首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   72787篇
  免费   7966篇
  国内免费   5608篇
电工技术   4880篇
技术理论   5篇
综合类   7329篇
化学工业   10120篇
金属工艺   4922篇
机械仪表   7065篇
建筑科学   7509篇
矿业工程   2885篇
能源动力   2118篇
轻工业   8893篇
水利工程   2084篇
石油天然气   3803篇
武器工业   951篇
无线电   4056篇
一般工业技术   7862篇
冶金工业   2978篇
原子能技术   911篇
自动化技术   7990篇
  2024年   712篇
  2023年   2023篇
  2022年   3753篇
  2021年   3807篇
  2020年   3397篇
  2019年   2643篇
  2018年   2458篇
  2017年   2813篇
  2016年   3030篇
  2015年   3047篇
  2014年   4256篇
  2013年   4074篇
  2012年   5269篇
  2011年   5544篇
  2010年   3968篇
  2009年   4114篇
  2008年   3520篇
  2007年   4380篇
  2006年   3996篇
  2005年   3304篇
  2004年   2606篇
  2003年   2387篇
  2002年   1896篇
  2001年   1561篇
  2000年   1355篇
  1999年   1149篇
  1998年   968篇
  1997年   715篇
  1996年   631篇
  1995年   556篇
  1994年   496篇
  1993年   351篇
  1992年   284篇
  1991年   241篇
  1990年   193篇
  1989年   144篇
  1988年   126篇
  1987年   71篇
  1986年   54篇
  1985年   58篇
  1984年   44篇
  1983年   27篇
  1982年   38篇
  1981年   15篇
  1980年   44篇
  1979年   29篇
  1965年   15篇
  1964年   21篇
  1963年   15篇
  1959年   15篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
王婧月  陆佳平  王利强 《包装工程》2023,44(23):191-197
目的 为提高M型预制袋包装机袋口折合机构轨迹输出点的运动精度,对袋口折合机构进行运动精度可靠性优化。方法 在运动学分析的基础上,用环路增量法建立考虑杆长误差时袋口折合机构的位置误差模型,接着对轨迹输出点进行可靠性分析及蒙特卡洛法验证,通过灵敏度分析确定关键误差影响因素,最后进行运动精度可靠性优化。结果 建立的可靠性模型可以有效地反映杆长误差对机构运动精度的影响,x分量轨迹的可靠度由82.5%提高至92.91%,y分量轨迹可靠度由65.34%提高至89%。结论 经过可靠性优化能够使袋口折合机构运动精度满足设计要求。  相似文献   
992.
考虑了剪滞翘曲应力自平衡条件、剪切变形和剪力滞后效应等因素的影响,本文提出了一种对宽翼薄壁T形梁动力学特性的分析方法.分析中为了准确反应T形梁翼板的动位移变化,三个广义动位移被引入,且以能量变分原理为基础建立了T形梁动力反应的控制微分方程和自然边界条件,据此对T形梁的动力反应特性进行了分析,揭示了T形梁桥动力反应的规律.算例中,对比了考虑和不考虑剪滞翘曲应力自平衡条件对T形梁动力反应的影响,结果显示考虑剪滞翘曲应力自平衡条件的计算方法与有限元数值解吻合更好.  相似文献   
993.
官振中  康怀飞 《工业工程》2023,26(1):1-7+40
建立随机需求下的两阶段销售模型,研究消费者高价后悔和缺货后悔对零售商定价与库存决策的影响,分析两种运营策略:价格承诺和快速响应。结果表明,高价(缺货)后悔加重(减轻)消费者策略性等待行为,零售商应降低(提高)定价并减少(增加)库存;价格承诺和快速响应均能缓解消费者策略性等待行为,但两者的价值受消费者预期后悔的影响相反;价格承诺仅在补货成本高于某个阈值且消费者预期后悔敏感度低于某个阈值时优于快速响应。  相似文献   
994.
With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed. A distributed architecture based on an intrusion detection system (IDS) ensures that a dynamic, scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is available. In this study, we examined the time-related aspects of network traffic data. We presented an intrusion detection model based on a two-layered bidirectional long short-term memory (Bi-LSTM) with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark dataset. We showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy, precision, recall and F1 score.  相似文献   
995.
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy.  相似文献   
996.
The self-assembly of peptidyl virus-like nanovesicles (pVLNs) composed of highly ordered peptide bilayer membranes that encapsulate the small interfering RNA (siRNA) is reported. The targeting and enzyme-responsive sequences on the bilayer's surface allow the pVLNs to enter cancer cells with high efficiency and control the release of genetic drugs in response to the subcellular environment. By transforming its structure in response to the highly expressed enzyme matrix metalloproteinase 7 (MMP-7) in cancer cells, it helps the siRNA escape from the lysosomes, resulting in a final silencing efficiency of 92%. Moreover, the pVLNs can serve as reconfigurable “Trojan horse” by transforming into membranes triggered by the MMP-7 and disrupting the cytoplasmic structure, thereby achieving synergistic anticancer effects and 96% cancer cell mortality with little damage to normal cells. The pVLNs benefit from their biocompatibility, targeting, and enzyme responsiveness, making them a promising platform for gene therapy and anticancer therapy.  相似文献   
997.
Hysteresis normally exhibited by mechanical systems and materials is so prevalent that its response prediction under random excitation has been extensively investigated for decades. Nevertheless, the transient solution of the response, which is crucial for assessing the system’s reliability, is still a challenging topic that requires additional development. To this regard, this work proposes a semi-analytical method using the radial basis function neural network (RBFNN) to attain the transient probability density distribution of the randomly excited Bouc–Wen system. Specifically, the trial solution of the corresponding FPK equation is configured as the RBFNN with undetermined time-varying weight coefficients. By discretizing the time derivative with the Euler difference method, a loss function with time recurrence is derived and minimized to yield the time-varying optimal weight coefficients through the optimization method. Additionally, an optimized sampling strategy is adopted to reduce the burden of calculation. Finally, the Bouc–Wen hysteretic systems with softening and hardening nonlinearity are considered to investigate the performance of the adopted technique. The numerical results have shown that the evaluation process of the probability density functions(PDFs) can be captured well with sufficient accuracy and efficiency. The proposed efficient sampling technique can provide considerable efficiency improvement for the medium dimension system. The work of the paper will contribute to the reliability design of hysteretic structures in engineering.  相似文献   
998.
通过对已脆化的25Cr2Mo1V钢螺栓及经恢复热处理后的螺栓的金相及电子显微分析,阐述了25Cr2Mo1V钢在长期高温高压下工作发生脆化的原因,讨论了恢复热处理对脆化螺栓恢复性能的作用  相似文献   
999.
介绍了一种基于实体模型的CAD/CAM系统的Undo/Redo操作实现技术.它支持多层次嵌套的CAD/CAM建模环境.因而当用户在CAD/CAM系统环境中建模时,可以方便地对模型进行Undo/Redo编辑操作.  相似文献   
1000.
介绍一种采用 STEWART机构的新型加工中心 .对这种加工中心加工球面时各“腿”长度变化的规律进行了分析 .结果表明 :各“腿”长度呈正 (余 )弦规律变化 ,且其变化周期与幅度均相同 ;它们的变化曲线依次相差 1 2 0°到达峰顶 ,其顺序与加工球面上截面圆各点的逆时针顺序相互对应 .导出的各“腿”长度变化的公式可用于指导数控编程  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号