首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10631篇
  免费   1048篇
  国内免费   389篇
电工技术   637篇
综合类   459篇
化学工业   1882篇
金属工艺   505篇
机械仪表   742篇
建筑科学   899篇
矿业工程   315篇
能源动力   313篇
轻工业   898篇
水利工程   154篇
石油天然气   653篇
武器工业   72篇
无线电   1271篇
一般工业技术   1488篇
冶金工业   487篇
原子能技术   118篇
自动化技术   1175篇
  2024年   52篇
  2023年   258篇
  2022年   439篇
  2021年   582篇
  2020年   421篇
  2019年   367篇
  2018年   372篇
  2017年   443篇
  2016年   406篇
  2015年   435篇
  2014年   567篇
  2013年   650篇
  2012年   663篇
  2011年   798篇
  2010年   632篇
  2009年   596篇
  2008年   575篇
  2007年   494篇
  2006年   487篇
  2005年   419篇
  2004年   276篇
  2003年   247篇
  2002年   213篇
  2001年   204篇
  2000年   175篇
  1999年   277篇
  1998年   197篇
  1997年   183篇
  1996年   128篇
  1995年   105篇
  1994年   89篇
  1993年   65篇
  1992年   44篇
  1991年   44篇
  1990年   29篇
  1989年   29篇
  1988年   18篇
  1987年   20篇
  1986年   11篇
  1985年   7篇
  1984年   8篇
  1983年   4篇
  1982年   5篇
  1981年   7篇
  1980年   5篇
  1976年   5篇
  1975年   2篇
  1972年   2篇
  1968年   2篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Influence Maximization aims to find the top-K influential individuals to maximize the influence spread within a social network, which remains an important yet challenging problem. Most existing greedy algorithms mainly focus on computing the exact influence spread, leading to low computational efficiency and limiting their application to real-world social networks. While in this paper we show that through supervised sampling, we can efficiently estimate the influence spread at only negligible cost of precision, thus significantly reducing the execution time. Motivated by this, we propose ESMCE, a power-law exponent supervised Monte Carlo estimation method. In particular, ESMCE exploits the power-law exponent of the social network to guide the sampling, and employs multiple iterative steps to guarantee the estimation accuracy. Moreover, ESMCE shows excellent scalability and well suits large-scale social networks. Extensive experiments on six real-world social networks demonstrate that, compared with state-of-the-art greedy algorithms, ESMCE is able to achieve almost two orders of magnitude speedup in execution time with only negligible error (2.21 % on average) in influence spread.  相似文献   
102.
With the rapid development of online learning technology, a huge amount of e-learning materials have been generated which are highly heterogeneous and in various media formats. Besides, e-learning environments are highly dynamic with the ever increasing number of learning resources that are naturally distributed over the network. On the other hand, in the online learning scenario, it is very difficult for users without sufficient background knowledge to choose suitable resources for their learning. In this paper, a hybrid recommender system is proposed to recommend learning items in users’ learning processes. The proposed method consists of two steps: (1) discovering content-related item sets using item-based collaborative filtering (CF), and (2) applying the item sets to sequential pattern mining (SPM) algorithm to filter items according to common learning sequences. The two approaches are combined to recommend potentially useful learning items to guide users in their current learning processes. We also apply the proposed approach to a peer-to-peer learning environment for resource pre-fetching where a central directory of learning items is not available. Experiments are conducted in a centralized and a P2P online learning systems for the evaluation of the proposed method and the results show good performance of it.  相似文献   
103.
管材超声波分层检测作为控制产品质量的关键步骤,必须引起相关从业人员的重视,特别是要重点分析分层缺陷检测中盲区的构成原因和分布特征。只有这样,才能切实保证检测结果的准确性,更好地控制管材质量。通过对超声波分层缺陷检测的重要性进行阐释,分析了其中盲区的构成和分布等问题。  相似文献   
104.
基于重金属对脲酶的抑制作用,研制了用于测定铜离子的生物传感器。该生物传感器的制备以壳聚糖为载体,将脲酶固定于pH电极表面。由于壳聚糖对Cu2+的富集,该生物传感器展现出高灵敏度。在样品溶液中加入5 mmol/L NaI,可以消除Hg2+和Ag+的干扰,从而实现Cu2+的选择性检测。在0.005~0.5μg/mL的浓度范围内,脲酶活性的抑制率与Cu2+浓度的对数呈良好的线性响应关系,其检出限为0.002μg/mL。将使用后的生物传感器浸泡于0.5 mmol/L的EDTA溶液再生5 min,被Cu2+抑制的脲酶的活性可以得到恢复。  相似文献   
105.
