首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3058篇
  免费   132篇
  国内免费   15篇
电工技术   43篇
综合类   13篇
化学工业   489篇
金属工艺   57篇
机械仪表   88篇
建筑科学   135篇
矿业工程   1篇
能源动力   95篇
轻工业   181篇
水利工程   26篇
石油天然气   7篇
无线电   556篇
一般工业技术   521篇
冶金工业   483篇
原子能技术   13篇
自动化技术   497篇
  2023年   18篇
  2022年   22篇
  2021年   55篇
  2020年   40篇
  2019年   49篇
  2018年   67篇
  2017年   62篇
  2016年   62篇
  2015年   59篇
  2014年   89篇
  2013年   190篇
  2012年   124篇
  2011年   150篇
  2010年   125篇
  2009年   146篇
  2008年   162篇
  2007年   175篇
  2006年   144篇
  2005年   113篇
  2004年   112篇
  2003年   99篇
  2002年   96篇
  2001年   70篇
  2000年   67篇
  1999年   72篇
  1998年   162篇
  1997年   119篇
  1996年   85篇
  1995年   54篇
  1994年   59篇
  1993年   46篇
  1992年   20篇
  1991年   17篇
  1990年   22篇
  1989年   36篇
  1988年   26篇
  1987年   22篇
  1986年   33篇
  1985年   25篇
  1984年   19篇
  1983年   10篇
  1982年   8篇
  1981年   11篇
  1980年   8篇
  1979年   4篇
  1978年   7篇
  1977年   11篇
  1976年   11篇
  1973年   5篇
  1966年   3篇
排序方式: 共有3205条查询结果,搜索用时 531 毫秒
71.
72.
73.
74.
Underwater communication primarily utilizes propagation of acoustic waves in water. Its unique characteristics, including slow propagation speed and low data rates, pose many challenges to Media Access Control (MAC) protocol design. In most existing handshaking-based underwater MAC protocols, only an initiating sender can transmit data packets to its intended receiver after a channel reservation through a Request-to-Send (RTS)/Clear-to-Send (CTS) handshake. This conventional single-node transmission approach is particularly inefficient in underwater environments, as it does not account for long propagation delays. To improve channel utilization in high latency environments, we propose a novel approach that exploits the idle waiting time during a 2-way handshake to set up concurrent transmissions from multiple nodes. The sender can coordinate multiple first-hop neighbors (appenders) to use the current handshake opportunity to transmit (append) their data packets with partially overlapping transmission times. After the sender finishes transmitting its packets to its own receiver, it starts to receive incoming appended packets that arrive in a collision-free packet train. This not only reduces the amount of time spent on control signaling, but it also greatly improves packet exchange efficiency. Based on this idea, we propose an asynchronous, single-channel handshaking-based MAC protocol based on reverse opportunistic packet appending (ROPA). From extensive simulations (single- and multi-hop networks) and comparisons with several existing MAC protocols, including MACA-U, MACA-UPT, BiC-MAC, Slotted-FAMA, DACAP, unslotted Aloha, we show that ROPA significantly increases channel utilization and offers performance gains in throughput and delay while attaining a stable saturation throughput.  相似文献   
75.
Abstract

In this article, we report on two lessons aimed at introducing junior high school students to the idea of shearing in a touchscreen dynamic geometry environment. By using shearing, we hoped to shift students’ attention away from a formula-driven, computational conception of area toward a more geometric one. We found that the students were able to solve several problems involving the comparison of polygons based on verbal and diagrammatic explanations. We describe the features of the touchscreen dynamic geometry technology that supported their learning, as well as the specific role that the teacher played in modeling students’ reasoning about area.  相似文献   
76.
A survey on algorithms for mining frequent itemsets over data streams   总被引:9,自引:8,他引:1  
The increasing prominence of data streams arising in a wide range of advanced applications such as fraud detection and trend learning has led to the study of online mining of frequent itemsets (FIs). Unlike mining static databases, mining data streams poses many new challenges. In addition to the one-scan nature, the unbounded memory requirement and the high data arrival rate of data streams, the combinatorial explosion of itemsets exacerbates the mining task. The high complexity of the FI mining problem hinders the application of the stream mining techniques. We recognize that a critical review of existing techniques is needed in order to design and develop efficient mining algorithms and data structures that are able to match the processing rate of the mining with the high arrival rate of data streams. Within a unifying set of notations and terminologies, we describe in this paper the efforts and main techniques for mining data streams and present a comprehensive survey of a number of the state-of-the-art algorithms on mining frequent itemsets over data streams. We classify the stream-mining techniques into two categories based on the window model that they adopt in order to provide insights into how and why the techniques are useful. Then, we further analyze the algorithms according to whether they are exact or approximate and, for approximate approaches, whether they are false-positive or false-negative. We also discuss various interesting issues, including the merits and limitations in existing research and substantive areas for future research.  相似文献   
77.
78.
Inverse sampling suggests one continues to sample subjects until a pre-specified number of rare events of interest is observed. It is generally considered to be more appropriate than the usual binomial sampling when the subjects come sequentially, when the response probability is rare, and when maximum likelihood estimators of some epidemiological measures are undefined under binomial sampling. Reliable but conservative exact conditional procedure for the ratio of the response probabilities of subject without the attribute of interest has been studied. However, such a procedure is inapplicable to the risk ratio (i.e., ratio of the response probabilities of subject with the attribute of interest). In this paper, we investigate various test statistics (namely Wald-type, score and likelihood ratio test statistics) for testing non-unity risk ratio under standard inverse sampling scheme, which suggests one continue to sample until the predetermined number of index subjects with the attributes of interest is observed. Both asymptotic and numerical approximate unconditional methods are considered for P-value calculation. Performance of these test procedures are evaluated under different settings by means of Monte Carlo simulation. In general, the Wald-type test statistic is preferable for its satisfactory and stable performance with approximate unconditional procedures. The methodologies are illustrated with a real example from a heart disease study.  相似文献   
79.
This paper considers single-machine scheduling problems with deteriorating jobs, i.e., jobs whose processing times are an increasing function of their starting times. In addition, the jobs are related by a series–parallel graph. It is shown that for the general linear problem to minimize the makespan, polynomial algorithms exist. It is also shown that for the proportional linear problem of minimization of the total weighted completion time, polynomial algorithms exist, too.  相似文献   
80.
Ng TW  Chau FS 《Applied optics》1994,33(25):5959-5961
Errors in measurement of the object illumination angle affect fringe interpretation accuracies in speckle interferometry. To measure the object illumination angle we propose a method based on the moiré effect. The technique is easy to implement and was found to yield fast and accurate measurements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号