首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   218503篇
  免费   18336篇
  国内免费   12303篇
电工技术   34492篇
技术理论   22篇
综合类   24985篇
化学工业   10552篇
金属工艺   7555篇
机械仪表   18544篇
建筑科学   18694篇
矿业工程   8930篇
能源动力   8435篇
轻工业   4715篇
水利工程   6466篇
石油天然气   6656篇
武器工业   3970篇
无线电   21542篇
一般工业技术   11296篇
冶金工业   6839篇
原子能技术   2319篇
自动化技术   53130篇
  2024年   298篇
  2023年   1862篇
  2022年   3587篇
  2021年   4819篇
  2020年   5191篇
  2019年   3777篇
  2018年   3476篇
  2017年   5004篇
  2016年   6031篇
  2015年   7108篇
  2014年   13707篇
  2013年   11617篇
  2012年   16230篇
  2011年   17290篇
  2010年   13087篇
  2009年   13154篇
  2008年   13455篇
  2007年   17261篇
  2006年   15563篇
  2005年   13900篇
  2004年   11393篇
  2003年   10303篇
  2002年   7810篇
  2001年   6566篇
  2000年   5367篇
  1999年   4338篇
  1998年   3217篇
  1997年   2597篇
  1996年   2340篇
  1995年   2013篇
  1994年   1653篇
  1993年   1122篇
  1992年   942篇
  1991年   681篇
  1990年   551篇
  1989年   458篇
  1988年   325篇
  1987年   187篇
  1986年   111篇
  1985年   122篇
  1984年   102篇
  1983年   91篇
  1982年   72篇
  1981年   64篇
  1980年   51篇
  1979年   45篇
  1978年   34篇
  1977年   28篇
  1976年   23篇
  1959年   21篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
We provide normal forms and the global phase portraits on the Poincaré disk of the Abel quadratic differential equations of the second kind having a symmetry with respect to an axis or to the origin. Moreover, we also provide the bifurcation diagrams for these global phase portraits.  相似文献   
72.
With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the new location privacy challenges caused by DLBS, since the service device is enabled to perform the localization without the permission of the user. To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user. The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information of their device. We make the simulation of our proposed scheme and the result convince its effectiveness.  相似文献   
73.
针对具有自动装卸搬运机器人的制造单元,着重考虑其双重资源约束的特点,提出了该系统的有限缓冲开排队网的建模方法。根据工件的加工、装卸与搬运等工艺流程,定义该系统的排队网模型的各种状态,基于连续时间马尔可夫链,采用精确解法对该模型进行分析求解,获得系统一系列的稳态性能指标。为了验证排队网建模方法的有效性,建立其对应的仿真模型,分别采用排队网模型的数值计算与仿真模型的仿真统计2种方法求出系统的性能指标进行对比,并基于排队网模型对该制造单元的系统性能进行分析,为该类制造单元的资源配置优化和设施布局优化等问题提供重要的理论支撑。  相似文献   
74.
The Pythagorean fuzzy set (PFS) is characterized by two functions expressing the degree of membership and the degree of nonmembership, which square sum of them is equal or less than 1. It was proposed as a generalization of a fuzzy set to deal with indeterminate and inconsistent information. In this study, we shall present some novel Dice similarity measures of PFSs and the generalized Dice similarity measures of PFSs and indicates that the Dice similarity measures and asymmetric measures (projection measures) are the special cases of the generalized Dice similarity measures in some parameter values. Then, we propose the generalized Dice similarity measures-based multiple attribute group decision-making models with Pythagorean fuzzy information. Then, we apply the generalized Dice similarity measures between PFSs to multiple attribute group decision making. Finally, an illustrative example is given to demonstrate the efficiency of the similarity measures for selecting the desirable ERP system.  相似文献   
75.
76.
针对高可靠度机载多余度EWIS各组成部分寿命服从指数分布但参数未知的情况,提出采用无失效数据可靠度分析方法评估EWIS的可靠度水平。通过Monte-Carlo仿真方法对连接形式为“先并联、后串联”EWIS各组成部分寿命进行抽样,利用“最小最大值”方法获得系统寿命的抽样值,用概率纸检验法初步判断EWIS寿命是否服从威布尔分布,再用Pearson拟合优度检验法判断EWIS寿命是否服从威布尔分布。结合无故障飞行时间的样本值与EWIS寿命服从威布尔分布的假设,采用无失效数据分析方法评估EWIS的可靠度水平。研究方法对机载多余度EWIS无失效数据可靠度分析有一定的贡献。  相似文献   
77.
