首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   366919篇
  免费   22709篇
  国内免费   11414篇
电工技术   16192篇
技术理论   31篇
综合类   19220篇
化学工业   60731篇
金属工艺   21240篇
机械仪表   21195篇
建筑科学   24962篇
矿业工程   10021篇
能源动力   8974篇
轻工业   20041篇
水利工程   6001篇
石油天然气   20534篇
武器工业   2234篇
无线电   40078篇
一般工业技术   49383篇
冶金工业   17713篇
原子能技术   3093篇
自动化技术   59399篇
  2024年   1222篇
  2023年   4686篇
  2022年   7947篇
  2021年   11484篇
  2020年   8564篇
  2019年   7290篇
  2018年   21228篇
  2017年   21368篇
  2016年   17150篇
  2015年   11752篇
  2014年   14009篇
  2013年   16643篇
  2012年   20689篇
  2011年   28233篇
  2010年   24486篇
  2009年   20996篇
  2008年   21805篇
  2007年   22472篇
  2006年   16084篇
  2005年   15303篇
  2004年   10105篇
  2003年   9029篇
  2002年   7829篇
  2001年   6592篇
  2000年   7285篇
  1999年   8570篇
  1998年   6897篇
  1997年   5853篇
  1996年   5495篇
  1995年   4521篇
  1994年   3774篇
  1993年   2639篇
  1992年   2148篇
  1991年   1624篇
  1990年   1173篇
  1989年   935篇
  1988年   769篇
  1987年   525篇
  1986年   389篇
  1985年   266篇
  1984年   184篇
  1983年   120篇
  1982年   130篇
  1981年   86篇
  1980年   70篇
  1968年   43篇
  1966年   42篇
  1965年   46篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
文章介绍了目前国内外长输管道外防护技术的特点和防护层应用的现状,分析了常用防腐蚀材料的防腐蚀性能。指出在山区复杂地形条件下,应考虑环境条件和施工条件,并通过技术经济分析对管道外防腐蚀层进行合理选择。  相似文献   
992.
基于HMM方法的动态手势轨迹训练性能研究   总被引:1,自引:0,他引:1  
基于HMM(Hidden Markov Model,隐形马尔可夫模型)对动态手势轨迹的训练是手势识别的关键技术之一。本文对HMM的模型训练采用Baum.Welch算法,并分别从迭代次数,样本个数选取,以及模型初值选取等方面对动态手势轨迹的训练性能进行了研究。实验结果表明HMM方法对具有时空特性的动态手势轨迹识别是非常有效的。  相似文献   
993.
主要介绍AUTHORWARE下多媒体教学课件的网上发布技术路线与实践  相似文献   
994.
Co-evolution as a computational and cognitive model of design   总被引:6,自引:0,他引:6  
Co-evolutionary design has been developed as a computational model that assumes two parallel search spaces: the problem space and the solution space. The design process iteratively searches each space using the other space as the basis for a fitness function when evaluating the alternatives. Co-evolutionary design can also be developed as a cognitive model of design by characterizing the way in which designers iteratively search for a design solution, making revisions to the problem specification. This paper presents the computational model of co-evolutionary design and then describes a protocol study of human designers looking for evidence of co-evolution of problem specifications and design solutions. The study shows that co-evolutionary design is a good cognitive model of design and highlights the similarities and differences between the computational model and the cognitive model. The results show that the two kinds of co-evolutionary design complement each other, having strengths in different aspects of the design process. Electronic Publication  相似文献   
995.
We present the design and specification of a protocol for scalable and reliable group rekeying together with performance evaluation results. The protocol is based upon the use of key trees for secure groups and periodic batch rekeying. At the beginning of each rekey interval, the key server sends a rekey message to all users consisting of encrypted new keys (encryptions, in short) carried in a sequence of packets. We present a scheme for identifying keys, encryptions, and users, and a key assignment algorithm that ensures that the encryptions needed by a user are in the same packet. Our protocol provides reliable delivery of new keys to all users eventually. It also attempts to deliver new keys to all users with a high probability by the end of the rekey interval. For each rekey message, the protocol runs in two steps: a multicast step followed by a unicast step. Proactive forward error correction (FEC) multicast is used to reduce delivery latency. Our experiments show that a small FEC block size can be used to reduce encoding time at the server without increasing server bandwidth overhead. Early transition to unicast, after at most two multicast rounds, further reduces the worst-case delivery latency as well as user bandwidth requirement. The key server adaptively adjusts the proactivity factor based upon past feedback information; our experiments show that the number of NACKs after a multicast round can be effectively controlled around a target number. Throughout the protocol design, we strive to minimize processing and bandwidth requirements for both the key server and users.  相似文献   
996.
