首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32160篇
  免费   4280篇
  国内免费   2164篇
电工技术   8350篇
技术理论   1篇
综合类   3694篇
化学工业   856篇
金属工艺   666篇
机械仪表   2352篇
建筑科学   6316篇
矿业工程   1012篇
能源动力   1529篇
轻工业   316篇
水利工程   1270篇
石油天然气   637篇
武器工业   264篇
无线电   2172篇
一般工业技术   2478篇
冶金工业   835篇
原子能技术   143篇
自动化技术   5713篇
  2024年   194篇
  2023年   485篇
  2022年   965篇
  2021年   1061篇
  2020年   1205篇
  2019年   938篇
  2018年   933篇
  2017年   1172篇
  2016年   1284篇
  2015年   1437篇
  2014年   2288篇
  2013年   1871篇
  2012年   2503篇
  2011年   2771篇
  2010年   2066篇
  2009年   2112篇
  2008年   2037篇
  2007年   2346篇
  2006年   2065篇
  2005年   1674篇
  2004年   1337篇
  2003年   1151篇
  2002年   914篇
  2001年   756篇
  2000年   609篇
  1999年   536篇
  1998年   317篇
  1997年   313篇
  1996年   277篇
  1995年   201篇
  1994年   181篇
  1993年   114篇
  1992年   75篇
  1991年   65篇
  1990年   68篇
  1989年   64篇
  1988年   67篇
  1987年   28篇
  1986年   19篇
  1985年   19篇
  1984年   14篇
  1983年   13篇
  1982年   15篇
  1981年   9篇
  1980年   6篇
  1979年   6篇
  1978年   4篇
  1977年   2篇
  1976年   8篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
预应力筋的优化布置是大内跨小边跨的多跨预应力混凝土框架结构合理设计计算的关键.为满足控制截面承载力最大的需要,以往常将大跨所需预应力筋布置为连续曲线,并按水平直线延伸通过其相邻的两小跨,按这种布置方式仅使大跨内产生竖向向上的预应力等效荷载,可较好平衡大跨的竖向外荷载;而若将大跨及相邻的两小跨统一考虑,预应力筋按连续曲线布置,张拉产生的预应力等效荷载不但可有效平衡大跨的竖向外荷载而且也可平衡小跨的竖向外荷载,可以使荷载平衡得到优化实现.以一典型工程为例,分析了在相同条件下两种预应力筋布置过程中张拉引起的综合弯矩、主弯矩和次弯矩的分布和量值上差异,比较了两类布筋形式对正截面承载力计算结果的影响,验证了对大内跨小边跨框架结构统一考虑后整体上按三段连续正反抛物线预应力筋布置的合理性.  相似文献   
92.
异构云数据中心各类服务器的控制成本和性能上的差异将影响其运维管理成本及QoS博弈平衡关系,针对任务序列强度具有的时效性,提出了任务序列强度感知的大规模任务调度模型。依据当前到达数据中心的任务序列的强度以及集群中服务器的当前状态,在任务调度中强调节约服务器运维管理成本和各服务器负载均衡的基础上实现优化数据中心对任务序列处理的平均响应时间和系统的吞吐量。通过对实验结果的分析,验证了集群服务器控制模型在任务调度中的可信度大于95%,同时通过与当前应用广且具代表性的算法——最短任务优先,公平分发机制进行比较分析,其效果是三者中最好的,也验证了模型的有效性和可行性。  相似文献   
93.
针对海上浮式装置力学分析中选用不同截止频率阈值得到重构的冲击载荷对结构响应结果有较大影响的问题,采用变分模态分解(Variable Mode Decomposition, VMD)方法得到冲击载荷各本征模态函数、对应频谱的特征频率和最大加速度幅值。选取不同的截止因数,重构得到不同的冲击载荷。数值仿真结果表明:当截止因数为0.01时,重构的冲击载荷动力学响应与原始冲击载荷动力学响应基本保持一致;在保证足够的安全裕度的前提下,当截止因数选0.20时,可获得更低的截止频率。  相似文献   
94.
The superplastic deformation behavior of quasi-single phase Zn-0.3 wt. %Al was investigated. A series of load relaxation and tensile tests was conducted at various temperatures ranging from RT (20 °C) to 200 °C. The recently proposed internal variable theory of structural superplasticity was applied. The flow curves obtained from load relaxation tests were shown to consist of contributions from interface sliding (IS) and accommodating plastic deformation. In the case of quasi-single phase Zn-0.3 wt.% Al alloy with an average agrain size of 1 μm, the IS behavior could be described as a viscous flow process characterized by a power index of Mg=0.5. A large elongation of about 1400% was obtained at room temperature and the strain rate sensitivity parameter was about 0.4. Although relatively large-grained (10 μm) single phase alloy showed a high value of strain rate sensitivity comparable to that of fine-grained alloy at very low strain rate range, IS was not expected from the analysis based on the internal variable theory of structural superplasticity at room temperature. As the temperature increased above 100 °C, however, the contribution from IS was observed at a very low strain rate range. A high elongation of ∼400% was obtained in a specimen of 10-μm-grain-size at 200 °C under a strain rate of 2×10−4/sec. Jointly appointed at Center for Advanced Aerospace Materials (CAAM)  相似文献   
95.
