首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7587篇
  免费   399篇
  国内免费   14篇
工业技术   8000篇
  2023年   58篇
  2022年   28篇
  2021年   114篇
  2020年   110篇
  2019年   128篇
  2018年   166篇
  2017年   146篇
  2016年   214篇
  2015年   187篇
  2014年   311篇
  2013年   544篇
  2012年   443篇
  2011年   481篇
  2010年   351篇
  2009年   426篇
  2008年   364篇
  2007年   332篇
  2006年   335篇
  2005年   288篇
  2004年   274篇
  2003年   250篇
  2002年   269篇
  2001年   198篇
  2000年   164篇
  1999年   154篇
  1998年   355篇
  1997年   212篇
  1996年   155篇
  1995年   131篇
  1994年   114篇
  1993年   111篇
  1992年   58篇
  1991年   70篇
  1990年   55篇
  1989年   57篇
  1988年   40篇
  1987年   42篇
  1986年   39篇
  1985年   30篇
  1984年   29篇
  1983年   20篇
  1982年   14篇
  1981年   23篇
  1980年   15篇
  1979年   9篇
  1978年   15篇
  1977年   14篇
  1976年   21篇
  1974年   6篇
  1973年   8篇
排序方式: 共有8000条查询结果,搜索用时 15 毫秒
31.

Chatter causes machining instability and reduces productivity in the metal cutting process. It has negative effects on the surface finish, dimensional accuracy, tool life and machine life. Chatter identification is therefore necessary to control, prevent, or eliminate chatter and to determine the stable machining condition. Previous studies of chatter detection used either model-based or signal-based methods, and each of them has its drawback. Model-based methods use cutting dynamics to develop stability lobe diagram to predict the occurrence of chatter, but the off-line stability estimation couldn’t detect chatter in real time. Signal-based methods apply mostly Fourier analysis to the cutting or vibration signals to identify chatter, but they are heuristic methods and do not consider the cutting dynamics. In this study, the model-based and signal-based chatter detection methods were thoroughly investigated. As a result, a hybrid model- and signal-based chatter detection method was proposed. By analyzing the residual between the force measurement and the output of the cutting force model, milling chatter could be detected and identified efficiently during the milling process.

  相似文献   
32.
Journal of Mechanical Science and Technology - In this paper, the performances of various ILU type parallel preconditioners for the finite element discretization of the incompressible Naiver-Stokes...  相似文献   
33.
Journal of Mechanical Science and Technology - In this study, we propose a design for a household air purifier that reduces the flow-induced noise caused by the impeller of the fan system. The...  相似文献   
34.
The nitrogenase cofactors are structurally and functionally unique in biological chemistry. Despite a substantial amount of spectroscopic characterization of protein-bound and isolated nitrogenase cofactors, electrochemical characterization of these cofactors and their related species is far from complete. Herein we present voltammetric studies of three isolated nitrogenase cofactor species: the iron–molybdenum cofactor (M-cluster), iron–vanadium cofactor (V-cluster), and a homologue to the iron–iron cofactor (L-cluster). We observe two reductive events in the redox profiles of all three cofactors. Of the three, the V-cluster is the most reducing. The reduction potentials of the isolated cofactors are significantly more negative than previously measured values within the molybdenum–iron and vanadium–iron proteins. The outcome of this study provides insight into the importance of the heterometal identity, the overall ligation of the cluster, and the impact of the protein scaffolds on the overall electronic structures of the cofactors.  相似文献   
35.
Protection of Metals and Physical Chemistry of Surfaces - Cucumis anguria L. (C. anguria L.) commonly known as Indian gherkin is originally from Africa, though now seen widely in southeast,...  相似文献   
36.
Multimedia Tools and Applications - Individual tooth segmentation and identification from cone-beam computed tomography images are preoperative prerequisites for orthodontic treatments. Instance...  相似文献   
37.
Journal of Mechanical Science and Technology - This study is concerned with the hydroelastic vibration of the flexible bottom plate of a cylindrical tank coupled with sloshing. The cylindrical tank...  相似文献   
38.
Helicobacter pylori infection is the etiology of several gastric-related diseases including gastric cancer. Cytotoxin associated gene A (CagA), vacuolating cytotoxin A (VacA) and α-subunit of urease (UreA) are three major virulence factors of H. pylori, and each of them has a distinct entry pathway and pathogenic mechanism during bacterial infection. H. pylori can shed outer membrane vesicles (OMVs). Therefore, it would be interesting to explore the production kinetics of H. pylori OMVs and its connection with the entry of key virulence factors into host cells. Here, we isolated OMVs from H. pylori 26,695 strain and characterized their properties and interaction kinetics with human gastric adenocarcinoma (AGS) cells. We found that the generation of OMVs and the presence of CagA, VacA and UreA in OMVs were a lasting event throughout different phases of bacterial growth. H. pylori OMVs entered AGS cells mainly through macropinocytosis/phagocytosis. Furthermore, CagA, VacA and UreA could enter AGS cells via OMVs and the treatment with H. pylori OMVs would cause cell death. Comparison of H. pylori 26,695 and clinical strains suggested that the production and characteristics of OMVs are not only limited to laboratory strains commonly in use, but a general phenomenon to most H. pylori strains.  相似文献   
39.
The Journal of Supercomputing - This study proposes an efficient exact k-flexible aggregate nearest neighbor (k-FANN) search algorithm in road networks using the M-tree. The state-of-the-art...  相似文献   
40.

Emerging privacy-preserving technologies help protect sensitive data during application executions. Recently, the secure two-party computing (TPC) scheme has demonstrated its potential, especially for the secure model inference of a deep learning application by protecting both the user input data and the model parameters. Nevertheless, existing TPC protocols incur excessive communications during the program execution, which lengthens the execution time. In this work, we propose the precomputing scheme, POPS, to address the problem, which is done by shifting the required communications from during the execution to the time prior to the execution. Particular, the multiplication triple generation is computed beforehand with POPS to remove the overhead at runtime. We have analyzed the TPC protocols to ensure that the precomputing scheme conforms the existing secure protocols. Our results show that POPS takes a step forward in the secure inference by delivering up to \(20\times \) and \(5\times \) speedups against the prior work for the microbenchmark and the convolutional neural network experiments, respectively.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号