首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   48479篇
  免费   6561篇
  国内免费   4102篇
电工技术   2355篇
技术理论   8篇
综合类   4472篇
化学工业   2127篇
金属工艺   1469篇
机械仪表   2667篇
建筑科学   5682篇
矿业工程   13054篇
能源动力   1319篇
轻工业   790篇
水利工程   1787篇
石油天然气   1101篇
武器工业   281篇
无线电   3153篇
一般工业技术   2443篇
冶金工业   3388篇
原子能技术   241篇
自动化技术   12805篇
  2024年   166篇
  2023年   549篇
  2022年   1297篇
  2021年   1656篇
  2020年   1979篇
  2019年   1315篇
  2018年   1277篇
  2017年   1497篇
  2016年   1777篇
  2015年   2003篇
  2014年   3434篇
  2013年   2846篇
  2012年   4329篇
  2011年   4122篇
  2010年   3272篇
  2009年   3378篇
  2008年   3300篇
  2007年   3617篇
  2006年   3130篇
  2005年   2704篇
  2004年   2273篇
  2003年   2024篇
  2002年   1544篇
  2001年   1278篇
  2000年   990篇
  1999年   756篇
  1998年   529篇
  1997年   428篇
  1996年   344篇
  1995年   321篇
  1994年   281篇
  1993年   179篇
  1992年   119篇
  1991年   112篇
  1990年   71篇
  1989年   54篇
  1988年   46篇
  1987年   34篇
  1986年   19篇
  1985年   9篇
  1984年   20篇
  1983年   8篇
  1982年   8篇
  1981年   7篇
  1980年   9篇
  1979年   5篇
  1977年   3篇
  1966年   3篇
  1959年   4篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
文猛  张释如 《包装工程》2022,43(21):162-168
目的 为了解决目前三维数据隐藏算法不能兼顾无失真和盲提取的问题,提出一种新的完全无失真的三维网格模型数据隐藏盲算法。方法 首先使用混沌逻辑映射选择嵌入与提取模式,保证数据的安全性。然后利用面元素重排,完全不会造成三维模型失真的性质,通过不同嵌入模式规则对三角面元素进行重排,以嵌入秘密数据。接收端则可根据相应的提取模式规则提取秘密数据。结果 仿真结果与分析表明,该算法不会对三维模型造成任何失真,嵌入容量为每顶点2比特,且能抵抗仿射变换攻击、噪声攻击和平滑攻击等。结论 这种三维数据隐藏盲算法无失真,容量大、安全性高、鲁棒性强,适用于三维载体不容修改的情形,如军事、医学、秘密通信和版权保护等。  相似文献   
2.
本文分析了乌兰矿投产前期采矿现状及存在的主要问题,针对该矿所处蒙古国经济落后、投资风险大的现实状况,为避免生产中断、规避投资风险,早日回收前期投资考虑,采取了双斜坡道开拓、全尾胶结充填、高端壁空场嗣后充填采矿、多中段组合式连续开采等系列技术应对方案。大大降低了一次性投资规模及投资风险,前期投资得以快速回笼的同时,矿山产能也充分释放,确保了矿山的持续稳定,取得了较好的经济和社会效益。为海外地下近地表矿体开采矿山规避投资风险提供了很好的技术方案借鉴。  相似文献   
3.
《Ceramics International》2022,48(4):5066-5074
We studied the morphological nature of various thin films such as silicon carbide (SiC), diamond (C), germanium (Ge), and gallium nitride (GaN) on silicon substrate Si(100) using the pulsed laser deposition (PLD) method and Monte Carlo simulation. We, for the first time, systematically employed the visibility algorithm graph to meticulously study the morphological features of various PLD grown thin films. These thin-film morphologies are investigated using random distribution, Gaussian distribution, patterned heights, etc. The nature of the interfacial height of individual surfaces is examined by a horizontal visibility graph (HVG). It demonstrates that the continuous interfacial height of the silicon carbide, diamond, germanium, and gallium nitride films are attributed to random distribution and Gaussian distribution in thin films. However, discrete peaks are obtained in the brush and step-like morphology of germanium thin films. Further, we have experimentally verified the morphological nature of simulated silicon carbide, diamond, germanium, and gallium nitride thin films were grown on Si(100) substrate by pulsed laser deposition (PLD) at elevated temperature. Various characterization techniques have been used to study the morphological, and electrical properties which confirmed the different nature of the deposited films on the Silicon substrate. Decent hysteresis behavior has been confirmed by current-voltage (IV) measurement in all the four deposited films. The highest current has been measured for GaN at ~60 nA and the lowest current in SiC at ~30 nA level which is quite low comparing with the expected signal level (μA). The HVG technique is suitable to understand surface features of thin films which are substantially advantageous for the energy devices, detectors, optoelectronic devices operating at high temperatures.  相似文献   
4.