四辊轧机辊系间的轴向摩擦力对辊系轴承寿命的影响   总被引:1,自引:0,他引:1  
四辊轧机工作辊轴承和支承辊止推轴承失效的主要原因是它们在工作中所受的轴向载荷过大。工作辊与支承辊轴线的不平行引起其接触面的轴向相对滑动 ,由此产生轴向滑动摩擦力 ,使轧辊轴承最终失效。通过对辊系的分析 ,给出了解决该问题的新的设计思路 ,对新轧机的设计和旧轧机的改造具有指导意义  相似文献   
96.
对程星磊等提出的总应力形式增量弹塑性本构模型进行二次开发,以模拟复杂应力状态下软黏土的响应。通过Newton-Raphson算法,对材料非线性问题进行迭代求解;针对本构模型中应力反向等一系列关键性问题,应用欧拉切线算法编写了有限元程序,并结合子增量方法提高了计算精度。预测了软黏土在轴对称应力状态下的响应,得到了应力应变关系曲线,将其与单元预测结果进行比较,二者趋于一致,从而验证了有限元程序编写的合理性。利用该程序模拟三轴不固结不排水试验,模拟结果与试验吻合良好,表明该本构模型有限元程序可以反映轴对称应力状态下软黏土的不排水应力应变特性,可应用于更加复杂边值问题的模拟计算。  相似文献   
97.
Travel patterns have gradually changed from group travel to individual travel. An increasing number of people acquire travel information through various types of media. One of the alternative information sources is social media, which enables users to exchange information among members. However, one of the characteristics of social media is information sharing, not information search, which involves both giving (i.e. posting) and taking (i.e. selective reading, forwarding, replying, linking, and liking) information. Compared to the ‘giving’ side of information-sharing research, less effort has been spent on the ‘taking’ side of information research. Therefore, we investigate travel information adoption in social media as well as how individuals communicate with each other. We use the elaboration likelihood model, which measures the impact of central (e.g. argument quality) and peripheral (e.g. credibility) cues on traveller information-sharing behaviour corresponding with social presence on social media. The results of an empirical analysis of 527 respondents, who were experienced in travel information adoption via social media, were examined. Our findings revealed that argument quality had a positive effect on perceived usefulness and source credibility positively affected perceived usefulness and social relationships. Perceived usefulness had a significant positive effect on social relationships. Both perceived usefulness and social relationships affected travel information adoption. Lastly, the levels of argument quality and source credibility perceived by social media members were found to differ according to the level of social presence.  相似文献   
98.
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme.  相似文献   
99.
Cloud computing is an emerging technology in which information technology resources are virtualized to users in a set of computing resources on a pay‐per‐use basis. It is seen as an effective infrastructure for high performance applications. Divisible load applications occur in many scientific and engineering applications. However, dividing an application and deploying it in a cloud computing environment face challenges to obtain an optimal performance due to the overheads introduced by the cloud virtualization and the supporting cloud middleware. Therefore, we provide results of series of extensive experiments in scheduling divisible load application in a Cloud environment to decrease the overall application execution time considering the cloud networking and computing capacities presented to the application's user. We experiment with real applications within the Amazon cloud computing environment. Our extensive experiments analyze the reasons of the discrepancies between a theoretical model and the reality and propose adequate solutions. These discrepancies are due to three factors: the network behavior, the application behavior and the cloud computing virtualization. Our results show that applying the algorithm result in a maximum ratio of 1.41 of the measured normalized makespan versus the ideal makespan for application in which the communication to computation ratio is big. They show that the algorithm is effective for those applications in a heterogeneous setting reaching a ratio of 1.28 for large data sets. For application following the ensemble clustering model in which the computation to communication ratio is big and variable, we obtained a maximum ratio of 4.7 for large data set and a ratio of 2.11 for small data set. Applying the algorithm also results in an important speedup. These results are revealing for the type of applications we consider under experiments. The experiments also reveal the impact of the choice of the platforms provided by Amazon on the performance of the applications under study. Considering the emergence of cloud computing for high performance applications, the results in this paper can be widely adopted by cloud computing developers. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
100.
利用状态空间平均方法建立了Buck变换器的数学模型,该模型考虑了电容和电感的串联等效电阻,仿真结果与电路模型的仿真结果基本一致,其准确性较高;基于该数学模型,分别设计了PID控制和PWM滑模控制,滑模控制基于二重积分滑动面,并利用了电流信息。仿真结果表明,在负载突变情况下,基于二重积分滑动面的PWM滑模电流控制具有更好的动态响应特性和稳态误差调节特性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号