首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16173篇
  免费   2702篇
  国内免费   2435篇
电工技术   801篇
技术理论   4篇
综合类   1177篇
化学工业   297篇
金属工艺   143篇
机械仪表   674篇
建筑科学   321篇
矿业工程   227篇
能源动力   169篇
轻工业   131篇
水利工程   251篇
石油天然气   141篇
武器工业   143篇
无线电   3379篇
一般工业技术   737篇
冶金工业   89篇
原子能技术   54篇
自动化技术   12572篇
  2024年   189篇
  2023年   549篇
  2022年   831篇
  2021年   965篇
  2020年   1051篇
  2019年   757篇
  2018年   756篇
  2017年   871篇
  2016年   984篇
  2015年   1163篇
  2014年   1767篇
  2013年   1403篇
  2012年   1575篇
  2011年   1337篇
  2010年   840篇
  2009年   765篇
  2008年   860篇
  2007年   909篇
  2006年   681篇
  2005年   627篇
  2004年   489篇
  2003年   421篇
  2002年   315篇
  2001年   274篇
  2000年   185篇
  1999年   161篇
  1998年   113篇
  1997年   90篇
  1996年   82篇
  1995年   55篇
  1994年   58篇
  1993年   30篇
  1992年   35篇
  1991年   20篇
  1990年   19篇
  1989年   14篇
  1988年   15篇
  1987年   8篇
  1986年   10篇
  1985年   5篇
  1984年   5篇
  1983年   7篇
  1982年   2篇
  1980年   3篇
  1979年   4篇
  1978年   1篇
  1977年   4篇
  1976年   1篇
  1972年   2篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
In reverse engineering, geometrical information of a product is obtained directly from a physical shape by a digitizing device. To fabricate the product, manufacturing information (usually tool-path) must be generated from a CAD model. The data digitized must be processed and in most cases, a surface model is constructed from them using some of the surface fitting technologies. However, these technologies are usually complicated and the process for constructing a surface patch from a massive digitizing data is time-consuming. To simplify the process for getting tool-path information, a simple algorithm is proposed in this paper. The algorithm is used to generate a 5-axis machining tool-path. Instead of implementing any complicated surface fitting techniques, a direct method is proposed for constructing three-dimensional (3D) triangular mesh from the digitizing data with the mesh points considered as the tool contact locations. Depending on the locations of the points digitized, a decimation procedure is applied such that some of the digitizing data will be filtered out. Then, the tool axis orientations which must be determined in 5-axis tool-path are calculated and the tool center locations are determined accordingly. A 3D biarc fitting technique is applied for all the tool center locations so that a complete 5-axis tool-path is obtained.  相似文献   
12.
基于经济的网格资源调度算法研究   总被引:1,自引:1,他引:0  
网格使构建虚拟组织,在全世界范围内共享资源成为现实.但是,在网格环境下的资源管理和调度是一项相当复杂的工作,这主要是由于资源分布在世界各地,隶属于不同的组织,各个资源拥有者都有不同的使用和访问策略、开销模型、不断变化的负载和可用性.为了满足网格计算环境中资源调度的复杂需要,可以将现实世界中的经济原理和模型应用到网格环境下的任务调度中,并据此提出了几种经济资源调度算法.  相似文献   
13.
Cable supported bridges are wind prone structures. Therefore, their aerodynamic behaviour must be studied in depth in order to guarantee their safe performance. In the last decades important achievements have been reached in the study of bridges under wind-induced actions. On the other hand, non-conventional design techniques such as sensitivity analysis or optimum design have not been applied although they have proved their feasibility in the automobile or aeronautic industries. The aim of this research work is to demonstrate how non-conventional design techniques can help designers when dealing with long span bridges considering their aeroelastic behaviour. In that respect, the comprehensive analytical optimum design problem formulation is presented. In the application example the optimum design of the challenging Messina Strait Bridge is carried out. The chosen initial design has been the year 2002 design proposal. Up to a 33% deck material saving has been obtained after finishing the optimization process.  相似文献   
14.
Deep Neural Network (DNN), one of the most powerful machine learning algorithms, is increasingly leveraged to overcome the bottleneck of effectively exploring and analyzing massive data to boost advanced scientific development. It is not a surprise that cloud computing providers offer the cloud-based DNN as an out-of-the-box service. Though there are some benefits from the cloud-based DNN, the interaction mechanism among two or multiple entities in the cloud inevitably induces new privacy risks. This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services. We systematically and thoroughly review privacy attacks and defenses in the pipeline of cloud-based DNN service, i.e., data manipulation, training, and prediction. In particular, a new theory, called cloud-based ML privacy game, is extracted from the recently published literature to provide a deep understanding of state-of-the-art research. Finally, the challenges and future work are presented to help researchers to continue to push forward the competitions between privacy attackers and defenders.  相似文献   
15.
