首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6576篇
  免费   698篇
  国内免费   555篇
电工技术   444篇
技术理论   1篇
综合类   967篇
化学工业   301篇
金属工艺   72篇
机械仪表   247篇
建筑科学   885篇
矿业工程   128篇
能源动力   150篇
轻工业   140篇
水利工程   305篇
石油天然气   213篇
武器工业   73篇
无线电   582篇
一般工业技术   354篇
冶金工业   164篇
原子能技术   44篇
自动化技术   2759篇
  2024年   11篇
  2023年   73篇
  2022年   79篇
  2021年   99篇
  2020年   133篇
  2019年   154篇
  2018年   108篇
  2017年   151篇
  2016年   151篇
  2015年   188篇
  2014年   317篇
  2013年   326篇
  2012年   368篇
  2011年   471篇
  2010年   411篇
  2009年   486篇
  2008年   467篇
  2007年   578篇
  2006年   497篇
  2005年   439篇
  2004年   377篇
  2003年   318篇
  2002年   265篇
  2001年   191篇
  2000年   173篇
  1999年   150篇
  1998年   113篇
  1997年   124篇
  1996年   107篇
  1995年   75篇
  1994年   97篇
  1993年   68篇
  1992年   46篇
  1991年   47篇
  1990年   18篇
  1989年   28篇
  1988年   23篇
  1987年   13篇
  1986年   9篇
  1985年   14篇
  1984年   7篇
  1983年   7篇
  1982年   7篇
  1981年   7篇
  1980年   5篇
  1977年   3篇
  1976年   3篇
  1974年   3篇
  1962年   3篇
  1954年   2篇
排序方式: 共有7829条查询结果,搜索用时 31 毫秒
91.
《国际计算机数学杂志》2012,89(3-4):267-278
A boundary integral procedure for the solution of an important class of crack problems in anisotropic elasticity is outlined. A specific numerical example is considered in order to assess the effectiveness of the procedure.  相似文献   
92.
Insertion and deletion operations are two most important operations in molecular computation, and recently these two operations gained interest in the context of molecular computation. In the proposed system, single contextual insertion and usual (with two contexts) contextual deletions are used. In addition, it is assumed that the deletion operation has higher precedence than insertions, if both are possible at a moment. Given a word t, called a context, and the single contextual insertion is performed as follows. For each occurrence of the context t in the given string y, the word t is replaced as txt. In practice, this can be achieved by a replicative transposition process. Similarly, given a pair of words (u, v), called a context, the (u, v)-contextual deletion removes the word in between u and v. Finally, the power of this system and some closure properties are studied.  相似文献   
93.
生物多样性与人类健康休戚与共,在中国大力开展生物多样性保护和健康中国建设的背景下,实现二者的协同具有重要意义,但中国的相关研究和实践仍处于起步阶段,有必要回顾国际经验、探索前进方向。梳理了生物多样性与人类健康关系的认知发展历程,辨析了“同一健康”“生态健康”“星球健康”3种主流整体健康思想的异同,总结了当前有关生物多样性影响人类健康的医学和心理学机制、假说与理论模型。在此基础上,从阐释现象、理论机制、调节优化3个层面提出了生物多样性影响人类健康领域的15组关键研究问题,并提出了加强生物多样性促进人类健康能力的绿色空间规划设计策略。系统地展现了生物多样性影响人类健康领域的认知历程、作用机制、关键问题及实现路径,以期为后续研究和实践提供借鉴。  相似文献   
94.
This paper presents a privacy-preserving system for participatory sensing, which relies on cryptographic techniques and distributed computations in the cloud. Each individual user is represented by a personal software agent, deployed in the cloud, where it collaborates on distributed computations without loss of privacy, including with respect to the cloud service providers. We present a generic system architecture involving a cryptographic protocol based on a homomorphic encryption scheme for aggregating sensing data into maps, and demonstrate security in the Honest-But-Curious model both for the users and the cloud service providers. We validate our system in the context of NoiseTube, a participatory sensing framework for noise pollution, presenting experiments with real and artificially generated data sets, and a demo on a heterogeneous set of commercial cloud providers. To the best of our knowledge our system is the first operational privacy-preserving system for participatory sensing. While our validation pertains to the noise domain, the approach used is applicable in any crowd-sourcing application relying on location-based contributions of citizens where maps are produced by aggregating data – also beyond the domain of environmental monitoring.  相似文献   
95.
