首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36018篇
  免费   3621篇
  国内免费   2435篇
电工技术   1833篇
综合类   5055篇
化学工业   5379篇
金属工艺   3520篇
机械仪表   2480篇
建筑科学   3147篇
矿业工程   1169篇
能源动力   1219篇
轻工业   1512篇
水利工程   1010篇
石油天然气   2161篇
武器工业   247篇
无线电   2046篇
一般工业技术   4246篇
冶金工业   1794篇
原子能技术   422篇
自动化技术   4834篇
  2024年   64篇
  2023年   360篇
  2022年   680篇
  2021年   948篇
  2020年   1011篇
  2019年   929篇
  2018年   831篇
  2017年   1165篇
  2016年   1201篇
  2015年   1333篇
  2014年   2050篇
  2013年   2167篇
  2012年   2658篇
  2011年   2771篇
  2010年   2067篇
  2009年   2204篇
  2008年   2058篇
  2007年   2471篇
  2006年   2320篇
  2005年   1961篇
  2004年   1645篇
  2003年   1451篇
  2002年   1217篇
  2001年   989篇
  2000年   884篇
  1999年   757篇
  1998年   585篇
  1997年   519篇
  1996年   504篇
  1995年   461篇
  1994年   400篇
  1993年   274篇
  1992年   247篇
  1991年   203篇
  1990年   161篇
  1989年   147篇
  1988年   113篇
  1987年   62篇
  1986年   34篇
  1985年   31篇
  1984年   34篇
  1983年   26篇
  1982年   30篇
  1981年   6篇
  1980年   7篇
  1979年   17篇
  1977年   3篇
  1975年   3篇
  1959年   3篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
The Markov properties of the solutions of Ito-Skorokhod stochastic functional-differential equations (SFDEs) with entire prehistory are considered, the concept of a weak infinitesimal operator is introduced for a Markov process that is a solution of an SFDE, and the strong solution of the SFDE is analyzed for stability. Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 123–134, January–February 2009.  相似文献   
992.
The problem-solving time and the solution accuracy are expressed as functions of a parameter. An optimization problem of choosing the parameter using a “time cost–solution accuracy” criterion is considered. A Pareto-optimal set of solutions is obtained. The best value of the parameter is chosen by the ideal-point method. Translated from Kibernetika i Sistemnyi Analiz, No. 4, pp. 98–105, July–August 2009.  相似文献   
993.
Manufacturing systems produce their products by making use of three main strategies: make-to-order, make-to-stock and hybrid (combination of MTO and MTS strategies) systems. Hence, several products must be considered and partitioned in terms of many different conflicting criteria, leading to a large set of subjective or ambiguous data. Thus, an effective evaluation approach is essential to improve decision quality. In this paper a comprehensive decision, making structure is proposed to choose the proper strategy for producing the products. It consists of a novel hybrid methodology, which combines analytical hierarchy process (AHP) and technique for order performance by similarity to ideal solution (TOPSIS) for partitioning of products. In this study, the rating of each alternative regarding different criteria (throughout the TOPSIS technique) is described by means of linguistic variables. Furthermore, fuzzy AHP methodology is applied to determine the weights of evaluation criteria. At the end, the effectiveness of the proposed model is demonstrated through a case study.  相似文献   
994.
Most conventional conference key agreement protocols have not been concerned with a practical situation. There may exist some malicious conferees who attempt to block conference initiation for some purposes, e.g. commercial, political or military benefit. Instances where conference must be launched immediately due to emergency, efficient detection of malicious behavior would be needed. Recently, Tzeng (IEEE Trans. Comput. 51(4):373–379, 2002) proposed a fault-tolerant conference key agreement protocol to address the issue where a conference key can be established among conferees even though malicious conferees exist. However, his protocol might be complex and inefficient during fault-detection. In the case where a malicious conferee exists and a fault-tolerant mechanism is launched, complicated interactions between conferees will be required. In this paper, we introduce a novel strategy, where any malicious conferee may be identified and removed from the conferee list without any interaction. With such a non-interactive fault-tolerance, conferences could be established and started efficiently. A complete example of our protocol will be given to describe the fascinating fault-tolerance. We analyse the security of our protocol regarding four aspects, i.e. correctness, fault-tolerance, active attack and passive attack. The comparisons of performance between our protocol and that of Tzeng are also shown. As a whole, the advantage of our protocol is superior to that of Tzeng under the situation where malicious conferees exist.
Chi-Sung LaihEmail:
  相似文献   
995.
