首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12338篇
  免费   1010篇
  国内免费   402篇
电工技术   658篇
综合类   479篇
化学工业   1961篇
金属工艺   496篇
机械仪表   548篇
建筑科学   678篇
矿业工程   149篇
能源动力   375篇
轻工业   1151篇
水利工程   204篇
石油天然气   265篇
武器工业   75篇
无线电   1711篇
一般工业技术   1624篇
冶金工业   1476篇
原子能技术   153篇
自动化技术   1747篇
  2024年   62篇
  2023年   214篇
  2022年   424篇
  2021年   623篇
  2020年   456篇
  2019年   389篇
  2018年   437篇
  2017年   411篇
  2016年   425篇
  2015年   476篇
  2014年   607篇
  2013年   733篇
  2012年   766篇
  2011年   854篇
  2010年   634篇
  2009年   579篇
  2008年   588篇
  2007年   513篇
  2006年   425篇
  2005年   338篇
  2004年   289篇
  2003年   253篇
  2002年   281篇
  2001年   221篇
  2000年   183篇
  1999年   200篇
  1998年   502篇
  1997年   319篇
  1996年   251篇
  1995年   137篇
  1994年   144篇
  1993年   128篇
  1992年   76篇
  1991年   79篇
  1990年   64篇
  1989年   75篇
  1988年   42篇
  1987年   40篇
  1986年   42篇
  1985年   45篇
  1984年   38篇
  1983年   38篇
  1982年   38篇
  1981年   29篇
  1980年   29篇
  1979年   23篇
  1977年   43篇
  1976年   62篇
  1975年   16篇
  1973年   16篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
Improving the surface characteristics of roller burnishing processes is one of effective approaches to decrease the machining costs and time. This paper systematically investigates the nonlinear relationships between machining parameters and surface characteristics, including surface roughness (Ra), surface hardness (H), and hardness depth (HD) of the interior roller burnishing using response surface method (RSM) model. Three process parameters considered include spindle speed S, feed rate F, and burnishing depth D. A set of physical experiments was carried out with AISI 1045 steel on a computer numerical control (CNC) milling machine using the roller burnishing tool. The target of the current complex optimization is to enhance the surface hardness and hardness depth, while the surface roughness is considered as the constraint. Finally, an evolutionary algorithm entitled archive-based micro genetic algorithm (AMGA) was used to generate a set of feasible optimal solutions and determine the best machining conditions. The results show that an appropriate trade-off solution can be drawn with regard to the low surface roughness and high the surface hardness as well as hardness depth. Furthermore, the integration of RSM model and AMGA can be considered as a powerful approach for modeling and optimizing interior roller burnishing processes.  相似文献   
112.
Coherent addition of adjacent lasers by forked eigenstate operation   总被引:1,自引:0,他引:1  
Forked laser eigenstates are shown to provide a powerful tool both to phase lock spatially separated laser oscillators and to add their powers coherently into a TEM(00) output beam. Coherent addition of the powers extracted from two fiber-coupled diode-pumped Nd:YAG channels is theoretically and experimentally demonstrated. Pure TEM(00) oscillation is obtained with a 20% optical-to-optical conversion efficiency. The coherence of the two-propagation-axis laser is proved, and single-frequency operation is demonstrated. The scalability of the scheme is discussed.  相似文献   
113.
The different steps of development of chemically induced brain tumors were investigated in rats by MRI using a superparamagnetic contrast agent, magnetite-dextran nanoparticles (MD3). Sprague-Dawley strain pregnant female rats were injected intravenously with ethynitrosourea solution at the end of pregnancy. Offspring whelped by the inoculated mother were followed. MRI examinations were performed at 0.5 T. MD3 nanoparticles were injected intravenously at a dose of 5 mg Fe kg-1 body weight 30 min before rat sacrifice. After sacrifice, histological slices were stained with hematoxylin-eosin. Relaxation times were measured at 40 MHz and 37°. MD3 nanoparticles act differently according to the step of the tumor development. Before tumor appearance, at a step characterized by the presence of abnormal cell clusters, relaxation time T2 increased significantly. The T2-weighted image showed a small increase in signal intensity in the lesion. Image contrast was improved by MD3 nanoparticles injection because of the decrease in healthy tissue signal intensity. The Tl-weighted image did not provide any additional information. In presence of a minute tumor, relaxation times decreased in tumor but increased in surrounding tissue. The Tl-weighted image showed a hypersignal on the border of an hyposignal. T2-weighted image showed a hypersignal in the same area. Signal intensity was not modified after MD3 nanoparticles injection. When new vascular capillaries developed in the tumor, MD3 nanoparticles cross into the cerebral parenchyma. Transmission electron microscopy showed magnetite crystals in this specific area on cytoplasm vesicles of glial cells and in tumor-specific membrane arrangements. On T2-weighted image, the hypersignal consisted of a well defined part and a second more fuzzy part, its signal being extinguished after MD3 nanoparticles injection. Necrotic areas and edema can be discriminated. The use of such a superparamagnetic contrast agent would be helpful in early detection of tumor development and in improving distinction of tumor mass from its vascular environment in patients. © 1998 Elsevier Science B.V. All rights reserved.  相似文献   
114.
