首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7011篇
  免费   1029篇
  国内免费   561篇
电工技术   444篇
技术理论   1篇
综合类   182篇
化学工业   660篇
金属工艺   225篇
机械仪表   1393篇
建筑科学   255篇
矿业工程   28篇
能源动力   945篇
轻工业   440篇
水利工程   123篇
石油天然气   41篇
武器工业   9篇
无线电   1068篇
一般工业技术   1182篇
冶金工业   59篇
原子能技术   21篇
自动化技术   1525篇
  2024年   69篇
  2023年   264篇
  2022年   476篇
  2021年   500篇
  2020年   471篇
  2019年   406篇
  2018年   277篇
  2017年   358篇
  2016年   462篇
  2015年   364篇
  2014年   482篇
  2013年   575篇
  2012年   876篇
  2011年   730篇
  2010年   463篇
  2009年   491篇
  2008年   204篇
  2007年   341篇
  2006年   335篇
  2005年   129篇
  2004年   36篇
  2003年   28篇
  2002年   26篇
  2001年   37篇
  2000年   26篇
  1999年   26篇
  1998年   11篇
  1997年   7篇
  1996年   8篇
  1995年   8篇
  1994年   7篇
  1993年   17篇
  1992年   16篇
  1991年   5篇
  1990年   4篇
  1989年   5篇
  1988年   10篇
  1987年   24篇
  1986年   12篇
  1985年   4篇
  1983年   1篇
  1982年   1篇
  1979年   3篇
  1951年   6篇
排序方式: 共有8601条查询结果,搜索用时 15 毫秒
61.
研究了用SHS/PHIP技术制备出的Ti3AlC2可加工陶瓷的塑性变形特征。应变速率为1×10^-3/s,从室温到1300℃的压缩实验结果表明,室温到800℃的压缩断裂方式为脆性断裂,但存在显微塑性。主裂纹的偏转与分岔、晶粒的分层与扭折是主要变形机制;1000℃到1300℃,位错运动带来了塑性流变的结果。800℃到1000℃被称为韧脆转变温度区间,在此温度区间以上的应力与应变曲线存在着“硬化区域”,并且随着温度的升高,“塑性区”要大于“硬化区”。  相似文献   
62.
Study on improvement of conductivity of Cu-Cr-Zr alloys   总被引:1,自引:0,他引:1  
The influence of alloying, heat treatment, and plastic working on the performance of Cu-Cr-Zr alloys was investigated. The precipitated phases were characterized as Cr, Cu51Zr14 and Cu5Zr. Cu-Cr-Zr alloys demonstrate combination properties of high strength and high conductivity after solution treatment, aging treatment, and plastic deformation. Precipitation course of Cr is the main factor that influences the conductivity of Cu-Cr-Zr alloys, while adding Zr in the alloys adjusts the orientation relationship between Cr and matrix, and tends to increase the conductivity of aged Cu-Cr-Zr alloys after deformation.  相似文献   
63.
64.
65.
This paper proposes a robust image hashing method in discrete Fourier domain that can be applied in such fields as image authentication and retrieval. In the pre-processing stage, image resizing and total variation based filtering are first used to regularize the input image. Then the secondary image is obtained by the rotation projection, and the robust frequency feature is extracted from the secondary image after discrete Fourier transform. More sampling points are chosen from the low- and middle-frequency component to represent the salient content of the image effectively, which is achieved by the non-uniform sampling. Finally, the intermediate sampling feature vectors are scrambled and quantized to produce the resulting binary hash securely. The security of the method depends entirely on the secret key. Experiments are conducted to show that the present method has satisfactory robustness against perceptual content-preserving manipulations and has also very low probability for collision of the hashes of distinct images.  相似文献   
66.
