首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   229632篇
  免费   20052篇
  国内免费   13061篇
电工技术   34680篇
技术理论   22篇
综合类   26234篇
化学工业   11156篇
金属工艺   8244篇
机械仪表   19111篇
建筑科学   20775篇
矿业工程   9236篇
能源动力   8904篇
轻工业   5058篇
水利工程   6671篇
石油天然气   6837篇
武器工业   3943篇
无线电   23355篇
一般工业技术   13529篇
冶金工业   6930篇
原子能技术   2336篇
自动化技术   55724篇
  2024年   346篇
  2023年   1995篇
  2022年   3864篇
  2021年   5198篇
  2020年   5604篇
  2019年   4087篇
  2018年   3826篇
  2017年   5364篇
  2016年   6458篇
  2015年   7581篇
  2014年   14437篇
  2013年   12326篇
  2012年   17044篇
  2011年   18130篇
  2010年   13754篇
  2009年   13775篇
  2008年   14203篇
  2007年   18117篇
  2006年   16299篇
  2005年   14584篇
  2004年   11969篇
  2003年   10752篇
  2002年   8173篇
  2001年   6849篇
  2000年   5603篇
  1999年   4514篇
  1998年   3416篇
  1997年   2754篇
  1996年   2451篇
  1995年   2102篇
  1994年   1730篇
  1993年   1159篇
  1992年   978篇
  1991年   707篇
  1990年   572篇
  1989年   478篇
  1988年   339篇
  1987年   202篇
  1986年   122篇
  1985年   143篇
  1984年   129篇
  1983年   118篇
  1982年   108篇
  1981年   66篇
  1980年   60篇
  1979年   48篇
  1978年   37篇
  1977年   30篇
  1976年   23篇
  1959年   21篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the new location privacy challenges caused by DLBS, since the service device is enabled to perform the localization without the permission of the user. To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user. The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information of their device. We make the simulation of our proposed scheme and the result convince its effectiveness.  相似文献   
82.
针对具有自动装卸搬运机器人的制造单元,着重考虑其双重资源约束的特点,提出了该系统的有限缓冲开排队网的建模方法。根据工件的加工、装卸与搬运等工艺流程,定义该系统的排队网模型的各种状态,基于连续时间马尔可夫链,采用精确解法对该模型进行分析求解,获得系统一系列的稳态性能指标。为了验证排队网建模方法的有效性,建立其对应的仿真模型,分别采用排队网模型的数值计算与仿真模型的仿真统计2种方法求出系统的性能指标进行对比,并基于排队网模型对该制造单元的系统性能进行分析,为该类制造单元的资源配置优化和设施布局优化等问题提供重要的理论支撑。  相似文献   
83.
The Pythagorean fuzzy set (PFS) is characterized by two functions expressing the degree of membership and the degree of nonmembership, which square sum of them is equal or less than 1. It was proposed as a generalization of a fuzzy set to deal with indeterminate and inconsistent information. In this study, we shall present some novel Dice similarity measures of PFSs and the generalized Dice similarity measures of PFSs and indicates that the Dice similarity measures and asymmetric measures (projection measures) are the special cases of the generalized Dice similarity measures in some parameter values. Then, we propose the generalized Dice similarity measures-based multiple attribute group decision-making models with Pythagorean fuzzy information. Then, we apply the generalized Dice similarity measures between PFSs to multiple attribute group decision making. Finally, an illustrative example is given to demonstrate the efficiency of the similarity measures for selecting the desirable ERP system.  相似文献   
84.
85.
Two low-memory and high-performance architectures for the CCSDS 122.0-B-1 standard are proposed. They use novel memory organizations to reduce the total memory requirements in order to be implemented in a single FPGA device. The architectures were implemented in radiation-hardened and commercial FPGA devices. Based on the experimental results for the case of Virtex5QV radiation-hardened device, the throughput is 135 MSamples/sec for image with 12 bits/pixel and horizontal resolution up 8192 pixels. Also, the proposed architectures outperform the existing one in terms of the memory requirements and area.  相似文献   
86.
针对高可靠度机载多余度EWIS各组成部分寿命服从指数分布但参数未知的情况,提出采用无失效数据可靠度分析方法评估EWIS的可靠度水平。通过Monte-Carlo仿真方法对连接形式为“先并联、后串联”EWIS各组成部分寿命进行抽样,利用“最小最大值”方法获得系统寿命的抽样值,用概率纸检验法初步判断EWIS寿命是否服从威布尔分布,再用Pearson拟合优度检验法判断EWIS寿命是否服从威布尔分布。结合无故障飞行时间的样本值与EWIS寿命服从威布尔分布的假设,采用无失效数据分析方法评估EWIS的可靠度水平。研究方法对机载多余度EWIS无失效数据可靠度分析有一定的贡献。  相似文献   
87.
