首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21602篇
  免费   1755篇
  国内免费   905篇
电工技术   1183篇
技术理论   2篇
综合类   1368篇
化学工业   3616篇
金属工艺   1165篇
机械仪表   1366篇
建筑科学   1954篇
矿业工程   763篇
能源动力   576篇
轻工业   1202篇
水利工程   346篇
石油天然气   1505篇
武器工业   121篇
无线电   2213篇
一般工业技术   2592篇
冶金工业   1193篇
原子能技术   232篇
自动化技术   2865篇
  2024年   105篇
  2023年   433篇
  2022年   636篇
  2021年   891篇
  2020年   737篇
  2019年   618篇
  2018年   661篇
  2017年   744篇
  2016年   626篇
  2015年   816篇
  2014年   1115篇
  2013年   1218篇
  2012年   1392篇
  2011年   1435篇
  2010年   1294篇
  2009年   1160篇
  2008年   1144篇
  2007年   1110篇
  2006年   1170篇
  2005年   1102篇
  2004年   653篇
  2003年   569篇
  2002年   509篇
  2001年   478篇
  2000年   445篇
  1999年   590篇
  1998年   497篇
  1997年   417篇
  1996年   377篇
  1995年   322篇
  1994年   253篇
  1993年   149篇
  1992年   131篇
  1991年   118篇
  1990年   88篇
  1989年   72篇
  1988年   56篇
  1987年   29篇
  1986年   30篇
  1985年   13篇
  1984年   11篇
  1983年   8篇
  1982年   13篇
  1981年   5篇
  1980年   3篇
  1979年   3篇
  1978年   2篇
  1977年   6篇
  1976年   8篇
排序方式: 共有10000条查询结果,搜索用时 13 毫秒
31.
32.
Laser shock forming (LSF) technology employs shock waves to form sheet metal into three-dimensional complex parts, and has application potential in manufacturing sheet metal parts. In this paper, the forming of 2024 aluminum alloy sheet with LSF was investigated through numerical and experimental methods. The numerical model was established with the commercial code ABAQUS/Explicit. The formed conical cup was obtained from the simulation, and validated by the experiment. With the verified numerical model, the deformation behaviors, including deformation velocity, sheet thickness variation and strain distribution, were studied. In addition, the influence of different shock wave pressures on the forming precision was also investigated. The experimental and numerical results show that the metal sheet loaded by shock wave can take the shape of the mold, and the non-uniform thickness is distributed in the formed cup. The investigations also display that there exists reverse deformation at the central region of deforming sheet owing to severe collision during LSF. In order to obtain formed part with better quality, an appropriate pressure of applied shock waves is required.  相似文献   
33.
Zan  Wu  Zhang  Qiaochu  Xu  Hu  Liao  Fuyou  Guo  Zhongxun  Deng  Jianan  Wan  Jing  Zhu  Hao  Chen  Lin  Sun  Qingqing  Ding  Shijin  Zhou  Peng  Bao  Wenzhong  Zhang  David Wei 《Nano Research》2018,11(7):3739-3745
Nano Research - A spin-coating method was applied to obtain thinner and smoother PEO/LiClO4 polymer electrolyte films (EFs) with a lower level of crystallization than those obtained using a...  相似文献   
34.
With the great potential of the all-polymer solar cells for large-area wearable devices, both large-area device efficiency and mechanical flexibility are very critical but attract limited attention. In this work, from the perspective of the polymer configurations, two types of terpolymer acceptors PYTX-A and PYTX-B (X = Cl or H) are developed. The configuration difference caused by the replacement of non-conjugated units results in distinct photovoltaic performance and mechanical flexibility. Benefiting from a good match between the intrinsically slow film-forming of the active materials and the technically slow film-forming of the blade-coating process, the toluene-processed large-area (1.21 cm2) binary device achieves a record efficiency of 14.70%. More importantly, a new parameter of efficiency stretchability factor (ESF) is proposed for the first time to comprehensively evaluate the overall device performance. PM6:PYTCl-A and PM6:PYTCl-B yield significantly higher ESF than PM6:PY-IT. Further blending with non-conjugated polymer donor PM6-A, the best ESF of 3.12% is achieved for PM6-A:PYTCl-A, which is among the highest comprehensive performances.  相似文献   
35.
