首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   26240篇
  免费   2319篇
  国内免费   1558篇
电工技术   463篇
技术理论   1篇
综合类   1065篇
化学工业   968篇
金属工艺   434篇
机械仪表   519篇
建筑科学   223篇
矿业工程   101篇
能源动力   958篇
轻工业   177篇
水利工程   39篇
石油天然气   56篇
武器工业   32篇
无线电   4818篇
一般工业技术   1931篇
冶金工业   128篇
原子能技术   146篇
自动化技术   18058篇
  2024年   97篇
  2023年   587篇
  2022年   919篇
  2021年   1225篇
  2020年   1178篇
  2019年   960篇
  2018年   985篇
  2017年   1965篇
  2016年   2268篇
  2015年   1664篇
  2014年   2523篇
  2013年   1719篇
  2012年   1747篇
  2011年   1717篇
  2010年   1433篇
  2009年   1637篇
  2008年   892篇
  2007年   1382篇
  2006年   1239篇
  2005年   714篇
  2004年   327篇
  2003年   366篇
  2002年   428篇
  2001年   414篇
  2000年   264篇
  1999年   299篇
  1998年   158篇
  1997年   123篇
  1996年   120篇
  1995年   92篇
  1994年   122篇
  1993年   74篇
  1992年   74篇
  1991年   73篇
  1990年   63篇
  1989年   62篇
  1988年   82篇
  1987年   6篇
  1986年   16篇
  1985年   18篇
  1984年   14篇
  1983年   8篇
  1982年   10篇
  1981年   8篇
  1980年   5篇
  1979年   5篇
  1978年   7篇
  1977年   11篇
  1976年   7篇
  1975年   3篇
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
31.
Bunruangses  M.  Youplao  P.  Amiri  I. S.  Pornsuwancharoen  N.  Yupapin  P. 《SILICON》2020,12(12):3057-3057
Silicon - The original version of this article unfortunately contained a mistake in the “Acknowledgments” section.  相似文献   
32.
Many argue that digital technologies have the potential to enhance the teaching and learning of mathematics. However, the availability of technology is not sufficient to realise this potential. The study reported takes a detailed approach to investigate the utility of the particular offerings of the available technologies in the teaching and learning of a specific area of mathematics, functions. Sixteen affordances identified in the data are described. The complexity of the process involved in resolving a situation where particular affordances would be useful so as they are perceived and enacted is detailed. Finally, a grounded theory framework arising from the data analysis from this study that can be used to explain, predict and guide action in other digital environments is presented.  相似文献   
33.
An Intermediate Bulk Container (IBC) was punctured during its handling, releasing oil onto soil at an environmentally-sensitive region of Australia. The telehandler did not pierce the plastic of the IBC directly (as was expected) but rather one of the tynes had caught on the underside of the metal base plate, despite numerous controls being in place at time of spill, revealing a previously unreported mechanism for a fluid spill from handling of petroleum hydrocarbons. The diverse investigation team used a root cause analysis (RCA) technique to identify the underlying cause: the inspection process was inadequate with contributing factors of not using a spotter and design of IBC did not anticipate conditions. Engineering controls were put in place as part of the change management process to help prevent spills from occurring from piercing from telehandler tynes on the current project site.  相似文献   
34.
Creating an intelligent system that can accurately predict stock price in a robust way has always been a subject of great interest for many investors and financial analysts. Predicting future trends of financial markets is more remarkable these days especially after the recent global financial crisis. So traders who access to a powerful engine for extracting helpful information throw raw data can meet the success. In this paper we propose a new intelligent model in a multi-agent framework called bat-neural network multi-agent system (BNNMAS) to predict stock price. The model performs in a four layer multi-agent framework to predict eight years of DAX stock price in quarterly periods. The capability of BNNMAS is evaluated by applying both on fundamental and technical DAX stock price data and comparing the outcomes with the results of other methods such as genetic algorithm neural network (GANN) and some standard models like generalized regression neural network (GRNN), etc. The model tested for predicting DAX stock price a period of time that global financial crisis was faced to economics. The results show that BNNMAS significantly performs accurate and reliable, so it can be considered as a suitable tool for predicting stock price specially in a long term periods.  相似文献   
35.
