首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3915篇
  免费   155篇
  国内免费   111篇
电工技术   83篇
综合类   259篇
化学工业   152篇
金属工艺   503篇
机械仪表   822篇
建筑科学   142篇
矿业工程   184篇
能源动力   56篇
轻工业   102篇
水利工程   15篇
石油天然气   524篇
武器工业   16篇
无线电   145篇
一般工业技术   249篇
冶金工业   81篇
原子能技术   8篇
自动化技术   840篇
  2024年   10篇
  2023年   46篇
  2022年   74篇
  2021年   83篇
  2020年   93篇
  2019年   59篇
  2018年   65篇
  2017年   82篇
  2016年   111篇
  2015年   99篇
  2014年   203篇
  2013年   200篇
  2012年   251篇
  2011年   304篇
  2010年   210篇
  2009年   212篇
  2008年   205篇
  2007年   221篇
  2006年   222篇
  2005年   183篇
  2004年   172篇
  2003年   171篇
  2002年   147篇
  2001年   111篇
  2000年   115篇
  1999年   89篇
  1998年   82篇
  1997年   67篇
  1996年   50篇
  1995年   52篇
  1994年   39篇
  1993年   24篇
  1992年   13篇
  1991年   13篇
  1990年   11篇
  1989年   14篇
  1988年   13篇
  1987年   10篇
  1986年   8篇
  1985年   7篇
  1984年   8篇
  1983年   16篇
  1982年   8篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1965年   1篇
  1963年   1篇
  1960年   1篇
排序方式: 共有4181条查询结果,搜索用时 31 毫秒
91.
基于模糊数学和可靠性数学的基本理论 ,阐述了刀具模糊可靠性的基本概念和评价方法 ,并进一步应用于陶瓷刀具研究领域 ,建立了陶瓷刀具模糊可靠性与刀具材料力学性能的关系 ,从而使得不做或少做切削实验就能评价陶瓷刀具可靠性的设想成为可能  相似文献   
92.
This paper documents part of a research program which has been under way at the CIM Centre at Swinburne University of Technology since 1989. The purpose of the research program was to develop an open-architecture machine tool control system and then to see how that system could be used to change the distribution of traditional manufacturing design, planning and control functions. This paper examines one part of that research program and focuses on a methodology which could prove to be useful in the machine tool selection, cutter selection and cutter path generation phases of process planning for cutting operations on workpieces in computer-controlled machine tools.It is suggested that a configuration space transform be used for each cutter/machine tool combination to find the volume that the combination could remove from the uncut workpiece without removing any of the material that will form the final workpiece. A method of comparing these volumes from different combinations is then outlined. The output of this method is a reasonable sequence of machine tools and cutters. Path planning can then be carried out for each of the chosen combinations using a method similar to the one used to find the possible volume to be removed.Possible implementation techniques, and their limitations on existing computer hardware, are discussed and the most promising of these are identified, based upon some properties of configuration space transforms.  相似文献   
93.
在半导体芯片制造中越来越广泛使用多组合设备.本文介绍了多组合设备的结构配置、生产运行过程、调度控制问题的一般特征条件、应该满足的约束及周期性调度策略;分析了问题的复杂性因素.从多组合设备的结构特征、运行过程特征两方面分类综述了调度问题的建模、分析方法、调度算法及存在的问题,最后指出了未来的研究方向.  相似文献   
94.
Automatic 3D model reconstruction of cutting tools from a single camera   总被引:1,自引:0,他引:1  
Collision detection by machining simulation requires the 3D models of rotating cutters. However, the 3D models of a cutter and holder are not always available. In this paper, a new method is proposed to design an automatic vision-based 3D modeling system, which is able to quickly reconstruct the 3D model of a cutter and holder when they are installed onto the spindle. Only a single camera is mounted on the machine tool to capture the image of the rotating cutter and holder. By viewing the rotating cutter and holder as an object of surface of revolution, the contour of the imaged cutter and holder can be used to reconstruct the 3D model as a stack of circular cross-sections. Then the complete generating function of the cutter and holder can be recovered from the cross-sections. Finally, the 3D model of the cutter is built by rotating the generating function around the spindle axis. The effectiveness and accuracy of the proposed method are verified by experiments on-machine using 12 kinds of cutters and holders, which can satisfy the requirement of collision detection.  相似文献   
95.
高校公选课程的开设是培养大学生综合素质的重要渠道之一,《动画设计—Flash》以其生动鲜活、实用性强、易学易用的特点深受广大同学的欢迎。该文根据教学实践,从教学内容的安排、教学手段与方法、考核方式三个方面进行了阐述。  相似文献   
96.
内存泄漏是软件系统中常见的一种错误,会持续消耗内存,致使系统运行效率下降,甚至导致系统崩溃。内存泄漏的检测工具主要可以分为两类:一类是使用基于程序扫描分析技术的静态工具;另一类则是监视实时内存分配状态进行判别的动态工具。如何评估工具检测内存泄漏的能力,相关的标准并不明确。通过对内存泄漏的认识与了解,对相关工具能力进行了调研与分析,提出了一个内存泄漏工具的评估标准。  相似文献   
97.

