全文获取类型
收费全文 | 31931篇 |
免费 | 2372篇 |
国内免费 | 2039篇 |
专业分类
电工技术 | 1895篇 |
技术理论 | 1篇 |
综合类 | 3395篇 |
化学工业 | 926篇 |
金属工艺 | 2608篇 |
机械仪表 | 5142篇 |
建筑科学 | 1086篇 |
矿业工程 | 1086篇 |
能源动力 | 409篇 |
轻工业 | 481篇 |
水利工程 | 453篇 |
石油天然气 | 1803篇 |
武器工业 | 352篇 |
无线电 | 3214篇 |
一般工业技术 | 1240篇 |
冶金工业 | 789篇 |
原子能技术 | 189篇 |
自动化技术 | 11273篇 |
出版年
2024年 | 45篇 |
2023年 | 233篇 |
2022年 | 451篇 |
2021年 | 584篇 |
2020年 | 701篇 |
2019年 | 510篇 |
2018年 | 482篇 |
2017年 | 735篇 |
2016年 | 846篇 |
2015年 | 1106篇 |
2014年 | 1827篇 |
2013年 | 1613篇 |
2012年 | 2221篇 |
2011年 | 2493篇 |
2010年 | 1898篇 |
2009年 | 1887篇 |
2008年 | 2015篇 |
2007年 | 2537篇 |
2006年 | 2262篇 |
2005年 | 2062篇 |
2004年 | 1714篇 |
2003年 | 1656篇 |
2002年 | 1282篇 |
2001年 | 1121篇 |
2000年 | 858篇 |
1999年 | 637篇 |
1998年 | 495篇 |
1997年 | 435篇 |
1996年 | 371篇 |
1995年 | 302篇 |
1994年 | 228篇 |
1993年 | 178篇 |
1992年 | 115篇 |
1991年 | 95篇 |
1990年 | 57篇 |
1989年 | 55篇 |
1988年 | 42篇 |
1987年 | 33篇 |
1986年 | 19篇 |
1985年 | 18篇 |
1984年 | 21篇 |
1983年 | 33篇 |
1982年 | 16篇 |
1981年 | 11篇 |
1980年 | 6篇 |
1979年 | 10篇 |
1977年 | 8篇 |
1976年 | 4篇 |
1974年 | 3篇 |
1959年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
单汽泡沸腾过程数值模拟的研究 总被引:1,自引:0,他引:1
《石油化工》2015,44(11):1295
利用Comsol Multiphysics软件中的Level Set方法对单汽泡沸腾过程进行了模拟,建立了微细结构网格,给出了边界条件,求解了质量、动量、能量和Level Set方程,得到了正确的模拟结果。分析了单汽泡沸腾过程中相含率、压力场、速度场和温度场随时间的变化规律;考察了接触角和壁面效应对汽泡脱离直径和汽泡生长周期的影响。模拟结果表明,当接触角小于12°时,汽泡脱离直径维持不变;当接触角大于12°时,接触角越大,汽泡脱离直径越大。汽泡生长周期随接触角的增大而延长。当加热装置的直径小于汽泡脱离直径时,汽泡受壁面效应的影响不易脱离;当加热装置的直径大于汽泡脱离直径时,汽泡脱离直径不随加热装置直径的增大而变化;汽泡生长周期随加热装置直径的增大而缩短。 相似文献
52.
Minh Ngoc Dinh David Abramson Chao Jin Andrew Gontarek Bob Moench Luiz DeRose 《Software》2015,45(4):501-526
Contemporary parallel debuggers allow users to control more than one processing thread while supporting the same examination and visualisation operations of that of sequential debuggers. This approach restricts the use of parallel debuggers when it comes to large scale scientific applications run across hundreds of thousands compute cores. First, manually observing the runtime data to detect error becomes impractical because the data is too big. Second, performing expensive but useful debugging operations becomes infeasible as the computational codes become more complex, involving larger data structures, and as the machines become larger. This study explores the idea of a data‐centric debugging approach, which could be used to make parallel debuggers more powerful. It discusses the use of ad hoc debug‐time assertions that allow a user to reason about the state of a parallel computation. These assertions support the verification and validation of program state at runtime as a whole rather than focusing on that of only a single process state. Furthermore, the debugger's performance can be improved by exploiting the underlying parallel platform because the available compute cores can execute parallel debugging functions, while a program is idling at a breakpoint. We demonstrate the system with several case studies and evaluate the performance of the tool on a 20 000 cores Cray XE6. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
53.
The load applied to a machine tool feed drive changes during the machining process as material is removed. This load change alters the Coulomb friction of the feed drive. Because Coulomb friction accounts for a large part of the total friction the friction compensation control accuracy of the feed drives is limited if this nonlinear change in the applied load is not considered. This paper presents a new friction compensation method that estimates the machine tool load in real time and considers its effect on friction characteristics. A friction observer based on a Kalman filter with load estimation is proposed for friction compensation control considering the applied load change. A specially designed feed drive testbed that enables the applied load to be modified easily was constructed for experimental verification. Control performance and friction estimation accuracy are demonstrated experimentally using the testbed. 相似文献
54.
软件功能安全验证活动对提高安全关键系统的安全性具有重要作用,它贯穿于软件安全生命周期的各个阶段。通过对各阶段输出文档的审查和分析,可尽早发现软件问题,降低软件修复成本。完整的问题闭环处理流程可有效解决软件验证活动中发现的问题,给出各方均满意的处理结果。 相似文献
55.
