首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14177篇
  免费   992篇
  国内免费   113篇
电工技术   232篇
综合类   61篇
化学工业   3597篇
金属工艺   353篇
机械仪表   499篇
建筑科学   546篇
矿业工程   21篇
能源动力   979篇
轻工业   1309篇
水利工程   210篇
石油天然气   226篇
武器工业   4篇
无线电   1473篇
一般工业技术   2598篇
冶金工业   608篇
原子能技术   96篇
自动化技术   2470篇
  2024年   70篇
  2023年   269篇
  2022年   602篇
  2021年   907篇
  2020年   764篇
  2019年   828篇
  2018年   922篇
  2017年   842篇
  2016年   824篇
  2015年   479篇
  2014年   765篇
  2013年   1428篇
  2012年   916篇
  2011年   975篇
  2010年   678篇
  2009年   610篇
  2008年   441篇
  2007年   368篇
  2006年   314篇
  2005年   208篇
  2004年   188篇
  2003年   160篇
  2002年   129篇
  2001年   101篇
  2000年   98篇
  1999年   91篇
  1998年   180篇
  1997年   161篇
  1996年   118篇
  1995年   94篇
  1994年   77篇
  1993年   76篇
  1992年   56篇
  1991年   44篇
  1990年   45篇
  1989年   41篇
  1988年   30篇
  1987年   31篇
  1986年   41篇
  1985年   30篇
  1984年   31篇
  1983年   29篇
  1982年   23篇
  1981年   20篇
  1980年   22篇
  1979年   19篇
  1978年   22篇
  1977年   24篇
  1976年   31篇
  1975年   14篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Tunnels are increasingly being excavated in soft ground conditions when services are required in urban environments, and it is now common to have tunnels crossing at various elevations. As the tunnel excavations are undertaken at different levels, there will be an interaction which can have a significant influence on stress distributions and consequently deformations within the tunnels and surface settlement. As multi-layer tunnelling is a three dimensional phenomenon in nature, 3D numerical solutions must be utilized for perpendicularly crossing tunnels at various levels. This paper reports the investigations into the changes in stress distribution, deformations and surface settlements which may be expected when the twin Tohid Tunnels pass beneath the Line 4 metro tunnel in Tehran.  相似文献   
992.
Temporal fluctuations of the speckle pattern formed upon backscattering of a laser beam from an interface between gold and nonlinear polymer film have been observed as a function of optical power. The instability can be explained by coupling of laser light to surface plasmons and other guided modes, which experience multiple scattering while propagating in the film along the interface. The speckle pattern produced in this process is extremely sensitive to fluctuations of the scattering potential near the interface.  相似文献   
993.
An unprecedented growth in computer and communication systems in the last two decades has resulted in a proportional increase in the number and sophistication of network attacks. In particular, the number of previously-unseen attacks has increased exponentially in the last few years. Due to the rapidly evolving nature of network attacks, a considerable paradigm shift has taken place in the intrusion detection community. The main focus is now on Network Anomaly Detection Systems (NADSs) which model and flag deviations from normal/benign behavior of a network and can hence detect previously-unseen attacks. Contemporary NADS borrow concepts from a variety of theoretical fields (e.g., Information theory, stochastic and machine learning, signal processing, etc.) to model benign behavior. These NADSs, however, fall short of achieving acceptable performance levels as therefore widespread commercial deployments. Thus, in this paper, we firstly evaluate the performance of eight prominent network-based anomaly detectors under malicious portscan attacks to identify which NADSs perform better than others and why. These NADSs are evaluated on three criteria: accuracy (ROC curves), scalability (with respect to varying normal and attack traffic rates, and deployment points) and detection delay. These criteria are evaluated using two independently collected datasets with complementary strengths. We then propose novel methods and promising guidelines to improve the accuracy and scalability of existing and future anomaly detectors. Experimental analysis of the proposed guidelines is also presented for the proof of concept.  相似文献   
994.
In this paper, an adaptive control scheme, based on fuzzy logic systems, for pH control is addressed. For implementation of the proposed scheme no composition measurement is required. Stability of the closed-loop system is established and it is shown that the solution of the closed-loop system is uniformly ultimately bounded and under a certain condition, asymptotical stability is achieved. Effectiveness of the proposed controller is tested through simulation and experimental studies. Results indicate that the proposed controller has good performances in set-point tracking and load rejection and much better than that of a tuned PI controller.  相似文献   
995.