High-efficiency filtration in residential forced-air heating, ventilation, and air conditioning (HVAC) systems protects equipment and can reduce exposure to particulate matter. Laboratory tests provide a measure of the nominal efficiency, but they may not accurately reflect the in situ efficiency of the filters because of variations in system conditions and changes in filter performance over time. The primary focus of this paper is to evaluate the effective filtration efficiency, which is inclusive of any loading and system impacts, in 21 occupied residential homes through in-duct concentration measurements. We considered the role of filter media by testing both electret and non-electret media, as well as the role of loading by considering new and used filters. The results show that filters with higher nominal efficiency generally had higher effective filtration efficiency in the same home. In terms of performance change, there is no significant difference in efficiency between initial and 3-month non-electret filters, but the efficiency of electret filters generally decreased over time. However, both nominal efficiency and performance change were vastly overshadowed by the wide variety in loading and system conditions across homes, making it hard to predict filter efficiency in a given home without in situ measurements.  相似文献   
5.
分析了排风扇前盖塑件的工艺特点,介绍了排风扇前盖注射成型模结构及模具的工作过程。  相似文献   
6.
为了实现大口径光学元件的安全装夹、转运,通过光学元件开槽与不开槽两种装夹方式的分析,得出开槽夹紧转运方式将带来微裂纹、应力集中、成本高等缺陷,提出了利用摩擦力克服光学零件的重力和惯性力的低应力装夹转运方案。通过对光学元件低应力夹紧结构设计,并利用有限元分析方法,得到不开槽装夹方式下,光学元件的最大主应力为1.11 MPa,最大切应力为0.73 MPa,远低于光学元件破坏的强度极限,且受力均匀,无应力集中现象。  相似文献   
7.
Process mining techniques relate observed behavior (i.e., event logs) to modeled behavior (e.g., a BPMN model or a Petri net). Process models can be discovered from event logs and conformance checking techniques can be used to detect and diagnose differences between observed and modeled behavior. Existing process mining techniques can only uncover these differences, but the actual repair of the model is left to the user and is not supported. In this paper we investigate the problem of repairing a process model w.r.t. a log such that the resulting model can replay the log (i.e., conforms to it) and is as similar as possible to the original model. To solve the problem, we use an existing conformance checker that aligns the runs of the given process model to the traces in the log. Based on this information, we decompose the log into several sublogs of non-fitting subtraces. For each sublog, either a loop is discovered that can replay the sublog or a subprocess is derived that is then added to the original model at the appropriate location. The approach is implemented in the process mining toolkit ProM and has been validated on logs and models from several Dutch municipalities.  相似文献   
8.
Fault detection, isolation and optimal control have long been applied to industry. These techniques have proven various successful theoretical results and industrial applications. Fault diagnosis is considered as the merge of fault detection (that indicates if there is a fault) and fault isolation (that determines where the fault is), and it has important effects on the operation of complex dynamical systems specific to modern industry applications such as industrial electronics, business management systems, energy, and public sectors. Since the resources are always limited in real-world industrial applications, the solutions to optimally use them under various constraints are of high actuality. In this context, the optimal tuning of linear and nonlinear controllers is a systematic way to meet the performance specifications expressed as optimization problems that target the minimization of integral- or sum-type objective functions, where the tuning parameters of the controllers are the vector variables of the objective functions. The nature-inspired optimization algorithms give efficient solutions to such optimization problems. This paper presents an overview on recent developments in machine learning, data mining and evolving soft computing techniques for fault diagnosis and on nature-inspired optimal control. The generic theory is discussed along with illustrative industrial process applications that include a real liquid level control application, wind turbines and a nonlinear servo system. New research challenges with strong industrial impact are highlighted.  相似文献   
9.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
10.
随着互联网的高速发展,引发了网络流量、电信骨干网流量急速增长,使得网络容量的提升迫在眉睫。目前,100G 系统已经商用,超100G系统能够更有效地解决流量和网络带宽持续增长带来的压力,本文主要介绍新型单模光纤的特性以及探讨基于新型单模光纤的传输技术。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号