首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41461篇
  免费   4082篇
  国内免费   2737篇
电工技术   3847篇
技术理论   2篇
综合类   3590篇
化学工业   4967篇
金属工艺   2739篇
机械仪表   3215篇
建筑科学   3530篇
矿业工程   1446篇
能源动力   1283篇
轻工业   2293篇
水利工程   1108篇
石油天然气   2045篇
武器工业   553篇
无线电   4688篇
一般工业技术   3854篇
冶金工业   1863篇
原子能技术   520篇
自动化技术   6737篇
  2024年   144篇
  2023年   477篇
  2022年   1066篇
  2021年   1563篇
  2020年   1143篇
  2019年   879篇
  2018年   1076篇
  2017年   1204篇
  2016年   1068篇
  2015年   1715篇
  2014年   2350篇
  2013年   2698篇
  2012年   3327篇
  2011年   3511篇
  2010年   3254篇
  2009年   3059篇
  2008年   3173篇
  2007年   3105篇
  2006年   2820篇
  2005年   2431篇
  2004年   1794篇
  2003年   1308篇
  2002年   1185篇
  2001年   996篇
  2000年   832篇
  1999年   577篇
  1998年   350篇
  1997年   269篇
  1996年   246篇
  1995年   148篇
  1994年   139篇
  1993年   79篇
  1992年   84篇
  1991年   45篇
  1990年   42篇
  1989年   42篇
  1988年   20篇
  1987年   14篇
  1986年   9篇
  1985年   4篇
  1984年   6篇
  1983年   4篇
  1982年   3篇
  1981年   2篇
  1980年   7篇
  1979年   6篇
  1959年   2篇
  1951年   4篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
51.
通过对给定样本模式的学习,构建的三层神经网络模型能够获取评价专家的经验、知识、主观判断以及对目标重要性的权重协调能力,较好地保证评价结果的客观性.实例证明,人工神经网络方法应用于组织网络化发展评价是可行和有效的.  相似文献   
52.
CORBA技术在现场设备通信中的应用*   总被引:1,自引:0,他引:1  
首先简要介绍CORBA体系结构,阐述了利用CORBA的代理机制,通过代理屏蔽不同通信协议差异,以实现设备之间通信的集成策略.该机制能够方便地实现不同协议设备之间的通信集成,而且便于系统扩展,并兼容多种操作系统平台.最后结合具体实例给出现场设备的集成方案.  相似文献   
53.
54.
Metallurgical and Materials Transactions A - In this work, we used hydride-dehydride Ti (HDH-Ti) powders (with the oxygen levels of 0.17 and 0.51 wt pct, respectively) combined with microstructural...  相似文献   
55.
Event-driven observer-based output feedback control for linear systems   总被引:1,自引:0,他引:1  
This paper concerns the problem of event-driven observer-based output feedback control of linear systems. Contrary to normal sampled-data control systems, where the controller is updated periodically, in event-driven systems, it is updated only when an “event” happens, and a typical event is defined as some error signals exceeding a given threshold. Both continuous- and discrete-time event detector cases are considered. It is shown that even with the significantly reduced sampling frequency, the global uniform ultimate boundedness of the event-driven closed-loop systems can also be guaranteed. A numerical example is finally used to illustrate the effectiveness and advantages of the proposed approaches.  相似文献   
56.
This paper investigates the observability analysis for linear time systems whose outputs are affected by unknown inputs. Three different definitions of observability are proposed. By introducing the Smith form and comparing the invariant factors, a sufficient condition is deduced for each proposed observability definition. Three examples are given for the purpose of highlighting the effectiveness of the proposed approach.  相似文献   
57.
A recently proposed pipelined multithreading (PMT) technique exhibits wide applicability in parallelizing general sequential programs on multi-core processors. However, significant inter-core communication overhead limits PMT performance and prevents its commercial utilization. A simple and effective clustered pipelined multithreading (CPMT) approach is presented to accelerate sequential programs on commodity multi-core processors. This CPMT technique adopts a clustered communication mechanism that can yield very low average communication overhead by eliminating false sharing as well as reducing communication operation and transit delays in the software-only approach. A single-producer/single-consumer concurrent lock-free clusteredQueue algorithm based on a two-level queue structure is also proposed. The accuracy of CPMT is theoretically demonstrated. The performances of the algorithm and CPMT are evaluated on a commodity AMD Phenom four-core processor. The number of enqueue and dequeue times of the algorithm are 20.8 and 23 cycles given an appropriate parameter, respectively. The speedup of CPMT ranges from 13.1% to 119.8% for typical loops extracted from the SPEC CPU 2000 benchmark suite.  相似文献   
58.
针对我国化肥生产企业质检机构的现状 ,结合国家相关政策的要求 ,就如何搞好化肥企业质检机构的管理提出了诸多指导性意见  相似文献   
59.
In this paper, a novel self-adaptive extreme learning machine (ELM) based on affinity propagation (AP) is proposed to optimize the radial basis function neural network (RBFNN). As is well known, the parameters of original ELM which developed by G.-B. Huang are randomly determined. However, that cannot objectively obtain a set of optimal parameters of RBFNN trained by ELM algorithm for different realistic datasets. The AP algorithm can automatically produce a set of clustering centers for the different datasets. According to the results of AP, we can, respectively, get the cluster number and the radius value of each cluster. In that case, the above cluster number and radius value can be used to initialize the number and widths of hidden layer neurons in RBFNN and that is also the parameters of coefficient matrix H of ELM. This may successfully avoid the subjectivity prior knowledge and randomness of training RBFNN. Experimental results show that the method proposed in this thesis has a more powerful generalization capability than conventional ELM for an RBFNN.  相似文献   
60.
Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software security, hardware security has some special features and challenges. In order to guarantee hardware security, academia has proposed the concept of trusted integrated circuits, which aims at a secure circulation of IC design, manufacture and chip using. This paper reviews the main problems of trusted integrated circuits, and concludes four key domains of the trusted IC, namely the trusted IC design, trusted manufacture, trusted IP protection, and trusted chip authentication. The main challenges in those domains are also analyzed based on the current known techniques. Finally, the main limitations of the current techniques and possible future trends are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号