In this paper, a novel compound fault-tolerant attitude control (FTC) scheme is proposed for reentry hypersonic vehicles with aerodynamic surfaces and reaction control systems (RCS) in the presence of parameter uncertainties, external disturbances and aerodynamic surfaces faults. Aerodynamic surfaces work as the primary actuators and RCS serve as auxiliary actuators. When aerodynamic surfaces cannot provide the required attitude control torque due to low dynamic pressure or faults, RCS are activated to assist aerodynamic surfaces to generate the residual torque. A nonlinear disturbance observer-based sliding mode controller is designed to calculate the required attitude control torque which can handle the parametric uncertainties and external disturbances together. The quadratic programming method is applied to obtain the optimal aerodynamic surfaces deflections from the required control torque. An innovative fuzzy rule-based decision-making system is design to solve the RCS control allocation problem, which is conceptually easy to understand and computationally efficiently compared with existing approaches. Based on quantized control theory, the closed-loop control system stability is rigorously analyzed. Simulation results are given to demonstrate the effectiveness and efficiency of developed FTC scheme.  相似文献   
78.
The operational environment can be a valuable source of information about the behavior of software applications and their usage context. Although a single instance of an application has limited evidence of the range of the possible behaviors and situations that might be experienced in the field, the collective knowledge composed by the evidence gathered by the many instances of a same application running in several diverse user environments (eg, a browser) might be an invaluable source of information. This information can be exploited by applications able to autonomously analyze how they behave in the field and adjust their behavior accordingly. Augmenting applications with the capability to collaborate and directly share information about their behavior is challenging because it requires the definition of a fully decentralized and dependable networked infrastructure whose nodes are the user machines. The nodes of the infrastructure must be collaborative, to share information, and autonomous, to exploit the available information to change their behavior, for instance, to better accommodate the needs of the users to prevent known problems. This paper describes the initial results that we obtained with the design and the development of an infrastructure that can enable the execution of collaborative scenarios in a fully decentralized way. Our idea is to combine the agent-based paradigm, which is well suited to design collaborative and autonomous nodes, and the peer-to-peer paradigm, which is well suited to design distributed and dynamic network infrastructures. To demonstrate our idea, we augmented the popular JADE agent-based platform with a software layer that supports both the creation of a fully decentralized peer-to-peer network of JADE platforms and the execution of services within that network, thus enabling JADE multiagent systems (MASs) to behave as peer-to-peer networks. The resulting platform can be used to study the design of collaborative applications running in the field.  相似文献   
79.
Insider trading is a kind of criminal behavior in stock market by using nonpublic information. In recent years, it has become the major illegal activity in China’s stock market. In this study, a combination approach of GBDT (Gradient Boosting Decision Tree) and DE (Differential Evolution) is proposed to identify insider trading activities by using data of relevant indicators. First, insider trading samples occurred from year 2007 to 2017 and corresponding non-insider trading samples are collected. Next, the proposed method is trained by the GBDT, and initial parameters of the GBDT are optimized by the DE. Finally, out-of-samples are classified by the trained GBDT–DE model and its performances are evaluated. The experiment results show that our proposed method performed the best for insider trading identification under time window length of ninety days, indicating the relevant indicators under 90-days time window length are relatively more useful. Additionally, under all three time window lengths, relative importance result shows that several indicators are consistently crucial for insider trading identification. Furthermore, the proposed approach significantly outperforms other benchmark methods, demonstrating that it could be applied as an intelligent system to improve identification accuracy and efficiency for insider trading regulation in China stock market.  相似文献   
80.
With the growth of distributed computing systems, the modern Big Data analysis platform products often have diversified characteristics. It is hard for users to make decisions when they are in early contact with Big Data platforms. In this paper, we discussed the design principles and research directions of modern Big Data platforms by presenting research in modern Big Data products. We provided a detailed review and comparison of several state-of-the-art frameworks and concluded into a typical structure with five horizontal and one vertical. According to this structure, this paper presents the components and modern optimization technologies developed for Big Data, which helps to choose the most suitable components and architecture from various Big Data technologies based on requirements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号