Context

Software developers spend considerable effort implementing auxiliary functionality used by the main features of a system (e.g., compressing/decompressing files, encryption/decription of data, scaling/rotating images). With the increasing amount of open source code available on the Internet, time and effort can be saved by reusing these utilities through informal practices of code search and reuse. However, when this type of reuse is performed in an ad hoc manner, it can be tedious and error-prone: code results have to be manually inspected and integrated into the workspace.

Objective

In this paper we introduce and evaluate the use of test cases as an interface for automating code search and reuse. We call our approach Test-Driven Code Search (TDCS). Test cases serve two purposes: (1) they define the behavior of the desired functionality to be searched; and (2) they test the matching results for suitability in the local context. We also describe CodeGenie, an Eclipse plugin we have developed that performs TDCS using a code search engine called Sourcerer.

Method

Our evaluation consists of two studies: an applicability study with 34 different features that were searched using CodeGenie; and a performance study comparing CodeGenie, Google Code Search, and a manual approach.

Results

Both studies present evidence of the applicability and good performance of TDCS in the reuse of auxiliary functionality.

Conclusion

This paper presents an approach to source code search and its application to the reuse of auxiliary functionality. Our exploratory evaluation shows promising results, which motivates the use and further investigation of TDCS.  相似文献   
98.
99.
User interfaces are becoming more intuitive following the requirements of the individual learner and reinforcing the drive towards more personalised learning and greater learner autonomy. There are clearly a new set of challenges emerging for teaching practitioners that will have implications upon not just what is learned but importantly upon lesson planning. This paper explores these changes to teaching through a consideration of an exploratory learning model which allows practitioners to rethink how they teach in 3D and immersive spaces where learning sequences and experiences are choreographed to support peer interactions and exchanges. The ELM extends from Kolb’s experiential learning model to adapt the use of 3D applications, and provides examples from research and development projects to exemplify how the model works in practice. Teaching in these contexts provides less emphasis upon curriculum and more emphasis upon sequencing learning experiences, meta-reflection, peer assessment and group work.  相似文献   
100.
This paper describes the motivation, proposal, and early prototype testing of a computer tool for story visualisation. An analysis of current software for making various types of visual story is made; this identifies a gap between software which emphasises preset banks of artwork, and software which emphasises low-level construction and/or drawing. A proposal is made to fill this gap, and a prototype implementation of the proposal is described in the context of a school-based study with England and Wales’s Year 5, covering ages 9–10 years. Results from this prototype study both validate the novel proposal made and demonstrate that children are capable of manipulating characters and notional camera angles in a more complex way than most current software permits.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号