首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   50752篇
  免费   5991篇
  国内免费   3885篇
电工技术   4532篇
技术理论   2篇
综合类   5009篇
化学工业   6778篇
金属工艺   3309篇
机械仪表   3532篇
建筑科学   3952篇
矿业工程   1906篇
能源动力   1587篇
轻工业   5160篇
水利工程   1539篇
石油天然气   1858篇
武器工业   645篇
无线电   5758篇
一般工业技术   5018篇
冶金工业   1705篇
原子能技术   836篇
自动化技术   7502篇
  2024年   294篇
  2023年   911篇
  2022年   1956篇
  2021年   2615篇
  2020年   1835篇
  2019年   1456篇
  2018年   1589篇
  2017年   1773篇
  2016年   1499篇
  2015年   2363篇
  2014年   2806篇
  2013年   3266篇
  2012年   4066篇
  2011年   4080篇
  2010年   3857篇
  2009年   3636篇
  2008年   3649篇
  2007年   3633篇
  2006年   3151篇
  2005年   2599篇
  2004年   1997篇
  2003年   1515篇
  2002年   1663篇
  2001年   1553篇
  2000年   1053篇
  1999年   544篇
  1998年   223篇
  1997年   181篇
  1996年   181篇
  1995年   118篇
  1994年   87篇
  1993年   105篇
  1992年   84篇
  1991年   57篇
  1990年   38篇
  1989年   44篇
  1988年   25篇
  1987年   17篇
  1986年   24篇
  1985年   12篇
  1984年   8篇
  1983年   9篇
  1982年   5篇
  1981年   15篇
  1980年   8篇
  1979年   11篇
  1959年   8篇
  1951年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
基于数值模拟的接水盘冲压成形工艺分析与设计   总被引:1,自引:0,他引:1  
分析了冰箱接水盘的形状和结构特点 ,设计了零件的冲压成形工艺 ,运用板料成形有限元软件对其中的拉伸和翻边工艺进行数值模拟 ,得到成形过程中工件各部位的厚度分布和成形极限图 ,分析了在不同工艺条件下可能产生的缺陷及其原因 ,并确定其初始毛坯和中间毛坯的合理形状 ,有效地保证了成形工艺的可靠性  相似文献   
42.
提出了一种基于计算机辅助制造的数控加工代码自动生成的方法,着重阐述了该方法针对椭圆弧的数控代码自动生成过程。该方法通过分析加工图形的dxf文件,提取图形的坐标信息,再经过数据拟和,自动生成该图形的数控代码。该方法由VC++6.0实现相应的功能,经实际运行表明,能满足加工精度要求。该方法摆脱了传统数控机床从加工图形到形成数控加工代码时间长且精度不高的缺点,极大她提高了工作效率。  相似文献   
43.
With the development of modern image processing techniques, the numbers of images increase at a high speed in network. As a new form of visual communication, image is widely used in network transmission. However, the image information would be lost after transmission. In view of this, we are motivated to restore the image to make it complete in an effective and efficient way in order to save the network bandwidth. At present, there are two main methods for digital image restoration, texture-based method and non-textured-based method. In the texture-based method, Criminisi algorithm is a widely used algorithm. However, the inaccurate completion order and the inefficiency in searching matching patches are two main limitations of Criminisi algorithm. To overcome these shortcomings, in this paper, an exemplar image completion based on evolutionary algorithm is proposed. In the non-textured-based method, total variation method is a typical algorithm. An improved total variation algorithm is proposed in this paper. In the improved algorithm, the diffusion coefficients are defined according to the distance and direction between the damaged pixel and its neighborhood pixel. Experimental results show that the proposed algorithms have better general performance in image completion. And these two new algorithms could improve the experience of network surfing and reduce the network communication cost.  相似文献   
44.
45.
施工索道能够很好地解决高陡边坡施工材料及机械设备运输的难题。立洲水电站大坝工程根据实际地形,灵活架设了施工索道。介绍了该工程施工索道在不同地形条件下的布置和锚固端形式,例举了部分施工索道的设计参数。施工索道在立洲水电站大坝工程中的应用,可为今后复杂条件下的同类工程提供参考和借鉴。  相似文献   
46.