明式家具不论是在选材用料、造型设计、榫卯构成,还是在加工制作和装饰手法等方面的造诣直至今天还为人折服,人们认识到其价值的同时,也在不断的仿制明式家具的风格。文章通过具体分析明式家具中罗汉床的曲线造型这一点,使明式罗汉床的特点更明确化、具体化。希望通过分析,为现代家具设计师,特别是罗汉床的设计能提供一个清晰准确的定位。  相似文献   
996.
文章提出一种新颖的方法一改进的基因表达式编程算法来求解作业车间调度问题。作业车间调度问题是许多实际生产调度问题的简化模型,基因表达式编程算法结合了遗传算法和遗传编程的优点,具有更强的解决问题能力,对基因表达式编程算法进行改进使其在作业车间调度问题的应用上更加有效;最后应用一个实例来验证提出方法的有效性。  相似文献   
997.
演化测试是一种有效的测试用例自动生成技术。它将测试用例的生成的过程转化为一个利用遗传算法进行数值优化的问题,可以自动生成高质量的测试用例。目前,演化测试技术已经在许多测试领域被广泛地研究。研究发现,演化测试过程中无效解和局部最优解的存在扰乱了演化正常进行,降低了演化测试的性能。针对演化测试中存在的问题,提出基于惩罚函数的适应值函数F(x),对无效解和局部最优解进行惩罚,有助于演化过程中根据适应值选择更合适的个体进行遗传操作,提高演化测试的性能。实验结果表明,F(x)有效降低了无效解和局部最优解的适应值,提高了演化测试的性能。  相似文献   
998.
Force-distance curve measurements using atomic force microscope (AFM) has been widely used in a broad range of areas. However, currently force-curve measurements are hampered the its low speed of AFM. In this article, a novel inversion-based iterative control technique is proposed to dramatically increase the speed of force-curve measurements. Experimental results are presented to show that by using the proposed control technique, the speed of force-curve measurements can be increased by over 80 times--with no loss of spatial resolution--on a commercial AFM platform and with a standard cantilever. High-speed force curve measurements using this control technique are utilized to quantitatively study the time-dependent elastic modulus of poly(dimethylsiloxane) (PDMS). The force-curves employ a broad spectrum of push-in (load) rates, spanning two-order differences. The elastic modulus measured at low-speed compares well with the value obtained from dynamic mechanical analysis (DMA) test, and the value of the elastic modulus increases as the push-in rate increases, signifying that a faster external deformation rate transitions the viscoelastic response of PDMS from that of a rubbery material toward a glassy one.  相似文献   
999.
We offer a comparison of several different detectors of damage-induced nonlinearities in assessing the connectivity of a composite-to-metal bolted joint. Each detector compares the structure's measured vibrational response to surrogate data, conforming to a general model for the healthy structure. The strength of this approach to detection is that it works in the presence of certain types of varying ambient conditions and is valid for structures excited with any stationary process. Here we employ several such detectors using dynamic strain response data collected near the joint as the structure was driven using simulated wave forcing (taken from the Pierson–Moskowitz frequency distribution for wave height). In an effort to simulate in situ monitoring conditions the experiments were carried out in the presence of strongly varying temperatures. The performance of the detectors was assessed using receiver operating characteristic (ROC) curves, a well known method for displaying detection characteristics. The ROC curve is well suited to the problem of vibration-based structural health monitoring applications where quantifying false positive and false negative errors is essential. The results of this work indicate that using the estimated auto-bicoherence of the systems response produced the best overall detection performance when compared to features based on a nonlinear prediction scheme and another based on information theory. For roughly 10% false alarms, the bicoherence detector gives nearly 90% probability of detection (POD). Conversely, for several of the other detectors 5–10% false alarms leads to 70% POD. While the bicoherence (and bispectrum) have been used previously in the context of damage detection, this work represents the first attempt at using them in a surrogate-based detection scheme.  相似文献   
1000.
In this paper, we begin our research from the generating theory of the medial axis. The normal equidistant mapping relationships between two boundaries and its medial axis have been proposed based on the moving Frenet frames and Cesaro’s approach of the differential geometry. Two pairs of adjoint curves have been formed and the geometrical model of the medial axis transform of the planar domains with curved boundaries has been established. The relations of position mapping, scale transform and differential invariants between the curved boundaries and the medial axis have been investigated. Based on this model, a tracing algorithm for the computation of the medial axis has been generated. In order to get the accurate medial axis and branch points, a Two_Tangent_Points_Circle algorithm and a Three_Tangent_Points_Circle algorithm have been generated, which use the results of the tracing algorithm as the initial values to make the iterative process effective. These algorithms can be used for the computation of the medial axis effectively and accurately. Based on the medial axis transform and the envelope theory, the trimmed offset curves of curved boundaries have been investigated. Several numerical examples are given at the end of the paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号