首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12578篇
  免费   2118篇
  国内免费   1166篇
电工技术   2182篇
技术理论   1篇
综合类   1223篇
化学工业   375篇
金属工艺   238篇
机械仪表   545篇
建筑科学   1174篇
矿业工程   290篇
能源动力   187篇
轻工业   1454篇
水利工程   144篇
石油天然气   364篇
武器工业   137篇
无线电   2033篇
一般工业技术   799篇
冶金工业   268篇
原子能技术   43篇
自动化技术   4405篇
  2024年   68篇
  2023年   261篇
  2022年   445篇
  2021年   554篇
  2020年   603篇
  2019年   494篇
  2018年   472篇
  2017年   569篇
  2016年   563篇
  2015年   729篇
  2014年   948篇
  2013年   933篇
  2012年   1118篇
  2011年   1098篇
  2010年   829篇
  2009年   781篇
  2008年   869篇
  2007年   906篇
  2006年   677篇
  2005年   598篇
  2004年   489篇
  2003年   383篇
  2002年   301篇
  2001年   226篇
  2000年   190篇
  1999年   159篇
  1998年   113篇
  1997年   91篇
  1996年   76篇
  1995年   45篇
  1994年   48篇
  1993年   27篇
  1992年   38篇
  1991年   28篇
  1990年   23篇
  1989年   15篇
  1988年   10篇
  1987年   12篇
  1986年   4篇
  1985年   13篇
  1984年   4篇
  1983年   12篇
  1982年   7篇
  1981年   4篇
  1980年   5篇
  1978年   3篇
  1975年   3篇
  1966年   3篇
  1965年   3篇
  1959年   3篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
1.
An acoustic emission (AE) experiment was carried out to explore the AE location accuracy influenced by temperature. A hollow hemispherical specimen was used to simulate common underground structures. In the process of heating with the flame, the pulse signal of constant frequency was stimulated as an AE source. Then AE signals received by each sensor were collected and used for comparing localization accuracy at different temperatures. Results show that location errors of AE keep the same phenomenon in the early and middle heating stages. In the later stage of heating, location errors of AE increase sharply due to the appearance of cracks. This provides some beneficial suggestions on decreasing location errors of structural cracks caused by temperature and improves the ability of underground structure disaster prevention and control.  相似文献   
2.
深凹露天矿山由于其特殊的结构,爆破产生的炮烟扩散稀释较为困难,严重危害生产作业人员的生命安全与健康。基于实际矿山构建了深凹露天矿山的二维物理及数学模型,采用非稳态数值分析方法研究了不同爆破位置下,深凹露天矿山采坑内爆破炮烟的扩散规律。研究结果表明:不同爆破位置下,露天采坑内均出现复环流,爆破点位置是影响露天采坑内风流结构特征的重要因素;露天采坑内的炮烟最高浓度均随着时间变化而逐渐下降,但下降的速率逐步减小,呈现三个阶段的下降趋势;爆破位置位于背风侧时露天采坑内的炮烟最高浓度和降至安全浓度所需时间远高于迎风侧三个爆破位置;随着背风侧爆破点距采坑底部距离的减小,炮烟最高浓度及降至安全浓度所需时间先降低后增加,炮烟最高浓度及降至安全浓度所需时间随着迎风侧爆破位置距采坑底部距离的减小而增加。研究结果对于指导深凹露天矿山企业合理组织爆破后的生产作业和保障作业人员安全具有重要意义。  相似文献   
3.
The objective of this study is to investigate the impact of biomass feeding location on rice husk gasification for hydrogen production. By comparing the results between top-feed and bottom-feed of the feedstock of the fluidized bed biomass gasification at the reaction temperature between 600~1000 °C and ER = 0.2, 0.27, and 0.33 without steam, the optimum low heating value was increase by 2.35 kJ/g-rice husk by the top-feed to gasifier. Although the yield of hydrogen was decreased by 42% for the rice husk gasification by the top-feed operation, the yield of CO, CO2, and CH4 were highly increased, which enhancing the heating value of the effluent gas. The study results suggested the potential route of the biomass gasification at the different feeding location.  相似文献   
4.
