首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   362345篇
  免费   22386篇
  国内免费   11204篇
电工技术   15887篇
技术理论   31篇
综合类   19121篇
化学工业   59377篇
金属工艺   21047篇
机械仪表   21126篇
建筑科学   24631篇
矿业工程   9872篇
能源动力   8947篇
轻工业   19967篇
水利工程   5921篇
石油天然气   20196篇
武器工业   2234篇
无线电   39646篇
一般工业技术   48974篇
冶金工业   17202篇
原子能技术   3064篇
自动化技术   58692篇
  2024年   769篇
  2023年   4406篇
  2022年   6531篇
  2021年   10854篇
  2020年   8281篇
  2019年   7025篇
  2018年   21027篇
  2017年   21186篇
  2016年   16980篇
  2015年   11629篇
  2014年   13892篇
  2013年   16548篇
  2012年   20665篇
  2011年   28188篇
  2010年   24453篇
  2009年   20969篇
  2008年   21779篇
  2007年   22454篇
  2006年   16076篇
  2005年   15292篇
  2004年   10095篇
  2003年   9013篇
  2002年   7818篇
  2001年   6573篇
  2000年   7269篇
  1999年   8520篇
  1998年   6852篇
  1997年   5799篇
  1996年   5457篇
  1995年   4473篇
  1994年   3729篇
  1993年   2607篇
  1992年   2120篇
  1991年   1596篇
  1990年   1142篇
  1989年   908篇
  1988年   746篇
  1987年   486篇
  1986年   357篇
  1985年   234篇
  1984年   161篇
  1983年   104篇
  1982年   125篇
  1981年   83篇
  1980年   67篇
  1968年   43篇
  1966年   42篇
  1965年   46篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
The multi-homogeneous Bezout number is a bound for the number of solutions of a system of multi-homogeneous polynomial equations, in a suitable product of projective spaces. Given an arbitrary, not necessarily multi-homogeneous, system, one can ask for the optimal multi-homogenization that would minimize the Bezout number. In this paper it is proved that the problem of computing, or even estimating, the optimal multi-homogeneous Bezout number is actually NP-hard. In terms of approximation theory for combinatorial optimization, the problem of computing the best multi-homogeneous structure does not belong to APX, unless P = NP. Moreover, polynomial-time algorithms for estimating the minimal multi-homogeneous Bezout number up to a fixed factor cannot exist even in a randomized setting, unless BPP ⫆ NP.  相似文献   
993.
In this paper, AssetCollector is presented, which is a system for managing collections of cultural assets. AssetCollector covers the needs of collection curators towards defining, populating and searching a collection in a flexible way, while supporting them in generating reports based on the collection’s assets and reusing them in order to build web sites and CD-ROMs. In order to support the above functionality, the system provides the content structuring subsystem, the content input subsystem, the search subsystem and the report subsystem. The use of the subsystems is straightforward and requires no technical skills from the curators. AssetCollector has been successfully applied for organizing various collections of cultural assets in Greece, such as archaeological sites, museums and published books. In the future, an evaluation procedure is planned in order to further refine the use of the system according to the targeted users’ needs. Furthermore, more import and export facilities will be provided, which will make the system compliant with widely accepted standards.  相似文献   
994.
In this paper, we generalize the Linear VaR method from portfolios with normally distributed risk factors to portfolios with mixture of elliptically distributed ones. We treat both the Expected Shortfall and the Value-at-Risk of such portfolios. Special attention is given to the particular case of a mixture of multivariate t-distributions. This is a part of J. SADEFO-KAMDEM PhD Thesis[12] of the Université de Reims, France . It has been presented at the workshop on modelling and computation in Financial Engineering at Bad Herrenalb, Germany May 6-8, 2003. The author is an associate professor at the Department of mathematics, université d’Evry Val d’Essonne.  相似文献   
995.
996.
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required  相似文献   
997.
Domain-Driven, Actionable Knowledge Discovery   总被引:1,自引:0,他引:1  
Data mining increasingly faces complex challenges in the real-life world of business problems and needs. The gap between business expectations and R&D results in this area involves key aspects of the field, such as methodologies, targeted problems, pattern interestingness, and infrastructure support. Both researchers and practitioners are realizing the importance of domain knowledge to close this gap and develop actionable knowledge for real user needs.  相似文献   
998.
999.
1000.
Applications of the discrete element method in mechanical engineering   总被引:2,自引:0,他引:2  
Compared to other fields of engineering, in mechanical engineering, the Discrete Element Method (DEM) is not yet a well known method. Nevertheless, there is a variety of simulation problems where the method has obvious advantages due to its meshless nature. For problems where several free bodies can collide and break after having been largely deformed, the DEM is the method of choice. Neighborhood search and collision detection between bodies as well as the separation of large solids into smaller particles are naturally incorporated in the method. The main DEM algorithm consists of a relatively simple loop that basically contains the three substeps contact detection, force computation and integration. However, there exists a large variety of different algorithms to choose the substeps to compose the optimal method for a given problem. In this contribution, we describe the dynamics of particle systems together with appropriate numerical integration schemes and give an overview over different types of particle interactions that can be composed to adapt the method to fit to a given simulation problem. Surface triangulations are used to model complicated, non-convex bodies in contact with particle systems. The capabilities of the method are finally demonstrated by means of application examples. Commemorative Contribution.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号