首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   336722篇
  免费   4750篇
  国内免费   1449篇
电工技术   5111篇
综合类   2515篇
化学工业   48585篇
金属工艺   12893篇
机械仪表   10295篇
建筑科学   9146篇
矿业工程   1146篇
能源动力   8435篇
轻工业   32416篇
水利工程   3397篇
石油天然气   2218篇
武器工业   6篇
无线电   42549篇
一般工业技术   62266篇
冶金工业   50042篇
原子能技术   3649篇
自动化技术   48252篇
  2021年   1843篇
  2020年   1382篇
  2019年   1712篇
  2018年   16693篇
  2017年   15621篇
  2016年   12576篇
  2015年   2761篇
  2014年   3938篇
  2013年   12368篇
  2012年   9868篇
  2011年   18885篇
  2010年   15577篇
  2009年   13838篇
  2008年   15610篇
  2007年   16535篇
  2006年   8568篇
  2005年   8794篇
  2004年   8433篇
  2003年   8311篇
  2002年   7214篇
  2001年   7195篇
  2000年   6581篇
  1999年   6960篇
  1998年   16557篇
  1997年   11485篇
  1996年   8722篇
  1995年   6616篇
  1994年   5794篇
  1993年   5644篇
  1992年   4074篇
  1991年   3839篇
  1990年   3617篇
  1989年   3439篇
  1988年   3337篇
  1987年   2643篇
  1986年   2535篇
  1985年   3211篇
  1984年   2868篇
  1983年   2606篇
  1982年   2409篇
  1981年   2448篇
  1980年   2247篇
  1979年   2091篇
  1978年   1909篇
  1977年   2211篇
  1976年   2759篇
  1975年   1612篇
  1974年   1516篇
  1973年   1583篇
  1972年   1153篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
82.
This paper presents and analyzes in detail an efficient search method based on evolutionary algorithms (EA) assisted by local Gaussian random field metamodels (GRFM). It is created for the use in optimization problems with one (or many) computationally expensive evaluation function(s). The role of GRFM is to predict objective function values for new candidate solutions by exploiting information recorded during previous evaluations. Moreover, GRFM are able to provide estimates of the confidence of their predictions. Predictions and their confidence intervals predicted by GRFM are used by the metamodel assisted EA. It selects the promising members in each generation and carries out exact, costly evaluations only for them. The extensive use of the uncertainty information of predictions for screening the candidate solutions makes it possible to significantly reduce the computational cost of singleand multiobjective EA. This is adequately demonstrated in this paper by means of mathematical test cases and a multipoint airfoil design in aerodynamics.  相似文献   
83.
Critical systems are aptly named - from electric power to water and gas to the telephone system and the Internet, they're all critical to some aspect of our daily lives. We're a networked society and as such, it's important to both know whether critical systems are trustworthy and be able to communicate, review, and debate the level of trust achieved in them. In the safety domain, explicit safety cases are increasingly required by law, regulations, and standards. In this article, we outline what a small, international group of experts, spanning various disciplines in safety, security, reliability, and critical infrastructure, been doing with the International Working Group on Assurance Cases (for Security), what we hope to achieve, and where we go next.  相似文献   
84.
In this letter, a concise process technology is proposed for the first time to enable the fabrication of good quality three-dimensional (3-D) suspended radio frequency (RF) micro-inductors on bulk silicon, without utilizing the lithography process on sidewall and trench-bottom patterning. Samples were fabricated to demonstrate the applicability of the proposed process technology.  相似文献   
85.
86.
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.  相似文献   
87.
88.
89.
This paper describes a sequential tripping strategy used in a wide area back-up protection expert system (BPES) to combat situations in which protection relays have maloperated or information is missing. The BPES is an innovative back-up protection scheme designed to prevent the occurrence of widespread blackouts. The BPES evaluates the certainty that transmission lines are likely to be affected by the fault and uses a sequential tripping strategy to isolate the fault if a firm decision is not available due to maloperated relays and/or missing information. The mode of analysis and the sequential tripping strategy ensures that the BPES will clear a fault at minimum risk to the network. An example is included to demonstrate how the certainty factor based sequential tripping strategy is employed by the BPES to clear a fault which occurred on the South Western part of the UK National Grid System  相似文献   
90.
Eliminating the adoption barrier   总被引:1,自引:0,他引:1  
Krueger  C. 《Software, IEEE》2002,19(4):29-31
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号