无患子表面活性物及其复配体系的性质研究   总被引:25,自引:0,他引:25  
对天然植物原料无患子提取物中的表面活性物的性质(临界胶束浓度、表面张力和起泡性能)及其影响因素(温度、pH、水硬度和盐度等)进行了系统的研究,结果表明无患子表面活性物具有很低的cmc和γcmc,且在一定范围内受一些因素的影响也不大,是一种理想的香波原料;同时也研究了无患子活性物与其他温和型的阴离子表面活性剂的复配体系,表明具有明显的协同增效效果。  相似文献   
106.
Multilayered protein films which contained ordered layers of photosynthetic reaction center (RC) from Rhodobacter Sphaeroides (RS601) were assembled by means of alternate electrostatic adsorption with positively charged poly(diallyldimethylammonium chloride) (PDDA). The assembly of RC was monitored by spectrometry and photocurrent measurement. Linear film growth was observed up to about 20 cycles of adsorption. For the monolayer film, the photocurrent was about 8.5 nA cm−2. For the multilayered film, the total photocurrent was about 77 nA cm−2 for the 24-layer RC film, while the average photocurrent increment per adsorption cycle was about 3.2 nA cm−2. The overall light-to-electricity conversion efficiency for a 24-layer film was about eight times higher than that for the monolayer one. The effects of electrode potential and pH on the photocurrent were also measured to illustrate the light-to-electric converting mechanism.  相似文献   
107.
In this paper, we study the coordination mechanism in the forestry supply chain between strategic forest management and tactical production planning. We first formulate an integrated model to establish a theoretical benchmark for performance of the entire supply chain. It is a mixed integer programming model that involves harvesting, bucking, transportation, production, and sales decisions for both tactical and strategic planning levels. We then present two sequential approaches S‐A and S‐B where the coordination is done through internal pricing. S‐A is the approach currently used in practice where harvesting in the forest is the main driver of the supply chain activities and internal pricing is introduced to control bucking decision in a separate stage. In contrast, S‐B takes downstream demand information into consideration and internal pricing directly influences harvesting decision in the first stage. In order to find the appropriate setting of internal pricing that leads to the system optimum, we suggest two heuristics H‐I and H‐II. The internal pricing in H‐I is based on dual values and in H‐II, it is derived from a Lagrangian decomposition. A real‐life case study in the Chilean forestry industry is used to compare the results of different approaches. It is shown that the new sequential approach S‐B generates as good feasible solution as that obtained from the integrated approach but in much less time. Both heuristics H‐I and H‐II bring about near‐optimal feasible solutions. H‐II also provides optimistic bound of the optimal objective function value, which can be used as a measure of the solution quality.  相似文献   
108.
扩展双星树(T(n)n1,n2)是 n-1长路径的两端点分别联结 n1条悬挂边和 n2条悬挂边所得到的图。论文根据扩展双星树的结构特征,研究了扩展双星树的类Wiener指数,给出了一般计算公式。  相似文献   
109.
In this paper, a mathematical model is presented to describe the photocatalytic degradation of VOCs in a packed bed reactor. Here, the adsorption of VOCs on the wall of the reactor is taken into account and the diffusion of VOCs in the axial direction is neglected. First-order kinetics is used to describe the photocatalytic oxidation of VOCs. The analytical solution of the present model is obtained by traveling wave method. The solution shows that the reactor performance is totally dependent on the inlet concentration of VOCs when the time is large enough. The present model is validated through the experimental result of the photocatalytic oxidation of trichloroethylene in a packed bed and the predicted results accord well with the experimental data. The influence of flow rate and inlet concentration on the performance of the reactor is discussed in detail. High flow rate offers high reaction rate and low conversion efficiency. The different inlet conditions and different reaction patterns are also investigated. The model would be useful to estimate the rate constant and help to the design of the reactor.  相似文献   
110.
随着计算机网络技术的不断发展,计算机互联网在人们的生活中应用越来越广泛,网络安全问题也随之而来。目前的计算机安全存在着诸多因素的威胁,研究人员也在致力于这方面的研究与发展,应用先进的技术来保证计算机安全,为计算机用户的信息安全提供更高的保障。本文将针对计算机安全问题进行分析,探讨数据加密技术在计算机安全中的应用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号