首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   682053篇
  免费   69380篇
  国内免费   49307篇
电工技术   69886篇
技术理论   26篇
综合类   62772篇
化学工业   96029篇
金属工艺   32867篇
机械仪表   48219篇
建筑科学   46033篇
矿业工程   20423篇
能源动力   22894篇
轻工业   34600篇
水利工程   18777篇
石油天然气   27206篇
武器工业   8120篇
无线电   68730篇
一般工业技术   61126篇
冶金工业   25875篇
原子能技术   6301篇
自动化技术   150856篇
  2024年   3039篇
  2023年   10283篇
  2022年   19297篇
  2021年   22211篇
  2020年   20898篇
  2019年   18379篇
  2018年   17343篇
  2017年   22364篇
  2016年   25467篇
  2015年   27229篇
  2014年   40690篇
  2013年   41779篇
  2012年   46232篇
  2011年   50825篇
  2010年   39736篇
  2009年   42600篇
  2008年   40760篇
  2007年   48318篇
  2006年   44237篇
  2005年   37260篇
  2004年   30462篇
  2003年   27340篇
  2002年   21948篇
  2001年   17882篇
  2000年   15696篇
  1999年   12342篇
  1998年   9733篇
  1997年   8093篇
  1996年   7065篇
  1995年   6077篇
  1994年   5274篇
  1993年   3946篇
  1992年   3136篇
  1991年   2458篇
  1990年   1941篇
  1989年   1668篇
  1988年   1143篇
  1987年   802篇
  1986年   645篇
  1985年   641篇
  1984年   635篇
  1983年   440篇
  1982年   455篇
  1981年   318篇
  1980年   283篇
  1979年   242篇
  1978年   147篇
  1977年   144篇
  1976年   84篇
  1962年   90篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
This work is devoted to the stress–strain state of isotropic double curved shell with defect system. The construction is weakened by two non-through thickness (internal) cracks of different length and by a circular hole located between cracks. In this study we use the line-spring model. Within the framework of this model cracks are modeled as mathematical cuts of shell’s middle surface. This leads to a two-dimensional problem. The problem is reduced to a system of eight boundary integral equations. To ensure the uniqueness of solution an additional equation is added. In the numerical solution of the problem special quadrature formulas for singular integrals of Cauchy type and the finite difference method are applied. The influence of defects on each other for double curved shell has been investigated. The given theoretical results can be used for the calculation of structural elements with holes, cracks on the strength and fracture toughness in various branches of engineering.  相似文献   
32.
33.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
34.
Though modeling and verifying Multi-Agent Systems (MASs) have long been under study, there are still challenges when many different aspects need to be considered simultaneously. In fact, various frameworks have been carried out for modeling and verifying MASs with respect to knowledge and social commitments independently. However, considering them under the same framework still needs further investigation, particularly from the verification perspective. In this article, we present a new technique for model checking the logic of knowledge and commitments (CTLKC+). The proposed technique is fully-automatic and reduction-based in which we transform the problem of model checking CTLKC+ into the problem of model checking an existing logic of action called ARCTL. Concretely, we construct a set of transformation rules to formally reduce the CTLKC+ model into an ARCTL model and CTLKC+ formulae into ARCTL formulae to get benefit from the extended version of NuSMV symbolic model checker of ARCTL. Compared to a recent approach that reduces the problem of model checking CTLKC+ to another logic of action called GCTL1, our technique has better scalability and efficiency. We also analyze the complexity of the proposed model checking technique. The results of this analysis reveal that the complexity of our reduction-based procedure is PSPACE-complete for local concurrent programs with respect to the size of these programs and the length of the formula being checked. From the time perspective, we prove that the complexity of the proposed approach is P-complete with regard to the size of the model and length of the formula, which makes it efficient. Finally, we implement our model checking approach on top of extended NuSMV and report verification results for the verification of the NetBill protocol, taken from business domain, against some desirable properties. The obtained results show the effectiveness of our model checking approach when the system scales up.  相似文献   
35.
Data fitting with B-splines is a challenging problem in reverse engineering for CAD/CAM, virtual reality, data visualization, and many other fields. It is well-known that the fitting improves greatly if knots are considered as free variables. This leads, however, to a very difficult multimodal and multivariate continuous nonlinear optimization problem, the so-called knot adjustment problem. In this context, the present paper introduces an adapted elitist clonal selection algorithm for automatic knot adjustment of B-spline curves. Given a set of noisy data points, our method determines the number and location of knots automatically in order to obtain an extremely accurate fitting of data. In addition, our method minimizes the number of parameters required for this task. Our approach performs very well and in a fully automatic way even for the cases of underlying functions requiring identical multiple knots, such as functions with discontinuities and cusps. To evaluate its performance, it has been applied to three challenging test functions, and results have been compared with those from other alternative methods based on AIS and genetic algorithms. Our experimental results show that our proposal outperforms previous approaches in terms of accuracy and flexibility. Some other issues such as the parameter tuning, the complexity of the algorithm, and the CPU runtime are also discussed.  相似文献   
36.
针对国际黄金价格的走低,黄金冶炼企业如何在激烈的市场竞争中寻求更大的利润空间,优化成本控制显得尤为重要。以某冶炼厂为例,阐述核算前移在优化企业成本控制中的应用,以达到降本增效的目的,实现企业利润的最大化。  相似文献   
37.
ABSTRACT

In this paper, we review some algebraic control system. Precisely, linear and bilinear systems on Euclidean spaces and invariant and linear systems on Lie groups. The fourth classes of systems have a common issue: to any class, there exists an associated subgroup. From this object, we survey the controllability property. Especially, from those coming from our contribution to the theory.  相似文献   
38.
Many argue that digital technologies have the potential to enhance the teaching and learning of mathematics. However, the availability of technology is not sufficient to realise this potential. The study reported takes a detailed approach to investigate the utility of the particular offerings of the available technologies in the teaching and learning of a specific area of mathematics, functions. Sixteen affordances identified in the data are described. The complexity of the process involved in resolving a situation where particular affordances would be useful so as they are perceived and enacted is detailed. Finally, a grounded theory framework arising from the data analysis from this study that can be used to explain, predict and guide action in other digital environments is presented.  相似文献   
39.
介绍机械制造厂燃煤锅炉的烟尘特点,分析滤料失效的原因,提出一套针对该工况的滤料解决方案。介绍针对复杂工况条件所选用的纤维种类以及复合面层原料成分配比的确定,最终选用针刺工艺加工并对该新产品的基本性能进行了测试分析。  相似文献   
40.
We introduce a new architecture for the design of a tool for modeling and simulation of continuous and hybrid systems. The environment includes a compiler based on Modelica, a modular and a causal standard specification language for physical systems modeling (the tool supports models composed using certain component classes defined in the Modelica Standard Library, and the instantiation, parameterization and connection of these MSL components are described using a subset of Modelica). Models are defined in Modelica and are translated into DEVS models. DEVS theory (originally defined for modeling and simulation of discrete event systems) was extended in order to permit defining these of models. The different steps in the compiling process are show, including how to model these dynamic systems under the discrete event abstraction, including examples of model simulation with their execution results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号