Charles Weir Ingolf Becker James Noble Lynne Blair M. Angela Sasse Awais Rashid 《Software》2020,50(3):275-298
Though some software development teams are highly effective at delivering security, others either do not care or do not have access to security experts to teach them how. Unfortunately, these latter teams are still responsible for the security of the systems they build: systems that are ever more important to ever more people. We propose that a series of lightweight interventions, six hours of facilitated workshops delivered over three months, can improve a team's motivation to consider security and awareness of assurance techniques, changing its security culture even when no security experts are involved. The interventions were developed after an Appreciative Inquiry and Grounded Theory survey of security professionals to find out what approaches work best. We tested the interventions in a participatory action research field study where we delivered the workshops to three software development organizations and evaluated their effectiveness through interviews beforehand, immediately afterwards, and after twelve months. We found that the interventions can be effective with teams with limited or no security experience and that improvement is long-lasting. This approach and the learning points arising from the work here have the potential to be applied in many development teams, improving the security of software worldwide. 相似文献
56.
Deep learning has gained a significant popularity in recent years thanks to its tremendous success across a wide range of relevant fields of applications, including medical image analysis domain in particular. Although convolutional neural networks (CNNs) based medical applications have been providing powerful solutions and revolutionizing medicine, efficiently training of CNNs models is a tedious and challenging task. It is a computationally intensive process taking long time and rare system resources, which represents a significant hindrance to scientific research progress. In order to address this challenge, we propose in this article, R2D2, a scalable intuitive deep learning toolkit for medical imaging semantic segmentation. To the best of our knowledge, the present work is the first that aims to tackle this issue by offering a novel distributed versions of two well-known and widely used CNN segmentation architectures [ie, fully convolutional network (FCN) and U-Net]. We introduce the design and the core building blocks of R2D2. We further present and analyze its experimental evaluation results on two different concrete medical imaging segmentation use cases. R2D2 achieves up to 17.5× and 10.4× speedup than single-node based training of U-Net and FCN, respectively, with a negligible, though still unexpected segmentation accuracy loss. R2D2 offers not only an empirical evidence and investigates in-depth the latest published works but also it facilitates and significantly reduces the effort required by researchers to quickly prototype and easily discover cutting-edge CNN configurations and architectures. 相似文献
57.
58.
Mohammad Reza Parsaei Hamid Reza Boveiri Reza Javidan Raouf Khayami 《International Journal of Communication Systems》2020,33(11)
Telemedicine is a new area based on the information and communication technology for collecting, storing, organizing, retrieving and exchanging medical information. One of the most important applications of telemedicine is indeed telesurgery in which an efficient telecommunication infrastructure between the surgery room and remote surgeons need to be established. One of the most important issues to be tackled in telesurgery is to find favorable links for routing as well as providing high Quality of Service (QoS). In this paper, an efficient model based on the hybridization of Type‐2 Fuzzy System (T2FS) and Cuckoo Optimization Algorithm (COA) over the Software Defined Networks (SDN) is proposed in order to achieve optimal and reliable routes for telesurgery application. Using T2FS, the fitness of the links is determined; then, a COA is conducted over the Constraint Shortest Path (CSP) problem to find the best routes. Delay is considered as a CSP problem which is satisfied by trying to find the paths with minimum cost. Due to the NP‐completeness of the CSP problem, an Enhanced COA (so‐called E‐COA) is proposed and utilized as a metaheuristic solver. To the best of our knowledge, this paper is the first SDN‐based communication model that applies both T2FS and E‐COA for assigning proper costs to the network's links, and solves the consequence CSP problem according to the QoS requirement for telesurgery. The model also recognizes and preserves the second‐best routes in order to keep the reliability for such a critical application. In addition to the simulations, the performance evaluation is also conducted on a real experimental scenario. Many comparisons are carried out between the proposed model and other conventional methods, and the evaluation study shows the superiority of the proposed model on all the three QoS‐related metrics, i.e. average end‐to‐end delay, packet loss ratio and PSNR. 相似文献
59.
随着时代的发展,信息技术在各个领域均得到广泛运用,计算机软件技术也越发凸显出其重要性。大数据时代为人们的生活带来了便利,使日常工作变得更加高效。文章从大数据时代下计算机软件技术的内涵着手,提出了计算机软件处理数据的技术手段及应用方向,对计算机软件的相关应用展开论述。 相似文献
60.
资源型产业发展为推进国家经济增长和工业化进程提供了重要保障。为深入了解资源型产业的研究情况,以CNKI数据库为数据源,搜集2000—2020年关于资源型产业的核心及以上期刊论文,利用CiteSpace软件从发文作者与研究机构分布、关键词共现网络和时区图谱等方面,绘制知识图谱,进行可视化分析。研究发现:资源型产业领域的研究成果愈加丰富,但研究群体间联系合作较少,且现有的合作研究主要集中在所处地域资源富集和具有学科优势的研究机构及学者;资源型产业领域的研究热点可概括为产业发展、资源型城市、产业集群、产业结构、产业链和产业集聚等方面;针对资源型产业领域未来可从资源型产业相关理论研究、创新发展模式和可持续发展等方面深入展开。 相似文献