A steelmaking-continuous casting (SCC) scheduling problem is an example of complex hybrid flow shop scheduling problem (HFSSP) with a strong industrial background. This paper investigates the SCC scheduling problem that involves controllable processing times (CPT) with multiple objectives concerning the total waiting time, earliness/tardiness and adjusting cost. The SCC scheduling problem with CPT is seldom discussed in the existing literature. This study is motivated by the practical situation of a large integrated steel company in which the just-in-time (JIT) and cost-cutting production strategy have become a significant concern. To address this complex HFSSP, the scheduling problem is decomposed into two subproblems: a parallel machine scheduling problem (PMSP) in the last stage and an HFSSP in the upstream stages. First, a hybrid differential evolution (HDE) algorithm combined with a variable neighborhood decomposition search (VNDS) is proposed for the former subproblem. Second, an iterative backward list scheduling (IBLS) algorithm is presented to solve the latter subproblem. The effectiveness of this bi-layer optimization approach is verified by computational experiments on well-designed and real-world scheduling instances. This study provides a new perspective on modeling and solving practical SCC scheduling problems.  相似文献   
36.
Smart grid has opened up a new role of “prosumer” in an energy value network, transforming many conventional energy consumers into prosumers, who not only generate green energy but also share the surplus with utilities and other consumers. The concept of a goal-oriented prosumer community group (PCG) has emerged recently as an effective way to fulfill sustainable energy exchange. Such community-based energy sharing networks comprise multiple irreconcilable objectives such as demand constraints, cost constraints, and income maximization. In many cases, one goal may be achievable only at the expense of other goals. This necessitates the development of an effective framework to manage the multiple goals and reduce the gap with their achievement levels. Therefore, in this research paper, an effective framework is developed to negotiate among the multiple goals and thus to define optimal mutual goals for each PCG in a more sustainable manner using multiple-criteria goal programming techniques. Simulation results are presented to illustrate how the methods work in practical situations, where each of the objective measure is given a target value and the unwanted deviations from this set are minimized in an achievement function.  相似文献   
37.
We use photoluminescence to observe light-induced degradation in silicon in real time. Numerical simulations are used to match our results and lifetime decay data from the literature with theoretical models for the generation of the light-induced boron–oxygen defects. It is found that the existing model of the slowly generated defect SRC, where its saturated concentration is a function of the majority carrier concentration, does not explain certain results in both p- and n-type samples. A new model is proposed in which the saturated SRC concentration is controlled by the total hole concentration under illumination.  相似文献   
38.
The architectural choices underlying Linked Data have led to a compendium of data sources which contain both duplicated and fragmented information on a large number of domains. One way to enable non-experts users to access this data compendium is to provide keyword search frameworks that can capitalize on the inherent characteristics of Linked Data. Developing such systems is challenging for three main reasons. First, resources across different datasets or even within the same dataset can be homonyms. Second, different datasets employ heterogeneous schemas and each one may only contain a part of the answer for a certain user query. Finally, constructing a federated formal query from keywords across different datasets requires exploiting links between the different datasets on both the schema and instance levels. We present Sina, a scalable keyword search system that can answer user queries by transforming user-supplied keywords or natural-languages queries into conjunctive SPARQL queries over a set of interlinked data sources. Sina uses a hidden Markov model to determine the most suitable resources for a user-supplied query from different datasets. Moreover, our framework is able to construct federated queries by using the disambiguated resources and leveraging the link structure underlying the datasets to query. We evaluate Sina over three different datasets. We can answer 25 queries from the QALD-1 correctly. Moreover, we perform as well as the best question answering system from the QALD-3 competition by answering 32 questions correctly while also being able to answer queries on distributed sources. We study the runtime of SINA in its mono-core and parallel implementations and draw preliminary conclusions on the scalability of keyword search on Linked Data.  相似文献   
39.
Every year, the rate at which technology is applied on areas of our everyday life is increasing at a steady pace. This rapid development drives the technology companies to design and fabricate their integrated circuits (ICs) in non-trustworthy outsourcing foundries to reduce the cost, thus, leaving space for a synchronous form of virus, known as Hardware Trojan (HT), to be developed. HTs leak encrypted information, degrade device performance or lead to total destruction. To reduce the risks associated with these viruses, various approaches have been developed aiming to prevent and detect them, based on conventional or machine learning methods. Ideally, any undesired modification made to an IC should be detectable by pre-silicon verification/simulation and post-silicon testing. The infected circuit can be inserted in different stages of the manufacturing process, rendering the detection of HTs a complicated procedure. In this paper, we present a comprehensive review of research dedicated to countermeasures against HTs embedded into ICs. The literature is grouped in four main categories; (a) conventional HT detection approaches, (b) machine learning for HT countermeasures, (c) design for security and (d) runtime monitor.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号