首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   54609篇
  免费   8066篇
  国内免费   5831篇
电工技术   4652篇
综合类   6466篇
化学工业   4159篇
金属工艺   2908篇
机械仪表   4427篇
建筑科学   7923篇
矿业工程   3148篇
能源动力   1232篇
轻工业   1899篇
水利工程   1917篇
石油天然气   2623篇
武器工业   609篇
无线电   4559篇
一般工业技术   5027篇
冶金工业   2266篇
原子能技术   437篇
自动化技术   14254篇
  2024年   354篇
  2023年   974篇
  2022年   2044篇
  2021年   2163篇
  2020年   2155篇
  2019年   1889篇
  2018年   1568篇
  2017年   1914篇
  2016年   2135篇
  2015年   2372篇
  2014年   3477篇
  2013年   3205篇
  2012年   4202篇
  2011年   4477篇
  2010年   3502篇
  2009年   3599篇
  2008年   3326篇
  2007年   3865篇
  2006年   3523篇
  2005年   3006篇
  2004年   2504篇
  2003年   2192篇
  2002年   1825篇
  2001年   1519篇
  2000年   1249篇
  1999年   1078篇
  1998年   800篇
  1997年   732篇
  1996年   586篇
  1995年   488篇
  1994年   386篇
  1993年   268篇
  1992年   235篇
  1991年   174篇
  1990年   140篇
  1989年   120篇
  1988年   84篇
  1987年   67篇
  1986年   39篇
  1985年   41篇
  1984年   37篇
  1983年   39篇
  1982年   13篇
  1981年   10篇
  1980年   22篇
  1979年   23篇
  1977年   7篇
  1960年   6篇
  1959年   9篇
  1955年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset.  相似文献   
2.
Manufacturing companies not only strive to deliver flawless products but also monitor product failures in the field to identify potential quality issues. When product failures occur, quality engineers must identify the root cause to improve any affected product and process. This root-cause analysis can be supported by feature selection methods that identify relevant product attributes, such as manufacturing dates with an increased number of product failures. In this paper, we present different methods for feature selection and evaluate their ability to identify relevant product attributes in a root-cause analysis. First, we compile a list of feature selection methods. Then, we summarize the properties of product attributes in warranty case data and discuss these properties regarding the challenges they pose for machine learning algorithms. Next, we simulate datasets of warranty cases, which emulate these product properties. Finally, we compare the feature selection methods based on these simulated datasets. In the end, the univariate filter information gain is determined to be a suitable method for a wide range of applications. The comparison based on simulated data provides a more general result than other publications, which only focus on a single use case. Due to the generic nature of the simulated datasets, the results can be applied to various root-cause analysis processes in different quality management applications and provide a guideline for readers who wish to explore machine learning methods for their analysis of quality data.  相似文献   
3.
系统阐述了基准平面垂直断面法在爆破漏斗试验中测量爆破漏斗体积的基本原理,并将隧道激光断面仪应用于金厂河矿1 750 m水平15#采场底部切割巷道爆破漏斗试验爆破漏斗体积测量中。通过与传统体重法等计算法所得漏斗体积分析比较,结果表明基于隧道激光断面仪与3D Mine软件分析的基准平面垂直断面法实用性强、操作方便、结果直观可靠,达到试验预期目的。  相似文献   
4.
简要介绍了组合式超大容积(850m3)水池在水压爆破拆除过程中爆破方案选择、参数选取等方面的经验,并对爆破效果进行了分析,为同类工程施工提供了可借鉴的经验。  相似文献   
5.
6.
To obtain the mixing enhancement mechanism of H2–Water combined jets in supersonic crossflows in a combustor with expanded section for rotating detonation ramjet, the flow field shape and spray structure were studied by experimental and numerical methods. The Eulerian–Lagrangian method was used to investigate the diffusion mechanism and H2–Water interaction law of combined jets with different sequences. At the same time, high-speed photography and the schlieren technique were used to capture the flow field. The effects of jet pressure drop, orifice diameter, orifice spacing, incoming Mach number, and other parameters on the penetration depth of water jets were studied. The results of experiment and simulation show that using H2–Water combined jets, the penetration depth of the jet spray can be greatly increased and the jet mixing effect can be significantly improved, which will contribute to the engine's ignition and stable combustion. In the case of pre-water/post-H2, the penetration depth of the hydrogen jet is greater. In the case of pre-H2/post-water, the hydrogen jet raises the water spray mainly by protecting the integrity of the water column.  相似文献   
7.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
8.
In practical applications of structural health monitoring technology, a large number of distributed sensors are usually adopted to monitor the big dimension structures and different kinds of damage. The monitored structures are usually divided into different sub-structures and monitored by different sensor sets. Under this situation, how to manage the distributed sensor set and fuse different methods to obtain a fast and accurate evaluation result is an important problem to be addressed deeply. In the paper, a multi-agent fusion and coordination system is presented to deal with the damage identification for the strain distribution and joint failure in the large structure. Firstly, the monitoring system is adopted to distributedly monitor two kinds of damages, and it self-judges whether the static load happens in the monitored sub-region, and focuses on the static load on the sub-region boundary to obtain the sensor network information with blackboard model. Then, the improved contract net protocol is used to dynamically distribute the damage evaluation module for monitoring two kinds of damage uninterruptedly. Lastly, a reliable assessment for the whole structure is given by combing various heterogeneous classifiers strengths with voting-based fusion. The proposed multi-agent system is illustrated through a large aerospace aluminum plate structure experiment. The result shows that the method can significantly improve the monitoring performance for the large-scale structure.  相似文献   
9.
为研究钢管套筒灌浆连接轴向受拉破坏过程及破坏机理,试验中设计了16组48个钢管套筒灌浆连接试件,试件采用钢板代替圆钢管,并进行静载试验。分析了灌浆料裂缝扩展过程、荷载-相对位移曲线,并对抗剪键高距比、灌浆料厚度、侧向力等因素对破坏过程及承载力的影响进行分析。结果表明:对于不设置抗剪键的套筒灌浆连接试件,斜裂缝随机产生,裂缝分布不均匀;对于设置抗剪键的套筒灌浆连接试件,裂缝首先出现在底部抗剪键位置处,与水平方向夹角约为30°,随后在中部和上部抗剪键位置处分别出现斜裂缝。由于每个抗剪键上荷载分担并不均匀,与抗剪键接触的灌浆料逐渐达到极限压应力,达到极限状态时,承载力全部由抗剪键间的机械咬合力承担,在连接承载力中,可忽略摩擦力和胶结力作用。随着抗剪键高距比h/s增大,各试件初始剪切刚度相差不大,承载力增大,但增幅逐渐减小,建议抗剪键高距比0.06g/s>0.3,同时需要满足灌浆料灌注的施工要求。  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号