收费全文 | 7587篇 |
免费 | 399篇 |
国内免费 | 14篇 |
工业技术 | 8000篇 |
2023年 | 58篇 |
2022年 | 28篇 |
2021年 | 114篇 |
2020年 | 110篇 |
2019年 | 128篇 |
2018年 | 166篇 |
2017年 | 146篇 |
2016年 | 214篇 |
2015年 | 187篇 |
2014年 | 311篇 |
2013年 | 544篇 |
2012年 | 443篇 |
2011年 | 481篇 |
2010年 | 351篇 |
2009年 | 426篇 |
2008年 | 364篇 |
2007年 | 332篇 |
2006年 | 335篇 |
2005年 | 288篇 |
2004年 | 274篇 |
2003年 | 250篇 |
2002年 | 269篇 |
2001年 | 198篇 |
2000年 | 164篇 |
1999年 | 154篇 |
1998年 | 355篇 |
1997年 | 212篇 |
1996年 | 155篇 |
1995年 | 131篇 |
1994年 | 114篇 |
1993年 | 111篇 |
1992年 | 58篇 |
1991年 | 70篇 |
1990年 | 55篇 |
1989年 | 57篇 |
1988年 | 40篇 |
1987年 | 42篇 |
1986年 | 39篇 |
1985年 | 30篇 |
1984年 | 29篇 |
1983年 | 20篇 |
1982年 | 14篇 |
1981年 | 23篇 |
1980年 | 15篇 |
1979年 | 9篇 |
1978年 | 15篇 |
1977年 | 14篇 |
1976年 | 21篇 |
1974年 | 6篇 |
1973年 | 8篇 |
Chatter causes machining instability and reduces productivity in the metal cutting process. It has negative effects on the surface finish, dimensional accuracy, tool life and machine life. Chatter identification is therefore necessary to control, prevent, or eliminate chatter and to determine the stable machining condition. Previous studies of chatter detection used either model-based or signal-based methods, and each of them has its drawback. Model-based methods use cutting dynamics to develop stability lobe diagram to predict the occurrence of chatter, but the off-line stability estimation couldn’t detect chatter in real time. Signal-based methods apply mostly Fourier analysis to the cutting or vibration signals to identify chatter, but they are heuristic methods and do not consider the cutting dynamics. In this study, the model-based and signal-based chatter detection methods were thoroughly investigated. As a result, a hybrid model- and signal-based chatter detection method was proposed. By analyzing the residual between the force measurement and the output of the cutting force model, milling chatter could be detected and identified efficiently during the milling process.
相似文献Emerging privacy-preserving technologies help protect sensitive data during application executions. Recently, the secure two-party computing (TPC) scheme has demonstrated its potential, especially for the secure model inference of a deep learning application by protecting both the user input data and the model parameters. Nevertheless, existing TPC protocols incur excessive communications during the program execution, which lengthens the execution time. In this work, we propose the precomputing scheme, POPS, to address the problem, which is done by shifting the required communications from during the execution to the time prior to the execution. Particular, the multiplication triple generation is computed beforehand with POPS to remove the overhead at runtime. We have analyzed the TPC protocols to ensure that the precomputing scheme conforms the existing secure protocols. Our results show that POPS takes a step forward in the secure inference by delivering up to \(20\times \) and \(5\times \) speedups against the prior work for the microbenchmark and the convolutional neural network experiments, respectively.
相似文献