全文获取类型
收费全文 | 16173篇 |
免费 | 2702篇 |
国内免费 | 2435篇 |
专业分类
电工技术 | 801篇 |
技术理论 | 4篇 |
综合类 | 1177篇 |
化学工业 | 297篇 |
金属工艺 | 143篇 |
机械仪表 | 674篇 |
建筑科学 | 321篇 |
矿业工程 | 227篇 |
能源动力 | 169篇 |
轻工业 | 131篇 |
水利工程 | 251篇 |
石油天然气 | 141篇 |
武器工业 | 143篇 |
无线电 | 3379篇 |
一般工业技术 | 737篇 |
冶金工业 | 89篇 |
原子能技术 | 54篇 |
自动化技术 | 12572篇 |
出版年
2024年 | 189篇 |
2023年 | 549篇 |
2022年 | 831篇 |
2021年 | 965篇 |
2020年 | 1051篇 |
2019年 | 757篇 |
2018年 | 756篇 |
2017年 | 871篇 |
2016年 | 984篇 |
2015年 | 1163篇 |
2014年 | 1767篇 |
2013年 | 1403篇 |
2012年 | 1575篇 |
2011年 | 1337篇 |
2010年 | 840篇 |
2009年 | 765篇 |
2008年 | 860篇 |
2007年 | 909篇 |
2006年 | 681篇 |
2005年 | 627篇 |
2004年 | 489篇 |
2003年 | 421篇 |
2002年 | 315篇 |
2001年 | 274篇 |
2000年 | 185篇 |
1999年 | 161篇 |
1998年 | 113篇 |
1997年 | 90篇 |
1996年 | 82篇 |
1995年 | 55篇 |
1994年 | 58篇 |
1993年 | 30篇 |
1992年 | 35篇 |
1991年 | 20篇 |
1990年 | 19篇 |
1989年 | 14篇 |
1988年 | 15篇 |
1987年 | 8篇 |
1986年 | 10篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 7篇 |
1982年 | 2篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 4篇 |
1976年 | 1篇 |
1972年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
In reverse engineering, geometrical information of a product is obtained directly from a physical shape by a digitizing device. To fabricate the product, manufacturing information (usually tool-path) must be generated from a CAD model. The data digitized must be processed and in most cases, a surface model is constructed from them using some of the surface fitting technologies. However, these technologies are usually complicated and the process for constructing a surface patch from a massive digitizing data is time-consuming. To simplify the process for getting tool-path information, a simple algorithm is proposed in this paper. The algorithm is used to generate a 5-axis machining tool-path. Instead of implementing any complicated surface fitting techniques, a direct method is proposed for constructing three-dimensional (3D) triangular mesh from the digitizing data with the mesh points considered as the tool contact locations. Depending on the locations of the points digitized, a decimation procedure is applied such that some of the digitizing data will be filtered out. Then, the tool axis orientations which must be determined in 5-axis tool-path are calculated and the tool center locations are determined accordingly. A 3D biarc fitting technique is applied for all the tool center locations so that a complete 5-axis tool-path is obtained. 相似文献
12.
基于经济的网格资源调度算法研究 总被引:1,自引:1,他引:0
网格使构建虚拟组织,在全世界范围内共享资源成为现实.但是,在网格环境下的资源管理和调度是一项相当复杂的工作,这主要是由于资源分布在世界各地,隶属于不同的组织,各个资源拥有者都有不同的使用和访问策略、开销模型、不断变化的负载和可用性.为了满足网格计算环境中资源调度的复杂需要,可以将现实世界中的经济原理和模型应用到网格环境下的任务调度中,并据此提出了几种经济资源调度算法. 相似文献
13.
F. Nieto S. Hernández J. Á. Jurado 《Structural and Multidisciplinary Optimization》2009,39(2):133-151
Cable supported bridges are wind prone structures. Therefore, their aerodynamic behaviour must be studied in depth in order
to guarantee their safe performance. In the last decades important achievements have been reached in the study of bridges
under wind-induced actions. On the other hand, non-conventional design techniques such as sensitivity analysis or optimum
design have not been applied although they have proved their feasibility in the automobile or aeronautic industries. The aim
of this research work is to demonstrate how non-conventional design techniques can help designers when dealing with long span
bridges considering their aeroelastic behaviour. In that respect, the comprehensive analytical optimum design problem formulation
is presented. In the application example the optimum design of the challenging Messina Strait Bridge is carried out. The chosen
initial design has been the year 2002 design proposal. Up to a 33% deck material saving has been obtained after finishing
the optimization process. 相似文献
14.
Deep Neural Network (DNN), one of the most powerful machine learning algorithms, is increasingly leveraged to overcome the bottleneck of effectively exploring and analyzing massive data to boost advanced scientific development. It is not a surprise that cloud computing providers offer the cloud-based DNN as an out-of-the-box service. Though there are some benefits from the cloud-based DNN, the interaction mechanism among two or multiple entities in the cloud inevitably induces new privacy risks. This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services. We systematically and thoroughly review privacy attacks and defenses in the pipeline of cloud-based DNN service, i.e., data manipulation, training, and prediction. In particular, a new theory, called cloud-based ML privacy game, is extracted from the recently published literature to provide a deep understanding of state-of-the-art research. Finally, the challenges and future work are presented to help researchers to continue to push forward the competitions between privacy attackers and defenders. 相似文献
15.