In order to evade detection of ever-improving defense techniques, modern botnet masters are constantly looking for new communication platforms for delivering C&C (Command and Control) information. Attracting their attention is the emergence of online social networks such as Twitter, as the information dissemination mechanism provided by these networks can naturally be exploited for spreading botnet C&C information, and the enormous amount of normal communications co-existing in these networks makes it a daunting task to tease out botnet C&C messages.Against this backdrop, we explore graph-theoretic techniques that aid effective monitoring of potential botnet activities in large open online social networks. Our work is based on extensive analysis of a Twitter dataset that contains more than 40 million users and 1.4 billion following relationships, and mine patterns from the Twitter network structure that can be leveraged for improving efficiency of botnet monitoring. Our analysis reveals that the static Twitter topology contains a small-sized core sugraph, after removing which, the Twitter network breaks down into small connected components, each of which can be handily monitored for potential botnet activities. Based on this observation, we propose a method called Peri-Watchdog, which computes the core of a large online social network and derives the set of nodes that are likely to pass botnet C&C information in the periphery of online social network. We analyze the time complexity of Peri-Watchdog under its normal operations. We further apply Peri-Watchdog on the Twitter graph injected with synthetic botnet structures and investigate the effectiveness of Peri-Watchdog in detecting potential C&C information from these botnets.To verify whether patterns observed from the static Twitter graph are common to other online social networks, we analyze another online social network dataset, BrightKite, which contains evolution of social graphs formed by its users in half a year. We show not only that there exists a similarly relatively small core in the BrightKite network, but also this core remains stable over the course of BrightKite evolution. We also find that to accommodate the dynamic growth of BrightKite, the core has to be updated about every 18 days under a constrained monitoring capacity.  相似文献   
67.
将紧致格式与低阶格式结合,构造紧致格式的修正项,并将修正项加入到源项中进行求解,得到了一种基于非均分网格求解泊松方程的紧致修正法,且将该方法应用于二维和三维泊松方程的数值求解中。数值计算结果表明:紧致修正方法的精度高于经典方法的精度,但四阶紧致修正方法比二阶经典方法对网格的依赖性强。  相似文献   
68.
Because subjective evaluation is not adequate for assessing work in an automatic system, using an objective image fusion performance metric is a common approach to evaluate the quality of different fusion schemes. In this paper, a multi-resolution image fusion metric using visual information fidelity (VIF) is presented to assess fusion performance objectively. This method has four stages: (1) Source and fused images are filtered and divided into blocks. (2) Visual information is evaluated with and without distortion information in each block. (3) The visual information fidelity for fusion (VIFF) of each sub-band is calculated. (4) The overall quality measure is determined by weighting the VIFF of each sub-band. In our experiment, the proposed fusion assessment method is compared with several existing fusion metrics using the subjective test dataset provided by Petrovic. We found that VIFF performs better in terms of both human perception matching and computational complexity.  相似文献   
69.
反渗透处理高含盐废水的实验研究与膜污染分析   总被引:1,自引:0,他引:1  
试验以经过混凝-超滤预处理后的高含盐废水为研究对象,考察了一级两段反渗透处理工艺对CODcr、TDS等的去除效果以及操作压力、温度、pH等因素对反渗透去除效果的影响。研究表明:在最佳工艺条件下,CODcr的去除率大于90%,TDS的去除率大于99%。反渗透处理后出水达到工业循环冷却水水质要求(GB50330-2002)。膜受污染后采用化学清洗和水力清洗相结合的方法可使膜的透水量恢复97.53%。  相似文献   
70.
城市快速路是城市交通的主动脉,承担着城市大部分交通量,良好的快速路控制策略能有效缓解道路拥堵。本文借助改进的宏观交通流模型,采用Visual Basic面向对象语言,开发城市快速路的控制仿真系统。运用该仿真系统对一个包含两起点两终点的快速路段进行仿真,模拟采用ALINEA策略和不采用控制的快速路交通运行状态。仿真结果表明,对入口匝道实施ALINEA控制后,高峰时刻主线流量增加约150veh/h,入口匝道与主线汇合区速度提高约10km/h,说明ALINEA控制策略能有效缓解快速路拥堵。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号