首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29324篇
  免费   2930篇
  国内免费   1436篇
电工技术   1912篇
综合类   2041篇
化学工业   4475篇
金属工艺   1606篇
机械仪表   1929篇
建筑科学   2336篇
矿业工程   989篇
能源动力   920篇
轻工业   2213篇
水利工程   602篇
石油天然气   1603篇
武器工业   267篇
无线电   3484篇
一般工业技术   3571篇
冶金工业   1253篇
原子能技术   366篇
自动化技术   4123篇
  2024年   168篇
  2023年   653篇
  2022年   1234篇
  2021年   1718篇
  2020年   1314篇
  2019年   1089篇
  2018年   1117篇
  2017年   1187篇
  2016年   1078篇
  2015年   1558篇
  2014年   1783篇
  2013年   2036篇
  2012年   2124篇
  2011年   2062篇
  2010年   1760篇
  2009年   1705篇
  2008年   1641篇
  2007年   1485篇
  2006年   1423篇
  2005年   1184篇
  2004年   831篇
  2003年   607篇
  2002年   583篇
  2001年   453篇
  2000年   447篇
  1999年   483篇
  1998年   374篇
  1997年   313篇
  1996年   286篇
  1995年   235篇
  1994年   204篇
  1993年   115篇
  1992年   96篇
  1991年   80篇
  1990年   58篇
  1989年   51篇
  1988年   34篇
  1987年   31篇
  1986年   28篇
  1985年   7篇
  1984年   9篇
  1983年   6篇
  1982年   8篇
  1981年   10篇
  1980年   7篇
  1976年   2篇
  1973年   1篇
  1972年   1篇
  1959年   3篇
  1951年   3篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
131.
Ni  Qingjian  Zhang  Meng 《Applied Intelligence》2022,52(13):15026-15039
Applied Intelligence - Accurate traffic flow prediction is crucial for the development of intelligent transportation. It can not only effectively avoid traffic congestion and other traffic...  相似文献   
132.
Due to air turbulence, large areas of coal will fall when the special coal-transportation trains pass the tunnel exits and entrances. Aiming at the problems of low efficiency and high cost of manual cleaning for long distance coal cleaning in the tunnel, a new railway tunnel fallen coal dust collection device which was composed of a main conveying coal feeding pipe and multiple branch pipes of coal suction was designed. It was used to clean the small particles and lightweight railway tunnel fallen coal. Firstly, the gas-solid two-phase flow model based on the Euler-Lagrange approach for the design of the main conveying coal feeding pipe was established in the coal conveying pipelines. Secondly, the effect of the coal particles' incident angle and multiple branch pipe spacing on the main coal conveying pipe flow field, which was based on Fluent finite element simulation software, was studied. What was more, the optimal angle of incidence and the optimal value of the number of branch coal suction pipe, which was installed on the main conveying pipe, were analyzed. Finally, the finite element simulation was verified by field test. Simulation and experimental results showed that it was more conducive to the railway tunnel fallen coal transportation when coal particles' incident angle was less than 45° and the branch pipe spacing was in the vicinity of 750 mm. For that when incident angle was less than 45°, the main conveying coal pipe pressure-drop became weaker and particle flow could obtain large horizontal transport velocity. And when the branch pipe spacing was in the vicinity of 750 mm, the horizontal transport velocity had a smaller fluctuation range and the transportation of coal was larger than that of the other groups. The research results are of great significance to improve the structure of the main conveying coal pipe, increase the efficiency of tunnel coal conveying and optimize the railway tunnel coal dust collection device.  相似文献   
133.
Meng  Fanbin  Wang  Ying  Wang  Qiang  Xu  Xiaoling  Jiang  Man  Zhou  Xuesong  He  Ping  Zhou  Zuowan 《Nano Research》2018,11(7):3958-3958
Nano Research - The first author, Fanbin Meng, and the second author, Ying Wang, contributed equally to this work was unfortunately forgotten to write on the first pages of the main text and the...  相似文献   
134.
135.
在满足机构许用压力角条件下,采用0.618法最优确定盘状摆动凸轮机械的最小基圆半径。  相似文献   
136.
李蒙  李晓花 《计算机教育》2011,(20):12-14,18
依据"高等学校计算机科学与技术专业发展战略研究报告暨专业规范关于计算机专业人才培养模式的指导意见",针对洛阳理工学院自身特点,文章讨论计算机学科课程教学模式改革途径、青年教师培养模式、建立工程实践能力培养基地方案,设计了专业课程与实践项目对接、科技创新项目开发过程资源管理、开发实验室预约为一体的工程实践管理软件平台,为培养计算机专业工程型与应用型人才进行了有益的探索与研究。  相似文献   
137.
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag’s identification.  相似文献   
138.
Let γ(G) denote the domination number of a digraph G and let CmCn denote the Cartesian product of Cm and Cn, the directed cycles of length m,n?2. In this paper, we determine the exact values: γ(C2Cn)=n; γ(C3Cn)=n if , otherwise, γ(C3Cn)=n+1; if , otherwise, .  相似文献   
139.
就目前实验室建设上、管理上的存在的难题进行了分析,介绍了目前主要的虚拟化技术,提出了基于虚拟化技术的实验室建设构想,为学校的实验室建设提供了新的思路.  相似文献   
140.
The Body-Centered Cubic (BCC) and Face-Centered Cubic (FCC) lattices have been analytically shown to be more efficient sampling lattices than the traditional Cartesian Cubic (CC) lattice, but there has been no estimate of their visual comparability. Two perceptual studies (each with N = 12 participants) compared the visual quality of images rendered from BCC and FCC lattices to images rendered from the CC lattice. Images were generated from two signals: the commonly used Marschner-Lobb synthetic function and a computed tomography scan of a fish tail. Observers found that BCC and FCC could produce images of comparable visual quality to CC, using 30-35 percent fewer samples. For the images used in our studies, the L(2) error metric shows high correlation with the judgement of human observers. Using the L(2) metric as a proxy, the results of the experiments appear to extend across a wide range of images and parameter choices.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号