首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   78297篇
  免费   13112篇
  国内免费   8870篇
电工技术   8590篇
技术理论   1篇
综合类   8882篇
化学工业   2904篇
金属工艺   2507篇
机械仪表   6917篇
建筑科学   1639篇
矿业工程   1149篇
能源动力   2210篇
轻工业   722篇
水利工程   1173篇
石油天然气   978篇
武器工业   1408篇
无线电   12470篇
一般工业技术   4937篇
冶金工业   1057篇
原子能技术   445篇
自动化技术   42290篇
  2024年   218篇
  2023年   1217篇
  2022年   2413篇
  2021年   2628篇
  2020年   2884篇
  2019年   2391篇
  2018年   2405篇
  2017年   2821篇
  2016年   3253篇
  2015年   4076篇
  2014年   5397篇
  2013年   5229篇
  2012年   6418篇
  2011年   7040篇
  2010年   5537篇
  2009年   5767篇
  2008年   6074篇
  2007年   6804篇
  2006年   5498篇
  2005年   4648篇
  2004年   3726篇
  2003年   3077篇
  2002年   2239篇
  2001年   1656篇
  2000年   1389篇
  1999年   1102篇
  1998年   895篇
  1997年   703篇
  1996年   576篇
  1995年   406篇
  1994年   354篇
  1993年   265篇
  1992年   242篇
  1991年   158篇
  1990年   163篇
  1989年   125篇
  1988年   91篇
  1987年   40篇
  1986年   44篇
  1985年   50篇
  1984年   39篇
  1983年   31篇
  1982年   35篇
  1981年   21篇
  1980年   26篇
  1979年   18篇
  1978年   18篇
  1977年   16篇
  1976年   16篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
提出了一种基于FCOS神经网络的小建筑物目标检测算法,针对FCOS模型在特征提取阶段提取到的小建筑物目标特征较少问题,引入多尺度检测和可变形卷积方式,加强网络对小建筑物目标的特征提取能力,并通过改进后的SGE注意力机制降低特征图中的干扰噪声权重。改进后的网络可以提取到更多的小建筑物目标特征,对环境干扰噪声的鲁棒性更强。在自己搭建的数据集上进行了实验测试,结果表明,在相同环境下网络改进后建筑物的整体检测准确率提升了1.7%,其中对小建筑物目标提升了3.6%,减少了小建筑物目标漏检、误检的问题。  相似文献   
2.
在噪声雷达中,传统相关处理方法的距离旁瓣受到时宽带宽积的限制,在有限相关处理时间内得到的距离旁瓣较高,会造成微弱目标被强目标、杂波旁瓣淹没的现象。提出一种基于抽取最小均方(Least Mean Square,LMS)滤波的噪声雷达旁瓣抑制方法,将LMS滤波器的系数作为距离压缩结果,从而获取较低的距离旁瓣。对该方法的性能进行了理论分析,并通过数字仿真验证了算法的有效性和理论分析的正确性。  相似文献   
3.
In this work, coupling effects of water content, temperature, oxygen density, and polytetrafluoroethylene (PTFE) loading on oxygen transport through an ionomer thin film on a platinum surface in a catalyst layer of a proton exchange membrane (PEM) fuel cell are investigated using molecular dynamics approach. Taguchi orthogonal algorithm is employed to comprehensively analyze the coupling effects in a limited number of cases. It is found that the effect of operation temperature is the weakest among the four factors, which has the smallest effect index 14.4. Coupling effects including the PTFE loadings on the oxygen transfer through the ionomer thin film is uncovered. Less PTFE loadings should be beneficial for the oxygen transfer. The chemical potential gradient is considered as the major driven force for the oxygen transport through the ionomer thin film, and oxygen density is the dominating factor, significantly affecting the chemical potential in the thin film.  相似文献   
4.
简要叙述了MP PFGun技术工作原理、系统结构特点以及PropFrac脉冲压裂模拟器软件基本功能,并对SSM-XX井的模拟计算P-T曲线和井下压力仪实测曲线进行了对比。结果表明:SM-XX井采用MP PFGun电缆输送工艺安全,脉冲压裂持续时间长,且利用PropFrac模拟软件指导施工设计,取得了较好的应用效果。  相似文献   
5.
