首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15908篇
  免费   2273篇
  国内免费   1762篇
电工技术   1960篇
技术理论   3篇
综合类   1808篇
化学工业   433篇
金属工艺   259篇
机械仪表   1827篇
建筑科学   564篇
矿业工程   272篇
能源动力   286篇
轻工业   130篇
水利工程   361篇
石油天然气   313篇
武器工业   166篇
无线电   2068篇
一般工业技术   1058篇
冶金工业   207篇
原子能技术   135篇
自动化技术   8093篇
  2024年   71篇
  2023年   198篇
  2022年   300篇
  2021年   397篇
  2020年   420篇
  2019年   396篇
  2018年   391篇
  2017年   542篇
  2016年   616篇
  2015年   723篇
  2014年   930篇
  2013年   986篇
  2012年   1197篇
  2011年   1228篇
  2010年   922篇
  2009年   1020篇
  2008年   1064篇
  2007年   1256篇
  2006年   1031篇
  2005年   963篇
  2004年   842篇
  2003年   698篇
  2002年   582篇
  2001年   469篇
  2000年   430篇
  1999年   339篇
  1998年   278篇
  1997年   296篇
  1996年   231篇
  1995年   209篇
  1994年   198篇
  1993年   141篇
  1992年   134篇
  1991年   84篇
  1990年   57篇
  1989年   61篇
  1988年   54篇
  1987年   36篇
  1986年   19篇
  1985年   29篇
  1984年   21篇
  1983年   14篇
  1982年   8篇
  1981年   11篇
  1980年   10篇
  1979年   8篇
  1977年   6篇
  1976年   6篇
  1975年   4篇
  1974年   4篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
为实现高效的平流式换热器柔性弯曲制造,避免模具对制品的损伤,采用仿真与试验相结合的方法实现平流式换热器无模弯曲工艺开发.与传统的换热器绕弯成型技术相比,该成型过程无须弯曲模,而是通过控制换热器两端的运动轨迹实现弯曲成型,改变相应的运动轨迹能实现不同的弯曲半径.在成型原理分析的基础上,建立无模弯曲成型过程的有限元仿真模型,并基于仿真结果确定合理的弯曲速度、夹头长度和中性层半径等工艺参数.设计并制造无模弯曲成型试验装置,并研究翅片结构等因素对成型质量的影响.  相似文献   
62.
在高地震烈度区的岩石高边坡抗震安全评价需要大规模数值计算,而现有商业软件无法有效解决这类复杂的工程问题,因此,本文开发了解决岩石高边坡接触稳定性问题的对等架构并行计算程序,并应用于泰山公司抽水蓄能电站上水库左岸边坡的静力和动力稳定性评价。在数值建模过程中,将岩石边坡滑块体、地质结构面、库水作用以及近场地基作为岩石高边坡动力接触系统。在稳定性安全评价中结合了有限元法、极限平衡法和接触算法,考虑影响高边坡稳定性的多种复杂因素,通过计算特定滑动面的安全系数或安全系数时程,基于现行水电工程水工建筑物抗震设计规范,完成了岩石高边坡稳定性评价,回避了求解复杂岩体材料非线性的问题。计算结果显示,所开发的程序具有较高的并行计算效率,对解决复杂岩石高边坡稳定问题具有显著的优势。  相似文献   
63.
Semantic segmentation based on the complementary information from RGB and depth images has recently gained great popularity, but due to the difference between RGB and depth maps, how to effectively use RGB-D information is still a problem. In this paper, we propose a novel RGB-D semantic segmentation network named RAFNet, which can selectively gather features from the RGB and depth information. Specifically, we construct an architecture with three parallel branches and propose several complementary attention modules. This structure enables a fusion branch and we add the Bi-directional Multi-step Propagation (BMP) strategy to it, which can not only retain the feature streams of the original RGB and depth branches but also fully utilize the feature flow of the fusion branch. There are three kinds of complementary attention modules that we have constructed. The RGB-D fusion module can effectively extract important features from the RGB and depth branch streams. The refinement module can reduce the loss of semantic information and the context aggregation module can help propagate and integrate information better. We train and evaluate our model on NYUDv2 and SUN-RGBD datasets, and prove that our model achieves state-of-the-art performances.  相似文献   
64.
基于SaaS的矿震远程预警系统关键技术初探   总被引:1,自引:1,他引:0  
现有的矿震预警系统都是以独立形式运行于各矿区,相互之间没有关联,重复投资严重,且矿震数据海量繁杂,仅依靠现场分析无法满足实时预警需求。文章基于感知矿山物联网示范工程(夹河矿),对采用云计算SaaS模式构建的矿震远程预警系统关键技术进行了相关研究:首先给出了系统整体框架,然后重点探讨了该系统所涉及的三个关键技术,包括基于SaaS的矿震预警专家分析软件架构、多源SaaS数据库构建技术以及基于MapReduce的并发数据过滤接收技术。现场应用表明,所构建的系统已基本具备全国统一远程矿震预警系统的架构,能满足多矿区远程矿震预警的基本要求。  相似文献   
65.
Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost and can be integrated into the ubiquitous EPCglobal Class 1 Generation 2 tag protocol (C1G2) are still needed and being investigated. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-ofth-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the EPCglobal C1G2 tag protocol, which assures low implementation cost. We also present a successful implementation of our protocol on real-world components such as the INTEL WISP UHF RFID tag and a C1G2 compliant reader.  相似文献   
66.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit.  相似文献   
67.
该文引入speedup作为并行程序的性能评测指标,分析了并行程序在不同类型和不同数量的客户虚拟机中运行的性能差异,实验表明,MPI并行程序在xVM虚拟化环境中的运行性能接近非虚拟化本地主机的性能,在半虚拟化环境中的并行程序性能超过全虚拟化环境中的并行程序性能。  相似文献   
68.
密集平行束孔落矿的底盘漏斗采矿方案的特点是:用密集严行束孔落矿;凿岩与出矿水平合二为一;实行“掘井、劈漏、落矿三位一体”的回采工艺。该方案结构简单、采切比低、工人劳动强度低,适于开采缓倾斜顶底围岩不稳固的中厚以上矿体。  相似文献   
69.
A method capable of estimating the hydrograph from a prescribed storm for a practical mild slope upstream catchment is proposed. This method makes use of two new characteristic parameters, andS, in conjunction with the kinematic wave equation to compute lateral inflows of the main stream of the catchment. The depth profile of overland flow at any instant within the catchment and hydrograph at any location can be easily found. Lag times for individual lateral inflows are then considered and are linearly combined to obtain the hydrograph at the outlet of the catchment or depth profile of the main stream at any instant. The validity of the excess rainfall-surface runoff linear relationship in this study has also been verified with Tatsunokuchiyama catchment, and it shows good results for this computed runoff.  相似文献   
70.
This paper extends the algorithms which were developed in Part I to cases in which there is no affine schedule, i.e. to problems whose parallel complexity is polynomial but not linear. The natural generalization is to multidimensional schedules with lexicographic ordering as temporal succession. Multidimensional affine schedules, are, in a sense, equivalent to polynomial schedules, and are much easier to handle automatically. Furthermore, there is a strong connection between multidimensional schedules and loop nests, which allows one to prove that a static control program always has a multidimensional schedule. Roughly, a larger dimension indicates less parallelism. In the algorithm which is presented here, this dimension is computed dynamically, and is just sufficient for scheduling the source program. The algorithm lends itself to a divide and conquer strategy. The paper gives some experimental evidence for the applicability, performances and limitations of the algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号