首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7955篇
  免费   652篇
  国内免费   409篇
电工技术   398篇
综合类   489篇
化学工业   1255篇
金属工艺   516篇
机械仪表   408篇
建筑科学   630篇
矿业工程   361篇
能源动力   179篇
轻工业   475篇
水利工程   146篇
石油天然气   673篇
武器工业   57篇
无线电   968篇
一般工业技术   962篇
冶金工业   388篇
原子能技术   63篇
自动化技术   1048篇
  2024年   45篇
  2023年   153篇
  2022年   269篇
  2021年   374篇
  2020年   300篇
  2019年   278篇
  2018年   267篇
  2017年   289篇
  2016年   255篇
  2015年   358篇
  2014年   411篇
  2013年   527篇
  2012年   505篇
  2011年   553篇
  2010年   477篇
  2009年   458篇
  2008年   393篇
  2007年   428篇
  2006年   419篇
  2005年   362篇
  2004年   221篇
  2003年   191篇
  2002年   158篇
  2001年   143篇
  2000年   158篇
  1999年   198篇
  1998年   160篇
  1997年   118篇
  1996年   117篇
  1995年   108篇
  1994年   93篇
  1993年   54篇
  1992年   47篇
  1991年   36篇
  1990年   22篇
  1989年   21篇
  1988年   15篇
  1987年   6篇
  1986年   7篇
  1985年   7篇
  1984年   2篇
  1983年   2篇
  1982年   4篇
  1980年   3篇
  1977年   1篇
  1976年   1篇
  1959年   2篇
排序方式: 共有9016条查询结果,搜索用时 15 毫秒
121.
The conditions for the transition from internal to external oxidation of the most-reactive component C of ternary A–B–C alloys are examined, assuming the presence of external scales of the oxide of the component of intermediate reactivity B. For this, approximate expressions for the diffusion coefficient of oxygen and for the concentration of oxygen dissolved in the binary A–B alloy matrix within the zone of internal oxidation as functions of the composition of the metal matrix within the zone of internal oxidation are used. Numerical calculations of the critical content of C needed for this transition are carried out for different combinations of values of the various parameters involved. The results obtained for the ternary alloys are compared with the corresponding data calculated for the binary A–C and B–C alloys under oxygen pressures insufficient to oxidize the most-noble alloy component. This allows to predict the possibility of existence of a third-element effect under intermediate oxidant pressures.  相似文献   
122.
Fe-18.2Cr-6.9Ni-2.5Mo-1.5C材料铸态组成相为奥氏体和M7C_3型碳化物,在随后加热时可产生时效硬化现象,最佳时效温度为650℃。时效过程中可产生α-铁索体和M_23C_6型碳化物两个新相。  相似文献   
123.
金刚石修整滚轮是目前最为有效的高效、高精砂轮成形修整工具,迎合了磨削技术高精、高速和高效发展趋势,内电镀高精度修整滚轮制造工艺复杂、工序多,影响制造精度因素较多,修整参数选择、滚轮图纸设计和工艺编制是生产中的关键环节。本文从分析金刚石修整滚轮设计制造的特点人手,应用CAD/CAPP集成技术实现了金刚石修整滚轮设计、工艺规程编制和技术文件管理的自动化,提高了滚轮制造工艺水平和对产品质量的控制能力,较好地解决了一些设计和工艺过程相对简单、变化较小的定型产品的CAD/CAPP集成化的问题。  相似文献   
124.
采用点焊工艺生产拖拉机机罩,点焊压痕影响了外观质量,通过对几种方案的探讨和大量的胶粘试验,确定了一种用结构胶粘结代替点焊的工艺,该工艺使制件的外观质量得以大幅度提高,而生产成本则明显降低。  相似文献   
125.
蒋治良  刘旭红 《贵金属》1994,15(2):53-56
在稀盐酸介质中酚酞于-0.55V处产生一灵敏的单扫描示波极谱波。基于在稀盐酸介质中及100℃下,痕量Ru(Ⅲ)对高碘酸盐氧化酚酞这一缓慢反应的强烈催化作用,用自来水冷却中止反应,采用单扫描示波极谱波研究Ru这一新的指示反应,建立检出限和测定范围分别为0.05ng/mlRu的催化反应-示波极谱分析新方法,并用于实际试样分析,结果较好。  相似文献   
126.
根据目前视频监控需求,采用ARM11处理器与Linux操作系统相结合的方式,提出了一种基于B/S架构的远程网络视频监控方案。使用V4L2进行视频图像采集,选择H.264压缩标准,通过硬件多格式编码器MFC完成视频硬件压缩。运用RTP流媒体传输技术实现视频数据的打包传输,客户端通过安装Active X控件完成视频图像的显示,最终实现网络视频监控功能。  相似文献   
127.
With the advent of the powerful editing software and sophisticated digital cameras, it is now possible to manipulate images. Copy-move is one of the most common methods for image manipulation. Several methods have been proposed to detect and locate the tampered regions, while many methods failed when the copied region undergone some geometric transformations before being pasted, because of the de-synchronization in the searching procedure. This paper presents an efficient technique for detecting the copy-move forgery under geometric transforms. Firstly, the forged image is divided into overlapping circular blocks, and Polar Complex Exponential Transform (PCET) is employed to each block to extract the invariant features, thus, the PCET kernels represent each block. Secondly, the Approximate Nearest Neighbor (ANN) Searching Problem is used for identifying the potential similar blocks by means of locality sensitive hashing (LSH). In order to make the algorithm more robust, morphological operations are applied to remove the wrong similar blocks. Experimental results show that our proposed technique is robust to geometric transformations with low computational complexity.  相似文献   
128.
In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.  相似文献   
129.
With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sensor nodes that are in a normal status. Currently, two kinds of approaches exist to identify the substitute sensor nodes: the most common approach is to prepare redundancy nodes, though the involved tasks such as maintaining redundancy nodes, i.e., relocating the new node, lead to an extra burden on the wireless sensor networks. More recently, other approaches without using redundancy nodes are emerging, and they merely select the substitute nodes in a sensor node’s perspective i.e., migrating the service of faulty node to it’s nearest sensor node, though usually neglecting the requirements of the application level. Even a few work consider the need of the application level, they perform at packets granularity and don’t fit well at service granularity. In this paper, we aim to remove these limitations in the wireless sensor network with the service-oriented architecture. Instead of deploying redundancy nodes, the proposed mechanism replaces the faulty sensor node with consideration of the similarity on the application level, as well as on the sensor level. On the application level, we apply the Bloom Filter for its high efficiency and low space costs. While on the sensor level, we design an objective solution via the coefficient of a variation as an evaluation for choosing the substitute on the sensor level.  相似文献   
130.
针对车载装备上传感器数据采集模块的体积小、可靠性高、实时性好等需求,设计了基于嵌入式实时操作系统μC/OS-Ⅱ的数据采集模块,选用集成了ADC与CAN通信功能等多种外设的Cortex-M3内核芯片STM32F107VCT6,移植嵌入式操作系统以简化软件设计,提高实时性和可靠性;数据采集模块将采集到的数据通过CAN总线实时地发送到主控计算机,同时也通过FatFs文件系统存储在SD卡中,便于计算机读取其中数据,进行离线分析;电路优化设计和数字滤波算法,提高了数据采集模块抗干扰能力和采样精度;通过实验验证,该数据采集模块可以准确、及时地获取和发送传感器数据,具有较高的可靠性和实时性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号