首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   93057篇
  免费   4757篇
  国内免费   4562篇
电工技术   4516篇
技术理论   6篇
综合类   8915篇
化学工业   12675篇
金属工艺   5672篇
机械仪表   3246篇
建筑科学   4510篇
矿业工程   1318篇
能源动力   2797篇
轻工业   5862篇
水利工程   2031篇
石油天然气   4118篇
武器工业   707篇
无线电   7647篇
一般工业技术   14273篇
冶金工业   2538篇
原子能技术   2187篇
自动化技术   19358篇
  2024年   70篇
  2023年   322篇
  2022年   536篇
  2021年   748篇
  2020年   1178篇
  2019年   1058篇
  2018年   1176篇
  2017年   1113篇
  2016年   1704篇
  2015年   2349篇
  2014年   4250篇
  2013年   4961篇
  2012年   4295篇
  2011年   5037篇
  2010年   4191篇
  2009年   5549篇
  2008年   5579篇
  2007年   5970篇
  2006年   5445篇
  2005年   4522篇
  2004年   3906篇
  2003年   3778篇
  2002年   3798篇
  2001年   2835篇
  2000年   3199篇
  1999年   2974篇
  1998年   2493篇
  1997年   2369篇
  1996年   2522篇
  1995年   2653篇
  1994年   2415篇
  1993年   1469篇
  1992年   1487篇
  1991年   1028篇
  1990年   750篇
  1989年   670篇
  1988年   634篇
  1987年   371篇
  1986年   225篇
  1985年   374篇
  1984年   411篇
  1983年   429篇
  1982年   329篇
  1981年   407篇
  1980年   270篇
  1979年   116篇
  1978年   115篇
  1977年   70篇
  1976年   47篇
  1975年   55篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
Xin-Na Geng  Danyu Bai 《工程优选》2019,51(8):1301-1323
This article addresses the no-wait flowshop scheduling problem with simultaneous consideration of common due date assignment, convex resource allocation and learning effect in a two machine setting. The processing time of each job can be controlled by its position in a sequence and also by allocating extra resource, which is a convex function of the amount of a common continuously divisible resource allocated to the job. The objective is to determine the optimal common due date, the resource allocation and the schedule of jobs such that the total earliness, tardiness and common due date cost (the total resource consumption cost) are minimized under the constraint condition that the total resource consumption cost (the total earliness, tardiness and common due date cost) is limited. Polynomial time algorithms are developed for two versions of the problem.  相似文献   
22.
Propagation characteristics of Rayleigh-type wave in a piezoelectric layered system are theoretically investigated. The piezoelectric layer is considered as a cubic crystal with finite thickness rotated about Y-axis and is imperfectly bonded onto a semi-infinite dielectric substrate. The imperfect interface between the two constituents is assumed to be mechanically compliant and dielectrically weakly conducting. The exact dispersion relations for electrically open or shorted boundary conditions are obtained. The numerical results show that the phase velocity of Rayleigh-type wave is symmetric with respect to the cut orientation of 45。 and can achieve the maximum propagation speed in this orientation. The mechanical imperfection plays an important role in the dispersion relations, further the normal imperfection can produce a significant reduction of phase velocity comparing with the tangential imperfection. Comparing with the mechanical imperfection the electrical imperfection makes a relatively small reduction of phase velocity of Rayleigh-type wave. The obtained results can provide some fundamentals for understanding of piezoelectric semiconductor and for design and application of piezoelectric surface acoustic wave devices.  相似文献   
23.
The changeable structure and movement law of overlying strata are the main contributor to the change of mining stress. Starting from the relevant theory of key stratum and particularly based on the theory of mine ground pressure and strata control, this research proposed a new solution to mining stress problems by establishing a dual-load-zone stratum structural model. Elastic foundation beam theory was used to solve the stress of overlying strata of the dual-load-zones with superposition method, which revised the traditional calculation method of mining stress. The abnormal increase of lead abutment pressure in the mining area was explained effectively, through which the evolution law of mining stress in the case of hard rock was obtained. The results indicate that mining stress experiences a drastic change within the range of 50 m ahead of the coal wall due to the collapse of main roof; under the influence of main key stratum and inferior key strata, the influence range of lead abutment pressure is extended up to approximately 120 m in the working face; this remarkable increase can be attributed to the excessive length of sagging zone. Results from both the dual-load-zone model experiment and field measurement demonstrate high consistency. The model can predict the influence range of abutment pressure effectively and thus guide the safety production of mining.  相似文献   
24.
