首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   90131篇
  免费   4112篇
  国内免费   4201篇
电工技术   4035篇
技术理论   5篇
综合类   8709篇
化学工业   12601篇
金属工艺   5627篇
机械仪表   3075篇
建筑科学   4276篇
矿业工程   1250篇
能源动力   2744篇
轻工业   5837篇
水利工程   1931篇
石油天然气   4094篇
武器工业   693篇
无线电   6788篇
一般工业技术   14075篇
冶金工业   2469篇
原子能技术   2181篇
自动化技术   18054篇
  2024年   60篇
  2023年   262篇
  2022年   379篇
  2021年   570篇
  2020年   981篇
  2019年   939篇
  2018年   1053篇
  2017年   991篇
  2016年   1506篇
  2015年   2170篇
  2014年   3959篇
  2013年   4717篇
  2012年   4015篇
  2011年   4678篇
  2010年   3926篇
  2009年   5344篇
  2008年   5351篇
  2007年   5698篇
  2006年   5235篇
  2005年   4380篇
  2004年   3778篇
  2003年   3698篇
  2002年   3740篇
  2001年   2810篇
  2000年   3191篇
  1999年   2968篇
  1998年   2516篇
  1997年   2380篇
  1996年   2528篇
  1995年   2691篇
  1994年   2427篇
  1993年   1497篇
  1992年   1517篇
  1991年   1029篇
  1990年   767篇
  1989年   676篇
  1988年   644篇
  1987年   378篇
  1986年   229篇
  1985年   371篇
  1984年   420篇
  1983年   435篇
  1982年   334篇
  1981年   412篇
  1980年   273篇
  1979年   115篇
  1978年   115篇
  1977年   75篇
  1976年   41篇
  1975年   55篇
排序方式: 共有10000条查询结果,搜索用时 34 毫秒
11.
针对当前扩大化和普及化的仓储物流,提出了一种3D自动化立体仓库可视化系统的实现方案,用以解决仓储系统中遇到的数据不直观的问题。该系统采用JavaScript编程语言,以Three.js引擎为基础,构建了基于WebGL的三维自动化立体仓库的可视化系统,该系统能有效直观的进行仓储管理,适合现代化仓储企业的管理需求。  相似文献   
12.
Both fluorescent and luminescent observation are widely used to examine real-time gene expression patterns in living organisms. Several fluuorescent and luminescent proteins with specific optical properties have been developed and applied for simultaneous, multi-color observation of more than two gene expression profiles. Compared to fluorescent proteins, however, the application of multi-color luminescent imaging in living organisms is still limited. In this study, we introduced two-color luciferases into the soil nematode C. elegans and performed simultaneous analysis of two gene expression profiles. Using a green-emitting luciferase Eluc (emerald luciferase) and red-emitting luciferase SLR (stable luciferase red), the expression patterns of two genes were simultaneously observed in single animals from embryonic to adult stages over its whole life span. In addition, dual gene activities were observed at the single embryo level, with the simultaneous observation of morphological changes. These are the first application of a two-color luciferase system into a whole animal and suggest that precise relationship of expression patterns of multiple genes of interest can be analyzed over the whole life of the animal, dependent on the changes in genetic and/or environmental conditions.  相似文献   
13.
The extracellular matrix (ECM) is important for normal development and disease states, including inflammation and fibrosis. To understand the complex regulation of ECM, we performed a suppressor screening using Caenorhabditis elegans expressing the mutant ROL-6 collagen protein. One cuticle mutant has a mutation in dpy-23 that encodes the μ2 adaptin (AP2M1) of clathrin-associated protein complex II (AP-2). The subsequent suppressor screening for dpy-23 revealed the lon-2 mutation. LON-2 functions to regulate body size through negative regulation of the tumor growth factor-beta (TGF-β) signaling pathway responsible for ECM production. RNA-seq analysis showed a dominant change in the expression of collagen genes and cuticle components. We noted an increase in the cav-1 gene encoding caveolin-1, which functions in clathrin-independent endocytosis. By knockdown of cav-1, the reduced TGF-β signal was significantly restored in the dpy-23 mutant. In conclusion, the dpy-23 mutation upregulated cav-1 expression in the hypodermis, and increased CAV-1 resulted in a decrease of TβRI. Finally, the reduction of collagen expression including rol-6 by the reduced TGF-β signal influenced the cuticle formation of the dpy-23 mutant. These findings could help us to understand the complex process of ECM regulation in organism development and disease conditions.  相似文献   
14.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
15.
