首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13868篇
  免费   1218篇
  国内免费   478篇
电工技术   580篇
综合类   446篇
化学工业   2598篇
金属工艺   618篇
机械仪表   535篇
建筑科学   741篇
矿业工程   271篇
能源动力   458篇
轻工业   1130篇
水利工程   214篇
石油天然气   315篇
武器工业   64篇
无线电   2315篇
一般工业技术   2232篇
冶金工业   868篇
原子能技术   113篇
自动化技术   2066篇
  2024年   51篇
  2023年   241篇
  2022年   446篇
  2021年   679篇
  2020年   520篇
  2019年   463篇
  2018年   523篇
  2017年   514篇
  2016年   630篇
  2015年   546篇
  2014年   687篇
  2013年   1022篇
  2012年   853篇
  2011年   927篇
  2010年   758篇
  2009年   736篇
  2008年   694篇
  2007年   623篇
  2006年   587篇
  2005年   533篇
  2004年   366篇
  2003年   336篇
  2002年   295篇
  2001年   261篇
  2000年   229篇
  1999年   222篇
  1998年   343篇
  1997年   219篇
  1996年   179篇
  1995年   159篇
  1994年   115篇
  1993年   138篇
  1992年   68篇
  1991年   83篇
  1990年   52篇
  1989年   58篇
  1988年   47篇
  1987年   32篇
  1986年   32篇
  1985年   34篇
  1984年   41篇
  1983年   22篇
  1982年   26篇
  1981年   25篇
  1980年   22篇
  1979年   20篇
  1978年   19篇
  1977年   19篇
  1974年   8篇
  1973年   14篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results.  相似文献   
32.
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy with relatively small computational complexity compared with other conventional detection methods.  相似文献   
33.
Pei‐Chi Wu 《Software》2001,31(12):1125-1130
ISO 10646 Universal Character Set (UCS) is a 31‐bit coding architecture that covers symbols in most of the world's written languages. Identifiers in programming languages are usually defined by using alphanumeric characters of ASCII, which represent mainly English words. An approach for working around this deficiency is to encode multilingual identifiers into the alphanumeric range of ASCII. For case‐sensitive languages, an encoding that utilizes [0–9][A–Z][a–z] can be more space‐efficient for multilingual identifiers. This paper proposes a base62 transformation format of ISO 10646 called UTF‐62. The resulting string of UTF‐62 is within a [0–9][A–Z][a–z] range, a total of 62 base characters. UTF‐62 also preserves the lexicographic sorting order of UCS‐4. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
34.
The International Society of Automation recently released ISA100.11a as an open standard for reliable wireless networks for industrial automation. ISA100.11a uses the TDMA scheme in the medium access layer to provide deterministic services. However, ISA100.11a adopts the CSMA-CA mechanism with priorities for retransmission from failure on dedicated links, sporadic data, and network configuration.This paper evaluates ISA100.11a CSMA-CA by simulation, considering the effects of backoff procedures and priority settings to probability of collision and successful use of slots. It's demonstrated that a high number of priority classes enable better network utilization resulting in less number of packets exceeding their lifetime.  相似文献   
35.
Résumé Les résultats expérimentaux présentés dans cette étude et ceux publiés précédemment montrent que l'électroréduction de l'oxygène se fait dans les sites actifs formés par des ions Mn4+, et que ceux de Mn3+ assurent le transport des électrons au sein du solide.
From the results obtained in this study and those presented in previous publications, it can be deduced that the electroreduction of oxygen occurs via electron transfers at active sites created by Mn4+ ions and that Mn3+ ions contribute to the transport of the electrons through the bulk of the electrocatalysts.


Certains de ces résultats ont fait l'object d'une communication enPoster à la réunion I.S.E. à Varna, Septembre 1977.

A=Zn, Cr, Al;B = Ni, Cu; et 0 x,y 1.  相似文献   
36.
An all-optical 2R regenerator, based on a compact self-seeded Fabry-Pe/spl acute/rot laser diode with a 10-mm-long embedded fiber Bragg grating cavity, and a bidirectional erbium-doped fiber amplifier, is proposed and experimentally demonstrated to execute all-optical 2R regeneration at 10 Gb/s. Compared with the conventional 1R regeneration, the proposed scheme has achieved significant 6.4-dB improvement of power penalty at bit-error ratio =10/sup -9/ in the transmission experiment over 100-km standard single-mode fiber.  相似文献   
37.
For original paper by Zorzi and Rao, see IEEE J. Sel. Areas Commun., vol.12, no.8, p.1289-98 (1994 October)  相似文献   
38.
39.
40.
We have studied heterogeneous nucleation of liquid 4He on cesiated surfaces using calorimetric techniques. Nucleation kinetics are strongly influenced by wetting properties. Since liquid 4He does not wet cesium below 2K, substantial supercooling of the vapor is expected on theoretical grounds. Experimentally, however, we have been unable to detect any supercooling in our cells. This may be due to microscopic defects in the Cs coating, which in turn may be related to the fact that we have been unable to find a cell construction material which is wetted by Cs. Somewhat paradoxically, it is possible to supercool helium vapor even in a container made of conventional wetted materials by imposing a large heat and mass flux from the liquid to the vapor across the bulk liquid-vapor interface. When evaporation is sufficiently strong, the vapor above the liquid becomes unstable, and forms a dense fog. Videos of this process show that the fog front propagates rapidly from very near the liquid-vapor interface upward into the vapor. Fog formation near the liquid interface implies that the vapor is in a supercooled metastable state. Qualitative ideas from non-equilibrium thermodynamics and kinetic theory are used to explain this phenomenon.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号