为提高神经网络的逼近和预测能力,提出一种各维输入为离散序列的量子衍生神经网络模型及算法。该模型为三层结构,隐层为量子衍生神经元,输出层为普通神经元。量子衍生神经元由量子旋转门和多位受控旋转门组成,利用多位受控旋转门中目标量子位的输出向输入端的反馈,实现对输入序列的整体记忆,利用受控旋转门输出中多位量子比特的纠缠获得量子衍生神经元的输出。基于量子计算理论设计了该模型的学习算法。该模型可从宽度和深度两方面获取输入序列的特征。仿真结果表明,当输入节点数和序列长度满足一定关系时,该模型明显优于普通神经网络。  相似文献   
96.
In the bioinformatics community, it is really important to find an accurate and simultaneous alignment among diverse biological sequences which are assumed to have an evolutionary relationship. From the alignment, the sequences homology is inferred and the shared evolutionary origins among the sequences are extracted by using phylogenetic analysis. This problem is known as the multiple sequence alignment (MSA) problem. In the literature, several approaches have been proposed to solve the MSA problem, such as progressive alignments methods, consistency-based algorithms, or genetic algorithms (GAs). In this work, we propose a Hybrid Multiobjective Evolutionary Algorithm based on the behaviour of honey bees for solving the MSA problem, the hybrid multiobjective artificial bee colony (HMOABC) algorithm. HMOABC considers two objective functions with the aim of preserving the quality and consistency of the alignment: the weighted sum-of-pairs function with affine gap penalties (WSP) and the number of totally conserved (TC) columns score. In order to assess the accuracy of HMOABC, we have used the BAliBASE benchmark (version 3.0), which according to the developers presents more challenging test cases representing the real problems encountered when aligning large sets of complex sequences. Our multiobjective approach has been compared with 13 well-known methods in bioinformatics field and with other 6 evolutionary algorithms published in the literature.  相似文献   
97.
Cut-and-choose paradigm makes Yao's protocol for two-party computation secure in malicious model with an error probability.In CRYPTO 2013,based on multi-phase cut-and-choose,Lindell reduced this probability to the optimal value.However,this work can only compute single-output functions with optimal error probability.We transform multi-phase cut-and-choose for singleoutput case into one that can deal with two-output functions,meanwhile maintaining the optimal error probability.Based on this new paradigm,we propose an efficient two-output secure computation protocol.Besides,by utilizing the specific property of the output garbled keys,we solve the authenticity issue of the generator's output with only symmetric cryptographic operations linear in the output length of the generator,which is the most efficient method so far in standard model without Random oracle (Ro).  相似文献   
98.
99.
This paper proposes an efficient computation‐aware mode decision and search point (SP) allocation algorithm for spatial and quality scalabilities in Scalable Video Coding. In our proposal, a linear model is derived to allocate the computation for macroblocks in enhancement layers by using the rate distortion costs of the base layer. In addition, an adaptive SP decision algorithm is proposed to decide the number of SPs for motion estimation under the constraint of the allocated computation. Experiment results demonstrate that the proposed algorithm allocates the computation resource efficiently and outperforms other works in rate distortion performance under the same computational availability constraint.  相似文献   
100.
Decisions on protecting public health against drinking water systems contamination threats should be made with careful consideration of credibility of threat observations and adverse impacts of response on system serviceability. Decision support models are developed in this study to prepare water utility operators for making these critical decisions during the intense course of an emergency. A pressure-dependent demand model is developed to simulate the system hydraulics and contaminant propagation under pressure-deficit conditions that emerge after the response actions are executed. Contrary to conventional demand-driven models, this hydraulic analysis approach prevents potential occurrence of negative pressures during the simulation and may identify better response protocols through exploring a larger search space. Response mechanisms of contaminant containment and discharge are optimized using evolutionary algorithms to achieve public health protection with minimum service interruption. Sensitivity analyses are conducted to assess optimal response performance for varying response delay, number of hydrants, and intrusion characteristics. Different methods for quantifying impacts on public health and system serviceability are explored and the sensitivity of the optimal response plan to these different formulations is investigated. The simulation-optimization schemes are demonstrated and discussed using a virtual water distribution system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号