The microstructure and thermal behavior of the Sn-Zn-Ag solder were investigated for 8.73–9% Zn and 0–3.0% Ag. The scanning electron microscopy (SEM) analysis shows the Ag-Zn compound when the solder contains 0.1% Ag. X-ray diffraction (XRD) analysis results indicate that Ag5Zn8 and AgZn3 become prominent when the Ag content is 0.3% and above. Meanwhile, the Zn-rich phase is refined, and the Zn orientations gradually diminish upon increase in Ag content. The morphology of the Ag-Zn compound varies from nodular to dendrite structure when the Ag content increases. The growth of the Ag-Zn compounds is accompanied by the diminishing of the eutectic structure of the Sn-9Zn solder. Differential scanning calorimetry (DSC) investigation reveals that the solidus temperature of these solders exists at around 198°C. A single, sharp exothermic peak was found for the solders with Ag content less than 0.5%. Liquidus temperatures were identified with the DSC analysis to vary from 206°C to 215°C when the Ag content ranges from 1.0% to 3.0%  相似文献   
997.
熔敷金属扩散氢逸出特性研究   总被引:4,自引:0,他引:4  
采用酒精法测量扩散氢 ,研究了焊条熔敷金属扩散氢含量以及在测氢过程中扩散氢逸出量与逸出时间的关系 (逸出特性 )。研究结果表明 ,熔敷金属扩散氢逸出特性受扩散氢含量、焊道数、熔敷金属化学成分和表面状态等多种因素的影响。熔敷金属扩散氢 (HDo)可以分为快速逸出扩散氢 (HDq)和慢速逸出扩散氢(HDs)两部分  相似文献   
998.
张晓雷 《世界电信》2003,16(10):6-8
信息社会世界峰会是根据ITU的相关决议,在ITU的大力倡导下,在联合国和其他国际组织、国际机构的支持和配合下促成的。峰会的目的旨在通过召开尽可能高级别的会议,就信息社会建设问题达成全球共识,通过利用信息通信技术潜力。推动实现联合国《千年宣言》所确定的目标,促进全人类的进步。峰会的整个进程分为两个阶段,第一阶段于2003年12月在日内瓦举行,第二阶段于2005年在突尼斯举行。目前,峰会的主要议题和安排已基本确定,各国,尤其是发达国家和发展中国家在对信息社会的认识和未来的一些做法上还存在明显分歧。  相似文献   
999.
Hyperspectral image fusion is a key technique of hyperspectral data processing. In recent years, many fusion methods have been proposed, but there is little work concerning evaluation of the performances of different image fusion methods. In this paper, a method called quantitative correlation analysis (QCA) is proposed, which provides a quantitative measure of the information transferred by an image fusion technique into the output image. Using the proposed method, the performances of different image fusion methods can be compared and analyzed directly based on the images of before and after performing the fusion. The correlation information entropy, based on the developed QCA, is also proposed and testified by numerical simulations. Typical hyperspectral data are applied to the proposed method. The results show that the method is effective, and its conclusions agree with the classification results in applications.  相似文献   
1000.
ω—烷氧基聚醚的用途   总被引:2,自引:0,他引:2  
ω-烷氧基聚醚与ω-羟基聚醚相比具有许多特殊的性能,例如粘度低,粘温变化小,化学惰性发等,这些特殊性能使得ω-烷氧基聚醚在化纤油剂、低泡表面活性剂和聚醚改性有机硅等方面都能找到用途,笔者建议加快ω-甲氧基聚醚的应用开发步伐。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号