With a sharp increase in the information volume, analyzing and retrieving this vast data volume is much more essential than ever. One of the main techniques that would be beneficial in this regard is called the Clustering method. Clustering aims to classify objects so that all objects within a cluster have similar features while other objects in different clusters are as distinct as possible. One of the most widely used clustering algorithms with the well and approved performance in different applications is the k-means algorithm. The main problem of the k-means algorithm is its performance which can be directly affected by the selection in the primary clusters. Lack of attention to this crucial issue has consequences such as creating empty clusters and decreasing the convergence time. Besides, the selection of appropriate initial seeds can reduce the cluster’s inconsistency. In this paper, we present a new method to determine the initial seeds of the k-mean algorithm to improve the accuracy and decrease the number of iterations of the algorithm. For this purpose, a new method is proposed considering the average distance between objects to determine the initial seeds. Our method attempts to provide a proper tradeoff between the accuracy and speed of the clustering algorithm. The experimental results showed that our proposed approach outperforms the Chithra with 1.7% and 2.1% in terms of clustering accuracy for Wine and Abalone detection data, respectively. Furthermore, achieved results indicate that comparing with the Reverse Nearest Neighbor (RNN) search approach, the proposed method has a higher convergence speed.  相似文献   
6.
影响稀土灼烧工艺的因素十分复杂,关系产品质量稳定及能耗,现行工艺存在优化空间。通过剖析灼烧窑中温度和湿度分布状况,运用κ-ε双方程湍流模型、流体传热、多孔介质传热等理论,按特定组分运输模式,建立灼烧过程质量、动量和能量耦合传递数学模型。设置不同边界导入Fluent环境对数学模型进行仿真试验,完成数据处理实现工艺参数优化。结果表明所建模型能准确反映灼烧窑中温湿度场分布及变化,且最终仿真结果与实际灼烧后的产品湿度含量相符合。  相似文献   
7.
《Ceramics International》2021,47(20):28086-28105
Refractory castables develop microstructures after curing that behave as partially saturated porous media. Upon heating (during its drying stage), the steam generated by the physical and chemically bond water can result in pore pressurization and explosive spalling. Numerical modeling can provide guidelines for designing safer heat-up profiles and also a better understanding of the mechanisms that lead to catastrophic damage. This work aims to review the fundamentals and models available, providing insightful thoughts on the current trends of the drying phenomena of ceramic compositions. The review also highlights that there are models better oriented to result in reasonable predictions of pore pressure values and others focused on a more accurate representation of the main physical phenomena that take place during heating. According to the findings, there are still various challenges to attain accurate models with high applicability capable of yielding safer and more efficient drying of refractory castables.  相似文献   
8.
传统通信模拟系统设计较为复杂,导致模拟过程消耗能量较大,不能准确模拟稳频通信质量。因此,提出基于Matlab的量子激光雷达稳频通信模拟系统。由于振荡器是雷达形成初始信号源的基础,通过分析振荡电路与相位噪声,获得相位噪声函数与通信频率存在的关系;为确保通信过程的稳定,将准确性与稳定性作为信号质量的评价指标,并采用锁频环稳频技术计算频率偏移程度,根据PID控制算法控制频率,量子激光雷达稳频通信;利用Matlab确定激光器、探测器等硬件组成结构,通过时序与数字阵列的设置完成模拟系统设计。仿真结果表明所提系统结构简便、性能稳定,能够真实模拟出稳频通信的信号质量。  相似文献   
9.
In the current research, a modern learning machine algorithm named “Weighted Regularized Extreme Learning Machine (WRELM)" is implemented for the first time for the simulation of the coefficient of discharge of side slots. For this purpose, an effective variable on the coefficient of discharge of side slots is firstly introduced, then five distinctive WRELM models are produced by it for the estimation of the coefficient. In the next stage, a database is created for verification of WRELM results. it should be mentioned that 70% of the data are utilized for training the WRELM models, while the rest (i.e. 30%) for testing them. After that, the optimal number of hidden layer neurons as well as the best activation function of the WRELM algorithm are chosen. In addition, the best regularization parameter and also the weight function of the WRELM are achieved. By conducting a sensitivity analysis, the most effective variable for the simulation of the coefficient of discharge along with the WRELM superior model is introduced. The WRELM superior model estimates values of the coefficient of discharge with the maximum exactness and the highest correlation. For instance, the estimations of the correlation coefficient and scatter index for this model are computed to be 0.930 and 0.051, respectively. The sensitivity analysis shows that the ratio of the side slot crest height to its length and the Froude number should be considered as the most important input variables. A comparison between the WRELM with the ELM displays that the former works much better. Furthermore, an uncertainty analysis is executed for both models. Eventually, an equation is suggested for the estimation of the coefficient of discharge and a partial derivative sensitivity analysis is performed on it.  相似文献   
10.
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks. In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks. Cryptanalysis in both types of attacks is performed by only one selected image. Moreover, we have suggested some improvements in the algorithm to defeat attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号