承包商在工作中与业主、咨询工程师的沟通和交流比较困难,是国际工程合同管理中普遍存在的问题。原因主要有:语言隔阂和障碍;双方的工作思维方式和知识结构存在很大差异;承包商固执的惯性思维和工作习惯。解决这个问题,改善和消除承包商和业主、咨询机构的沟通困难,对承包商的合同管理工作是至关重要的,主要的经验和基本原则是:承包商在合同管理工作中应尽量摒弃以往的习惯性思维和经验,牢牢把握灵活、变通的工作思维原则。通过一些案例分析,具体说明如何针对具体情况在合同管理中应用灵活变通的思维原则解决问题。  相似文献   
47.
This article considers stabilization of a one‐dimensional Schrödinger equation with variable coefficient and boundary observation which suffers from an arbitrary given time delay. We design an observer and predictor to stabilize the system. The state is estimated in the time span where the observation is available, and also predicted in the time interval where the observation is not available. It is shown that the estimated state feedback stabilizes the system exponentially. A numerical simulation is presented to illustrate the effect of the stabilizing controller.  相似文献   
48.
现行的多数网络教学系统在学生按需学习和"因材施教"上存在局限性,本文用PSO和K均值的混合分类算法对传统的网络教学系统进行改进,根据获取的用户基本信息和兴趣特征进行聚类,充分体现"以学习者为中心"个性化教学模式。实验结果表明,该算法具有较好的全局收敛性,寻优能力明显提升。  相似文献   
49.
Recently, periodic pattern mining from time series data has been studied extensively. However, an interesting type of periodic pattern, called partial periodic (PP) correlation in this paper, has not been investigated. An example of PP correlation is that power consumption is high either on Monday or Tuesday but not on both days. In general, a PP correlation is a set of offsets within a particular period such that the data at these offsets are correlated with a certain user-desired strength. In the above example, the period is a week (7 days), and each day of the week is an offset of the period. PP correlations can provide insightful knowledge about the time series and can be used for predicting future values. This paper introduces an algorithm to mine time series for PP correlations based on the principal component analysis (PCA) method. Specifically, given a period, the algorithm maps the time series data to data points in a multidimensional space, where the dimensions correspond to the offsets within the period. A PP correlation is then equivalent to correlation of data when projected to a subset of the dimensions. The algorithm discovers, with one sequential scan of data, all those PP correlations (called minimum PP correlations) that are not unions of some other PP correlations. Experiments using both real and synthetic data sets show that the PCA-based algorithm is highly efficient and effective in finding the minimum PP correlations. Zhen He is a lecturer in the Department of Computer Science at La Trobe University. His main research areas are database systems optimization, time series mining, wireless sensor networks, and XML information retrieval. Prior to joining La Trobe University, he worked as a postdoctoral research associate in the University of Vermont. He holds Bachelors, Honors and Ph.D degrees in Computer Science from the Australian National University. X. Sean Wang received his Ph.D degree in Computer Science from the University of Southern California in 1992. He is currently the Dorothean Chair Professor in Computer Science at the University of Vermont. He has published widely in the general area of databases and information security, and was a recipient of the US National Science Foundation Research Initiation and CAREER awards. His research interests include database systems, information security, data mining, and sensor data processing. Byung Suk Lee is associate professor of Computer Science at the University of Vermont. His main research areas are database systems, data modeling, and information retrieval. He held positions in industry and academia: Gold Star Electric, Bell Communications Research, Datacom Global Communications, University of St. Thomas, and currently University of Vermont. He was also a visiting professor at Dartmouth College and a participating guest at Lawrence Livermore National Laboratory. He served on international conferences as a program committee member, a publicity chair, and a special session organizer, and also on US federal funding proposal review panel. He holds a BS degree from Seoul National University, MS from Korea Advanced Institute of Science and Technology, and Ph.D from Stanford University. Alan C. H. Ling is an assistant professor at Department of Computer Science in University of Vermont. His research interests include combinatorial design theory, coding theory, sequence designs, and applications of design theory.  相似文献   
50.
该文提出和实现了一种基于网络异常流量特征的检测模型。通过将多条链路或多个流的流量信号作为一个整体进行研究,构建了网络异常流量监控的系统模型。该模型包括了数据采集、分析、异常判断和警告等功能,并综合了异常信息融合及警告信息关联性分析技术。通过实验证明,该套系统模型对短时间段内的突发流量能提供有效的检测和报警服务。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号