全文获取类型
收费全文 | 15908篇 |
免费 | 2273篇 |
国内免费 | 1762篇 |
专业分类
电工技术 | 1960篇 |
技术理论 | 3篇 |
综合类 | 1808篇 |
化学工业 | 433篇 |
金属工艺 | 259篇 |
机械仪表 | 1827篇 |
建筑科学 | 564篇 |
矿业工程 | 272篇 |
能源动力 | 286篇 |
轻工业 | 130篇 |
水利工程 | 361篇 |
石油天然气 | 313篇 |
武器工业 | 166篇 |
无线电 | 2068篇 |
一般工业技术 | 1058篇 |
冶金工业 | 207篇 |
原子能技术 | 135篇 |
自动化技术 | 8093篇 |
出版年
2024年 | 71篇 |
2023年 | 198篇 |
2022年 | 300篇 |
2021年 | 397篇 |
2020年 | 420篇 |
2019年 | 396篇 |
2018年 | 391篇 |
2017年 | 542篇 |
2016年 | 616篇 |
2015年 | 723篇 |
2014年 | 930篇 |
2013年 | 986篇 |
2012年 | 1197篇 |
2011年 | 1228篇 |
2010年 | 922篇 |
2009年 | 1020篇 |
2008年 | 1064篇 |
2007年 | 1256篇 |
2006年 | 1031篇 |
2005年 | 963篇 |
2004年 | 842篇 |
2003年 | 698篇 |
2002年 | 582篇 |
2001年 | 469篇 |
2000年 | 430篇 |
1999年 | 339篇 |
1998年 | 278篇 |
1997年 | 296篇 |
1996年 | 231篇 |
1995年 | 209篇 |
1994年 | 198篇 |
1993年 | 141篇 |
1992年 | 134篇 |
1991年 | 84篇 |
1990年 | 57篇 |
1989年 | 61篇 |
1988年 | 54篇 |
1987年 | 36篇 |
1986年 | 19篇 |
1985年 | 29篇 |
1984年 | 21篇 |
1983年 | 14篇 |
1982年 | 8篇 |
1981年 | 11篇 |
1980年 | 10篇 |
1979年 | 8篇 |
1977年 | 6篇 |
1976年 | 6篇 |
1975年 | 4篇 |
1974年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
为实现高效的平流式换热器柔性弯曲制造,避免模具对制品的损伤,采用仿真与试验相结合的方法实现平流式换热器无模弯曲工艺开发.与传统的换热器绕弯成型技术相比,该成型过程无须弯曲模,而是通过控制换热器两端的运动轨迹实现弯曲成型,改变相应的运动轨迹能实现不同的弯曲半径.在成型原理分析的基础上,建立无模弯曲成型过程的有限元仿真模型,并基于仿真结果确定合理的弯曲速度、夹头长度和中性层半径等工艺参数.设计并制造无模弯曲成型试验装置,并研究翅片结构等因素对成型质量的影响. 相似文献
62.
在高地震烈度区的岩石高边坡抗震安全评价需要大规模数值计算,而现有商业软件无法有效解决这类复杂的工程问题,因此,本文开发了解决岩石高边坡接触稳定性问题的对等架构并行计算程序,并应用于泰山公司抽水蓄能电站上水库左岸边坡的静力和动力稳定性评价。在数值建模过程中,将岩石边坡滑块体、地质结构面、库水作用以及近场地基作为岩石高边坡动力接触系统。在稳定性安全评价中结合了有限元法、极限平衡法和接触算法,考虑影响高边坡稳定性的多种复杂因素,通过计算特定滑动面的安全系数或安全系数时程,基于现行水电工程水工建筑物抗震设计规范,完成了岩石高边坡稳定性评价,回避了求解复杂岩体材料非线性的问题。计算结果显示,所开发的程序具有较高的并行计算效率,对解决复杂岩石高边坡稳定问题具有显著的优势。 相似文献
63.
《Displays》2021
Semantic segmentation based on the complementary information from RGB and depth images has recently gained great popularity, but due to the difference between RGB and depth maps, how to effectively use RGB-D information is still a problem. In this paper, we propose a novel RGB-D semantic segmentation network named RAFNet, which can selectively gather features from the RGB and depth information. Specifically, we construct an architecture with three parallel branches and propose several complementary attention modules. This structure enables a fusion branch and we add the Bi-directional Multi-step Propagation (BMP) strategy to it, which can not only retain the feature streams of the original RGB and depth branches but also fully utilize the feature flow of the fusion branch. There are three kinds of complementary attention modules that we have constructed. The RGB-D fusion module can effectively extract important features from the RGB and depth branch streams. The refinement module can reduce the loss of semantic information and the context aggregation module can help propagate and integrate information better. We train and evaluate our model on NYUDv2 and SUN-RGBD datasets, and prove that our model achieves state-of-the-art performances. 相似文献
64.
