首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   53740篇
  免费   5063篇
  国内免费   3201篇
电工技术   2538篇
技术理论   1篇
综合类   4689篇
化学工业   7359篇
金属工艺   7112篇
机械仪表   5618篇
建筑科学   2895篇
矿业工程   2357篇
能源动力   1945篇
轻工业   3556篇
水利工程   1244篇
石油天然气   2867篇
武器工业   729篇
无线电   4343篇
一般工业技术   6076篇
冶金工业   3750篇
原子能技术   1041篇
自动化技术   3884篇
  2024年   286篇
  2023年   842篇
  2022年   1459篇
  2021年   1733篇
  2020年   1936篇
  2019年   1639篇
  2018年   1685篇
  2017年   2186篇
  2016年   2244篇
  2015年   2196篇
  2014年   3144篇
  2013年   3399篇
  2012年   3812篇
  2011年   3924篇
  2010年   2944篇
  2009年   2963篇
  2008年   2621篇
  2007年   3393篇
  2006年   3019篇
  2005年   2493篇
  2004年   2236篇
  2003年   1878篇
  2002年   1607篇
  2001年   1392篇
  2000年   1168篇
  1999年   958篇
  1998年   832篇
  1997年   751篇
  1996年   679篇
  1995年   577篇
  1994年   414篇
  1993年   302篇
  1992年   291篇
  1991年   222篇
  1990年   189篇
  1989年   145篇
  1988年   105篇
  1987年   68篇
  1986年   49篇
  1985年   48篇
  1984年   43篇
  1983年   25篇
  1982年   29篇
  1981年   14篇
  1980年   16篇
  1979年   3篇
  1978年   6篇
  1977年   3篇
  1975年   9篇
  1959年   8篇
排序方式: 共有10000条查询结果,搜索用时 22 毫秒
51.
采用烧结方法制备得到纳米α-Fe_2O_3,利用X射线衍射仪(XRD)和透射电镜(TEM)对样品进行了表征,研究了纳米α-Fe_2O_3作为液体石蜡添加剂的摩擦磨损性能。结果表明,添加纳米添加剂后,润滑油摩擦系数改变不明显,但磨损率显著降低。磨损率与纳米α-Fe_2O_3添加剂的表面积和添加量密切相关,当纳米材料的表面积为47m~2/g时磨损率最低,磨损率值降低为3.78×10~(-15) m~2/g;添加量为1.0wt%,润滑油磨损率最低。  相似文献   
52.
图案是所有设计专业的学生在学校学习时所必修的一门专业基础课。纵观中华五千年的文明,哪一朝哪一代都有自己独特的图案风格。那么,在今天的图案设计特别是儿童服装的图案设计与应用中,怎样为孩子营造一个童话的世界,展现孩子的童真与童趣?一名优秀的童装图案设计师,应该充分利用自然环境,社会环境,民族心理和传统文化结构所赋予的条件,来解决这个问题,从而构思出独特完美而富有表现力的童装图案设计作品。  相似文献   
53.
In this paper, a cold standby repairable system consisting of two dissimilar components and one repairman is studied. When failures occur, the repair of both component 1 and component 2 are not ‘as good as new’. The consecutive operating times of component 1 after repair constitute a decreasing geometric process, while the repair times of component 1 are independent and identically distributed. For component 2, its failure is rectified by minimal repair, and the repair time is negligible. Component 1 has priority in use when both components are good. The replacement policy N is based on the failure number of component 1. Under policy N, we derive the explicit expression of the long-run average cost rate C(N) as well as the average number of repairs of component 2 before the system replaced. The optimal replacement policy N*, which minimises the long-run average cost rate C(N), is obtained theoretically. If the failure rate r(t) of component 2 is increasing, the existence and uniqueness of the optimal policy N* is also proved. Finally, a numerical example is given to validate the developed theoretical model. Some sensitivity analyses are provided to show the influence of some parameters, such as the costs for replacement and repair, and the parameters of the lifetime and repair time distributions of both components, to the optimal replacement policy N* and corresponding average cost rate C(N*).  相似文献   
54.
Active worms have posed a major security threat to the Internet and many research efforts have focused on them. However, defending against them remains challenging due to their continuous evolution. In this paper, we study a new class of defense-oriented evolved worms, the Varying Scan Rate worm (the VSR worm in short). In order to circumvent detection by existing worm detection schemes, the VSR worm deliberately varies its scan rate according to these schemes’ weaknesses. To counteract the VSR worm, we design a new worm-detection scheme, the attack-target Distribution Entropy-based Dynamic detection scheme (DED detection for short). DED detection utilizes the attack-target distribution and robust statistical feature in conjunction with dynamic decision adaptation to distinguish worm-scan traffic from non-worm-scan traffic. We present a comparatively complete space of detection schemes and conduct extensive performance evaluations on the DED detection scheme compared with other schemes, using real-world Internet traces as background scan traffic. Our data clearly demonstrate the effectiveness of the DED detection scheme in detecting both the VSR worm and the traditional worm.  相似文献   
55.
Test set size in terms of the number of test cases is an important consideration when testing software systems. Using too few test cases might result in poor fault detection and using too many might be very expensive and suffer from redundancy. We define the failure rate of a program as the fraction of test cases in an available test pool that result in execution failure on that program. This paper investigates the relationship between failure rates and the number of test cases required to detect the faults. Our experiments based on 11 sets of C programs suggest that an accurate estimation of failure rates of potential fault(s) in a program can provide a reliable estimate of adequate test set size with respect to fault detection and should therefore be one of the factors kept in mind during test set construction. Furthermore, the model proposed herein is fairly robust to incorrect estimations in failure rates and can still provide good predictive quality. Experiments are also performed to observe the relationship between multiple faults present in the same program using the concept of a failure rate. When predicting the effectiveness against a program with multiple faults, results indicate that not knowing the number of faults in the program is not a significant concern, as the predictive quality is typically not affected adversely.  相似文献   
56.
An online face recognition system is presented in the paper. To online face recognition system, we should consider the recognition rate, the image compression and image size. In the paper we researched the innovation technologies for face recognition system, including Kernel Principal Component Analysis (Kernel PCA), Delta low-pass wavelet filter, and face recognition algorithm using multiple images. Kernel PCA is derived to classify the characteristics of training images in the database. Delta low-pass wavelet filter is used to reduce the image size. A face recognition algorithm using multiple images is presented to improve the recognition rate. Simulation experiment shows that in the case of packet loss recognition rate is improved highly.  相似文献   
57.
Comments on J. J. Christensen-Szalanski and L. R. Beach's (see record 1984-21471-001) conclusion that the attention given to commentaries and replies to articles did not justify the extra space and argues that citation indexes do not measure the major usefulness of these commentaries. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
58.
开发了一种新的特性粘数分析方法 ,该方法采用熔体流动时间计算特性粘数 ,与经典特性粘数分析方法有很好的相关性且具有分析时间短、费用低、无污染等优点。  相似文献   
59.
针对目前很多人对农业科技进步贡献率和水利对粮食生产贡献率的不同认识,从发展历程、概念内涵、测算思路方法等方面,剖析了二者差异,认为二者在测算范围上存在大口径与小口径的差异,在测算对象上存在增量与总量的差异,在测算指标上存在产值与产量的差异,在测算方法上存在余值法与有无对比法的差异,为正确认识这两个指标提供了参考。  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号