In this paper, a novel compound fault-tolerant attitude control (FTC) scheme is proposed for reentry hypersonic vehicles with aerodynamic surfaces and reaction control systems (RCS) in the presence of parameter uncertainties, external disturbances and aerodynamic surfaces faults. Aerodynamic surfaces work as the primary actuators and RCS serve as auxiliary actuators. When aerodynamic surfaces cannot provide the required attitude control torque due to low dynamic pressure or faults, RCS are activated to assist aerodynamic surfaces to generate the residual torque. A nonlinear disturbance observer-based sliding mode controller is designed to calculate the required attitude control torque which can handle the parametric uncertainties and external disturbances together. The quadratic programming method is applied to obtain the optimal aerodynamic surfaces deflections from the required control torque. An innovative fuzzy rule-based decision-making system is design to solve the RCS control allocation problem, which is conceptually easy to understand and computationally efficiently compared with existing approaches. Based on quantized control theory, the closed-loop control system stability is rigorously analyzed. Simulation results are given to demonstrate the effectiveness and efficiency of developed FTC scheme.  相似文献   
88.
为研究含齿形裂隙岩石在单轴压缩下的破坏特征及强度特性,制作了含不同裂隙倾角和起伏角的齿形裂隙类岩石材料试件,并采用岩石力学伺服试验机进行单轴压缩试验。试验结果表明:(1)试件主要产生拉伸、剪切和拉剪复合裂纹,且根据裂纹的扩展路径可划分为A型(拉伸破坏)、B型(剪切破坏)、C型(复合破坏)3种破坏模式,裂隙倾角对试件最终破坏模式影响显著;(2)当裂隙倾角较小时,试件应力—应变曲线为多峰曲线,随着裂隙倾角的增大,曲线呈单峰形式,表现为延性减弱,脆性增强,而裂隙倾角相同但起伏角不同的试件应力—应变曲线大致相同;(3)当裂隙起伏角相同时,试件当量峰值强度随裂隙倾角的增大呈先减小后增大的规律,且裂隙起伏角对试件当量峰值强度的影响小于裂隙倾角。  相似文献   
89.
The operational environment can be a valuable source of information about the behavior of software applications and their usage context. Although a single instance of an application has limited evidence of the range of the possible behaviors and situations that might be experienced in the field, the collective knowledge composed by the evidence gathered by the many instances of a same application running in several diverse user environments (eg, a browser) might be an invaluable source of information. This information can be exploited by applications able to autonomously analyze how they behave in the field and adjust their behavior accordingly. Augmenting applications with the capability to collaborate and directly share information about their behavior is challenging because it requires the definition of a fully decentralized and dependable networked infrastructure whose nodes are the user machines. The nodes of the infrastructure must be collaborative, to share information, and autonomous, to exploit the available information to change their behavior, for instance, to better accommodate the needs of the users to prevent known problems. This paper describes the initial results that we obtained with the design and the development of an infrastructure that can enable the execution of collaborative scenarios in a fully decentralized way. Our idea is to combine the agent-based paradigm, which is well suited to design collaborative and autonomous nodes, and the peer-to-peer paradigm, which is well suited to design distributed and dynamic network infrastructures. To demonstrate our idea, we augmented the popular JADE agent-based platform with a software layer that supports both the creation of a fully decentralized peer-to-peer network of JADE platforms and the execution of services within that network, thus enabling JADE multiagent systems (MASs) to behave as peer-to-peer networks. The resulting platform can be used to study the design of collaborative applications running in the field.  相似文献   
90.
Insider trading is a kind of criminal behavior in stock market by using nonpublic information. In recent years, it has become the major illegal activity in China’s stock market. In this study, a combination approach of GBDT (Gradient Boosting Decision Tree) and DE (Differential Evolution) is proposed to identify insider trading activities by using data of relevant indicators. First, insider trading samples occurred from year 2007 to 2017 and corresponding non-insider trading samples are collected. Next, the proposed method is trained by the GBDT, and initial parameters of the GBDT are optimized by the DE. Finally, out-of-samples are classified by the trained GBDT–DE model and its performances are evaluated. The experiment results show that our proposed method performed the best for insider trading identification under time window length of ninety days, indicating the relevant indicators under 90-days time window length are relatively more useful. Additionally, under all three time window lengths, relative importance result shows that several indicators are consistently crucial for insider trading identification. Furthermore, the proposed approach significantly outperforms other benchmark methods, demonstrating that it could be applied as an intelligent system to improve identification accuracy and efficiency for insider trading regulation in China stock market.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号