Degree based topological indices are being widely used in computer-aided modeling, structural activity relations, and drug designing to predict the underlying topological properties of networks and graphs. In this work, we compute the certain important degree based topological indices like Randic index, sum connectivity index, ABC index, ABC4 index, GA index and GA5 index of Book graph Bn and Stacked book graph Bm,n. The results are analyzed by using edge partition, and the general formulas are derived for the above-mentioned families of graphs.  相似文献   
25.
In this paper, a reliable stochastic numerical analysis for typhoid fever incorporating with protection against infection has been considered. We have compared the solutions of stochastic and deterministic typhoid fever model. It has been shown that the stochastic typhoid fever model is more realistic as compared to the deterministic typhoid fever model. The effect of threshold number T* hold in stochastic typhoid fever model. The proposed framework of the stochastic non-standard finite difference scheme (SNSFD) preserves all dynamical properties like positivity, bounded-ness and dynamical consistency defined by Mickens, R. E. The stochastic numerical simulation of the model showed that increase in protection leads to low disease prevalence in a population.  相似文献   
26.
Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find a ppropriate d ata t o m odeling. F irst o f all, we use concept drift to make the partition of the life cycle of process object. Then, entity community detection is proposed to find changes. Finally, we propose stream-based real-time optimization of data sampling. Contributions of this paper are concept drift, community detection, and stream-based real-time computing. Experiments show the effectiveness and feasibility of our proposed adaptive data sampling mechanism for process object.  相似文献   
27.
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time of encryption and decryption. Our experiments result demonstrates that the NTRU-type public-key cryptosystem over the binary field is relatively practical and effective.  相似文献   
28.
ICT projects are considered an important means of achieving development goals in developing countries. Although voluminous, the research to date is inconsistent in theorizing how, or why, development outcomes do or do not occur following the introduction of ICT4D. To better understand how and why ICT projects succeed, and even what success means in the ICT4D context, we conducted a literature review of ICT4D studies published during the period 2000–2016. We find that the very meaning of development varies, with four meanings of development emerging from the literature: (1) development as increased freedom, (2) development as expanded inclusion, (3) development as increased economic productivity, and (4) development as improved well-being. An ICT might succeed according to one meaning of development while simultaneously hindering achievement according to another meaning. As revealed by our analysis of the literature, these four perspectives suffer from some limitations, not least among them being the imposition of colonialist views of development on the recipients of the ICT4D. To address the limitations, we employ postcolonial theory to derive a new theory of ICT4D in which development is defined as an increase in power parity between dominant stakeholders and intended beneficiaries.  相似文献   
29.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view.  相似文献   
30.
In the field of images and imaging, super-resolution (SR) reconstruction of images is a technique that converts one or more low-resolution (LR) images into a highresolution (HR) image. The classical two types of SR methods are mainly based on applying a single image or multiple images captured by a single camera. Microarray camera has the characteristics of small size, multi views, and the possibility of applying to portable devices. It has become a research hotspot in image processing. In this paper, we propose a SR reconstruction of images based on a microarray camera for sharpening and registration processing of array images. The array images are interpolated to obtain a HR image initially followed by a convolution neural network (CNN) procedure for enhancement. The convolution layers of our convolution neural network are 3×3 or 1×1 layers, of which the 1×1 layers are used to improve the network performance particularly. A bottleneck structure is applied to reduce the parameter numbers of the nonlinear mapping and to improve the nonlinear capability of the whole network. Finally, we use a 3×3 deconvolution layer to significantly reduce the number of parameters compared to the deconvolution layer of FSRCNN-s. The experiments show that the proposed method can not only ameliorate effectively the texture quality of the target image based on the array images information, but also further enhance the quality of the initial high resolution image by the improved CNN.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号