Recent generative adversarial networks (GANs) have yielded remarkable performance in face image synthesis. GAN inversion embeds an image into the latent space of a pretrained generator, enabling it to be used for real face manipulation. However, current inversion approaches for real faces suffer the dilemma of initialization collapse and identity loss. In this paper, we propose a hierarchical GAN inversion for real faces with identity preservation based on mutual information maximization. We first use a facial domain guaranteed initialization to avoid the initialization collapse. Furthermore, we prove that maximizing the mutual information between inverted faces and their identities is equivalent to minimizing the distance between identity features from inverted and original faces. Optimization for real face inversion with identity preservation is implemented on this mutual information-maximizing constraint. Extensive experimental results show that our approach outperforms state-of-the-art solutions for inverting and editing real faces, particularly in terms of face identity preservation.  相似文献   
5.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
6.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset.  相似文献   
7.
中国的海相富有机质页岩经历了多期构造改造,其含气性具有明显的差异。页岩气在不同构造演化阶段的保存条件是揭示页岩气差异富集机理的关键科学问题之一,开展构造-热演化研究可以明确其热演化史和构造隆升-剥蚀过程,为其评价提供演化格架。研究以丁山地区下古生界页岩为对象,联合磷灰石裂变径迹、磷灰石(U-Th)/He和锆石(U-Th)/He等多个古温标反演热演化史,结合镜质体反射率重建的最高古地温剖面,对丁山地区燕山期以来的差异构造隆升过程和剥蚀量进行了恢复,并在此基础上结合流体包裹体分析对丁山地区龙马溪组页岩的压力演化过程进行了模拟;根据页岩在埋藏—抬升过程中的温、压演化特征,定量表征了不同抬升阶段页岩含气量的变化,建立了龙马溪组页岩"埋藏—生烃—抬升"的演化格架。分析表明,丁山地区在燕山期和喜马拉雅期经历了不同的构造隆升过程。燕山期表现为"早期快速隆升—晚期缓慢隆升"的分段隆升,具有自NW向SE递进隆升且隆升幅度逐渐增大的特征;喜马拉雅期表现为整体快速隆升。燕山期是丁山地区产生差异构造隆升的主要时期。受这种差异构造隆升-剥蚀作用的影响,龙马溪组页岩的降温、降压过程和页岩气的散失过程具有明显的差异。燕山期的差异构造隆升是造成丁山地区龙马溪组页岩含气性呈平面分带的主要原因。  相似文献   
8.
Abstract

In this article I argue that the study of cultural heritage preservation practices in the context of Muslim societies has been constructed—and obstructed—through specific historical trajectories and challenges. These originate within the field of cultural heritage preservation, through its own history and principles which have complicated the interplay between heritage and religious values and uses. As a result, situated studies of preservation practices in and by Muslim communities are in their infancy. In this article I revisit the points of contact between the emergence of a Eurocentric preservation dogma and its encounter with different articulations and practices related to Islam that are now approached as part of heritage assemblages and debates. I consider specific biases inherent in these discourses and propose, as a result, to approach the study of Islam and heritage in its own terms—rather than as an alternative to Western preservation paradigms.  相似文献   
9.
With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the new location privacy challenges caused by DLBS, since the service device is enabled to perform the localization without the permission of the user. To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user. The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information of their device. We make the simulation of our proposed scheme and the result convince its effectiveness.  相似文献   
10.
The volume of freight vehicles operating within city boundaries is steadily increasing, which contributes to road congestion, especially in urban areas with a parking deficit. The proper identification of the location and size of commercial parking lay-by areas, where delivery vehicles can park for a limited time to perform loading/unloading operations, can relieve road congestion. Compared to the existing literature, this paper presents an improved two-stage approach, which includes a mathematical programme and a simulation model for determining the location and sizing of lay-by areas. The robustness and soundness of the results from a methodological and practical point of view are discussed using an example application.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号