首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18792篇
  免费   1801篇
  国内免费   892篇
电工技术   1236篇
技术理论   1篇
综合类   1243篇
化学工业   2740篇
金属工艺   1252篇
机械仪表   1227篇
建筑科学   1533篇
矿业工程   663篇
能源动力   441篇
轻工业   1550篇
水利工程   355篇
石油天然气   1246篇
武器工业   163篇
无线电   2129篇
一般工业技术   2193篇
冶金工业   905篇
原子能技术   153篇
自动化技术   2455篇
  2024年   141篇
  2023年   393篇
  2022年   620篇
  2021年   871篇
  2020年   669篇
  2019年   546篇
  2018年   561篇
  2017年   674篇
  2016年   549篇
  2015年   775篇
  2014年   978篇
  2013年   1091篇
  2012年   1201篇
  2011年   1228篇
  2010年   1123篇
  2009年   1092篇
  2008年   1017篇
  2007年   985篇
  2006年   1095篇
  2005年   1007篇
  2004年   636篇
  2003年   563篇
  2002年   535篇
  2001年   425篇
  2000年   413篇
  1999年   421篇
  1998年   358篇
  1997年   307篇
  1996年   273篇
  1995年   232篇
  1994年   184篇
  1993年   112篇
  1992年   91篇
  1991年   74篇
  1990年   60篇
  1989年   55篇
  1988年   45篇
  1987年   23篇
  1986年   15篇
  1985年   11篇
  1984年   9篇
  1983年   8篇
  1982年   8篇
  1981年   6篇
  1980年   3篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
通过有限元的方法,分析了T型薄壁管节点受平面内弯矩作用下的疲劳行为,得到了应力最大值的位置和拟合出用于预测T型薄壁管节点受平面内弯矩作用下的应力集中系数的参数公式。  相似文献   
52.
基于自组织神经网络的实时统计特征抽取方法   总被引:3,自引:0,他引:3  
应用人工神经网络讨论统计了特征抽取的原理,提出了相应的抽取方法。该方法具有实时性,容错性,高数据压缩率和良好的特征分辨率。通过计算机仿真和桥梁索力状态的实例计算分析证实了该技术具有广泛的应用价值。  相似文献   
53.
The copolymer from D ,L -lactide and poly(tetramethyene ether glycol) (PTMG) was prepared in bulk with an isotributyl aluminum–water–phosphoric acid complex catalyst as the initiator and characterized by H-NMR, GPC, and DSC. The effects of the temperature and the amount of PTMG on the polymerization rate and the molecular weight of copolymers were studied. The behavior of the degradation and delivery rate of Levonorgestrel microspheres in vitro was observed. The results show that the degradation and the delivery rate can be controlled by adjusting the molar rate of hydrophilic and hydrophobic segments of the copolymer © 1995 John Wiley & Sons, Inc.  相似文献   
54.
SL Xiong  ZP Fang  XY Zeng 《Canadian Metallurgical Quarterly》1994,19(4):233-4, inside backcover
Six compounds were isolated from the fruits of Luffa cylindrica. They were identified as lucyosides C, E, F, H, a mixture of alpha-spinasterol and stigmasta-7,22,25-trien-3 beta-OH and a mixture of alpha-spinasteryl glucoside and delta 7,22,25-stigmasteryl-beta-D-glucoside by means of chemical evidence and spectral analysis.  相似文献   
55.
Bai  Qingchun  Wei  Kai  Zhou  Jie  Xiong  Chao  Wu  Yuanbin  Lin  Xin  He  Liang 《The Journal of supercomputing》2021,77(9):9474-9493
The Journal of Supercomputing - Sentiment analysis in Danmaku video interaction aims at measuring public mood in respect of the video, which is helpful for the potential applications in behavioral...  相似文献   
56.
Li  Hongjian  Wei  Yaojun  Xiong  Yu  Ma  Enjie  Tian  Wenhong 《The Journal of supercomputing》2021,77(10):11575-11596
The Journal of Supercomputing - With the fast growth of big data applications, it has brought about a huge increase in the energy consumption for big data processing in Cloud data centers. In this...  相似文献   
57.
International Journal of Computer Vision - Nowadays, how to effectively evaluate visual properties has become a popular topic for fine-grained visual comprehension. In this paper we study the...  相似文献   
58.
With the advent of Next Generation Network (NGN), services that are currently provided by multiple specific network-centric architectures. NGN provides AAA (Anytime, Anywhere and Always on) access to users from different service providers with consistent and ubiquitous provision of services as necessary. This special issue of NGN includes pervasive, grid, and peer-to-peer computing to provide computing and communication services at anytime and anywhere. In fact, the application of NGN includes digital image processing, multimedia systems/services, and so on. Here we focus on the digital image processing technology in NGN environments. Low-contrast structure and heavy noise in NGN environments can be found in many kinds of digital images, which makes the images vague and uncertainly, especially in x-ray images. As result, some useful tiny characteristic are weakened—which are difficult to distinguish even by naked eyes. Based on the combination of no-linear grad-contrast operator and multi-resolution wavelet analysis, a kind of image enhancement processing algorithm for useful tiny characters is presented. The algorithm can enhance the tiny characters while confine amplifying noise. The analysis of the results shows that local regions of the image are enhanced by using the concept of the grad contrast to make image clearer adaptively. Experiments were conducted on real pictures, and the results show that the algorithm is flexible and convenient.  相似文献   
59.
Given a directed graph, the problem of blackhole mining is to identify groups of nodes, called blackhole patterns, in a way such that the average in-weight of this group is significantly larger than the average out-weight of the same group. The problem of finding volcano patterns is a dual problem of mining blackhole patterns. Therefore, we focus on discovering the blackhole patterns. Indeed, in this article, we develop a generalized blackhole mining framework. Specifically, we first design two pruning schemes for reducing the computational cost by reducing both the number of candidate patterns and the average computation cost for each candidate pattern. The first pruning scheme is to exploit the concept of combination dominance to reduce the exponential growth search space. Based on this pruning approach, we develop the gBlackhole algorithm. Instead, the second pruning scheme is an approximate approach, named approxBlackhole, which can strike a balance between the efficiency and the completeness of blackhole mining. Finally, experimental results on real-world data show that the performance of approxBlackhole can be several orders of magnitude faster than gBlackhole, and both of them have huge computational advantages over the brute-force approach. Also, we show that the blackhole mining algorithm can be used to capture some suspicious financial fraud patterns.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号