost extreme learning machine (Nadaboost-ELM) algorithm, and the mutual information method is used to obtain the parameters, strongly correlated with the ROP. Finally, a ROP submodel is established by a neural network with radial basis function optimized by the improved particle swarm optimization (RBFNN-IPSO). This two-level ROP model is applied to a real drilling process and the proposed method shows the best performance in ROP prediction as compared with conventional methods. The proposed ROP model provides the basis for intelligent optimization and control in the complex geological drilling process.  相似文献   
67.
针对现有混合入侵检测模型仅定性选取特征而导致检测精度较低的问题,同时为了充分结合误用检测模型和异常检测模型的优势,提出一种采用信息增益率的混合入侵检测模型.首先,利用信息增益率定量地选择特征子集,最大程度地保留样本信息;其次,采用余弦时变粒子群算法确定支持向量机参数构建误用检测模型,使其更好地平衡粒子在全局和局部的搜索能力,然后,选取灰狼算法确定单类支持向量机参数构建异常检测模型,以此来提高对最优参数的搜索效率和精细程度,综合提高混合入侵检测模型对攻击的检测效果;最后,通过两种数据集进行仿真实验,验证了所提混合入侵检测模型具有较好的检测性能.  相似文献   
68.
In the field of images and imaging, super-resolution (SR) reconstruction of images is a technique that converts one or more low-resolution (LR) images into a highresolution (HR) image. The classical two types of SR methods are mainly based on applying a single image or multiple images captured by a single camera. Microarray camera has the characteristics of small size, multi views, and the possibility of applying to portable devices. It has become a research hotspot in image processing. In this paper, we propose a SR reconstruction of images based on a microarray camera for sharpening and registration processing of array images. The array images are interpolated to obtain a HR image initially followed by a convolution neural network (CNN) procedure for enhancement. The convolution layers of our convolution neural network are 3×3 or 1×1 layers, of which the 1×1 layers are used to improve the network performance particularly. A bottleneck structure is applied to reduce the parameter numbers of the nonlinear mapping and to improve the nonlinear capability of the whole network. Finally, we use a 3×3 deconvolution layer to significantly reduce the number of parameters compared to the deconvolution layer of FSRCNN-s. The experiments show that the proposed method can not only ameliorate effectively the texture quality of the target image based on the array images information, but also further enhance the quality of the initial high resolution image by the improved CNN.  相似文献   
69.
肖凯  王蒙  唐新余  蒋同海 《计算机应用》2019,39(7):2156-2161
在现有的时间银行系统中,时间币的发行功能和结算功能完全集中到一个中心节点上。这种极度中心化的功能结构,不仅存在容易发生中心节点单点失效、数据容易被篡改等信息安全问题,还存在着时间币的发行和流通缺乏透明度以及时间币的结算依赖中心化的结算机构等问题。针对这些问题,提出了一种基于区块链技术的解决方法。首先,将时间币的发行功能和结算功能从中心节点上分离出来;然后,利用具有分布式去中心化、集体维护和不可篡改等特性的区块链技术,将分离出来的发行功能逐步去中心化,将分离出来的结算功能去中心化,形成公益时间链(PWTB);最终,PWTB利用区块链技术以去中心化的方式将时间银行系统由单个节点维护账本变成由集体维护一个分布式的共享账本,使时间币的发行和流通公开透明,时间币的结算不依赖某个中心化的节点。安全分析表明所设计的PWTB能够实现安全的信息传输与存储,以及数据的共享。  相似文献   
70.
个人信息因其自身携带隐私特性,与每个个体息息相关。个人信息保护不当,影响公众权益、企业利益以及社会秩序。在互联网、大数据、5G万物互联的时代,个人信息被广泛收集和使用,必须妥善解决个人信息保护问题,才能保障整个数据产业健康发展。而现有的个人信息保护方法或技术,不足以应对新形势下的保护诉求。基于数据运营安全的个人信息保护,针对当前个人信息保护的新形势和新诉求,提出结合人工智能,通过数据运营安全对结构化、半结构化、非结构化的个人信息流动的保护,涵盖从生产到运维,从采集、传输、存储、处理、分析、共享、销毁全生命周期保护,深入数据运营中内嵌防护,同时与业务解耦,达到保护个人信息安全的目标。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号