The effect of a naturally occurring plant phenolic constituent (the acylphloroglucinol derivative, jensenone, derived from Eucalyptus jensenii) on the food intake of two folivorous marsupials, the common ringtail (Pseudocheirus peregrinus) and the common brushtail possum (Trichosurus vulpecula) was studied. When fed diets containing varying concentrations of jensenone, both species regulated their intake of jensenone so as not to exceed a ceiling intake. This ceiling was about twice as high for common ringtails as for common brushtails from northern Australia. Southern populations of common ringtails showed greatly reduced capacities to tolerate jensenone. When common brushtails were injected (0.5 mg.kg-0.75 body mass) with ondansetron (a selective antagonist of serotonin 5HT3 receptors), they ate significantly more jensenone than animals injected with physiological saline. The same pattern was observed when common ringtails were fed diets containing both jensenone and ondansetron (0.0035 mg.g-1 wet mass of diet). Ondansetron injection had no effect on food intake when the food did not contain jensenone while the addition of higher doses of ondansetron to diets of common ringtails very slightly reduced food intakes of a non-jensenone diet. When common brushtails were given 50 mg of jensenone by gastric lavage, their average subsequent intake of dietary jensenone matched the difference between the daily threshold and the dose given, although the response of individuals was highly variable. Lavage with water alone had no effect on subsequent jensenone intake compared with the pre-dose period. We interpret these results as evidence that the antifeedant effects of jensenone and related compounds are partly mediated by serotonin action on 5HT3 receptors most likely via "nausea" to condition a food aversion.  相似文献   
36.
基于蚁群算法的网格资源发现模型研究   总被引:1,自引:0,他引:1  
本文通过对传统的网格资源发现存在的问题进行分析,针对其不足,引入蚁群算法,提出基于蚁群算法的网格资源发现模型(AA_GRRM),设计并分析AA_GRRM的体系结构,并对其关键模块分析设计,以提高网格资源发现效率。  相似文献   
37.
Contaminant intrusion in a water distribution network is a complex but a commonly observed phenomenon, which depends on three elements – a pathway, a driving force and a contamination source. However, the data on these elements are generally incomplete, non-specific and uncertain. In an earlier work, Sadiq, Kleiner, and Rajani (2006) have successfully applied traditional Dempster–Shafer theory (DST) to estimate the “risk” of contaminant intrusion in a water distribution network based on limited uncertain information. However, the method used for generating basic probability assignment (BPA) was not very flexible, and did not handle and process uncertain information effectively. In this paper, a more pragmatic method is proposed that utilizes “soft” computing flexibility to generate BPAs from uncertain information. This paper compares these two methods through numerical examples, and demonstrates the efficiency and effectiveness of modified method.  相似文献   
38.
随着电子商务的发展,以"客户为中心"已成为电子商务企业的经营策略,而任何高效的客户关系管理都是以扎实的客户分类为基础。然而电子商务中所搜集到的客户信息往往具有海量、高维度和不完备等特点,如何对其正确、高效地分类是一个难题。根据电子商务客户信息的特点,构建B2C客户分类模型,提出了先对客户信息进行主成分分析以消除属性之间的依赖性,而后用朴素贝叶斯算法进行分类的新方法。实验表明了该方法的有效性。  相似文献   
39.
We consider the problem of revenue maximization on multi‐unit auctions where items are distinguished by their relative values; any pair of items has the same ratio of values to all buyers. As is common in the study of revenue maximizing problems, we assume that buyers' valuations are drawn from public known distributions and they have additive valuations for multiple items. Our problem is well motivated by sponsored search auctions, which made money for Google and Yahoo! in practice. In this auction, each advertiser bids an amount bi to compete for ad slots on a web page. The value of each ad slot corresponds to its click‐through‐rate, and each buyer has her own per‐click valuations, which is her private information. Obviously, a strategic bidder may bid an amount that is different with her true valuation to improve her utility. Our goal is to design truthful mechanisms avoiding this misreporting. We develop the optimal (with maximum revenue) truthful auction for a relaxed demand model (where each buyer i wants at most di items) and a sharp demand model (where buyer i wants exactly di items). We also find an auction that always guarantees at least half of the revenue of the optimal auction when the buyers are budget constrained. Moreover, all of the auctions we design can be computed efficiently, that is, in polynomial time.  相似文献   
40.
Deng  Juan  Zhao  Shu  Wang  Yan  Wang  Lei  Wang  Hong  Sha  Hong 《Multimedia Tools and Applications》2017,76(7):10097-10117
Multimedia Tools and Applications - Most of the existing image encryption algorithms based on compressive sensing are too complex to operate. An image compression-encryption scheme with simple...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号