首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   75534篇
  免费   7595篇
  国内免费   6766篇
电工技术   6354篇
技术理论   15篇
综合类   7884篇
化学工业   3093篇
金属工艺   645篇
机械仪表   3227篇
建筑科学   3729篇
矿业工程   1272篇
能源动力   1671篇
轻工业   993篇
水利工程   1332篇
石油天然气   736篇
武器工业   1069篇
无线电   8851篇
一般工业技术   4782篇
冶金工业   2355篇
原子能技术   225篇
自动化技术   41662篇
  2024年   327篇
  2023年   1042篇
  2022年   1337篇
  2021年   1795篇
  2020年   2187篇
  2019年   1932篇
  2018年   1798篇
  2017年   2417篇
  2016年   2741篇
  2015年   2764篇
  2014年   4977篇
  2013年   5881篇
  2012年   4823篇
  2011年   5360篇
  2010年   4054篇
  2009年   4782篇
  2008年   4976篇
  2007年   5178篇
  2006年   4620篇
  2005年   4126篇
  2004年   3515篇
  2003年   3173篇
  2002年   2514篇
  2001年   2038篇
  2000年   1792篇
  1999年   1432篇
  1998年   1149篇
  1997年   983篇
  1996年   871篇
  1995年   720篇
  1994年   660篇
  1993年   595篇
  1992年   443篇
  1991年   413篇
  1990年   319篇
  1989年   259篇
  1988年   223篇
  1987年   186篇
  1986年   152篇
  1985年   198篇
  1984年   213篇
  1983年   186篇
  1982年   160篇
  1981年   106篇
  1980年   84篇
  1979年   98篇
  1978年   63篇
  1977年   72篇
  1976年   21篇
  1975年   16篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
MAG焊熔池图像特征及可用信息分析   总被引:1,自引:0,他引:1       下载免费PDF全文
针对MAG焊焊接过程的特点,采用被动式视觉传感的方式,利用近红外CCD摄像机,配合1064nm窄带滤光片和0.1%中性减光片组成的复合滤光系统,很好地排除了弧光的干扰,采集到大量高清晰的MAG焊短路过渡、射滴过渡、射流过渡熔池图像.利用数字图像处理技术对熔池图像进行图像处理,并提取出反映焊接质量的图像特征信息.对于单幅熔池图像进行了灰度分析,并提取了三条熔池图像等值轮廓线;对于连续多帧熔池图像,提出了利用熔池图像差影检测和熔池图像平均灰度来研究MAG焊焊接过程的新思路,为熔化极气体保护焊焊接过程质量控制奠定了基础.  相似文献   
982.
总结了板材拉深试冲时的综合故障及原因,应用小波技术加混合式数据融合方法,将数据级、特征级和决策级融合通过神经网络方法综合在一起,对板材拉深试冲时的缺陷进行智能诊断,描述了小波神经网络的建模过程,探讨了通过多源互补信息减少故障诊断系统不确定性的优化方法,并给出了诊断结果。  相似文献   
983.
基于柔性工程数据库的CAD与PDM系统集成方法研究   总被引:3,自引:0,他引:3  
分析了信息集成的各种方式 ,研究了当前CAD与PDM系统集成过程中面临的实际问题 ,提出了以柔性工程数据库为基础的CAD与PDM系统集成的解决方法 ,并且描述了系统的框架结构。  相似文献   
984.
Efforts to improve the high temperature behavior of MoSi2 in oxidizing environments led to the investigation of the Mo–Ru–Si phase diagram. The isothermal section at 1673 K was determined by X-ray diffraction, optical and scanning electron microscopies and EPMA. Five new silicides were identified and their crystallographic structure was characterized using conventional and synchrotron X-ray as well as neutron powder diffraction. Mo15Ru35Si50, denoted α-phase, is of FeSi-type structure, space group P213, a=4.7535 (5) Å, Dx=7.90 g. cm−3, Bragg R=7.13. Mo60Ru30Si10 is the ordered extension of the Mo70Ru30 σ-phase with space group P42/mnm, a=9.45940(8) Å, c=4.94273(5) Å, Dx=6.14 g. cm−3, Bragg R=5.75.  相似文献   
985.
水利建设市场主体信用评价工作开展以来,对水利建设市场的诚信体系建设起到了积极的作用,但也存在一些有待完善的细节。该文分析了信用信息评价与应用管理存在的问题,提出了建设思路、内容和系统的总体设计方案,为完善水利工程建设市场主体信用信息评价与应用管理,建设守信激励和失信惩戒体制服务。  相似文献   
986.
Supply chain management (SCM) is an important strategic tool that requires careful planning and management. While the availability of real-time information is a critical aspect of an SCM system, it possesses a potential to disrupt supply chain participants. Thus, the success of an SCM system hinges on how well participants deal with changes taking place in a real-time environment. This study adopts the concept of the real-time enterprise to understand the role of change management on SCM performance based on the concept of the information orientation. The study empirically validated the role of change management on SCM performance.  相似文献   
987.
Travel patterns have gradually changed from group travel to individual travel. An increasing number of people acquire travel information through various types of media. One of the alternative information sources is social media, which enables users to exchange information among members. However, one of the characteristics of social media is information sharing, not information search, which involves both giving (i.e. posting) and taking (i.e. selective reading, forwarding, replying, linking, and liking) information. Compared to the ‘giving’ side of information-sharing research, less effort has been spent on the ‘taking’ side of information research. Therefore, we investigate travel information adoption in social media as well as how individuals communicate with each other. We use the elaboration likelihood model, which measures the impact of central (e.g. argument quality) and peripheral (e.g. credibility) cues on traveller information-sharing behaviour corresponding with social presence on social media. The results of an empirical analysis of 527 respondents, who were experienced in travel information adoption via social media, were examined. Our findings revealed that argument quality had a positive effect on perceived usefulness and source credibility positively affected perceived usefulness and social relationships. Perceived usefulness had a significant positive effect on social relationships. Both perceived usefulness and social relationships affected travel information adoption. Lastly, the levels of argument quality and source credibility perceived by social media members were found to differ according to the level of social presence.  相似文献   
988.
We investigate the global robust tracking problem via output feedback for a class of cascade nonlinear systems with dynamic uncertainties and non-vanishing disturbances. It does not require a priori knowledge of the sign of the high-frequency gain. A recursive design scheme is presented using the ideas of pseudosign function, Nussbaum-type gain technique and the deadzone method. It is shown that under some conditions, the tracking error can be guaranteed asymptotic to the interval [?ε, ε]?? with arbitrary prescribed ε>0 after a finite time, while keeping all signals of the resulting closed-loop systems bounded. The simulation results demonstrate the effectiveness of the proposed algorithm.  相似文献   
989.
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme.  相似文献   
990.
We place the continuous-time orbit problem in PP, sharpening the decidability result shown by Hainry [7].  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号