首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35146篇
  免费   4294篇
  国内免费   3080篇
电工技术   1806篇
技术理论   6篇
综合类   5453篇
化学工业   3195篇
金属工艺   1702篇
机械仪表   1621篇
建筑科学   2075篇
矿业工程   786篇
能源动力   2729篇
轻工业   874篇
水利工程   1473篇
石油天然气   2885篇
武器工业   355篇
无线电   2735篇
一般工业技术   5416篇
冶金工业   873篇
原子能技术   461篇
自动化技术   8075篇
  2024年   56篇
  2023年   949篇
  2022年   1308篇
  2021年   1363篇
  2020年   1564篇
  2019年   1527篇
  2018年   1372篇
  2017年   1460篇
  2016年   1397篇
  2015年   1289篇
  2014年   1753篇
  2013年   2396篇
  2012年   2345篇
  2011年   2443篇
  2010年   1848篇
  2009年   1864篇
  2008年   1835篇
  2007年   1975篇
  2006年   1856篇
  2005年   1554篇
  2004年   1359篇
  2003年   1159篇
  2002年   1042篇
  2001年   817篇
  2000年   783篇
  1999年   745篇
  1998年   611篇
  1997年   554篇
  1996年   533篇
  1995年   508篇
  1994年   431篇
  1993年   327篇
  1992年   289篇
  1991年   250篇
  1990年   209篇
  1989年   173篇
  1988年   134篇
  1987年   85篇
  1986年   78篇
  1985年   50篇
  1984年   44篇
  1983年   27篇
  1982年   39篇
  1981年   34篇
  1980年   16篇
  1979年   25篇
  1978年   14篇
  1977年   7篇
  1959年   5篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
82.
针对嵌入式机载软件设计中存在的典型缺陷问题,结合嵌入式机载软件任务调度特性,提出采用随机Petri网对嵌入式机载软件设计进行仿真验证的可靠性检测方法,以提高嵌入式机载软件设计的可靠性。该方法采用随机Petri网对嵌入式机载软件系统行为建模,并给出典型缺陷的检测策略和判定准则,然后通过对Petri网模型进行仿真验证,检测系统是否存在此类设计缺陷;并给出了软件设计的运行流程的仿真验证算法,以支持对相应设计的可靠性检测。通过与其他可靠性检测方法的比较,表明了该方法的有效性。  相似文献   
83.
针对强背景噪声下经典随机共振方法对滚动轴承故障特征提取效果差的问题,提出了一种基于改进耦合增强随机共振的滚动轴承故障诊断方法。首先,利用一个定参双稳系统和一个变参双稳系统构成耦合随机共振系统,外部输入直接作用于定参双稳系统;然后,通过调节变参双稳系统参数和耦合系数实现耦合系统的随机共振控制,并借助遗传算法实现控制参数的自适应选取。实验和工程应用验证了所提方法的有效性和优越性。  相似文献   
84.
《等离子体科学和技术》2019,21(11):115403-44
In this paper, a honeycomb structure jet array with seven jet units was adopted to generate plasmas. Both the average discharge power and the emission intensity of the main excited species increase with increasing applied voltage. There are three stages of discharge evolution at different applied voltages: initial discharge, uniform discharge and strong coupling discharge.The spatial distribution of the emission intensity of the excited species can be divided into three categories: growth class, weakening class and variation class. The gas temperature along the whole plasma plume at different applied voltages is maintained at around 320K and can be widely used in heat-labile applications.  相似文献   
85.
Inspired by the gradient-based and inversion-free iterations, a new quasi gradient-based inversion-free iterative algorithm is proposed for solving the nonlinear matrix equation X+ATX?nA=I. The convergence proof of the suggested algorithm is given. Several matrix norm inequalities are established to depict the convergence properties of this algorithm. Three numerical examples are given to illustrate the effectiveness of the suggested algorithms.  相似文献   
86.
We provide normal forms and the global phase portraits on the Poincaré disk of the Abel quadratic differential equations of the second kind having a symmetry with respect to an axis or to the origin. Moreover, we also provide the bifurcation diagrams for these global phase portraits.  相似文献   
87.
Differential evolution is primarily designed and used to solve continuous optimization problems. Therefore, it has not been widely considered as applicable for real-world problems that are characterized by permutation-based combinatorial domains. Many algorithms for solving discrete problems using differential evolution have been proposed, some of which have achieved promising results. However, to enhance their performance, they require improvements in many aspects, such as their convergence speeds, computational times and capabilities to solve large discrete problems. In this paper, we present a new mapping method that may be used with differential evolution to solve combinatorial optimization problems. This paper focuses specifically on the mapping component and its effect on the performance of differential evolution. Our method maps continuous variables to discrete ones, while at the same time, it directs the discrete solutions produced towards optimality, by using the best solution in each generation as a guide. To judge its performance, its solutions for instances of well-known discrete problems, namely: 0/1 knapsack, traveling salesman and traveling thief problems, are compared with those obtained by 8 other state-of-the-art mapping techniques. To do this, all mapping techniques are used with the same differential evolution settings. The results demonstrated that our technique significantly outperforms the other mapping methods in terms of the average error from the best-known solution for the traveling salesman problems, and achieves promising results for both the 0/1 knapsack and the traveling thief problems.  相似文献   
88.
We deal with the mathematical model of the incremental degradation of the internal coating (e.g. a polymeric material) of a metallic pipe in which a fluid flows relatively fast. The fluid drags solid impurities so that longitudinal scratches, inaccessible to any direct inspection procedure, are produced on the coating. Time evolution of this kind of defects can be reconstructed from the knowledge of a sequence of temperature maps of the external surface. The time-varying orthogonal section of this damaged interface is determined as a function of time and polar angle through the identification of a suitable effective heat transfer coefficient by means of Thin Plate Approximation.  相似文献   
89.
This paper deals with the determination of an initial condition in degenerate hyperbolic equation from final observations. With the aim of reducing the execution time, this inverse problem is solved using an approach based on double regularization: a Tikhonov’s regularization and regularization in equation by viscose-elasticity. So, we obtain a sequence of weak solutions of degenerate linear viscose-elastic problems. Firstly, we prove the existence and uniqueness of each term of this sequence. Secondly, we prove the convergence of this sequence to the weak solution of the initial problem. Also we present some numerical experiments to show the performance of this approach.  相似文献   
90.
利用扫描电镜、X射线衍射仪和电子背散射衍射仪等设备研究了热轧态316L不锈钢金属间相(σ相和χ相)在固溶过程中的微结构演变规律,同时,利用高温激光共聚焦显微镜对金属间相回溶的全过程进行了原位在线观察,确定了最佳固溶温度。结果表明,固溶过程中发生了γ+σ+χ→γ+σ+χ+α/FeCr→γ+α/FeCr的相变过程。金属间相的回溶从1033.1℃开始到1149.5℃结束,回溶时间为21s,消除金属间相的最佳固溶温度约为1150℃。固溶处理前,基体中分布的带状组织形态不规则,χ相和σ相的面积比分别为0.46%和0.94%;固溶处理后,带状组织形态一致,主要分布铁素体和FeCr相,而χ相和σ相不可见。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号