基于SaaS的矿震远程预警系统关键技术初探 总被引:1,自引:1,他引:0
现有的矿震预警系统都是以独立形式运行于各矿区,相互之间没有关联,重复投资严重,且矿震数据海量繁杂,仅依靠现场分析无法满足实时预警需求。文章基于感知矿山物联网示范工程(夹河矿),对采用云计算SaaS模式构建的矿震远程预警系统关键技术进行了相关研究:首先给出了系统整体框架,然后重点探讨了该系统所涉及的三个关键技术,包括基于SaaS的矿震预警专家分析软件架构、多源SaaS数据库构建技术以及基于MapReduce的并发数据过滤接收技术。现场应用表明,所构建的系统已基本具备全国统一远程矿震预警系统的架构,能满足多矿区远程矿震预警的基本要求。 相似文献
65.
M. MoessnerAuthor VitaeGul N. KhanAuthor Vitae 《Computer Networks》2012,56(1):273-286
Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure, maintain low communication cost and can be integrated into the ubiquitous EPCglobal Class 1 Generation 2 tag protocol (C1G2) are still needed and being investigated. We present a novel authentication protocol, which offers a high level of security through the combination of a random key scheme with a strong cryptography. The protocol is applicable to resource, power and computationally constraint platforms such as RFID tags. Our investigation shows that it can provide mutual authentication, untraceability, forward and backward security as well as resistance to replay, denial-ofth-service and man-in-the-middle attacks, while retaining a competitive communication cost. The protocol has been integrated into the EPCglobal C1G2 tag protocol, which assures low implementation cost. We also present a successful implementation of our protocol on real-world components such as the INTEL WISP UHF RFID tag and a C1G2 compliant reader. 相似文献
66.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit. 相似文献
67.
陈剑 《计算机与数字工程》2012,40(4):130-132
该文引入speedup作为并行程序的性能评测指标,分析了并行程序在不同类型和不同数量的客户虚拟机中运行的性能差异,实验表明,MPI并行程序在xVM虚拟化环境中的运行性能接近非虚拟化本地主机的性能,在半虚拟化环境中的并行程序性能超过全虚拟化环境中的并行程序性能。 相似文献
68.
密集平行束孔落矿的底盘漏斗采矿方案的特点是:用密集严行束孔落矿;凿岩与出矿水平合二为一;实行“掘井、劈漏、落矿三位一体”的回采工艺。该方案结构简单、采切比低、工人劳动强度低,适于开采缓倾斜顶底围岩不稳固的中厚以上矿体。 相似文献
69.
A method capable of estimating the hydrograph from a prescribed storm for a practical mild slope upstream catchment is proposed. This method makes use of two new characteristic parameters, andS, in conjunction with the kinematic wave equation to compute lateral inflows of the main stream of the catchment. The depth profile of overland flow at any instant within the catchment and hydrograph at any location can be easily found. Lag times for individual lateral inflows are then considered and are linearly combined to obtain the hydrograph at the outlet of the catchment or depth profile of the main stream at any instant. The validity of the excess rainfall-surface runoff linear relationship in this study has also been verified with Tatsunokuchiyama catchment, and it shows good results for this computed runoff. 相似文献
70.
Paul Feautrier 《International journal of parallel programming》1992,21(6):389-420
This paper extends the algorithms which were developed in Part I to cases in which there is no affine schedule, i.e. to problems whose parallel complexity is polynomial but not linear. The natural generalization is to multidimensional schedules with lexicographic ordering as temporal succession. Multidimensional affine schedules, are, in a sense, equivalent to polynomial schedules, and are much easier to handle automatically. Furthermore, there is a strong connection between multidimensional schedules and loop nests, which allows one to prove that a static control program always has a multidimensional schedule. Roughly, a larger dimension indicates less parallelism. In the algorithm which is presented here, this dimension is computed dynamically, and is just sufficient for scheduling the source program. The algorithm lends itself to a divide and conquer strategy. The paper gives some experimental evidence for the applicability, performances and limitations of the algorithm. 相似文献