首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   93254篇
  免费   5245篇
  国内免费   1432篇
电工技术   2455篇
综合类   2044篇
化学工业   17257篇
金属工艺   3730篇
机械仪表   5042篇
建筑科学   4330篇
矿业工程   672篇
能源动力   3308篇
轻工业   6220篇
水利工程   748篇
石油天然气   2056篇
武器工业   212篇
无线电   14814篇
一般工业技术   16277篇
冶金工业   7992篇
原子能技术   1084篇
自动化技术   11690篇
  2024年   178篇
  2023年   1001篇
  2022年   1673篇
  2021年   2566篇
  2020年   1879篇
  2019年   1774篇
  2018年   2180篇
  2017年   2330篇
  2016年   2584篇
  2015年   2467篇
  2014年   3583篇
  2013年   5600篇
  2012年   5332篇
  2011年   6227篇
  2010年   4909篇
  2009年   5121篇
  2008年   4855篇
  2007年   4318篇
  2006年   4159篇
  2005年   3646篇
  2004年   3050篇
  2003年   2792篇
  2002年   2708篇
  2001年   2206篇
  2000年   2175篇
  1999年   2247篇
  1998年   3299篇
  1997年   2328篇
  1996年   2088篇
  1995年   1663篇
  1994年   1284篇
  1993年   1195篇
  1992年   836篇
  1991年   761篇
  1990年   685篇
  1989年   591篇
  1988年   485篇
  1987年   384篇
  1986年   348篇
  1985年   298篇
  1984年   263篇
  1983年   197篇
  1982年   202篇
  1981年   159篇
  1980年   160篇
  1979年   121篇
  1978年   106篇
  1977年   143篇
  1976年   183篇
  1975年   87篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
在互联网发展的基础上,物联网可将信息的交流与沟通扩展到任何物体与物体之间,故其将成为新媒体时代改变人类生活的新变量。在探索智能化信息交互与设计的过程中,文章紧跟物联网的发展趋势,不断思索物联网的崛起给新媒体时代的文化、生产与生活带来的需求、挑战与可能性,同时指出了在这样的背景下,物联网这个新媒体时代的新形势对信息设计所带来的新启示。  相似文献   
992.
目前在互联网上有海量的室外场景照片,它们不仅内容覆盖面广,对同一场景有大量不同视点和光照条件下的采样,而且获取成本很低.如何利用这些照片中包含的丰富场景信息,快速、方便地构造各种逼真的虚拟场景,是互联网迅猛发展给虚拟现实、计算机图形学和计算机视觉带来的新的研究课题之一.文中分析、总结了近年来国内外互联网图像的真实场景几何建模、自然光照建模和材质反射属性建模的最新研究进展,并对其未来的发展趋势提出了一些看法.  相似文献   
993.
城市建筑点云的自适应分割方法   总被引:1,自引:0,他引:1  
自动地提取城市建筑点云数据中的高层次结构是城市数字化等应用的重要基础步骤.通过提出"自适应分割"的概念来自动地获取三维城市建筑点云的一种灵活、层次化的结构表示.由于城市建筑的单元分布大都呈一种级联或者交错的形式,与之前采用全局规则格点进行分析的方法不同,文中采用一种自适应的方法对建筑点云进行分析;也可将自适应分割的概念用于建筑图像的分析上.最后给出了在不同类型的建筑点云和图像进行分析的结果以及一些相关的应用.  相似文献   
994.
根据南通大学独立学院培养应用型人才的目标,学院对高级语言程序设计课程提出了新的要求.为了进行课程改革,文章详细分析了高级语言程序设计课程存在的问题,提出了拟编新教材的具体方案,总结了新编教材所应具备的特色.  相似文献   
995.
Restoration of a wild-produced lake trout Salvelinus namaycush population in Lake Ontario has not been successful despite the adult population often meeting or exceeding restoration targets. Lack of high-quality spawning habitat in Lake Ontario is suggested as one impediment to recruitment of wild lake trout, although the quantity and location of spawning habitat is poorly understood. If high-quality spawning habitat is limited in Lake Ontario, lake trout may be using uncommon spawning locations such as rivers. Anecdotal angler accounts point to the Niagara River as a lake trout spawning location. To better understand the potential of the Niagara River as a spawning location, egg and juvenile fish collections were conducted 12–14 river kilometers from the mouth of the Niagara River from 2010 to 2012; and mature female lake trout with surgically implanted acoustic tags were monitored from 2015 to 2019. Genetic analyses confirmed 60% of collected eggs and 93% of collected post-hatch juvenile fish in the Niagara River were lake trout. Tagged female lake trout returned to the Niagara River over consecutive years during the spawning season. The short duration of lake trout presence in the river (mean = 56 days/year) suggests female lake trout use the Niagara River primarily for spawning. Diversity in spawning locations may provide lake trout population’s resilience against environmental variability through a portfolio effect. Improved identification of riverine spawning locations, including their overall contribution to wild recruitment, may be a useful tool for managers to restore a wild-produced population of lake trout in Lake Ontario.  相似文献   
996.
Water Resources Management - Public–private partnerships (PPPs) have grown in popularity as a method to leverage private sector actors in the production of government services. With the...  相似文献   
997.
DETECTOR: A knowledge-based system for injection molding diagnostics   总被引:1,自引:0,他引:1  
A knowledge-based system (KBS) for diagnosis of multiple defects in injection molding is presented. The general scheme for knowledge representation based on fuzzy set theory has been shown useful in representing inexact and incomplete information for developing the KBS. An optimality criterion is created for selecting a simple and best cover to explain the given problem. An efficient search algorithm for finding such cover is also discussed.  相似文献   
998.
in this paper, simple 1-D and 2-D systolic array for realizing the discrete cosine transform (DCT) based on the discrete Fourier transform (DFT) fo an input sequence are presented. The proposed arrays are obtained by a simple modified DFT (MDFT) and an inverse DFT (IDFT) version of the Goertzel algorithm combined with Kung's approach. The 1-D array requiresN cells, one multiplier and takesN clock cycles to produce a completeN-point DCT. The 2-D array takes N clock cycles, faster than the 1-D array, but the area complexity is larger. A continuous flow of input data is allowed and no idle time is required between the input sequences.  相似文献   
999.
Several Ni-Al-Mo-based eutectic superalloys were rapidly solidified using a chilled block melt spinning process. The effects of rapid solidification on the microstructure were studied using optical microscopy, transmission electron microscopy (TEM), and scanning transmission electron microscopy (STEM). Results showed, except for the alloy containing chromium, that the microstructure varied as a function of ribbon thickness from segregationless solidification at the wheel side of the ribbon to dendritic solidification at the free side. In addition, alloys with the same solidification rate showed a large variation in microstructure depending upon the solid state cooling rate. The rapidly solidified eutectic Ni-Al-Mo alloy with a small amount of rhenium and vanadium did not show any improvement on delaying or prohibiting the formation of the embrittling-NiMo phase on ageing at 1000 C. This was determined from microstructural as well as chemical analysis using STEM. Differential thermal analysis was used to obtain melting temperature,-Ni3Al solvus, and heat of formation for the alloys.  相似文献   
1000.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号