首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1539篇
  免费   93篇
  国内免费   3篇
电工技术   15篇
综合类   1篇
化学工业   381篇
金属工艺   32篇
机械仪表   41篇
建筑科学   64篇
矿业工程   3篇
能源动力   63篇
轻工业   197篇
水利工程   15篇
石油天然气   6篇
武器工业   1篇
无线电   156篇
一般工业技术   293篇
冶金工业   69篇
原子能技术   9篇
自动化技术   289篇
  2024年   2篇
  2023年   26篇
  2022年   54篇
  2021年   66篇
  2020年   55篇
  2019年   60篇
  2018年   57篇
  2017年   57篇
  2016年   51篇
  2015年   53篇
  2014年   66篇
  2013年   128篇
  2012年   97篇
  2011年   137篇
  2010年   92篇
  2009年   73篇
  2008年   100篇
  2007年   68篇
  2006年   60篇
  2005年   41篇
  2004年   43篇
  2003年   46篇
  2002年   33篇
  2001年   15篇
  2000年   9篇
  1999年   8篇
  1998年   17篇
  1997年   11篇
  1996年   14篇
  1995年   13篇
  1994年   10篇
  1993年   12篇
  1992年   4篇
  1991年   4篇
  1990年   5篇
  1989年   2篇
  1988年   5篇
  1987年   6篇
  1985年   12篇
  1984年   3篇
  1983年   3篇
  1979年   2篇
  1978年   1篇
  1976年   3篇
  1975年   1篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
  1970年   2篇
  1969年   1篇
排序方式: 共有1635条查询结果,搜索用时 31 毫秒
991.
992.
Advanced manufacturing processes such as additive manufacturing offer now the capability to control material placement at unprecedented length scales and thereby dramatically open up the design space. This includes the considerations of new component topologies as well as the architecture of material within a topology offering new paths to creating lighter and more efficient structures. Topology optimization is an ideal tool for navigating this multiscale design problem and leveraging the capabilities of advanced manufacturing technologies. However, the resulting design problem is computationally challenging as very fine discretizations are needed to capture all micro-structural details. In this paper, a method based on reduction techniques is proposed to perform efficiently topology optimization at multiple scales. This method solves the design problem without length scale separation, i.e., without iterating between the two scales. Ergo, connectivity between space-varying micro-structures is naturally ensured. Several design problems for various types of micro-structural periodicity are performed to illustrate the method, including applications to infill patterns in additive manufacturing.  相似文献   
993.
Fibers obtained from different parts of the oil palm tree (Elaeis guineensis) have been under investigation for possible use in construction. Studies have been carried out investigating the engineering properties and possible applications of these fibers. However, the experimental methods employed and the values of mechanical and physical properties recorded by various authors are inconsistent. It has therefore become necessary to organize information which would be useful in the design of oil palm fiber cement composites and help researchers and engineers make informed decisions in further research and application. This review provides information about fibers from different parts of the oil palm, their properties, enhancement techniques, current and potential application in cement composites.  相似文献   
994.
Abstract

Supported Co-Mo catalysts with a given ratio of metals were prepared from polyoxomolybdate Mo12O282-OH)12{Со(H2O)3}4 using impregnation and combustion methods. Effects of the type of catalyst and the ratio and flow of methane and hydrogen gases on the structure of carbon nanotubes (CNTs) synthesized by catalytic chemical vapor deposition (CCVD) method were studied using transmission electron microscopy and Raman spectroscopy. The catalyst prepared by combustion method yielded mainly individualized CNTs, while the CNTs were highly entangled or bundled when impregnation method was used. In both cases, addition of hydrogen to methane led to reduction of the CNT yield. The samples synthesized using two different catalysts and the same CH4/H2 ratio and flow of gases were tested in electrochemical capacitors. A higher specific surface area of the CNTs grown over impregnation-prepared catalyst caused a better performance at scan rates from 2 to 1000?mV/s.  相似文献   
995.
We measure the effects of urban riots on the labour market prospects of workers in the case of the French riots of 2007. The town of Villiers-le-Bel is our treatment unit while two other towns serve as control groups, Sarcelles and Enghien-les-Bains. Using the technique of correspondence testing, we are able to discern disparities in call-back rates for fictitious candidates who respond to actual job postings over four dimensions: gender, ethnic origin, locality of residence (advantaged vs. disadvantaged), and the degree of media exposure during the riots. We implement an empirical approach to measure discrimination across several dimensions that integrates a set of relevant parameters into one unified system of equations. We find statistically significant negative estimates of a media exposure effect. People residing in the area which received negative publicity were 3.2 percentage points less likely to receive a callback. The group of workers who tend to be the most associated with the riots, namely, men of North African origin (at least in terms of perceptions), are the least affected by potential discrimination by region of residence, while women of French origin are the most affected.  相似文献   
996.
ABSTRACT

Network Intrusion Detection System (NIDS) is often used to classify network traffic in an attempt to protect computer systems from various network attacks. A major component for building an efficient intrusion detection system is the preprocessing of network traffic and identification of essential features which is essential for building robust classifier. In this study, a NIDS based on deep learning model optimized with rule-based hybrid feature selection is proposed. The architecture is divided into three phases namely: hybrid feature selection, rule evaluation and detection. Several search methods and attribute evaluators were combined for features selection to enhance experimentation and comparison. The results obtained showed that the number of selected features will not affect the detection accuracy of the feature selection algorithms, but directly proportional to the performance of the base classifier. Results from the performance comparison proved that the proposed method outperforms other related methods with reduction of false alarm rate, high accuracy rate, reduced training and testing time of 1.2%, 98.8%, 7.17s and 3.11s, respectively. Finally, the simulation experiments on standard evaluation metrics showed that the proposed method is suitable for attack classification in NIDS.  相似文献   
997.
998.
Fire Technology - Large Eddy Simulations (LES) of smoke extraction duct system (SEDS) in single compartments of different volumes (i.e., 128 m $$^3$$ , 512 m $$^3$$ and 2400 m $$^3$$ ) with FDS...  相似文献   
999.
1000.
Journal of Intelligent Manufacturing - In furtherance of emerging research within smart production planning and control (PPC), this paper prescribes a methodology for the design and development of...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号