全文获取类型
收费全文 | 5497篇 |
免费 | 596篇 |
国内免费 | 251篇 |
专业分类
电工技术 | 386篇 |
综合类 | 344篇 |
化学工业 | 965篇 |
金属工艺 | 354篇 |
机械仪表 | 334篇 |
建筑科学 | 465篇 |
矿业工程 | 186篇 |
能源动力 | 155篇 |
轻工业 | 437篇 |
水利工程 | 96篇 |
石油天然气 | 372篇 |
武器工业 | 38篇 |
无线电 | 602篇 |
一般工业技术 | 666篇 |
冶金工业 | 295篇 |
原子能技术 | 44篇 |
自动化技术 | 605篇 |
出版年
2024年 | 39篇 |
2023年 | 113篇 |
2022年 | 234篇 |
2021年 | 345篇 |
2020年 | 244篇 |
2019年 | 193篇 |
2018年 | 226篇 |
2017年 | 200篇 |
2016年 | 185篇 |
2015年 | 257篇 |
2014年 | 294篇 |
2013年 | 342篇 |
2012年 | 364篇 |
2011年 | 378篇 |
2010年 | 291篇 |
2009年 | 280篇 |
2008年 | 273篇 |
2007年 | 227篇 |
2006年 | 274篇 |
2005年 | 253篇 |
2004年 | 164篇 |
2003年 | 156篇 |
2002年 | 133篇 |
2001年 | 128篇 |
2000年 | 136篇 |
1999年 | 115篇 |
1998年 | 82篇 |
1997年 | 67篇 |
1996年 | 59篇 |
1995年 | 75篇 |
1994年 | 43篇 |
1993年 | 31篇 |
1992年 | 35篇 |
1991年 | 28篇 |
1990年 | 12篇 |
1989年 | 14篇 |
1988年 | 17篇 |
1987年 | 18篇 |
1986年 | 6篇 |
1985年 | 4篇 |
1984年 | 1篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1951年 | 2篇 |
排序方式: 共有6344条查询结果,搜索用时 15 毫秒
31.
临界直径是确定炸药合理装药直径、预防炸药拒爆和不完全爆轰的重要指标,对炸药性能提高和高效利用有着十分重要的意义。设计了一种连续压导探针和楔形装药装置,在对炸药爆速进行测试的同时,利用炸药在临界直径不完全爆轰的特征,通过寻找爆轰波传播的拐点确定炸药临界直径。试验结果表明:装药密度为0.9g/cm3的铵油炸药爆速为3 261 m/s,临界直径为12.5 mm。提供了一种可同时测得炸药爆速和临界直径的方法,该方法简单,试验费用低,对炸药参数测试具有一定的指导意义。 相似文献
32.
Zibo Wang Chaobin Huo Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li Bailing Wang 《计算机、材料和连续体(英文)》2023,75(2):2957-2979
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy. 相似文献
33.
Molecular dynamic model of nanofluid between flat plates under shear flow conditions was built. The nanofluid model consisted
of 12 spherical copper nanoparticles with each particle diameter of 4 nm and argon atoms as base liquid. The Lennard–Jones
(LJ) potential function was adopted to deal with the interactions between atoms. Thus, the motion states of nanoparticles
during the process of flowing were obtained and the flow behaviors of nanofluid between flat plates at different moments could
be analyzed. The simulation results showed that an absorption layer of argon atoms existed surrounding each nanoparticle and
would accompany with the particle to move. The absorption layer contributed little to the flow of nanoparticles but much to
the heat transferring in nanofluids. Another phenomenon observed during shear flowing process was that the nanoparticles would
vibrate and rotate besides main flowing with liquid argon and these micro-motions could strengthen partial flowing in nanofluids. 相似文献
34.
自动测试系统中的仪器设备驱动通用封装研究 总被引:1,自引:0,他引:1
在目前的自动测试系统软件开发中,虚拟仪器设备指令的非通用性会导致系统开发繁琐、无法集成等问题,针对这些问题提出了一种适合大部分仪器设备的封装方法;这种封装方法,通过动态链接库的形式将事件处理机制嵌入到仪器驱动封装里,拥有跨平台、适用面广、开发速度快和仪器可互换等特点;经过在实际雷达射频模块自动测试系统项目中的应用,结果表明该方法能够实现跨平台操作、具有仪器互换和封装简便等特点,并且表现出极强的通用性,具有一定的实用性和推广价值. 相似文献
35.
武器发射时产生的脉冲噪声对人员和仪器会造成很大的危害,因此噪声测试在武器勤务性能考核巾具有重要意义,针对脉冲噪声信号特性,开发了一套基于VXI总线的噪声测试系统;详细介绍了系统硬件结构设计、基于LabWindows/CVI虚拟仪器开发平台的软件设计和系统功能;设计的系统具有存储容量大、采样率高和软件功能强等特点,能够用于各种武器单发或连发射击时的噪声测试,也可以用于武器非行驶状态下的稳态噪声测试;通过在试验中的应用,表明本系统操作简便,工作可靠. 相似文献
36.
The quality of plane layout design of the disc cutters for the full-face rock tunnel boring machine (TBM) directly affects the balance of force distribution on the cutter head during the excavating. Various layout patterns have been adopted in practice during the layout design of the disc cutters. Considering the engineering technical requirements and the corresponding structure design requirements of the cutter head, this study formulates a nonlinear multi-objective mathematical model with multiple constraints for the disc cutters plane layout design, and analyses the characteristics of a multi-spiral layout pattern, a dynamic star layout pattern and a stochastic layout pattern. And then a genetic algorithm is employed to solve a disc cutters’ multi-spiral layout problem, and a cooperative co-evolutionary genetic algorithm (CCGA) is utilized to solve a disc cutters’ star or stochastic layout problems. The emphasis was put on the study of superiority of three different layout patterns. Finally, an instance of the disc cutters’ plane layout design was solved by the proposed methods using three different kinds of layout patterns. Experimental results showed the effectiveness of the method of combining the mathematical model with the algorithms, and the pros and cons of the three layout patterns. 相似文献
37.
38.
对于教育测评所积累的大量数据,通过数据挖掘技术能产生出对学生、教师、教育管理者有用的知识。为此,从教育测评的目的、数据准备、数据积累方法,到数据的知识挖掘等几个方面,系统地研究了教育测评的知识发现的过程,并分别就三种需求的知识发现方法进行探讨,以改变教育测评仅能提供定性的结论而不能发现知识的状况,丰富教育测评的内涵。 相似文献
39.
40.
义类自动标注方法的研究 总被引:3,自引:1,他引:2
句法分析不能满足汉语分析的需要,句法和语义相结合的分析方法适用于汉语分析。分析的基础要有一部语法语义词典。目前的机读词典多是语法词典,因而需要在语法词典中加入词的语义信息。《同义词词林》是一部较好的义类词典,但没有语法信息,可以《同义词词林》的分类体系对语法词典进行义类标注,得到语法语义词典。这一过程中有不一致的情况,特别地,对《同义词词林》中未收录的词就不能直接标注义类。本文采用《同义词词林》的分类体系,研究设计了一个汉语词自动义类标注算法,对北大《现代汉语语法信息词典》进行自动义类标注。实验结果较为满意,得到91%的准确率。 相似文献