首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4906篇
  免费   234篇
  国内免费   15篇
电工技术   53篇
综合类   3篇
化学工业   740篇
金属工艺   144篇
机械仪表   188篇
建筑科学   67篇
矿业工程   2篇
能源动力   134篇
轻工业   307篇
水利工程   20篇
石油天然气   9篇
无线电   691篇
一般工业技术   744篇
冶金工业   1639篇
原子能技术   28篇
自动化技术   386篇
  2024年   7篇
  2023年   25篇
  2022年   47篇
  2021年   119篇
  2020年   88篇
  2019年   67篇
  2018年   116篇
  2017年   115篇
  2016年   123篇
  2015年   100篇
  2014年   143篇
  2013年   232篇
  2012年   215篇
  2011年   254篇
  2010年   188篇
  2009年   196篇
  2008年   188篇
  2007年   155篇
  2006年   133篇
  2005年   95篇
  2004年   92篇
  2003年   92篇
  2002年   57篇
  2001年   96篇
  2000年   74篇
  1999年   93篇
  1998年   575篇
  1997年   325篇
  1996年   227篇
  1995年   129篇
  1994年   120篇
  1993年   147篇
  1992年   42篇
  1991年   53篇
  1990年   32篇
  1989年   40篇
  1988年   36篇
  1987年   26篇
  1986年   33篇
  1985年   24篇
  1984年   12篇
  1983年   15篇
  1982年   19篇
  1981年   13篇
  1980年   19篇
  1979年   5篇
  1978年   6篇
  1977年   35篇
  1976年   86篇
  1975年   6篇
排序方式: 共有5155条查询结果,搜索用时 15 毫秒
111.
Micro-end-milling of single-crystal silicon   总被引:1,自引:0,他引:1  
Ductile-regime machining of silicon using micro-end-mill is almost impossible because of the brittle properties of silicon, crystal orientation effects, edge radius of the cutter and the hardness of tool materials. Micro-end-milling can potentially be used to create desired three dimensional (3D) free form surface features using the ductile machining technology for single-crystal silicon. There is still a lack of fundamental understanding of micro-end-milling of single-crystal silicon using diamond-coated tool, specifically basic understanding of material removal mechanism, cutting forces and machined surface integrity in micro-scale machining of silicon. In this paper, further research to understand the chip formation mechanism was conducted. An analysis was performed to discover how the chips are removed during the milling process. Brittle and ductile cutting regimes corresponding to machined surfaces and chips are discussed. Experiments have shown that single-crystal silicon can be ductile machined using micro-end-milling process. Forces generated when micro-end-milling single-crystal silicon are used to determine the performance of the milling process. Experimental results show that the dependence of the cutting force on the uncut chip thickness can be well described by a polynomial function order n. As cutting regime becomes more brittle, the cutting force has more complex function.  相似文献   
112.
The as-sintered Zn1−xTixO (0.01 ≤ x ≤ 0.05) samples contained a solid solution of Zn1−xTixO with a wurtzite structure and a small amount of the cubic spinel Zn2TiO4. The amount of Zn2TiO4 increased with an increase in TiO2 content. The density and grain size increased with the small TiO2 content (≤0.01), and then they decreased gradually by further increasing the TiO2 content. The addition of TiO2 to ZnO led to a significant increase in the electrical conductivity and a decrease in the absolute value of the Seebeck coefficient, resulting in an increase in the power factor. The highest value of power factor (7.6 × 10−4 W m−1 K−2) was attained for Zn0.98Ti0.02O at 1073 K. It is demonstrated that the TiO2 addition is fairly effective for enhancing thermoelectric properties.  相似文献   
113.
We consider a pseudo-inversion operation inspired by biological events, such as DNA sequence transformations, where only parts of a string are reversed. We define the pseudo-inversion of a string \(w = uxv\) to be the set of all strings \(v^Rxu^R\), where \(uv \ne \lambda \) and consider the operation from a formal language theoretic viewpoint. We show that regular languages are closed under the pseudo-inversion operation whereas context-free languages are not. Furthermore, we study the iterated pseudo-inversion operation and show that the iterated pseudo-inversion of a context-free language is recognized by a nondeterministic reversal-bounded multicounter machine. Finally, we introduce the notion of pseudo-inversion-freeness and examine closure properties and decidability problems for regular and context-free languages. We demonstrate that pseudo-inversion-freeness is decidable in polynomial time for regular languages and undecidable for context-free languages.  相似文献   
114.
Through the rapid spread of smartphones, users have access to many types of applications similar to those on desktop computer systems. Smartphone applications using augmented reality (AR) technology make use of users' location information. As AR applications will require new evaluation methods, improved usability and user convenience should be developed. The purpose of the current study is to develop usability principles for the development and evaluation of smartphone applications using AR technology. We develop usability principles for smartphone AR applications by analyzing existing research about heuristic evaluation methods, design principles for AR systems, guidelines for handheld mobile device interfaces, and usability principles for the tangible user interface. We conducted a heuristic evaluation for three popularly used smartphone AR applications to identify usability problems. We suggested new design guidelines to solve the identified problems. Then, we developed an improved AR application prototype of an Android-based smartphone, which later was conducted a usability testing to validate the effects of usability principles.  相似文献   
115.
The popularity and growth of social networking sites (SNSs) have resulted in fierce competition among SNS providers. A critical concern of SNSs is to identify how to have users continuously use a specific SNS. This study examines the determinants of journal-type bloggers’ continuous self-disclosure. An analysis of 283 samples with continuous self-disclosure experiences in journal-type blogs shows that personal factors, specifically the habit of self-disclosure, are the major factors affecting bloggers’ continuous self-disclosure, followed by self-benefits. In contrast, social factors, such as positive audience feedback and social benefits, are not related to continuous self-disclosure. These results suggest that SNS providers must encourage users to develop the habit of using their web sites regularly. By providing differential benefits to users, SNS providers may attract users to continuously use their services.  相似文献   
116.
