首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31931篇
  免费   2372篇
  国内免费   2039篇
电工技术   1895篇
技术理论   1篇
综合类   3395篇
化学工业   926篇
金属工艺   2608篇
机械仪表   5142篇
建筑科学   1086篇
矿业工程   1086篇
能源动力   409篇
轻工业   481篇
水利工程   453篇
石油天然气   1803篇
武器工业   352篇
无线电   3214篇
一般工业技术   1240篇
冶金工业   789篇
原子能技术   189篇
自动化技术   11273篇
  2024年   45篇
  2023年   233篇
  2022年   451篇
  2021年   584篇
  2020年   701篇
  2019年   510篇
  2018年   482篇
  2017年   735篇
  2016年   846篇
  2015年   1106篇
  2014年   1827篇
  2013年   1613篇
  2012年   2221篇
  2011年   2493篇
  2010年   1898篇
  2009年   1887篇
  2008年   2015篇
  2007年   2537篇
  2006年   2262篇
  2005年   2062篇
  2004年   1714篇
  2003年   1656篇
  2002年   1282篇
  2001年   1121篇
  2000年   858篇
  1999年   637篇
  1998年   495篇
  1997年   435篇
  1996年   371篇
  1995年   302篇
  1994年   228篇
  1993年   178篇
  1992年   115篇
  1991年   95篇
  1990年   57篇
  1989年   55篇
  1988年   42篇
  1987年   33篇
  1986年   19篇
  1985年   18篇
  1984年   21篇
  1983年   33篇
  1982年   16篇
  1981年   11篇
  1980年   6篇
  1979年   10篇
  1977年   8篇
  1976年   4篇
  1974年   3篇
  1959年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
单汽泡沸腾过程数值模拟的研究   总被引:1,自引:0,他引:1  
《石油化工》2015,44(11):1295
利用Comsol Multiphysics软件中的Level Set方法对单汽泡沸腾过程进行了模拟,建立了微细结构网格,给出了边界条件,求解了质量、动量、能量和Level Set方程,得到了正确的模拟结果。分析了单汽泡沸腾过程中相含率、压力场、速度场和温度场随时间的变化规律;考察了接触角和壁面效应对汽泡脱离直径和汽泡生长周期的影响。模拟结果表明,当接触角小于12°时,汽泡脱离直径维持不变;当接触角大于12°时,接触角越大,汽泡脱离直径越大。汽泡生长周期随接触角的增大而延长。当加热装置的直径小于汽泡脱离直径时,汽泡受壁面效应的影响不易脱离;当加热装置的直径大于汽泡脱离直径时,汽泡脱离直径不随加热装置直径的增大而变化;汽泡生长周期随加热装置直径的增大而缩短。  相似文献   
52.
Contemporary parallel debuggers allow users to control more than one processing thread while supporting the same examination and visualisation operations of that of sequential debuggers. This approach restricts the use of parallel debuggers when it comes to large scale scientific applications run across hundreds of thousands compute cores. First, manually observing the runtime data to detect error becomes impractical because the data is too big. Second, performing expensive but useful debugging operations becomes infeasible as the computational codes become more complex, involving larger data structures, and as the machines become larger. This study explores the idea of a data‐centric debugging approach, which could be used to make parallel debuggers more powerful. It discusses the use of ad hoc debug‐time assertions that allow a user to reason about the state of a parallel computation. These assertions support the verification and validation of program state at runtime as a whole rather than focusing on that of only a single process state. Furthermore, the debugger's performance can be improved by exploiting the underlying parallel platform because the available compute cores can execute parallel debugging functions, while a program is idling at a breakpoint. We demonstrate the system with several case studies and evaluate the performance of the tool on a 20 000 cores Cray XE6. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
53.
The load applied to a machine tool feed drive changes during the machining process as material is removed. This load change alters the Coulomb friction of the feed drive. Because Coulomb friction accounts for a large part of the total friction the friction compensation control accuracy of the feed drives is limited if this nonlinear change in the applied load is not considered. This paper presents a new friction compensation method that estimates the machine tool load in real time and considers its effect on friction characteristics. A friction observer based on a Kalman filter with load estimation is proposed for friction compensation control considering the applied load change. A specially designed feed drive testbed that enables the applied load to be modified easily was constructed for experimental verification. Control performance and friction estimation accuracy are demonstrated experimentally using the testbed.  相似文献   
54.
软件功能安全验证活动对提高安全关键系统的安全性具有重要作用,它贯穿于软件安全生命周期的各个阶段。通过对各阶段输出文档的审查和分析,可尽早发现软件问题,降低软件修复成本。完整的问题闭环处理流程可有效解决软件验证活动中发现的问题,给出各方均满意的处理结果。  相似文献   
55.