Murat  Ali  Wei  Bradley   《Data & Knowledge Engineering》2009,68(11):1206
Organizations, such as federally-funded medical research centers, must share de-identified data on their consumers to publicly accessible repositories to adhere to regulatory requirements. Many repositories are managed by third-parties and it is often unknown if records received from disparate organizations correspond to the same individual. Failure to resolve this issue can lead to biased (e.g., double counting of identical records) and underpowered (e.g., unlinked records of different data types) investigations. In this paper, we present a secure multiparty computation protocol that enables record joins via consumers’ encrypted identifiers. Our solution is more practical than prior secure join models in that data holders need to interact with the third party one time per data submission. Though technically feasible, the speed of the basic protocol scales quadratically with the number of records. Thus, we introduce an extended version of our protocol in which data holders append k-anonymous features of their consumers to their encrypted submissions. These features facilitate a more efficient join computation, while providing a formal guarantee that each record is linkable to no less than k individuals in the union of all organizations’ consumers. Beyond a theoretical treatment of the problem, we provide an extensive experimental investigation with data derived from the US Census to illustrate the significant gains in efficiency such an approach can achieve.  相似文献   
996.
997.
Since industry is rapidly developing, either locally or globally, manufacturers witness harder challenges due to the growing competitivity. This urges them to better consider the four factors linked to production and output: quality, quantity, cost and price, quality being of course the most important factor which constitutes their main concern. Efforts will be concentrated??in this research??on improving the quality and securing more accuracy for a machined surface in ball-end milling. Quality and precision are two essential criteria in industrial milling. However, milling errors and imperfections, due mainly to the cutting tool deflection, hinder the full achieving of these targets. Our task, all along this paper, consists in studying and realizing the simulation of the deflected cutting tool trajectory, by using the methods which are available. In a future stage, and in the frame of a deeper research, the simulation process will help to carry out the correction and the compensation of the errors resulting from the tool deflection. The corrected trajectory which is obtained by the method mirror will be sent to the machine. To achieve this goal, the next process consists??as a first step??in selecting a model of cutting forces for a ball-end mill. This allows to define??later on??the behavior of this tool, and the emergence of three methods namely the analytical model, the finite elements method, and the experimental method. It is possible to tackle the cutting forces simulation, all along the tool trajectory, while this latter is carrying out the sweeping of the part to be machined in milling and taking into consideration the cutting conditions, as well as the geography of the workpiece. A simulation of the deflected cutting tool trajectory dependent on the cutting forces has been realized.  相似文献   
998.
In this study, NiCu composite coating was electrochemically deposited on a copper electrode (Cu/NiCu) and tested for hydrogen evolution reaction (HER) in 1 M KOH solution for long-term electrolysis with the help of cathodic current–potential curves and electrochemical impedance spectroscopy (EIS) techniques. The bulk and surface composition of the coating was determined using atomic absorption spectroscopy (AAS) and energy dispersive X-ray (EDX) analysis. The surface morphology was investigated by scanning electron microscopy (SEM). The effect of electrolysis on the corrosion behavior of the Cu/NiCu electrode was also reported. It was found that the NiCu coating had a compact and porous structure with good time stability. The HER activity of the coating was stable over 120 h electrolysis and the HER mechanism was not modified during the operation. The corrosion tests showed that the corrosion resistance of the Cu/NiCu electrode changed when a cathodic current was applied to the electrolysis system.  相似文献   
999.
This paper presents a comprehensive modelling methodology for the electromagnetic immunity of integrated circuits (ICs) to direct power injection (DPI). The aim of this study is to predict the susceptibility of ICs by the means of simulations performed on an appropriate electrical model of different integrated logic cores located in the same die. These cores are identical from a functional point of view, but differ by their design strategies. The simulation model includes the whole measurement setup as well as the integrated circuit under test, its environment (PCB, power supply) and the substrate model of each logic core. Simulation results and comparisons with measurement results demonstrate the validity of the suggested model. Moreover, they highlight the interest of the aforementioned protection strategies against electromagnetic disturbances.  相似文献   
1000.
A series of cobalt and manganese catalysts supported on SBA-15 with different loading of Mn+2 and Co+2 were synthesized. These samples were characterized by SEM and XRD techniques. The catalytic activity of these samples was evaluated in the oxidation of ethylbenzene (EB) to produce acetophenone (AP) and benzoic acid (BA) in the liquid phase using tert-butylhydroperoxide (TBHP) as an oxidant. The effects of Co-Mn loading, TBHP: EB molar ratio and temperature on acetophenone and benzoic acid yields were studied by Box-Behnken experimental design to optimize the production of acetophenone and benzoic acid in liquid system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号