This paper presents an improved method based on single trial EEG data for the online classification of motor imagery tasks for brain-computer interface (BCI) applications. The ultimate goal of this research is the development of a novel classification method that can be used to control an interactive robot agent platform via a BCI system. The proposed classification process is an adaptive learning method based on an optimization process of the hidden Markov model (HMM), which is, in turn, based on meta-heuristic algorithms. We utilize an optimized strategy for the HMM in the training phase of time-series EEG data during motor imagery-related mental tasks. However, this process raises important issues of model interpretation and complexity control. With these issues in mind, we explore the possibility of using a harmony search algorithm that is flexible and thus allows the elimination of tedious parameter assignment efforts to optimize the HMM parameter configuration. In this paper, we illustrate a sequential data analysis simulation, and we evaluate the optimized HMM. The performance results of the proposed BCI experiment show that the optimized HMM classifier is more capable of classifying EEG datasets than ordinary HMM during motor imagery tasks.  相似文献   
117.
In this article, a Box-Cox transformation-based annealing robust radial basis function networks (ARRBFNs) is proposed for an identification algorithm with outliers. Firstly, a fixed Box-Cox transformation-based ARRBFN model with support vector regression (SVR) is derived to determine the initial structure. Secondly, the results of the SVR are used as the initial structure in the fixed Box-Cox transformation-based ARRBFNs for the identification algorithm with outliers. At the same time, an annealing robust learning algorithm (ARLA) is used as the learning algorithm for the fixed Box-Cox transformation-based ARRBFNs, and applied to adjust the parameters and weights. Hence, the fixed Box-Cox transformation-based ARRBFNs with an ARLA have a fast convergence speed for an identification algorithm with outliers. Finally, the proposed algorithm and its efficacy are demonstrated with an illustrative example in comparison with Box-Cox transformation-based radial basis function networks.  相似文献   
118.
The electrical conductivity and morphology of thick (up to 3 mm) porous polypyrrole (PPy) layers produced electrochemically from pyrrole in acetonitrile (ACN) solutions have been studied. The electrical conductivity of pressed porous layers ranges from 1 to 10 Scm–1, which is about one order of magnitude less than that in films which were prepared under similar conditions but without PnClCr. Analysis of the temperature dependence of conductivity has confirmed the major role of hopping in relation to tunnelling in charge transport inside the PPy layers even at lower temperatures. Scanning electron microscopy (SEM) showed a globular structure, which is different from the usual cauliflower-like structure of PPy films prepared without any oxidizing agent. Globular particles of about 1–3 m diameter have been found under a thin smooth crust on the electrode side of the sample. Globular particles form linked chain-like or larger round formations poorly filling the space. Closely packed fibrils of about 20 nm diameter and over 100 nm in length were found inside the aggregates.  相似文献   
119.
Transections of the chicken spinal cord after the developmental onset of myelination at embryonic day (E) 13 results in little or no functional regeneration. However, intraspinal injection of serum complement proteins with complement-binding GalC or 04 antibodies between E9-E12 results in a delay of the onset of myelination until E17. A subsequent transection of the spinal cord as late as E15 (i.e., during the normal restrictive period for repair) results in neuroanatomical regeneration and functional recovery. Utilizing a similar immunological protocol, we evoked a transient alteration of myelin structure in the posthatching (P) chicken spinal cord, characterized by widespread "unravelling" of myelin sheaths and a loss of MBP immunoreactivity (myelin disruption). Myelin repair began within 7 d of cessation of the myelin disruption protocol. Long term disruption of thoracic spinal cord myelin was initiated after a P2-P10 thoracic transection and maintained for > 14 d by intra-spinal infusion of serum complement proteins plus complement-binding GalC or 04 antibodies. Fourteen to 28 d later, retrograde tract tracing experiments, including double-labeling protocols, indicated that approximately 6-19% of the brainstem-spinal projections had regenerated across the transection site to lumbar levels. Even though voluntary locomotion was not observed after recovery, focal electrical stimulation of identified brainstem locomotor regions evoked peripheral nerve activity in paralyzed preparations, as well as leg muscle activity patterns typical of stepping in unparalyzed animals. This indicated that a transient alteration of myelin structure in the injured adult avian spinal cord facilitated brainstem-spinal axonal regrowth resulting in functional synaptogenesis with target neurons.  相似文献   
120.
The error-rate floor of low-density parity-check (LDPC) codes is attributed to the trapping sets of their Tanner graphs. Among them, fully absorbing sets dominantly affect the error-rate performance, especially for short blocklengths. Efficient methods to identify the dominant trapping sets of LDPC codes were thoroughly researched as exhaustively searching them is NP-hard. However, the existing methods are ineffective for Raptor-like LDPC codes, which have many types of trapping sets. An effective method to identify dominant fully absorbing sets of Raptor-like LDPC codes is proposed. The search space of the proposed algorithm is optimized into the Tanner subgraphs of the codes to afford time-efficiency and search-effectiveness. For 5G New Radio (NR) base graph (BG) 2 LDPC codes for short blocklengths, the proposed algorithm finds more dominant fully absorbing sets within one seventh of the computation time of the existing search algorithm, and its search-effectiveness is verified using importance sampling. The proposed method is also applied to 5G NR BG1 LDPC code and Advanced Television Systems Committee 3.0 type A LDPC code for large blocklengths.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号