Smart product service system (PSS) has become an essential strategy to transform towards digital servitization for manufacturing companies. By leveraging smart capabilities, smart PSS aims to create superior user experience in a smart context. To develop a successful smart PSS, customer requirement management from smart experience perspective is necessary. However, it is a challenging task to identify and evaluate diverse, implicit and interrelated smart experience-oriented customer requirement (SEO-CR) in smart PSS context. Hence, this paper proposes an effective methodology to elicit and analyze SEO-CRs. At first, a generic, two-dimensional SEO-CR system is presented as a basis to derive the tailored SEO-CRs for various smart PSS applications. Second, a novel HFLC-DEMATEL (hesitant fuzzy linguistic cloud-based Decision-making and trial evaluation laboratory) method is proposed to accurately evaluate the priority and complicated interaction of SEO-CRs, considering the hesitancy, fuzziness and randomness under uncertain decision environment. Some new operations (e.g., cloud total-relation matrix and weight determination method) and a cloud influence relation map are developed to fully take advantage of cloud model in DEMATEL implementation. Finally, a real case of smart vehicle service system (SVSS) is presented. The 18 SEO-CRs of the SVSS are derived based on the generalized SEO-CRs. By using HFLC-DEMATEL, some important SEO-CRs in context of SVSS are identified, such as autonomous and convenience. The finding of results can help designers make proper decisions in design and development of SVSS with a superior smart experience. The effectiveness and reliability of the proposed method are validated by conducting some comparative analyses. 相似文献
16.
在用传统的相似产品法进行可靠性预计时,所选取的相似产品与评价对象之间差异较大,会造成预计结果的偏差较大。为解决这一问题,提出了一种基于"功能—运动—动作"结构化分解的可靠性预计新方法。通过明确产品的各大运动功能建立功能层,分析完成各功能的机械部件运动建立运动层,确定实现各机械部件运动的元动作运动单元建立元动作层,建立了可靠性预计的"功能—运动—元动作运动单元"层次模型。引入区间层次分析法,确定了"功能—运动—元动作运动单元"层次模型中各子代运动单元对父代运动单元的可靠性影响权重,并构建了由子代运动单元预计父代运动单元可靠性的数学模型。确定影响评价机械结构相似度的因素,构建了区间数综合评判云模型并选取与元动作运动单元相似的参考结构,以区间数综合评价云模型得出的相似度值修正参考结构的可靠性数据来预计元动作运动单元的可靠性。将元动作运动单元的可靠性预计值代入数学模型,层层预计父代运动单元的可靠性,从而得出整个产品的可靠性水平。最后以数控转台为例进行了分析,得出了可靠性预计值,并将该方法与传统方法进行了比较。结果表明,新的可靠性预计方法具有较好的可行性和较高的准确性。 相似文献
17.
Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first is the migration trigger determination algorithm for cross-border migration and service degradation migration, respectively, based on trajectory prediction and traffic awareness to improve the determination accuracy. The second is the migration target decision calculation model for minimizing the average migration time and maximizing the average service time to reduce migration times and improve the stability and adaptability of migration decisions. The third is the migration decision algorithm based on the improved artificial bee colony algorithm to avoid local optimal migration decisions. Simulation results show that the proposed migration mechanism can reduce migration times, reduce average migration time, improve average service time and enhance the stability and adaptability of IoV application services. 相似文献
18.
Circular splicing systems are a formal model of a generative mechanism of circular words, inspired by a recombinant behaviour of circular DNA. Some unanswered questions are related to the computational power of such systems, and finding a characterization of the class of circular languages generated by circular splicing systems is still an open problem. In this paper we solve this problem for monotone complete systems, which are finite circular splicing systems with rules of a simpler form. We show that a circular language L is generated by a monotone complete system if and only if the set Lin(L) of all words corresponding to L is a pure unitary language generated by a set closed under the conjugacy relation. The class of pure unitary languages was introduced by A. Ehrenfeucht, D. Haussler, G. Rozenberg in 1983, as a subclass of the class of context-free languages, together with a characterization of regular pure unitary languages by means of a decidable property. As a direct consequence, we characterize (regular) circular languages generated by monotone complete systems. We can also decide whether the language generated by a monotone complete system is regular. Finally, we point out that monotone complete systems have the same computational power as finite simple systems, an easy type of circular splicing system defined in the literature from the very beginning, when only one rule of a specific type is allowed. From our results on monotone complete systems, it follows that finite simple systems generate a class of languages containing non-regular languages, showing the incorrectness of a longstanding result on simple systems. 相似文献
19.
20.
Generalized honeycomb torus (GHT) is recognized as an attractive alternative to existing torus interconnection networks in parallel computing systems. Assume that m and d are integers with m ? 2 and d ? 8. This paper addresses the fault-tolerant hamiltonicity of GHT(m, 2d, d) with fault set F = {(w, y), (x, y)}, where w < x, w + y is even and x + y is odd. We show that such a faulty GHT is hamiltonian by presenting a systematic method for constructing a fault-free hamiltonian cycle. This result reveals another appealing feature of GHTs. 相似文献