Though some software development teams are highly effective at delivering security, others either do not care or do not have access to security experts to teach them how. Unfortunately, these latter teams are still responsible for the security of the systems they build: systems that are ever more important to ever more people. We propose that a series of lightweight interventions, six hours of facilitated workshops delivered over three months, can improve a team's motivation to consider security and awareness of assurance techniques, changing its security culture even when no security experts are involved. The interventions were developed after an Appreciative Inquiry and Grounded Theory survey of security professionals to find out what approaches work best. We tested the interventions in a participatory action research field study where we delivered the workshops to three software development organizations and evaluated their effectiveness through interviews beforehand, immediately afterwards, and after twelve months. We found that the interventions can be effective with teams with limited or no security experience and that improvement is long-lasting. This approach and the learning points arising from the work here have the potential to be applied in many development teams, improving the security of software worldwide.  相似文献   
56.
Deep learning has gained a significant popularity in recent years thanks to its tremendous success across a wide range of relevant fields of applications, including medical image analysis domain in particular. Although convolutional neural networks (CNNs) based medical applications have been providing powerful solutions and revolutionizing medicine, efficiently training of CNNs models is a tedious and challenging task. It is a computationally intensive process taking long time and rare system resources, which represents a significant hindrance to scientific research progress. In order to address this challenge, we propose in this article, R2D2, a scalable intuitive deep learning toolkit for medical imaging semantic segmentation. To the best of our knowledge, the present work is the first that aims to tackle this issue by offering a novel distributed versions of two well-known and widely used CNN segmentation architectures [ie, fully convolutional network (FCN) and U-Net]. We introduce the design and the core building blocks of R2D2. We further present and analyze its experimental evaluation results on two different concrete medical imaging segmentation use cases. R2D2 achieves up to 17.5× and 10.4× speedup than single-node based training of U-Net and FCN, respectively, with a negligible, though still unexpected segmentation accuracy loss. R2D2 offers not only an empirical evidence and investigates in-depth the latest published works but also it facilitates and significantly reduces the effort required by researchers to quickly prototype and easily discover cutting-edge CNN configurations and architectures.  相似文献   
57.
58.
Telemedicine is a new area based on the information and communication technology for collecting, storing, organizing, retrieving and exchanging medical information. One of the most important applications of telemedicine is indeed telesurgery in which an efficient telecommunication infrastructure between the surgery room and remote surgeons need to be established. One of the most important issues to be tackled in telesurgery is to find favorable links for routing as well as providing high Quality of Service (QoS). In this paper, an efficient model based on the hybridization of Type‐2 Fuzzy System (T2FS) and Cuckoo Optimization Algorithm (COA) over the Software Defined Networks (SDN) is proposed in order to achieve optimal and reliable routes for telesurgery application. Using T2FS, the fitness of the links is determined; then, a COA is conducted over the Constraint Shortest Path (CSP) problem to find the best routes. Delay is considered as a CSP problem which is satisfied by trying to find the paths with minimum cost. Due to the NP‐completeness of the CSP problem, an Enhanced COA (so‐called E‐COA) is proposed and utilized as a metaheuristic solver. To the best of our knowledge, this paper is the first SDN‐based communication model that applies both T2FS and E‐COA for assigning proper costs to the network's links, and solves the consequence CSP problem according to the QoS requirement for telesurgery. The model also recognizes and preserves the second‐best routes in order to keep the reliability for such a critical application. In addition to the simulations, the performance evaluation is also conducted on a real experimental scenario. Many comparisons are carried out between the proposed model and other conventional methods, and the evaluation study shows the superiority of the proposed model on all the three QoS‐related metrics, i.e. average end‐to‐end delay, packet loss ratio and PSNR.  相似文献   
59.
随着时代的发展,信息技术在各个领域均得到广泛运用,计算机软件技术也越发凸显出其重要性。大数据时代为人们的生活带来了便利,使日常工作变得更加高效。文章从大数据时代下计算机软件技术的内涵着手,提出了计算机软件处理数据的技术手段及应用方向,对计算机软件的相关应用展开论述。  相似文献   
60.
资源型产业发展为推进国家经济增长和工业化进程提供了重要保障。为深入了解资源型产业的研究情况,以CNKI数据库为数据源,搜集2000—2020年关于资源型产业的核心及以上期刊论文,利用CiteSpace软件从发文作者与研究机构分布、关键词共现网络和时区图谱等方面,绘制知识图谱,进行可视化分析。研究发现:资源型产业领域的研究成果愈加丰富,但研究群体间联系合作较少,且现有的合作研究主要集中在所处地域资源富集和具有学科优势的研究机构及学者;资源型产业领域的研究热点可概括为产业发展、资源型城市、产业集群、产业结构、产业链和产业集聚等方面;针对资源型产业领域未来可从资源型产业相关理论研究、创新发展模式和可持续发展等方面深入展开。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号