Pervasive technology has been widely used in assistive environments and aware homes. The issue of how to preserve the privacy of patients being monitored has been attracting more public concerns. In assistive environments, location data of patients are collected through sensors for behavior patterns analysis, and they can also be shared among researchers for further research for early disease diagnosis. However, location information, even though de-identified, also introduces the risk of privacy leakage. A series of consecutive location samples can be considered as a trajectory of a single person, and this may leak private information if obtained by malicious users. This paper discusses this problem and proposes a location randomization algorithm to protect users’ location privacy. Two privacy metrics according to location privacy are defined and used to evaluate the proposed approach. A method using dynamic mix zones is proposed to confound trajectories of two or more persons.  相似文献   
115.
鲁港  于乐 《计算机安全》2011,(10):80-83
在企业网中为了限制非授权用户访问企业网之外的资源,一般在代理服务器上进行IP地址或计算机MAC绑定.但是如果代理服务器的参数设置不合适,可能起不到限制非授权用户访问外网的作用.为了检测哪些代理服务器没有进行非授权用户IP或MAC限制,使用C++Builder 6.0的NMHTTP控件开发了一个局域网代理服务器检测程序....  相似文献   
116.
为了满足某型装备典型信号测试方法标准化、通用化的需求,以通用检测平台为基础,以某型装备某电子箱为被测对象,研究了典型被测信号的测试方法;通过介绍通用检测平台的整体结构、软件运行机制以及被测信号的特征,设计了电子箱的测试适配器,在分析了基本电参数测试方法的基础上,重点介绍了基于微分运算的脉冲幅值测试方法以及通过测量上升、下降沿来实现脉冲相位关系测量的检测方法;最后,对该电子箱进行了实际的测试验证,所得数据和波形满足电子箱的功能要求,结果证实了测试方法的有效性与合理性。  相似文献   
117.
根据基带传输相关课程内容的特点,提出采用MATLAB/Simulink仿真来进行演示和实验以解决相关的问题。同时阐述了使用MATLAB/Simulink对基带传输系统仿真的过程。  相似文献   
118.
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost and storage cost; that is, each shadow size is m times as big as the original secret image. The new (2,n) secret sharing scheme for grayscale images proposed in this paper is based a combination of acceptable image quality using block truncation coding (BTC), high compression ratio discrete wavelet transform (DWT) and good subjective performance of the vector quantization (VQ) technique. Experimental results confirm that our proposed scheme not only generates a high quality reconstructed original image but also generates small, random-like grayscale shadows.  相似文献   
119.
We present in this paper a model for indexing and querying web pages, based on the hierarchical decomposition of pages into blocks. Splitting up a page into blocks has several advantages in terms of page design, indexing and querying such as (i) blocks of a page most similar to a query may be returned instead of the page as a whole (ii) the importance of a block can be taken into account, as well as (iii) the permeability of the blocks to neighbor blocks: a block b is said to be permeable to a block b?? in the same page if b?? content (text, image, etc.) can be (partially) inherited by b upon indexing. An engine implementing this model is described including: the transformation of web pages into blocks hierarchies, the definition of a dedicated language to express indexing rules and the storage of indexed blocks into an XML repository. The model is assessed on a dataset of electronic news, and a dataset drawn from web pages of the ImagEval campaign where it improves by 16% the mean average precision of the baseline.  相似文献   
120.
基于嵌入式网络技术,研究并实现了一种用于嵌入式设备的监控系统.该系统采用客户端/服务器架构,通过在嵌入式设备中内建一个嵌入式Web服务器,可使得相应的嵌入式设备直接接入Internet.同时用户可使用标准的网络浏览器,通过网络对此设备进行访问、控制和管理.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号