16.
Multi-tag collision imposes a vital detrimental effect on reading performance of an RFID system. In order to ameliorate such collision problem and to improve the reading performance, this paper proposes an efficient tag identification algorithm termed as the Enhanced Adaptive Tree Slotted Aloha (EATSA). The key novelty of EATSA is to identify the tags using grouping strategy. Specifically, the whole tag set is divided into groups by a frame of size F. In cases multiple tags fall into a group, the tags of the group are recognized by the improved binary splitting (IBS) method whereas the rest tags are waiting in the pipeline. In addition, an early observation mechanism is introduced to update the frame size to an optimum value fitting the number of tags. Theoretical analysis and simulation results show that the system throughput of our proposed algorithm can reach as much as 0.46, outperforming the prior Aloha-based protocols.  相似文献   
17.
With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the new location privacy challenges caused by DLBS, since the service device is enabled to perform the localization without the permission of the user. To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user. The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information of their device. We make the simulation of our proposed scheme and the result convince its effectiveness.  相似文献   
18.
Tibetan language has very limited resource for conventional automatic speech recognition so far. It lacks of enough data, sub-word unit, lexicons and word inventories for some dialects. And speech content recognition and dialect classification have been treated as two independent tasks and modeled respectively in most prior works. But the two tasks are highly correlated. In this paper, we present a multi-task WaveNet model to perform simultaneous Tibetan multi-dialect speech recognition and dialect identification. It avoids processing the pronunciation dictionary and word segmentation for new dialects, while, in the meantime, allows training speech recognition and dialect identification in a single model. The experimental results show our method can simultaneously recognize speech content for different Tibetan dialects and identify the dialect with high accuracy using a unified model. The dialect information used in output for training can improve multi-dialect speech recognition accuracy, and the low-resource dialects got higher speech content recognition rate and dialect classification accuracy by multi-dialect and multi-task recognition model than task-specific models.  相似文献   
19.
Perovskite oxides LaCoO_3 prepared by templating, co-precipitation and sol-gel method with different complexants were systematically characterized and its catalytic performances for CO oxidation were investigated. The samples were characterized by X-ray diffraction, thermogravimetry analysis and differential scanning calorimetry, N_2 physisorption, transmission electron microscopy, temperature program reduction of hydrogen, temperature program desorption of oxygen and X-ray photoelectron spectroscopy measurement, results of which show that the properties of LaCoO_3, such as surface morphology, surface area, surface compositions, redox capability, oxygen vacancy, as well as the calcination temperature and formation mechanism, depend intimately on the preparation method. Catalytic tests indicate that the sample prepared by carbon templating method shows the best activity for CO oxidation, with full CO conversion obtained at 135 ℃. In particular, the catalyst can be activated and significant increase of activity can be obtained with the increase of reaction time. The cyclic and longterm stability of catalysts were discussed and compared.  相似文献   
20.
Xin-Na Geng  Danyu Bai 《工程优选》2019,51(8):1301-1323
This article addresses the no-wait flowshop scheduling problem with simultaneous consideration of common due date assignment, convex resource allocation and learning effect in a two machine setting. The processing time of each job can be controlled by its position in a sequence and also by allocating extra resource, which is a convex function of the amount of a common continuously divisible resource allocated to the job. The objective is to determine the optimal common due date, the resource allocation and the schedule of jobs such that the total earliness, tardiness and common due date cost (the total resource consumption cost) are minimized under the constraint condition that the total resource consumption cost (the total earliness, tardiness and common due date cost) is limited. Polynomial time algorithms are developed for two versions of the problem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号