Smart product service system (PSS) has become an essential strategy to transform towards digital servitization for manufacturing companies. By leveraging smart capabilities, smart PSS aims to create superior user experience in a smart context. To develop a successful smart PSS, customer requirement management from smart experience perspective is necessary. However, it is a challenging task to identify and evaluate diverse, implicit and interrelated smart experience-oriented customer requirement (SEO-CR) in smart PSS context. Hence, this paper proposes an effective methodology to elicit and analyze SEO-CRs. At first, a generic, two-dimensional SEO-CR system is presented as a basis to derive the tailored SEO-CRs for various smart PSS applications. Second, a novel HFLC-DEMATEL (hesitant fuzzy linguistic cloud-based Decision-making and trial evaluation laboratory) method is proposed to accurately evaluate the priority and complicated interaction of SEO-CRs, considering the hesitancy, fuzziness and randomness under uncertain decision environment. Some new operations (e.g., cloud total-relation matrix and weight determination method) and a cloud influence relation map are developed to fully take advantage of cloud model in DEMATEL implementation. Finally, a real case of smart vehicle service system (SVSS) is presented. The 18 SEO-CRs of the SVSS are derived based on the generalized SEO-CRs. By using HFLC-DEMATEL, some important SEO-CRs in context of SVSS are identified, such as autonomous and convenience. The finding of results can help designers make proper decisions in design and development of SVSS with a superior smart experience. The effectiveness and reliability of the proposed method are validated by conducting some comparative analyses.  相似文献   
16.
在用传统的相似产品法进行可靠性预计时,所选取的相似产品与评价对象之间差异较大,会造成预计结果的偏差较大。为解决这一问题,提出了一种基于"功能—运动—动作"结构化分解的可靠性预计新方法。通过明确产品的各大运动功能建立功能层,分析完成各功能的机械部件运动建立运动层,确定实现各机械部件运动的元动作运动单元建立元动作层,建立了可靠性预计的"功能—运动—元动作运动单元"层次模型。引入区间层次分析法,确定了"功能—运动—元动作运动单元"层次模型中各子代运动单元对父代运动单元的可靠性影响权重,并构建了由子代运动单元预计父代运动单元可靠性的数学模型。确定影响评价机械结构相似度的因素,构建了区间数综合评判云模型并选取与元动作运动单元相似的参考结构,以区间数综合评价云模型得出的相似度值修正参考结构的可靠性数据来预计元动作运动单元的可靠性。将元动作运动单元的可靠性预计值代入数学模型,层层预计父代运动单元的可靠性,从而得出整个产品的可靠性水平。最后以数控转台为例进行了分析,得出了可靠性预计值,并将该方法与传统方法进行了比较。结果表明,新的可靠性预计方法具有较好的可行性和较高的准确性。  相似文献   
17.
Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first is the migration trigger determination algorithm for cross-border migration and service degradation migration, respectively, based on trajectory prediction and traffic awareness to improve the determination accuracy. The second is the migration target decision calculation model for minimizing the average migration time and maximizing the average service time to reduce migration times and improve the stability and adaptability of migration decisions. The third is the migration decision algorithm based on the improved artificial bee colony algorithm to avoid local optimal migration decisions. Simulation results show that the proposed migration mechanism can reduce migration times, reduce average migration time, improve average service time and enhance the stability and adaptability of IoV application services.  相似文献   
18.
Circular splicing systems are a formal model of a generative mechanism of circular words, inspired by a recombinant behaviour of circular DNA. Some unanswered questions are related to the computational power of such systems, and finding a characterization of the class of circular languages generated by circular splicing systems is still an open problem. In this paper we solve this problem for monotone complete systems, which are finite circular splicing systems with rules of a simpler form. We show that a circular language L is generated by a monotone complete system if and only if the set Lin(L) of all words corresponding to L is a pure unitary language generated by a set closed under the conjugacy relation. The class of pure unitary languages was introduced by A. Ehrenfeucht, D. Haussler, G. Rozenberg in 1983, as a subclass of the class of context-free languages, together with a characterization of regular pure unitary languages by means of a decidable property. As a direct consequence, we characterize (regular) circular languages generated by monotone complete systems. We can also decide whether the language generated by a monotone complete system is regular. Finally, we point out that monotone complete systems have the same computational power as finite simple systems, an easy type of circular splicing system defined in the literature from the very beginning, when only one rule of a specific type is allowed. From our results on monotone complete systems, it follows that finite simple systems generate a class of languages containing non-regular languages, showing the incorrectness of a longstanding result on simple systems.  相似文献   
19.
20.
Generalized honeycomb torus (GHT) is recognized as an attractive alternative to existing torus interconnection networks in parallel computing systems. Assume that m and d are integers with m ? 2 and d ? 8. This paper addresses the fault-tolerant hamiltonicity of GHT(m, 2d, d) with fault set F = {(w, y), (x, y)}, where w < x, w + y is even and x + y is odd. We show that such a faulty GHT is hamiltonian by presenting a systematic method for constructing a fault-free hamiltonian cycle. This result reveals another appealing feature of GHTs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号